mirror of
https://github.com/netbirdio/netbird.git
synced 2026-05-14 20:21:59 -04:00
Waiting for zitadel to be ready loop, with quickstart script #1391
Open
opened 2025-11-20 05:29:30 -05:00 by saavagebueno
·
28 comments
No Branch/Tag Specified
main
drop-candidateviaroutes-filter
ui-refactor
fix/rosenpass
ui-refactor-ui
e2e-windows-dns-combined
refactor-combined
wasm-websocket-dial
drop-dns-probes
feature/affected-peers
dependabot/go_modules/github.com/Azure/go-ntlmssp-0.1.1
debug-logs
reduce-embed-wg-pool
windows-dns-firewall
dependabot/go_modules/github.com/jackc/pgx/v5-5.9.2
fix/login-cmd-root-flags
feat/reseller-openapi-spec
github-issue-resolver
add-steamos-support
fix-darwin-uninstaller
flutter-test
dependabot/npm_and_yarn/proxy/web/postcss-8.5.12
ci/freebsd-pkg-bootstrap
cached-serial-check-on-sync
fix-mgmt-cache-bypass-overlay
revert-easyjson-5938
revert-ice-5820
revert-firewalld-5928
refactor/permissions-manager
wasm-js-func-release
revert-dns-5935-systemd-resolved
revert-dns-5935-5945
revert-dns-5945-mgmt-cache
feature/log-most-busy-peers
prototype/ui-wails
vnc-server
coderabbitai/utg/8ae8f20
feature/use-peer-fqdn-on-https
dependabot/go_modules/golang.org/x/image-0.38.0
feature/metrics-push-management-control
release/0.68.3
dependabot/go_modules/github.com/aws/aws-sdk-go-v2/aws/protocol/eventstream-1.7.8
dependabot/go_modules/github.com/aws/aws-sdk-go-v2/service/s3-1.97.3
add-slack-channel
claude/rdp-token-passthrough-eNcqW
transparent-proxy
fix/macos-stale-route-eexist
crowdsec-selfhosted
fix/remove-otel-units
entire/checkpoints/v1
dependabot/go_modules/github.com/go-jose/go-jose/v4-4.1.4
fix/getting-started
feat/static-connectors-combined-server
feature/use-local-keys-embedded
feature/fleetdm
set-env-only-if-not-fork
feature/expose-has-channel
fix/connection-status-race
fix/filter-cgnat-cni-ice-candidates
feature/check-cert-locker-before-acme
test/proxy-fixes
test/proxy-mtu
prototype/ui-tauri
test/proxy-speed
fix-reused-ports
feat/migrate-to-embedded-idp
feature/add-serial-to-proxy-merged
deploy/proxy-serial
test/connection
feature/disable-legacy-port
feature/flag-to-disable-legacy-port
test/perftest
dependabot/go_modules/github.com/pion/dtls/v3-3.0.11
fix/http-redirect
poc-token-command
dn-reverse-proxy
prototype/reverse-proxy-rename
prototype/reverse-proxy-logs-pagination
feature/client-metrics
prototype/reverse-proxy-clusters
debug-dns-route
fix/win-dns-batch
add-extra-route-logs
job-stream-notify-disconnection-eof
deploy/secrets-manager
trigger-proxy-update
bug/update-ios-client-code-build-tags
sync-client-netmap-serial
log/conn-disconn
nmap/compaction-deploy
ci-win-test
feature/disk-encryption-check
wasm-debug
swap-dns-prio
fix/dex-config
feature/migrate-auto-groups-to-table
dependabot/go_modules/github.com/quic-go/quic-go-0.57.0
nmap/compaction
dex-nocgo-stub
feature/exclude-terraform-from-rate-limiting
test-freebsd
retries-refactor
coderabbitai/docstrings/b7e98ac
feat/integrate-zitadel
bug/ios-hanging-reconection
zitadel-idp
feat/network-map-serial
refactor/get-account-no-users
