location ^~ /teamapps/ { proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_set_header X-Forwarded-Proto $scheme; proxy_pass http://127.0.0.1:6080; }
sandstorm/util.c++:845: fatal: *exception = sandstorm/run-bundle.c++:1871: failed: bind(sockFd, reinterpret_cast<sockaddr *>(&sa), sizeof(sockaddr_in)): Address already in usestack: 0x4f5072 0x4f502a 0x47591e** Front-end died immediately after starting.** Sleeping for a bit before trying again...
--
You received this message because you are subscribed to the Google Groups "Sandstorm Development" group.
To unsubscribe from this group and stop receiving emails from it, send an email to sandstorm-de...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
All I really care about is ensuring that my users can access their Sandstorm apps via a URL that appears to form part of the bigger enterprise of which this particular Sandstorm server is a part. Something along the lines of team.example.com is acceptable. I might well end up putting Sandstorm on a server all of its own (so no Port 6080 anymore) in order to avoid degrading the performance of the other apps that run on the example.com server. So if I do that what is required to keep Sandstorm happy. I am imagining
- A wildcard SSL cert
- /opt/sandstorm/sandstorm.conf modified to point to the team.example.com server.
- An extra A record that points *.team.example.com to the same IP as the team.example.com.
It is less than 24h since I discovered Sandstorm - in a word:fantastic! However, the steps to be taken when does not want the server to be accessed via a serverid.sandcats.io URL are less than crystal clear.
I was not able to make it work with sandcats.io domain. In this case the sandstorm server needs to check for auto updates of the certificate which doesn't work in http mode. So the sandstorm server needs to be also internally communicate via https and the reverse proxy needs to pass through this connection (purple box in my example on stack overflow). I have read that haproxy is able to do that but I didn't check that yet. You would need haproxy in front of your nginx proxy to separate the traffic to sandstorm from the rest.
But when you have an own custom wild card certificate it definitely works with nginx only (green or red box in my example on stack overflow). I could help you with that if required.