Docker:
docker exec pulse rm /data/.env
docker restart pulse
# Access UI again. Pulse will require a bootstrap token for setup.
# Get it with:
docker exec pulse /app/pulse bootstrap-tokenSystemd:
Delete /etc/pulse/.env and restart the service. Pulse will require a bootstrap token for setup:
sudo pulse bootstrap-token- Check which service is running:
systemctl status pulse(legacy installs may usepulse-backend). - Verify environment override:
systemctl show pulse --property=Environment. - Docker: Ensure you updated the
-pflag (e.g.,-p 8080:7655).
- Check if Pulse is running.
- Verify the port is open on your firewall.
- PBS: Remember PBS uses port 8007 and requires HTTPS.
- Docker Compose: Did you escape the
$signs in your hash? Use$$2a$$.... - Truncated Hash: Ensure your bcrypt hash is exactly 60 characters.
- Clear browser cookies.
- Check if your IP is locked out (wait 15 mins).
- If another admin can log in, use
POST /api/security/reset-lockoutto clear the lockout for your username or IP.
- Symptom: Audit Log entries show “Unsigned” or verification fails in the UI.
- Root cause: Audit signing is disabled (crypto manager unavailable), so events are stored without signatures.
- Fix: Ensure
.encryption.keyis present and Pulse Pro audit logging is enabled, then restart Pulse to regenerate.audit-signing.key. Newly created events will be signed; existing unsigned events remain unsigned.
- Symptom: Audit Log shows zero events or "Console Logging Only."
- Root cause: OSS build uses console logging only, or Pulse Pro audit logging is not enabled.
- Fix: Use Pulse Pro with audit logging enabled, then generate new audit events (logins, token creation, password changes).
- Symptom: Older events fail verification while newer events pass.
- Root cause: The audit signing key changed (for example,
.audit-signing.keywas regenerated), so signatures no longer match. - Fix: Restore the previous
.audit-signing.keyfrom backup to verify older events. If rotated intentionally, expect older events to fail verification.
- Install QEMU Guest Agent in the VM.
- Enable "QEMU Guest Agent" in Proxmox VM Options.
- Restart the VM.
- See VM Disk Monitoring.
- Install
lm-sensorson the host. - Run
sensors-detect. - Install the unified agent on the Proxmox host with
--enable-proxmox. - See Temperature Monitoring.
- Duplicate IDs: Cloned VMs often share
/etc/machine-id. - Fix: Run
rm /etc/machine-id && systemd-machine-id-setupon the clone.
- Check SMTP settings in Alerts → Notification Destinations.
- Check logs:
docker logs pulse | grep email. - Ensure your SMTP provider allows the connection (e.g., Gmail App Passwords).
- Verify the URL is reachable from the Pulse server.
- If targeting private IPs, allow them in Settings → System → Network → Webhook Security.
- Check Pulse logs for HTTP status codes and response bodies.
Every API response has an X-Request-ID header. Use it to find the exact log entry:
# systemd / Proxmox LXC
journalctl -u pulse --no-pager | grep "request_id=abc123"
# Docker
docker logs pulse 2>&1 | grep "request_id=abc123"If Pulse can't see VMs or storage, check the user permissions on Proxmox:
pveum user permissions <user>@pamAt minimum, ensure the user/token has read access for inventory and metrics:
Sys.AuditVM.MonitorDatastore.Audit
For VM disk usage via QEMU guest agent, also ensure VM.GuestAgent.Audit (PVE 9+).
If you are completely locked out, you can trigger a recovery token from localhost:
curl -X POST http://localhost:7655/api/security/recovery \
-d '{"action":"generate_token","duration":30}'Use the returned token in X-Recovery-Token when calling /api/security/recovery to enable or disable local-only auth bypass (disable_auth / enable_auth). Token generation is localhost-only.
Example (enable recovery mode):
curl -X POST http://localhost:7655/api/security/recovery \
-H "X-Recovery-Token: <token>" \
-d '{"action":"disable_auth"}'If you're still stuck:
- Check Logs:
journalctl -u pulse -n 100ordocker logs --tail 100 pulse. - Check Version:
curl http://localhost:7655/api/version. - Open Issue: Report on GitHub Issues with your logs and version info.