feat/auto-upgrade
feature/report-high-pat-id
feature/temporary-access-for-resource
fix/nmap-fwrules
dont-restart-dns
prototype/ui
update-gomobile
go-dns-for-ice
wasm-ldflags
test-ldflags
wasmbuild-test
feature/networks-s2s
vk/compare-nmaps
dbg/bothmaps
feature/changeset
reorder-dns-shutdown
fix/relay-reconnection-race
fix/nmap-exitnodes
vk/debug/nmap-both
move-licensed-code
feat/better-daemon-connection-lost-message
feat/auto-update-2
test/timings
refactor/getaccount-raw
tests/nmap-getaccount
refactor/nmap
refactor/nmap-limit-buffer
feature/detect-mac-wakeup
feature/extract-modules
quick-setings
feat/sync-limiter
feature/store-cache-impl
fix-install-version
feature/store-metrics
feature/metrics-on-store
feature/use-gorm-cache
loadtest-signal
unsymmetrical-squash
refactor/reducate-signaling
test/update-reduce
feature/store-cache
feature/remote-debug
cli-ws-proxy-backend-addr
feat/mgmt-map-serial
snyk-fix-d9d0081a4c7f9137bdb59d0d50a141a2
snyk-fix-7415cea5a11acd66753540ca2c598c63
job-yml-update
feature/android-allow-selecting-routes
fix/up-sequence
fix/dns-hash-update
snyk-fix-967adae9863f17f108ce8948d9117b8d
log/getaccount-by-peer
signal-suppressor
dns-exit-node
feature/auto-updates
feature/cache-srv-key
merged-fixes
fix/missed-offers-and-debug
debug-and-fixes
poc-wasm-clean-backend-s2s
test/remote-debug
debug-api
dependabot/go_modules/github.com/docker/docker-28.0.0incompatible
fix/remove-gpo-if-empty
fix/test-freebsd
fix/mysql-setup
fix/remove-logout-btn
handle-existing-domain-user
chore/unify-domain-validation
snyk-fix-c5fafc8a50ce1f29046e25a1fc346185
feat/profile-edit-btn
snyk-fix-a54966211e18d4cf67e5a2757cc006d1
log-short-id
feat/logout-ephemeral
log-checks
batch-wg-ops
nb-interface-default
feat/aws-integration
add/race-test
feature/relay-feature-versioning
fix/systemd-service-logs
poc/preprocessed-map
add-account-onboarding
bind-ipv6
fix/merge-main
logs/peerlogs-addpeer
feature/net-297-network-migration
feature/support-skip-auto-apply-exit-node-routes
set-cmd
set-command-with-cursor
feature/limit-update-channel
stop-using-locking-share
feature/poc-lazy-detection
feature/net-248-removal-of-sync-mutex-locks
test/multiple-peer-logging
preresolve
add-ns-punnycode-support
apply-routes-early
windows-search-domains
fix/connecting-route-filter
feature/management/rest-client/impersonate
debug-local-records
resource-fields-snake-case
test/grpc-rate-limit
traffic-correlation-policy
feature/rest-client-options
feat/events-metrics
feature/buf-cli
test/add-ratelimiter
test/remove-write-lock-on-add-peer
fix/add-peer-semaphore
feature/users-roles-endpoint
mlsmaycon-patch-1
debug-user-role
chore/primary-key-on-networks
feature/update-account-peers-buffer-startup
remove-ubuntu2004-runners
refactor/permissions-no-pat-allowed
ref/logrus-factory
use-conntrack-zone
deploy/permissions-account
feature/lazy-connection-idle
ref/improve-test-cov
restore-pr-3440
test/increase-grpc-timeouts
feat/buffer-account-peers-update
test/networkmapgeneration-changes
feature/base-manager
feature/flow-receiver
