Network
Radarr should be run via a Reverse Proxy, allowing you to isolate and wrap connections in SSL. See NGINX for more details. See Setup Base Proxy Control for basic proxy configuration.
See Nzbget reverse proxy reference.
Ports
---
###############################################################################
# Ports Configuration
###############################################################################
# Ports should be managed externally via an OS role.
#
# Reference:
# * https://docs.ansible.com/ansible/latest/collections/community/general/ufw_module.html
ports:
- {proto: 'tcp', from_ip: 'any', to_port: 6789, direction: 'in', comment: 'nzbget http'}
- {proto: 'tcp', from_ip: 'any', to_port: 6791, direction: 'in', comment: 'nzbget https'}
Using Subdomains
server {
listen 443 ssl http2;
server_name nzbget.{DOMAIN} nzbget;
location / {
proxy_pass http://nzbget:6791;
include /etc/nginx/conf.d/proxy-control.conf;
proxy_set_header Host $host;
}
}
Using Subpaths
server {
location /nzbget/ {
proxy_pass https://nzbget:6791/;
include /etc/nginx/conf.d/proxy-control.conf;
proxy_set_header Host $host;
}
}