Network

Radarr should be run via a Reverse Proxy, allowing you to isolate and wrap connections in SSL. See NGINX for more details. See Setup Base Proxy Control for basic proxy configuration.

See Nzbget reverse proxy reference.

Ports

---
###############################################################################
# Ports Configuration
###############################################################################
# Ports should be managed externally via an OS role.
#
# Reference:
# * https://docs.ansible.com/ansible/latest/collections/community/general/ufw_module.html

ports:
  - {proto: 'tcp', from_ip: 'any', to_port: 6789, direction: 'in', comment: 'nzbget http'}
  - {proto: 'tcp', from_ip: 'any', to_port: 6791, direction: 'in', comment: 'nzbget https'}

Using Subdomains

0644 root root nginx/conf.d/reverse-proxy.conf
server {
  listen                  443 ssl http2;
  server_name             nzbget.{DOMAIN} nzbget;

  location / {
    proxy_pass            http://nzbget:6791;
    include               /etc/nginx/conf.d/proxy-control.conf;
    proxy_set_header Host $host;
  }
}

Using Subpaths

0644 root root nginx/conf.d/reverse-proxy.conf
server {
  location /nzbget/ {
    proxy_pass            https://nzbget:6791/;
    include               /etc/nginx/conf.d/proxy-control.conf;
    proxy_set_header Host $host;
  }
}