Notifiarr Client After Install
Do these things:
- Log into the Web UI to configure the client.
- Set a Hostname.
- Setup Plex Webhook.
- Install Snapshot Dependencies.
- Do all the things under Configure the client.
Web UI
When you open the application on MacOS or Windows for the first time, you're prompted for your API key. Enter it. Must provide the "All" API key from your Profile page on notifiarr.com
API Key
The Notifiarr client uses the API key for bi-directional authorization between notifiarr.com and the Client. Keep it safe, and never share it.
If you're on Linux or FreeBSD and installed with root, you should set the API
key in the config file @ /etc/notifiarr/notifiarr.conf or
/usr/local/etc/notifiarr/notifiarr.conf. If you installed on a seed box, set
the API key in the config file in your home folder.
Most users will use the API key as the password to login into the client's WebUI for
the first time. You can set a dedicated password after logging in by clicking your
username in the menu => Trust Profile. The default username is admin.
The login URL will usually look like one of these. The default listen port is 5454.
http://localhost:5454http://notifiarrhttp://192.168.1.10:5454http://notifiarr.yourdomain.com(if you setup a proxy)
Hostname
It is important that a static hostname is set so the site can keep track of multiple clients' settings. Some examples of how to do that:
- Docker Run users add
-h notifiarrto yourdocker runcommand. - Docker Compose users add
hostname: notifiarrto your docker-compose.yaml file. - Unraid users add
-h notifiarrtoExtra Parameters. - Kubernetes hostnames are automatically determined based on the pod name.
Note
Failure to set a hostname will result in duplicate clients that need to be fixed once a hostname is set. Restart the client if you set or change the hostname.
WSL2 users
Add this volume to your Notifiarr container. This is used for a unique UUID for each client instance.
volumes:
/etc/machine-id:/etc/machine-id
Docker Users
When a new docker image is deployed with an empty /config folder mounted, the app will do two things:
- If the API Key is not configured or invalid: Create a new Web UI
adminpassword and print it into the log file and docker logs. - Write a brand new config to
/config/notifiarr.conffile with this password already saved. - Find the password by running
docker logs Notifiarr.
Environment Variables - and the Unraid Template - override settings in the Config file.
Unraid Users
The Official Unraid Template for Notifiarr Client contains the API Key and Plex Token as pre-defined inputs. Normally, you can just go ahead and set those there. Alternatively, you can delete them from the template, and configure these values using the client's Web UI. For consistency, we recommend setting the API key and Plex token in the Unraid template.
Plex Webhook
If you're using Plex, you can configure it to send Notifications. Unlike other integrations, Plex sends all its webhooks through the client. We do this because Plex can get overzealous with how much data it sends. The client can buffer these webhooks and filter duplicate notifications. It also checks the Plex API for sessions after it gets a webhook so it can provide richer notifications.
Plex Token
You must configure the Plex URL and Plex Token in the client Web UI Media Apps page for this to work.
- In Plex Media Server, add this URL to webhooks:
http://localhost:5454/plex?token=plex-token-here- Replace
localhostwith the IP or host of the notifiarr client application. - Replace
plex-token-herewith your plex token. - The Notifiarr application uses the Plex token to authorize incoming webhooks.
Snapshot Dependencies
This application can take a snapshot of your system at an interval and send
you a notification. Snapshot means system health like cpu, memory, disk, raid, users, etc.
Other data available in the snapshot: mysql health, iotop, iostat and top data.
Some of this may only be available on Linux, but other platforms have similar abilities.
If you monitor drive health you must have smartmontools (smartctl) installed.
If you use smartctl on Linux, you must enable sudo. Add the sudoers entry below to
/etc/sudoers and fix the path to smartctl if yours differs. If you monitor
raid and use MegaCli (LSI card), add the appropriate sudoers entry for that too.
To monitor application disk I/O you may install iotop and add the sudoers entry
for it, shown below. This feature is enabled on the website.
Snapshot Sudoers
The following sudoers entries are used by various snapshot features. Add them if you use the respective feature. Restart the client after modifying sudoers entries.
You can usually just put the following content into /etc/sudoers or /etc/sudoers.d/00-notifiarr.
Make sure the 00-notifiarr file has the proper permissions needed chmod 400 /etc/sudoers.d/00-notifiarr.
# Allows drive health monitoring on macOS, Linux/Docker and FreeBSD.
notifiarr ALL=(root) NOPASSWD:/usr/sbin/smartctl *
# Allows disk utilization monitoring on Linux (non-Docker).
notifiarr ALL=(root) NOPASSWD:/usr/sbin/iotop *
# Allows monitoring megaraid volumes on macOS, Linux/Docker and FreeBSD.
# Rarely needed, and you'll know if you need this.
notifiarr ALL=(root) NOPASSWD:/usr/sbin/MegaCli64 -LDInfo -Lall -aALL
Snapshot Packages
Install optional package(s) for snapshot data collection.
Windows
smartmontools - get it here https://sourceforge.net/projects/smartmontools/
Linux
- Debian/Ubuntu:
apt install smartmontools - RedHat/CentOS:
yum install smartmontools - Docker: It's already in the container. Lucky you! Just run the container in
--privilegedmode. - Synology:
opkg install smartmontools, but first get Entware: - Entware (synology): https://github.com/Entware/Entware-ng/wiki/Install-on-Synology-NAS
- Entware Package List: https://github.com/Entware/Entware-ng/wiki/Install-on-Synology-NAS
Configure The Client
- This is your after install check list.
It does not cover everything, but it's the things you should get done first. You should definitely check out the stuff above though, a lot of it is important prerequisites.
Set a password
Set a password, or configure your auth proxy header on the Trust Profile page. Find this page by clicking your username in the Web UI menu. There's a screenshot of it to the left; click that to see a larger version.
Setup Log Files
Head to the Settings => Configuration page and scroll down to Logging. If you don't see an Application Log File (and only a placeholder), then add one, and click Save Configuration.
Click the Folder icon to open a server-side file browser. You may optionally add Services, HTTP and Debug log files. These are not strictly necessary.
Configure Apps
Test Button
Click the Test button while adding instances. Make sure it works. The test button is the green double-check mark button next to the URL.
- On the Starr Apps pages, configure your apps.
- We recommend adding them all. If you have all the starr apps, add them all.
- All you need is a URL and an API key.
- If you turn on database backup checks (on the website), a username and password is also required.
- Add all your download apps too. And Plex, and add Tautulli if you use it. Find these on their respective pages: Download Apps and Media Apps.
Health Checks
Set the health check intervals on all your apps if you want notifications when an app goes down. See the Health Checks page for more information about that.
Log Files
Log file contents can be viewed in the UI under Insights => Log Files.
These are the default location for application output (logs). Make sure you setup a log file if you can't find your logs.
- Linux:
/var/log/notifiarr/{app,http,services}.log - Log paths for linux apt/deb installations are hardcoded
- FreeBSD:
/var/log/syslog(w/ default syslog) - macOS:
~/.notifiarr/Notifiarr.log - Windows:
<home folder>/.notifiarr/Notifiarr.log - Docker:
docker logs Notifiarr(recommend setting a log file)



