We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Yes
Debian bookworm
x86_64
AirVPN
Kubernetes
Running version latest built on 2023-08-24T09:09:29.123Z (commit 1ac031e)
ERROR [ip getter] Get "https://ipinfo.io/": context deadline exceeded (Client.Timeout exceeded while awaiting headers)
2023-09-01T22:31:13Z INFO [wireguard] Using available kernelspace implementation 2023-09-01T22:31:13Z INFO [wireguard] Connecting to 213.152.187.219:1637 2023-09-01T22:31:13Z INFO [wireguard] Wireguard setup is complete. Note Wireguard is a silent protocol and it may or may not work, without giving any error message. Typically i/o timeout errors indicate the Wireguard connection is not working. 2023-09-01T22:31:13Z INFO [firewall] setting allowed input port 1637 through interface wg0... 2023-09-01T22:31:13Z DEBUG [firewall] iptables --append INPUT -i wg0 -p tcp --dport 1637 -j ACCEPT 2023-09-01T22:31:13Z DEBUG [firewall] ip6tables --append INPUT -i wg0 -p tcp --dport 1637 -j ACCEPT 2023-09-01T22:31:13Z DEBUG [firewall] iptables --append INPUT -i wg0 -p udp --dport 1637 -j ACCEPT 2023-09-01T22:31:13Z DEBUG [firewall] ip6tables --append INPUT -i wg0 -p udp --dport 1637 -j ACCEPT 2023-09-01T22:31:13Z INFO [firewall] setting allowed input port 41909 through interface wg0... 2023-09-01T22:31:13Z DEBUG [firewall] iptables --append INPUT -i wg0 -p tcp --dport 41909 -j ACCEPT 2023-09-01T22:31:13Z DEBUG [firewall] ip6tables --append INPUT -i wg0 -p tcp --dport 41909 -j ACCEPT 2023-09-01T22:31:13Z DEBUG [firewall] iptables --append INPUT -i wg0 -p udp --dport 41909 -j ACCEPT 2023-09-01T22:31:13Z DEBUG [firewall] ip6tables --append INPUT -i wg0 -p udp --dport 41909 -j ACCEPT 2023-09-01T22:31:13Z INFO [firewall] setting allowed input port 57427 through interface wg0... 2023-09-01T22:31:13Z DEBUG [firewall] iptables --append INPUT -i wg0 -p tcp --dport 57427 -j ACCEPT 2023-09-01T22:31:13Z DEBUG [firewall] ip6tables --append INPUT -i wg0 -p tcp --dport 57427 -j ACCEPT 2023-09-01T22:31:13Z DEBUG [firewall] iptables --append INPUT -i wg0 -p udp --dport 57427 -j ACCEPT 2023-09-01T22:31:13Z DEBUG [firewall] ip6tables --append INPUT -i wg0 -p udp --dport 57427 -j ACCEPT 2023-09-01T22:31:20Z ERROR [ip getter] Get "https://ipinfo.io/": context deadline exceeded (Client.Timeout exceeded while awaiting headers) 2023-09-01T22:31:20Z INFO [ip getter] retrying in 5s 2023-09-01T22:31:24Z INFO [healthcheck] program has been unhealthy for 11s: restarting VPN (see https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md) 2023-09-01T22:31:24Z INFO [vpn] stopping 2023-09-01T22:31:24Z INFO [firewall] removing allowed port 1637... 2023-09-01T22:31:24Z DEBUG [firewall] iptables --delete INPUT -i wg0 -p tcp --dport 1637 -j ACCEPT 2023-09-01T22:31:24Z DEBUG [firewall] ip6tables --delete INPUT -i wg0 -p tcp --dport 1637 -j ACCEPT 2023-09-01T22:31:24Z DEBUG [firewall] iptables --delete INPUT -i wg0 -p udp --dport 1637 -j ACCEPT 2023-09-01T22:31:24Z DEBUG [firewall] ip6tables --delete INPUT -i wg0 -p udp --dport 1637 -j ACCEPT 2023-09-01T22:31:24Z INFO [firewall] removing allowed port 41909... 