- Add RBAC/role management endpoints to API.md - Document OIDC group-to-role mapping feature in OIDC.md - Add missing config files to CONFIGURATION.md (audit.db, AI files) - Add OIDC_GROUP_ROLE_MAPPINGS env var documentation - Fix "enterprise" -> "Pro" terminology in TROUBLESHOOTING.md - Refocus TEMPERATURE_MONITORING.md on agent method, collapse legacy proxy docs
4.9 KiB
🔧 Troubleshooting Guide
⚡ Quick Fixes
I forgot my password
Docker:
docker exec pulse rm /data/.env
docker restart pulse
# Access UI again. Pulse will require a bootstrap token for setup.
# Get it with:
docker exec pulse /app/pulse bootstrap-token
Systemd:
Delete /etc/pulse/.env and restart the service. Pulse will require a bootstrap token for setup:
sudo pulse bootstrap-token
Port change didn't take effect
- Check which service is running:
systemctl status pulse(legacy installs may usepulse-backend). - Verify environment override:
systemctl show pulse --property=Environment. - Docker: Ensure you updated the
-pflag (e.g.,-p 8080:7655).
"Connection Refused"
- Check if Pulse is running.
- Verify the port is open on your firewall.
- PBS: Remember PBS uses port 8007 and requires HTTPS.
🔍 Common Issues
Authentication
"Invalid username or password" after setup
- Docker Compose: Did you escape the
$signs in your hash? Use$$2a$$.... - Truncated Hash: Ensure your bcrypt hash is exactly 60 characters.
Cannot login / 401 Unauthorized
- Clear browser cookies.
- Check if your IP is locked out (wait 15 mins).
- If another admin can log in, use
POST /api/security/reset-lockoutto clear the lockout for your username or IP.
Audit Log verification shows unsigned events
- Symptom: Audit Log entries show “Unsigned” or verification fails in the UI.
- Root cause:
PULSE_AUDIT_SIGNING_KEYis not set, so events are stored without signatures. - Fix: Set
PULSE_AUDIT_SIGNING_KEYand restart Pulse Pro. Newly created events will be signed; existing unsigned events remain unsigned.
Audit Log is empty
- Symptom: Audit Log shows zero events or "Console Logging Only."
- Root cause: OSS build uses console logging only, or Pulse Pro audit logging is not enabled.
- Fix: Use Pulse Pro with audit logging enabled, then generate new audit events (logins, token creation, password changes).
Audit Log verification fails for older events
- Symptom: Older events fail verification while newer events pass.
- Root cause: The signing key changed or was rotated, so signatures no longer match.
- Fix: Keep
PULSE_AUDIT_SIGNING_KEYstable. If rotated intentionally, expect older events to fail verification.
Monitoring Data
VMs show "-" for disk usage
- Install QEMU Guest Agent in the VM.
- Enable "QEMU Guest Agent" in Proxmox VM Options.
- Restart the VM.
- See VM Disk Monitoring.
Temperature data missing
- Install
lm-sensorson the host. - Run
sensors-detect. - Install the unified agent on the Proxmox host with
--enable-proxmox. - See Temperature Monitoring.
Docker hosts appearing/disappearing
- Duplicate IDs: Cloned VMs often share
/etc/machine-id. - Fix: Run
rm /etc/machine-id && systemd-machine-id-setupon the clone.
Notifications
Emails not sending
- Check SMTP settings in Alerts → Notification Destinations.
- Check logs:
docker logs pulse | grep email. - Ensure your SMTP provider allows the connection (e.g., Gmail App Passwords).
Webhooks failing
- Verify the URL is reachable from the Pulse server.
- If targeting private IPs, allow them in Settings → System → Network → Webhook Security.
- Check Pulse logs for HTTP status codes and response bodies.
🛠️ Advanced Diagnostics
Correlate Logs with Requests
Every API response has an X-Request-ID header. Use it to find the exact log entry:
# systemd / Proxmox LXC
journalctl -u pulse --no-pager | grep "request_id=abc123"
# Docker
docker logs pulse 2>&1 | grep "request_id=abc123"
Check Permissions (Proxmox)
If Pulse can't see VMs or storage, check the user permissions on Proxmox:
pveum user permissions <user>@pam
At minimum, ensure the user/token has read access for inventory and metrics:
Sys.AuditVM.MonitorDatastore.Audit
For VM disk usage via QEMU guest agent, also ensure VM.GuestAgent.Audit (PVE 9+).
Recovery Mode
If you are completely locked out, you can trigger a recovery token from localhost:
curl -X POST http://localhost:7655/api/security/recovery \
-d '{"action":"generate_token","duration":30}'
Use the returned token in X-Recovery-Token when calling /api/security/recovery to enable or disable local-only auth bypass (disable_auth / enable_auth). Token generation is localhost-only.
Example (enable recovery mode):
curl -X POST http://localhost:7655/api/security/recovery \
-H "X-Recovery-Token: <token>" \
-d '{"action":"disable_auth"}'
🆘 Getting Help
If you're still stuck:
- Check Logs:
journalctl -u pulse -n 100ordocker logs --tail 100 pulse. - Check Version:
curl http://localhost:7655/api/version. - Open Issue: Report on GitHub Issues with your logs and version info.