Sabnzbd makes Usenet as simple and streamlined as possible by automating everything we can. All you have to do is add an .nzb. SABnzbd takes over from there, where it will be automatically downloaded, verified, repaired, extracted and filed away with zero human interaction.
We utilise the docker manifest for multi-platform awareness. More information is available from docker here and our announcement here.
Simply pulling lscr.io/linuxserver/sabnzbd:latest should retrieve the correct image for your arch, but you can also pull specific arch images via tags.
This image provides various versions that are available via tags. Please read the descriptions carefully and exercise caution when using unstable or development tags.
Tag
Available
Description
latest
✅
Stable SABnzbd releases
unstable
✅
Pre-releases from the develop branch
nightly
✅
Latest commits from the develop branch
## Application Setup
Initial setup is done via http://<docker host ip>:<mapped http port> ie, http://192.168.1.100:8080.
nzb-notify is included with this image as a convenience script. To use it set the Scripts folder in the Folder settings to /app/nzbnotify and then configure it under Notifications. See nzb-notify for more information.
In Sabnzbd gui settings, under Folders, make sure to set the Completed Download Folder as /downloads and the Temporary Download Folder as /incomplete-downloads
We have set /incomplete-downloads and /downloads as optional paths, this is because it is the easiest way to get started. While easy to use, it has some drawbacks. Mainly losing the ability to hardlink (TL;DR a way for a file to exist in multiple places on the same file system while only consuming one file worth of space), or atomic move (TL;DR instant file moves, rather than copy+delete) files while processing content.
Use the optional paths if you dont understand, or dont want hardlinks/atomic moves.
The folks over at servarr.com wrote a good write-up on how to get started with this.
Sabnzbd makes Usenet as simple and streamlined as possible by automating everything we can. All you have to do is add an .nzb. SABnzbd takes over from there, where it will be automatically downloaded, verified, repaired, extracted and filed away with zero human interaction.
We utilise the docker manifest for multi-platform awareness. More information is available from docker here and our announcement here.
Simply pulling lscr.io/linuxserver/sabnzbd:latest should retrieve the correct image for your arch, but you can also pull specific arch images via tags.
This image provides various versions that are available via tags. Please read the descriptions carefully and exercise caution when using unstable or development tags.
nzb-notify is included with this image as a convenience script. To use it set the Scripts folder in the Folder settings to /app/nzbnotify and then configure it under Notifications. See nzb-notify for more information.
In Sabnzbd gui settings, under Folders, make sure to set the Completed Download Folder as /downloads and the Temporary Download Folder as /incomplete-downloads
We have set /incomplete-downloads and /downloads as optional paths, this is because it is the easiest way to get started. While easy to use, it has some drawbacks. Mainly losing the ability to hardlink (TL;DR a way for a file to exist in multiple places on the same file system while only consuming one file worth of space), or atomic move (TL;DR instant file moves, rather than copy+delete) files while processing content.
Use the optional paths if you dont understand, or dont want hardlinks/atomic moves.
The folks over at servarr.com wrote a good write-up on how to get started with this.
Docker images are configured using parameters passed at runtime (such as those above). These parameters are separated by a colon and indicate <external>:<internal> respectively. For example, -p 8080:80 would expose port 80 from inside the container to be accessible from the host's IP on port 8080 outside the container.
For all of our images we provide the ability to override the default umask settings for services started within the containers using the optional -e UMASK=022 setting. Keep in mind umask is not chmod it subtracts from permissions based on it's value it does not add. Please read up here before asking for support.
When using volumes (-v flags), permissions issues can arise between the host OS and the container, we avoid this issue by allowing you to specify the user PUID and group PGID.
Ensure any volume directories on the host are owned by the same user you specify and any permissions issues will vanish like magic.
In this instance PUID=1000 and PGID=1000, to find yours use id user as below:
We publish various Docker Mods to enable additional functionality within the containers. The list of Mods available for this image (if any) as well as universal mods that can be applied to any one of our images can be accessed via the dynamic badges above.
Containers are configured using parameters passed at runtime (such as those above). These parameters are separated by a colon and indicate <external>:<internal> respectively. For example, -p 8080:80 would expose port 80 from inside the container to be accessible from the host's IP on port 8080 outside the container.