chore/benchmark-with-large-runner
refactor/handshake-initiator
client/ui-update-systray-icons
userspace-router
wgwatcher-test
output-if-key-already-exists
fix/relay-reconnection
feature/port-forwarding-client-codecleaning
detached2
test/callbacks-nil-iceconninfo
refactor/optimize-peer-expiration
enable-udp-port-for-docker-template
fix/relay-update
feature/apply-posture-netmap
fix/group-update-existing-resource
conntrack-stats
upgrade-okta-sdk
multi-price
test/conn-stat
set-min-parallel-tests-for-management
dns-interceptor
debug-dns
router-dns
add-static-system-info
debug-0.29.4
debug-0.33.0
account-refactoring
relay/2800_quic
route-get-account-refactoring
test/seed-random-routes
feature/get-account-refactoring
test/reconnect-race-condition
refactor/get-account-usage
feature/add-session-id-to-update-channel
improve-ipv4conn
fix/async-pion-event-handling
debug
add-offload
feature/validate-group-association-debug
fix/limit-conn-for-sqlite
test/engine-iface
test/transaction-for-jwt-sync
fix/engine-stop-in-foreground
feature/add-mysql-support
test-migration
refactor/header-size-values
relay/eliminate-gob
test/signal-dispatcher-with-relay
relay/debug
validate-icon
feature/ipv6-support
use-pre-expanded-peers-map
feature/use-signal-dispatcher
validate/peer-status
add-read-write-times
fix/sync-peer-race
feature/relay-status
netmap
evaluate/network-map-hash
fix/lower-dns-resolve-interval-on-fail
feature/relay
fix/go-mod-version
upgrade-nftables
synology-userspace-mode
fix/use-ip-for-default-routes-on-darwin
fix/proxy_close
enable-release-workflow-on-pr
deploy/peer-performance
feature/permanent-turn
feature/permanent-turn-proxy
deploy/posture-check-sqlite
feature/optimize_sqlite_save
debug-ios-behavior
fix/delete-route-only-after-adding
tshoot/windows-logger
remove-new-routing
refactor/eliminate-repo-dependency
add-arm-to-ci
refactor-demo-account-object
test/abc2
test/abc
send-ssh-rosenpass-config-meta
refactor-demo
ensure-schedule-never-runs-non-positive
feature/peer-validator-groupmgm
feature/peer-validator-fix
fix/include-active-dashboard-users
fix/handle-canceling-schedule
fix/geo-download
debug-google-workspace
yury/resolve-ip-to-location
feature/extend-sysinfo
sqlite-async-peer-status
yury/add-postgresql-store
fix/route
test-build
posture-checks-poc
debug-keycloak-idp
poc/netstack
for-pascal-tmp
peer-logout-management
manual-peer-logout
detached
chore/refactor-management
test/dns-bind
fix/enforce-acl-for-containers
yury/use-sync-map-in-updatechannel
fix/events-key-handling
filter-cache-on-load-account
fix/user-expiration
handle-user-context-cancellation
nb-client-k8s-statefulset
fake-addr
fix/iptables_in_docker
ebpf-debug
update-getting-started-flow-use-postgres
fix/peer_list_notification
feature/device-authentication-with-client-secret
feature/keep_alive
feat-groups-from-jwt
separate_proxy_from_wgconfig
fix/wg_conn
wg_conn_fix
wg_bind_parallel_processing
fix-rollback-get-acls
proxy_cfg_cleanup
performance-improvement-rego
update-lock-log-level
feat-client-side-acl
