mirror of
https://github.com/Dokploy/templates.git
synced 2026-05-08 09:38:42 -05:00
[GH-ISSUE #516] Potential bug Report: Zitadel self-hosted deploy on Dokploy fails #679
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @chasylexus on GitHub (Nov 3, 2025).
Original GitHub issue: https://github.com/Dokploy/templates/issues/516
To Reproduce
Bug Report: Zitadel self-hosted deploy on Dokploy fails with “Not Found” after setting custom subdomain
Description
I tried to deploy a self-hosted Zitadel instance using Dokploy from the built-in template, configured with a custom domain.
Here’s my setup:
dokploy.testhost.com.zitadel.dokploy.testhost.com:Problem
When I try to open the Zitadel web interface, it starts to load but then redirects to a page showing:
Current vs. Expected behavior
Expected: working web interface of Citadel
Current: websited is "trying to open" but redirects to page with json {"code":5,"message":"Not Found"}.
Provide environment information
Which area(s) are affected? (Select all that apply)
Traefik
Are you deploying the applications where Dokploy is installed or on a remote server?
Same server where Dokploy is installed
Additional context
See the attached video demonstrating the issue.
https://github.com/user-attachments/assets/87f5abfd-e672-4ae9-964c-8e16d628df3c
Will you send a PR to fix it?
No
@emretaskiran1 commented on GitHub (Nov 16, 2025):
I got same error.
@heykapil commented on GitHub (Dec 12, 2025):
Same error!
@Abhiigg commented on GitHub (Dec 30, 2025):
+1
@yavilavi commented on GitHub (Dec 31, 2025):
Same error
@lightumcc commented on GitHub (Dec 31, 2025):
+1
@abhishukla610 commented on GitHub (Jan 1, 2026):
+1
@rajatcing commented on GitHub (Jan 15, 2026):
hey folks thanks for reporting this, I will check with team as to what could we do here and update you all.
@rajatcing commented on GitHub (Jan 15, 2026):
so a quick workaround would be to disable login V2 by
ZITADEL_DEFAULTINSTANCE_FEATURES_LOGINV2_REQUIRED: falseand it should resolve the issue.@abhishukla610 commented on GitHub (Jan 15, 2026):
I solve the situation like the following trick which is mentioned on the official zitadel doc,
First run without zitadel v2 login (disable it) -> Follow v1 to v2 migrate guide (basically need to create a service role user, give it owner role and generate pat code) -> enable v2 login and add pat code in env
Also during this process, make sure to add attributes of https mode