For all of our images we provide the ability to override the default umask settings for services started within the containers using the optional -e UMASK=022 setting. Keep in mind umask is not chmod it subtracts from permissions based on it's value it does not add. Please read up here before asking for support.
When using volumes (-v flags), permissions issues can arise between the host OS and the container, we avoid this issue by allowing you to specify the user PUID and group PGID.
Ensure any volume directories on the host are owned by the same user you specify and any permissions issues will vanish like magic.
In this instance PUID=1000 and PGID=1000, to find yours use id your_user as below:
We publish various Docker Mods to enable additional functionality within the containers. The list of Mods available for this image (if any) as well as universal mods that can be applied to any one of our images can be accessed via the dynamic badges above.
Most of our images are static, versioned, and require an image update and container recreation to update the app inside. With some exceptions (ie. nextcloud, plex), we do not recommend or support updating apps inside the container. Please consult the Application Setup section above to see if it is recommended for the image.
Below are the instructions for updating containers:
Recreate a new container with the same docker run parameters as instructed above (if mapped correctly to a host folder, your /config folder and settings will be preserved)
You can also remove the old dangling images:
dockerimageprune
+
Via Watchtower auto-updater (only use if you don't remember the original parameters)¶
Pull the latest image at its tag and replace it with the same env variables in one run:
You can also remove the old dangling images: docker image prune
Warning
We do not endorse the use of Watchtower as a solution to automated updates of existing Docker containers. In fact we generally discourage automated updates. However, this is a useful tool for one-time manual updates of containers where you have forgotten the original parameters. In the long term, we highly recommend using Docker Compose.
16.05.23: - Rebase stable to Alpine 3.18, deprecate armhf.
15.03.23: - Switch from p7zip to 7zip, bump unrar to 6.2.6.
05.03.23: - Rebase master branch to Alpine 3.17.
03.10.22: - Rebase master branch to Alpine 3.16, migrate to s6v3.
12.08.22: - Bump unrar to 6.1.7.
31.07.22: - Add nightly tag.
10.03.22: - Add nzb-notify.
22.02.22: - Rebase master branch to Alpine, build unrar from source, deprecate Alpine branch.
25.01.22: - Rebase Unstable branch to Alpine.
13.01.22: - Add alpine branch
08.08.21: - Bump to focal, dont enforce binding to ipv4 port 8080
24.07.21: - Add python3-setuptools.
14.05.21: - Use linuxserver.io wheel index for pip packages.
12.02.21: - Clean up rust/cargo and pip cache.
17.08.20: - Run from source with python3 instead of ppa, remove python2 completely, symlink python to python3.
02.01.20: - Add python3 on top of python2 to image during transition.
23.03.19: - Switching to new Base images, shift to arm32v7 tag.
25.02.19: - Rebase to Bionic, add python deps for scripts.
26.01.19: - Add pipeline logic and multi arch.
13.12.17: - Fix continuation lines.
12.07.17: - Add inspect commands to README, move to jenkins build and push.
10.04.17: - Bump to 2.0 Release.
25.02.17: - Switch to nobetas repo for master/latest branch and add unstable branch.
08.02.17: - Add pythonioenconding=utf8 as env.
15.09.16: - Compile par2 multicore as per latest info sabnzbd git readme.
11.09.16: - Bump to release of 1.10.
09.09.16: - Rebase back to xenial, issues with alpine version of python and 1.10 branch of sab.
28.08.16: - Rebase to alpine, using git version of sab.
17.03.16: - Bump to install 1.0 final at startup.
14.03.16: - Refresh image to pick up latest RC.
23.01.15: - Refresh image.
14.12.15: - Refresh image to pick up latest beta.
21.08.15: - Initial Release.
Last update: October 12, 2023 Created: February 11, 2019
\ No newline at end of file
diff --git a/images/docker-series-troxide/index.html b/images/docker-series-troxide/index.html
index 8f9cd8aad4..f8e3df3c47 100644
--- a/images/docker-series-troxide/index.html
+++ b/images/docker-series-troxide/index.html
@@ -53,4 +53,4 @@
--pull\-tlscr.io/linuxserver/series-troxide:latest.
The ARM variants can be built on x86_64 hardware using multiarch/qemu-user-static