refactor/move_grpcserver_logic_to_account_manager
feature/event-storage
feature/update-idp-redeeming-invite
feature/api-peer-info
return-groupminimum-setupkey
feature/interface-bind
documentation_enhancement
fix-peer-registration
ssh
users_cache
pass-client-caller
client_caller_type
revert-283-feat-fix-windows-installer
periodic-peer-updates
ebpf
braginini/wasm
v0.71.0
v0.70.5
v0.70.4
v0.70.3
v0.70.2
v0.70.1
v0.70.0
v0.69.0
v0.68.3
v0.68.2
v0.68.1
v0.68.0
v0.67.4
v0.67.3
v0.67.2
v0.67.1
v0.67.0
v0.66.4
v0.66.3
v0.66.2
v0.66.1
v0.66.0
v0.65.3
v0.65.2
v0.65.1
v0.65.0
v0.64.6
v0.64.5
v0.64.4
v0.64.3
v0.64.2
v0.64.1
v0.64.0
v0.63.0
v0.62.3
v0.62.2
v0.62.1
v0.62.0
v0.61.2
v0.61.1
v0.61.0
v0.60.9
v0.60.8
v0.60.7
v0.60.6
v0.60.5
v0.60.4
v0.60.3
v0.60.2
v0.60.1
v0.60.0
v0.59.13
v0.59.12
v0.59.11
v0.59.10
v0.59.9
v0.59.8
v0.59.7
v0.59.6
v0.59.5
v0.59.4
v0.59.3
v0.59.2
v0.59.1
v0.59.0
v0.58.2
v0.58.1
v0.58.0
v0.57.1
v0.57.0
v0.56.1
v0.56.0
v0.55.1
v0.55.0
v0.54.2
v0.54.1
v0.54.0
v0.53.0
v0.52.2
v0.52.1
v0.52.0
v0.51.2
v0.51.1
v0.51.0
v0.50.3
v0.50.2
v0.50.1
v0.50.0
v0.49.0
v0.48.0-dev2
v0.48.0
v0.47.2
v0.47.1
v0.47.0
v0.46.0
v0.45.3
v0.45.2
v0.45.1
v0.45.0
v0.44.0
v0.43.3
v0.43.2
v0.43.1
v0.43.0
v0.42.0
v0.41.3
v0.41.2
v0.41.1
v0.41.0
v0.40.1
v0.40.0
v0.39.2
v0.39.1
v0.39.0
v0.38.2
v0.38.1
v0.38.0
v0.37.2
v0.37.1
v0.37.0
v0.36.7
v0.36.6
v0.36.5
v0.36.4
v0.36.3
v0.36.2
v0.36.1
v0.36.0
v0.35.2
v0.35.1
v0.35.0
v0.34.1
v0.34.0
v0.33.0
v0.32.0
v0.31.1
v0.31.0
v0.30.3
v0.30.2
v0.30.1
v0.30.0
v0.29.4
v0.29.3
0.29.3
v0.29.2
v0.29.1
v0.29.0
v0.28.9
v0.28.8
v0.28.7
v0.28.6
v0.28.5
v0.28.4
v0.28.3
v0.28.2
v0.28.1
v0.28.0
v0.27.10
v0.27.9
v0.27.8
v0.27.7
v0.27.6
v0.27.5
v0.27.4
v0.27.3
v0.27.2
v0.27.1
v0.27.0
v0.26.7
v0.26.6
v0.26.5
v0.26.4
v0.26.3
v0.26.2
v0.26.1
v0.26.0
v0.25.9
v0.25.8
v0.25.7
v0.25.6
v0.25.5
v0.25.4
v0.25.3
v0.25.2
v0.25.1
v0.25.0
v0.24.4
v0.24.3
v0.24.2
v0.24.1
v0.24.0
v0.23.9
v0.23.8
v0.23.7
v0.23.6
v0.23.5
v0.23.4
v0.23.3
v0.23.2
v0.23.1
v0.23.0
v0.22.7
v0.22.6
v0.22.5
v0.22.4
v0.22.3
v0.22.2
v0.22.1
v0.22.0
v0.21.11
v0.21.10
v0.21.9
v0.21.8
v0.21.7
v0.21.6
v0.21.5
v0.21.4
v0.21.3
v0.21.2
v0.21.1
v0.21.0
v0.20.8
v0.20.7
v0.20.6
v0.20.5
v0.20.4
v0.20.3
v0.20.2
v0.20.1
v0.20.0
v0.19.0
v0.18.1
v0.18.0
v0.17.0
v0.16.0
v0.15.3
v0.15.2
v0.15.1
v0.15.0
v0.14.6
v0.14.5
v0.14.4
v0.14.3
v0.14.2
v0.14.1
v0.14.0
v0.13.0
v0.12.0
v0.11.6
v0.11.5
v0.11.4
v0.11.3
v0.11.2
v0.11.1
v0.11.0
v0.10.10
v0.10.9
v0.10.8
v0.10.7
v0.10.6
v0.10.5
v0.10.4
v0.10.3
v0.10.2
v0.10.1
v0.10.0
v0.9.8
v0.9.7
v0.9.6
v0.9.5
v0.9.4
v0.9.3
v0.9.2
v0.9.1
v0.9.0
v0.8.12
v0.8.11
v0.8.10
v0.8.9
v0.8.8
v0.8.7
v0.8.6
v0.8.5
v0.8.4
v0.8.3
v0.8.2
v0.8.1
v0.8.0
v0.7.1
v0.7.0
v0.6.4
v0.6.3
v0.6.2
v0.6.1
v0.6.0
v0.5.11
v0.5.10
v0.5.1
v0.5.0
v0.4.0
v0.3.5
v0.3.4
v0.3.3
v0.3.2
v0.3.1
v0.3.0
v0.2.3
v0.2.2-beta.1
v0.2.1-beta.5
v0.2.0-beta.5
v0.2.0-beta.4
v0.2.0-beta.3
v0.2.0-beta.2
v0.2.0-beta.1
v0.1.0-beta.3
v0.1.0-beta.2
v0.1.0-beta.1
v0.1.0-rc.2
v0.1.0-rc-1
v0.0.8-hotfix-1
v0.0.8
v0.0.7
v0.0.6
v0.0.5
v0.0.4
v0.0.3
v0.0.2
v0.0.1
v0.0.0
Labels
Clear labels
