mirror of
https://github.com/NginxProxyManager/nginx-proxy-manager.git
synced 2026-04-25 17:35:52 +03:00
[GH-ISSUE #3604] Lack of DNS Resolution/Internet Connection causes NPM panel 'Bad Gateway' #2388
Labels
No labels
awaiting feedback
bug
cannot reproduce
dns provider request
duplicate
enhancement
enhancement
enhancement
good first issue
help wanted
invalid
need more info
no certbot plugin available
product-support
pull-request
question
stale
troll
upstream issue
v2
v2
v2
v3
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/nginx-proxy-manager-NginxProxyManager#2388
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @bluekitedreamer on GitHub (Mar 6, 2024).
Original GitHub issue: https://github.com/NginxProxyManager/nginx-proxy-manager/issues/3604
Checklist
jc21/nginx-proxy-manager:latestdocker image?Yes
Yes
Yes
Describe the bug
The NPM portal app backend will not load because of a network failure. I'm running through scenarios to help reduce downtime in the future, one of the scenarios is pulling the internet cord for example (internet outage simulation). Another is DNS resolution failure, which leads to the same result.
When starting the container in such a situation you are presented with various errors. An example of one:
Nginx Proxy Manager Version
v2.11.1
To Reproduce
Steps to reproduce the behavior:
Expected behavior
The portal and backend shouldn't need a dependency on the ability to reach out to lets encrypt during startup. If certificates are already generated there is no need to do a check/update during startup that would result in a catastrophic failure, that should instead entail an error down the line that's visible in the portal (could even be a feature improvement to do SMTP alerts on inability to connect to lets encrypt and downed proxy hosts). Users working in airgapped environments with manually loaded certificates would also not be able to start the container.
Screenshots
Operating System
Additional context
@doublehelix commented on GitHub (Mar 27, 2024):
I have the same issue.
There seems to be no way to manually configure an IP address for DNS.
The configuration I have is:
Even if we have to edit a config file, it would be better than nothing.
An option in the GUI would also be great though!?
@barrelltitor commented on GitHub (Apr 15, 2024):
@doublehelix why not just use the dns option in docker compose? You just add e.g
dns: 192.168.1.5on the same level as container_name, image, etc@doublehelix commented on GitHub (Apr 15, 2024):
Unfortunately that doesn't work due to network isolation within docker containers and networks.
The only solution I've found so far is to network pihole on a macVLan and create a shared bridge that is used by all containers that need to use the DNS services in the pihole container (including nginx).
This has the unfortunate side effect that all docker containers are now networked together. Not ideal, and the opposite of the intention of isolation by default.
The other solution of course is to not host DNS in docker. (Which is the route I ended up taking in the meantime)
@barrelltitor commented on GitHub (Apr 17, 2024):
You can setup firewall rules on that network to:
That way they will not really be networked together, as the connection would be immediately dropped.
@github-actions[bot] commented on GitHub (Oct 28, 2024):
Issue is now considered stale. If you want to keep it open, please comment 👍
@github-actions[bot] commented on GitHub (Oct 31, 2025):
Issue was closed due to inactivity.