Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
We value your experience with Plesk during 2025 Plesk strives to perform even better in 2026. To help us improve further, please answer a few questions about your experience with Plesk Obsidian 2025. Please take this short survey: https://survey.webpros.com/
Hi Kaspar,
Thanks, I will try that.
At the moment, I suspect that the blocking could be caused by the “(D)DoS Deflate Interface” extension. I have now whitelisted the IP of the Docker Bridge there and will see if the problem occurs again.
Unfortunately, the issue is not resolved. After removing Imunify and observing stable connectivity for a while, the problem (Gateway Timeout / inaccessible Docker container via subdomain) has returned.
Therefore, it seems Imunify was not the root cause.
The DROP rule affecting 172.17.0.2...
Update:
We’ve now tested completely uninstalling ImunifyAV (and possibly residual components from Imunify360) on our Plesk server. Since then, the recurring DROP rule against 172.17.0.2 has no longer reappeared – and the Docker container remains accessible via subdomains, even without our...
Addition:
The problem is not just that a DROP rule exists — that's understandable.
The real issue is that any manually added ACCEPT rule (e.g. for 172.17.0.0/16)
is automatically removed again, and the Plesk GUI offers no way to make such an exception persistent.
This makes it impossible to...
Hi @scsa20,
thank you for your reply and for sharing the screenshot.
Let me clarify: The port mapping (e.g. 8080:4323) and the Reverse Proxy via domain are both correctly configured — please see the attached screenshots below.
The actual issue is not the port mapping or the proxy setup...
Hello everyone,
I’m running Plesk Obsidian 18.0.70 on Ubuntu 22.04 and have recently started using Docker (e.g. to host Open WebUI).
Since then, I’ve noticed that a DROP rule against 172.17.0.2 (the Docker bridge IP) keeps getting automatically reinserted into the iptables INPUT chain – likely...
Hello Peter,
I just found 2 entries in /etc/cron.d: imunify-antivirus and imunify-notifier. Can I delete these entries?
imunify-antivirus
PATH=/usr/local/sbin:/usr/sbin:/sbin:/usr/local/bin:/usr/bin:/bin
# Every Saturday at 1:25
25 1 * * 6 root /opt/alt/tmpreaper/usr/sbin/tmpreaper 168...
Hello @jhernanper,
no, unfortunately I still get this message by mail on a weekly basis:
/bin/sh: line 1: /opt/alt/tmpreaper/usr/sbin/tmpreaper: No such file or directory