2021 Q4
2022 Q1
2022 Q1
accessibility
acl
agent
agent
Android
Android
api
authentik
automation
azure
battery-usage
bug
cache
client
client-ui
cloud
cloud-only
cloudflare
community
compatibility
config-idp
config-issue
connection
contribution
coturn
cross-vpn
dashboard
data-usage
distribution
dns
docker
documentation
duplicate
enhancement
enhancement
event-stream
feature-request
freebsd
getting-started
go
good first issue
gui
help wanted
home-assistant
idp
inconsistency
integration
integrations
ios
ipv6
jwt
k8s
keycloak
linux
login
macos
management-service
missing-docs
mobile
moved-internal
needs-review
netbird-ui
networking
new-platform
nginx
notification
okta
openwrt
packaging
peer-management
peer-management
peer-management
performance
postgres
posture-checks
psk
pull-request
question
refactor
relay
release
rfc
routes
security
security-related
self-hosting
server
signal
sleep-issue
ssh
ssl
status
store
synology
system-compatibility-issue
test-suite
third-party-integration
triage
triage-needed
troubleshooting
UX
waiting-feedback
windows
wontfix
zitadel
Mirrored from GitHub Pull Request
No Label
self-hosting
Milestone
No items
No Milestone
Projects
Clear projects
No project
Assignees
saavagebueno
Clear assignees
No Assignees
Notifications
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: SVI/netbird#1391
Reference in New Issue
Block a user
Blocking a user prevents them from interacting with repositories, such as opening or commenting on pull requests or issues. Learn more about blocking a user.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @luc-caspar on GitHub (Nov 2, 2024).
Describe the problem
Created a new AWS instance with Ubuntu 24.04.1, 1 CPU and 2Go of memory to test the latest version of Netbird.
After installing curl, jq, and docker, I downloaded the
getting-started-with-zitadel.shscript.When running said script, it get stuck in a loop waiting for zitadel to be ready, with the following message:
To Reproduce
Go through the self-hosting quickstart guide using ubuntu 22.04 on an AWS instance.
Expected behavior
Access to the management console and all of Netbird's features.
Are you using NetBird Cloud?
No, self-hosted.
NetBird version
latest (0.31.0 at the time of writing).
Screenshots
Additional context
I have already tried the solution provided in issue #1709 to no avail.
If relevant, here are the caddy.log
@mlsmaycon commented on GitHub (Nov 5, 2024):
The error message suggests checking the firewall, can you confirm that you've followed the requirements section of the guide and checked the Caddy container logs?
@luc-caspar commented on GitHub (Nov 5, 2024):
@mlsmaycon Thank you for your answer.

On the machine itself, no firewall is running. Instead, I am relying on AWS security group to punch holes where necessary. This is the list of currently open ports:
As for the caddy logs, they are the same as the ones I provided in the original post.
@yblis commented on GitHub (Nov 9, 2024):
Hello, I have the same problem on a new VPN, even with the firewall disabled.