2023-09-01T22:31:24Z DEBUG [firewall] iptables --delete INPUT -i wg0 -p tcp --dport 41909 -j ACCEPT 2023-09-01T22:31:24Z DEBUG [firewall] ip6tables --delete INPUT -i wg0 -p tcp --dport 41909 -j ACCEPT 2023-09-01T22:31:24Z DEBUG [firewall] iptables --delete INPUT -i wg0 -p udp --dport 41909 -j ACCEPT 2023-09-01T22:31:24Z DEBUG [firewall] ip6tables --delete INPUT -i wg0 -p udp --dport 41909 -j ACCEPT 2023-09-01T22:31:24Z INFO [firewall] removing allowed port 57427... 2023-09-01T22:31:24Z DEBUG [firewall] iptables --delete INPUT -i wg0 -p tcp --dport 57427 -j ACCEPT 2023-09-01T22:31:24Z DEBUG [firewall] ip6tables --delete INPUT -i wg0 -p tcp --dport 57427 -j ACCEPT 2023-09-01T22:31:24Z DEBUG [firewall] iptables --delete INPUT -i wg0 -p udp --dport 57427 -j ACCEPT 2023-09-01T22:31:24Z DEBUG [firewall] ip6tables --delete INPUT -i wg0 -p udp --dport 57427 -j ACCEPT 2023-09-01T22:31:24Z INFO [vpn] starting 2023-09-01T22:31:24Z INFO [firewall] allowing VPN connection... 2023-09-01T22:31:24Z DEBUG [firewall] iptables --delete OUTPUT -d 213.152.187.219 -o eth0 -p udp -m udp --dport 1637 -j ACCEPT 2023-09-01T22:31:24Z DEBUG [firewall] iptables --delete OUTPUT -d 213.152.187.219 -o eth0 -p udp -m udp --dport 1637 -j ACCEPT 2023-09-01T22:31:24Z DEBUG [firewall] iptables --delete OUTPUT -o wg0 -j ACCEPT 2023-09-01T22:31:24Z DEBUG [firewall] ip6tables --delete OUTPUT -o wg0 -j ACCEPT 2023-09-01T22:31:24Z DEBUG [firewall] iptables --append OUTPUT -d 213.152.186.18 -o eth0 -p udp -m udp --dport 1637 -j ACCEPT 2023-09-01T22:31:24Z DEBUG [firewall] iptables --append OUTPUT -d 213.152.186.18 -o eth0 -p udp -m udp --dport 1637 -j ACCEPT 2023-09-01T22:31:24Z DEBUG [firewall] iptables --append OUTPUT -o wg0 -j ACCEPT 2023-09-01T22:31:24Z DEBUG [firewall] ip6tables --append OUTPUT -o wg0 -j ACCEPT 2023-09-01T22:31:24Z INFO [wireguard] Using available kernelspace implementation 2023-09-01T22:31:24Z INFO [wireguard] Connecting to 213.152.186.18:1637 2023-09-01T22:31:24Z INFO [wireguard] Wireguard setup is complete. Note Wireguard is a silent protocol and it may or may not work, without giving any error message. Typically i/o timeout errors indicate the Wireguard connection is not working. 2023-09-01T22:31:24Z INFO [firewall] setting allowed input port 1637 through interface wg0... 2023-09-01T22:31:24Z DEBUG [firewall] iptables --append INPUT -i wg0 -p tcp --dport 1637 -j ACCEPT 2023-09-01T22:31:24Z DEBUG [firewall] ip6tables --append INPUT -i wg0 -p tcp --dport 1637 -j ACCEPT 2023-09-01T22:31:24Z DEBUG [firewall] iptables --append INPUT -i wg0 -p udp --dport 1637 -j ACCEPT 2023-09-01T22:31:24Z DEBUG [firewall] ip6tables --append INPUT -i wg0 -p udp --dport 1637 -j ACCEPT 2023-09-01T22:31:24Z INFO [firewall] setting allowed input port 41909 through interface wg0... 