EC2 deployment #2677
-
Hi there everyone. Instance is up, container too ~]$ docker ps Curl respond from SSH session $ curl -i http://127.0.0.1:8080 But cant access from https://ec2-example-ip.compute-1.amazonaws.com/ |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 5 replies
-
Did you configure EC2 to reverse proxy it to Port 80? I haven't used EC2 before, but it looks like that is the most likely reason. |
Beta Was this translation helpful? Give feedback.
-
@free2fork please use -p 8080:8080 to bind it to the default port and not like -p 127.0.0.1:8080:8080. Doing so would expose the container on the localhost only and would not be accessible globally. AN additional information, you can bind an extra volume target to persist the user data on container updates BELOW IS THE DOCKER RUN THAT I USE TO DEPLOY MY CODE-SERVER WITH A SELF-SIGNED CERTIFICATE COMMAND TO GENERATE A SELF SIGNED CERTIFICATE
COMMAND TO DEPLOY THE CONTAINER WITH THE PATH TO THE CERTIFICATES FOR HTTPS
@free2fork Please mark this discussion as answered if your query has been solved. |
Beta Was this translation helpful? Give feedback.
@free2fork please use -p 8080:8080 to bind it to the default port and not like -p 127.0.0.1:8080:8080. Doing so would expose the container on the localhost only and would not be accessible globally.
AN additional information, you can bind an extra volume target to persist the user data on container updates
You need to bind the following volume to a location
/home/coder/.local/share/code-server
As of now, this is not so discussed about, but without this binding, the code-server loses it's data on container update. Binding only the .config is not enough.
BELOW IS THE DOCKER RUN THAT I USE TO DEPLOY MY CODE-SERVER WITH A SELF-SIGNED CERTIFICATE
COMMAND TO GENERATE A SELF SIGNED CERTIFICATE