@mikebakke commented on GitHub (Nov 19, 2024):
This seems pretty much the issue I have. Granted I'm running behind haproxy but all that is doing is sending the raw 443 traffic to the vm with the quickstart script. All other required ports are forwarded direct from my router to the instance. I see caddy generate a certificate for my domain but then there's a loop waiting for Zitadel and messages which suggest there's no certificate for my haproxy nodes' IP address.
@TasdidurRahman commented on GitHub (Dec 12, 2024):
facing the same issue! @luc-caspar could you solve it?
@luc-caspar commented on GitHub (Dec 12, 2024):
@TasdidurRahman Unfortunately, I have not had the time to investigate further. My current solution was simply to keep the netbird v0.25 instance that is running perfectly and not upgrade it.
@NiklasDor commented on GitHub (Dec 15, 2024):
same error with 0.34.1
@NiklasDor commented on GitHub (Dec 21, 2024):
Problem only occurs on Ubuntu, just did a install on debian without any problems
@davidchi2020 commented on GitHub (Dec 24, 2024):
same error on centos9 with 0.35
@bitinerant commented on GitHub (Jan 1, 2025):
In my particular case, the relevant error was
dial tcp: lookup dashboard on 127.0.0.11:53: server misbehavingburied in the output ofdocker logs ubuntu_caddy_1, indicating that Caddy can't resolve local DNS names. (I'm not sure I would have ever found this without ChatGPT.) You can test if this is a problem on your system viadocker run --rm busybox ping dashboard.@gmckeown commented on GitHub (Feb 6, 2025):
@bitinerant What did you do to resolve this issue?
@georgetarlas commented on GitHub (Feb 6, 2025):
In my case was simple. From an initial misconfiguration, puclic IP was not accessible by lets encrypt that runs during installation, so I become banned by lest encrypt.
{"level":"error","ts":1738874957.3955424,"logger":"tls.obtain","msg":"will retry","error":"[vpn.XXX.gr] Obtain: [vpn.XXX.gr] creating new order: attempt 1: https://acme-v02.api.letsencrypt.org/acme/new-order: HTTP 429 urn:ietf:params:acme:error:rateLimited - too many certificates (5) already issued for this exact set of domains in the last 168h0m0s, retry after 2025-02-07 03:32:26 UTC: see https://letsencrypt.org/docs/rate-limits/#new-certificates-per-exact-set-of-hostnames (ca=https://acme-v02.api.letsencrypt.org/directory)","attempt":5,"retrying_in":600,"elapsed":627.088738971,"max_duration":2592000}
@ashayh commented on GitHub (Feb 7, 2025):
I am self hosting Netbird on Fedora in a home network for accessing Home assistant. I faced the same problem as OP but was able to fix using:
For adding a Android client with a gmail address, I had to sign up for a free SMTP provider, and add it to Zitadel via https://netbird-hostname/ui/console/instance?id=smtpprovider This allowed me to send a verification email and add a Android client as a peer.
Finally, for accessing Home assistant from outside the home network in Android:
@rafaelfmuniz commented on GitHub (Feb 10, 2025):
I'm also stuck in the same loop
@userdiv444 commented on GitHub (Mar 6, 2025):
Using Debian 12.9, and Docker version 27.5.1, script v0.31.1 (latestst) = stuck as well.
Help would be appreciated.
@b4rgut commented on GitHub (Mar 12, 2025):
I had a problem with Ubuntu 24.04.2 LTS and netbird v0.38.0. I fixed it by adding information about the local IP of the server and the netbird domain to /etc/hosts:
192.168.1.x netbird.example.com.The installation was successful, but the dashboard was not responding. I looked at the
docker logs netbird-dashboard-1and saw the errorsocket() [::]:80 failed (97: Address family not supported by protocol), which says that Nginx is trying to listen to IPv6 addresses(::):80, but it is disabled in the system or container settings IPv6 support.I have indeed disabled IPv6. When I turned it on, everything worked.
@YapWC commented on GitHub (Mar 23, 2025):
If anyone if facing issue with
403 errorandcf-mitigated: challengethen it is something to do with your CloudFlare proxy. I switched the proxy off on my CloudFlare and everything works.For more context I am not sure why the above error only appears on Hetzner Europe Server, I tried with Hetzner Singapore Server and it worked fine without any error with the exact configuration and setup all along. Maybe CloudFlare is flagging the Public IP Address of my Europe Server as suspicious (something to do with IP Reputation) and therefore denying the request.