2023-09-01T22:31:24Z DEBUG [firewall] iptables --append INPUT -i wg0 -p tcp --dport 41909 -j ACCEPT 2023-09-01T22:31:24Z DEBUG [firewall] ip6tables --append INPUT -i wg0 -p tcp --dport 41909 -j ACCEPT 2023-09-01T22:31:24Z DEBUG [firewall] iptables --append INPUT -i wg0 -p udp --dport 41909 -j ACCEPT 2023-09-01T22:31:24Z DEBUG [firewall] ip6tables --append INPUT -i wg0 -p udp --dport 41909 -j ACCEPT 2023-09-01T22:31:24Z INFO [firewall] setting allowed input port 57427 through interface wg0... 2023-09-01T22:31:24Z DEBUG [firewall] iptables --append INPUT -i wg0 -p tcp --dport 57427 -j ACCEPT 2023-09-01T22:31:24Z DEBUG [firewall] ip6tables --append INPUT -i wg0 -p tcp --dport 57427 -j ACCEPT 2023-09-01T22:31:24Z DEBUG [firewall] iptables --append INPUT -i wg0 -p udp --dport 57427 -j ACCEPT 2023-09-01T22:31:24Z DEBUG [firewall] ip6tables --append INPUT -i wg0 -p udp --dport 57427 -j ACCEPT 2023-09-01T22:31:40Z ERROR [ip getter] Get "https://ipinfo.io/": context deadline exceeded (Client.Timeout exceeded while awaiting headers) 2023-09-01T22:31:40Z INFO [ip getter] retrying in 5s 2023-09-01T22:31:40Z INFO [healthcheck] program has been unhealthy for 16s: restarting VPN (see https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md) 2023-09-01T22:31:40Z INFO [vpn] stopping
sidecars: gluetun: image: ghcr.io/qdm12/gluetun:latest@sha256:8d744532dc4a2394f9b6544637b1c1312be8e38903777df6081fd1511d5d1223 env: - name: VPN_TYPE value: wireguard - name: VPN_SERVICE_PROVIDER value: airvpn - name: VPN_INTERFACE value: wg0 - name: FIREWALL value: "on" - name: DOT value: "off" - name: FIREWALL_VPN_INPUT_PORTS value: 1637,41909,57427 - name: FIREWALL_INPUT_PORTS value: 80 - name: FIREWALL_DEBUG value: "on" - name: DNS_ADDRESS value: 10.41.0.10 # kube coredns - name: WIREGUARD_MTU value: 1320 # - name: WIREGUARD_PRIVATE_KEY # value: set in secret # - name: WIREGUARD_ADDRESSES # value: set in secret # - name: SERVER_COUNTRIES # value: set in secret envFrom: - secretRef: name: qbit-vpn-secret volumeMounts: - { name: post-iptables, mountPath: /iptables/post-rules.txt } securityContext: capabilities: add: - NET_ADMIN
The text was updated successfully, but these errors were encountered:
Done in 3449e7a 😉
Sorry, something went wrong.
No branches or pull requests
Is this urgent?
Yes
Host OS
Debian bookworm
CPU arch
x86_64
VPN service provider
AirVPN
What are you using to run the container
Kubernetes
What is the version of Gluetun
Running version latest built on 2023-08-24T09:09:29.123Z (commit 1ac031e)
What's the problem 🤔
ERROR [ip getter] Get "https://ipinfo.io/": context deadline exceeded (Client.Timeout exceeded while awaiting headers)
Share your logs
Share your configuration
The text was updated successfully, but these errors were encountered: