How to solve the most common issues with Briefer deployments.
I can access the web application, but the sign-in is not working
3000
.In case you can’t enable HTTPS or just want to try it out over HTTP, you can run Briefer over HTTP by setting the ALLOW_HTTP
environment variable to true
:ALLOW_HTTP
will not set the session cookie as Secure, thus allowing you to sign in using HTTP. We don’t recommend using this option production.Furthermore, if you’re using an older version of Briefer, you might need to delete older volumes which might contain conflicting data. You can do that by running:I can't access the web application
docker ps
. You should see a container using the image briefercloud/briefer
or briefercloud/briefer-web
. If you don’t see it, Briefer is not running.If Briefer is running, have a look at its logs and see if there are any errors. You can do that by running docker logs <container_id>
, where <container_id>
is the ID of the Briefer container.Finally, make sure that you’ve exposed your server to the internet or your local network. You can do that by allowing traffic on port 3000
and creating the necessary DNS records to access the host. Finally, please ensure that the container’s port is bound to the host’s port (3000
).I can access the web application, but I can't run code
I can access the web application, but it can't talk to the API
docker logs <container_id>
, where <container_id>
is the ID of the API container or the monolithic Briefer container in case that’s what you’re using.Check if it complains about any missing environment variables or if there’s any other straightforward error that you can solve.If you can’t figure out what’s happening, please open an issue here.I get a 500 error whenever I try to access Briefer
I'm having issues with my Postgres SSL settings
POSTGRES_SSL_DISABLED
: Set this to true
to disable SSL.POSTGRES_SSL_REJECT_UNAUTHORIZED
(optional): Set this to true
to reject unauthorized (self-signed) SSL certificates.POSTGRES_SSL_CA
: (optional): The path to the CA certificate file to validate the server certificate.values.yaml
file as api.env.postgresSslDisabled
, api.env.postgresSslRejectUnauthorized
, and api.env.postgresSslCa
, respectively.sslmode=prefer
in a Postgres connection string.