Anyways hope this help for those that is on CloudFlare.
Update:
So it is true that my Public IP Address of the EU Server was posed with Managed Challenge by CloudFlare Proxy when it tries to access Zitadel or NetBird via API as well. In this case instead of turning off the Proxy there is another solution.
Go to your CloudFlare DNS -> Security -> Events. You will see which IP address is being blocked/Challanged, then just copy the IP Address go to WAF -> Tools and add the IP address, Allow this Website. This is another solution for those who would like to have the proxy enabled all the time.
@Builder-DE-TH commented on GitHub (Apr 27, 2025):
This is still broken nearly 6 months later. Just tried again with v0.43.0 on a Proxmox LXC behind NPMplus and got the same error.
@ntk148v commented on GitHub (May 8, 2025):
Hit the same issue, Caddy logs returns:
@ntk148v commented on GitHub (May 16, 2025):
Hi folks, I have created a PR for this. Hope this helps, at least in my case, everything is working well now.
@aaluopy commented on GitHub (Jul 2, 2025):
same error on RockyLinux9 with 0.49.0
@mlsmaycon commented on GitHub (Jul 2, 2025):
@aaluopy
Can you share what did you check from this message?
@aaluopy commented on GitHub (Jul 4, 2025):
Sorry, forgot to update my troubleshooting status. I figured out the issue—it's because my domain isn't ICP-registered. The Caddy logs showed Let's Encrypt attempting HTTP-01 validation by accessing my domain, but the response received was the ICP filing interception page from https://dnspod.qcloud.com/static/webblock.html?d=xxx.mydomain.cn.
@Raito00 commented on GitHub (Oct 9, 2025):
when try latest:
I have the same problem on
Proxmox Debian 12 LXC
-- Unable to connect to Zitadel for more than 45s,
@Mi-Siu commented on GitHub (Oct 10, 2025):
Found somewhere that adding to /etc/hosts domain (the same you are exporting as NETBIRD_DOMAIN) with your LOCAL machine IP might be helpful, and... for me it worked, script continues (also changed DNS instead of my local to 8.8.8.8 in /etc/resolv.conf - don't know if that matters).
@Tacioandrade commented on GitHub (Nov 5, 2025):
I'm having the same problem! I initially installed it on a Debian 13 VM running on a Proxmox behind a NAT, it didn't work. I thought it was because ports 80 and 443 were behind a NAT and the application couldn't generate the HTTPS certificates via Certbot, so I hired a VPS from Hetzner to test it and the problem persists.
I've already tried:
1 - Setting the DNS configuration for Netbird in the /etc/hosts file (both 127.0.0.1 and the WAN IP)
2 - Running the script as root instead of the normal user
In addition, the "netbird-zitadel-1" container also loops, outputting this:
time="2025-11-05T22:03:11Z" level=debug msg="trigger iteration" caller="/home/runner/work/zitadel/zitadel/internal/eventstore/handler/v2/handler.go:415" iteration=0 projection=projections.smtp_configs5 time="2025-11-05T22:03:11Z" level=debug msg="trigger iteration" caller="/home/runner/work/zitadel/zitadel/internal/eventstore/handler/v2/handler.go:415" iteration=0 projection=projections.debug_events time="2025-11-05T22:03:11Z" level=debug msg="trigger iteration" caller="/home/runner/work/zitadel/zitadel/internal/eventstore/handler/v2/handler.go:415" iteration=0 projection=projections.notifications time="2025-11-05T22:03:12Z" level=debug msg="trigger iteration" caller="/home/runner/work/zitadel/zitadel/internal/eventstore/handler/v2/handler.go:415" iteration=0 projection=projections.instance_domains time="2025-11-05T22:03:12Z" level=debug msg="trigger iteration" caller="/home/runner/work/zitadel/zitadel/internal/eventstore/handler/v2/handler.go:415" iteration=0 projection=projections.login_policies5 time="2025-11-05T22:03:12Z" level=debug msg="trigger iteration" caller="/home/runner/work/zitadel/zitadel/internal/eventstore/handler/v2/handler.go:415" iteration=0 projection=projections.security_policies2 time="2025-11-05T22:03:13Z" level=debug msg="trigger iteration" caller="/home/runner/work/zitadel/zitadel/internal/eventstore/handler/v2/handler.go:415" iteration=0 projection=projections.privacy_policies4 time="2025-11-05T22:03:14Z" level=debug msg="trigger iteration" caller="/home/runner/work/zitadel/zitadel/internal/eventstore/handler/v2/handler.go:415" iteration=0 projection=projections.milestones time="2025-11-05T22:03:15Z" level=debug msg="trigger iteration" caller="/home/runner/work/zitadel/zitadel/internal/eventstore/handler/v2/handler.go:415" iteration=0 projection=projections.password_complexity_policies2 time="2025-11-05T22:03:15Z" level=debug msg="trigger iteration" caller="/home/runner/work/zitadel/zitadel/internal/eventstore/handler/v2/handler.go:415" iteration=0 projection=projections.project_roles4 time="2025-11-05T22:03:16Z" level=debug msg="trigger iteration" caller="/home/runner/work/zitadel/zitadel/internal/eventstore/handler/v2/handler.go:415" iteration=0 projection=projections.notifications time="2025-11-05T22:03:16Z" level=debug msg="trigger iteration" caller="/home/runner/work/zitadel/zitadel/internal/eventstore/handler/v2/handler.go:415" iteration=0 projection=projections.custom_texts2 time="2025-11-05T22:03:16Z" level=debug msg="trigger iteration" caller="/home/runner/work/zitadel/zitadel/internal/eventstore/handler/v2/handler.go:415" iteration=0 projection=projections.flow_triggers3 time="2025-11-05T22:03:17Z" level=debug msg="trigger iteration" caller="/home/runner/work/zitadel/zitadel/internal/eventstore/handler/v2/handler.go:415" iteration=0 projection=projections.instance_members4 time="2025-11-05T22:03:17Z" level=debug msg="trigger iteration" caller="/home/runner/work/zitadel/zitadel/internal/eventstore/handler/v2/handler.go:415" iteration=0 projection=projections.authn_keys2 time="2025-11-05T22:03:17Z" level=debug msg="trigger iteration" caller="/home/runner/work/zitadel/zitadel/internal/eventstore/handler/v2/handler.go:415" iteration=0 projection=projections.lockout_policies3 ^Croot@netbird:~# docker logs -f netbird-zitadel-1@mikebakke commented on GitHub (Nov 5, 2025):
@Tacioandrade how long did you leave it "looping"? I've just looked at my working instance and I seem to have a lot of those messages in my log. My recollection is it took a minute or 2 to finally setup and output the creds.
I started with a proxmox VM which failed to gen certs but then like you bought a VPS and it did run - I don't believe I modified the quick setup - just ran it. I've just checked on the VPS and I don't see any changes in my configs to get it to work.
Since then I have managed to do it on a vm in proxmox by adding the L4 module to my existing caddy which just forwards any raw packets for 80 and 443 to the VM.
@Tacioandrade commented on GitHub (Nov 5, 2025):
After 5 hours of racking my brain, I found the problem.
Netbird uses Let's Encrypt's ACME validation via IP address. I had tried more than 5 times to install Netbird with the same domain on a VM behind a NAT, which is why Let's Encrypt blocked the generation of a certificate for my domain.
Because the ACMD error log in the caddy was overwritten by dozens of other logs, only after retrieving all the logs and passing them to ChatGPT was it able to find the problem and pass it on to me.
On the instance I set up on Hetzner, I used another domain that I own, and with that, I was able to generate the HTTPS certificate correctly and the installation was completed successfully.
To any friends who encounter this, here's a tip:
Always install Netbird with external ports 80 and 443 pointing to the host. Unlike other solutions, if it fails to generate an HTTPS certificate, it won't generate a self-signed certificate and will continue with the installation without displaying an error message or stopping the tool installation.
Tomorrow I'll start using the solution and see how it performs in my environments! Thanks for the help @mikebakke and I hope to participate more and more in the Netbird community.