Public | Automated Build

Last pushed: a year ago
Short Description
Forked from stockflare/docker-nginx-elb-websocket to add host header to forwarded requests.
Full Description

This image started as a fork from stockflare/docker-nginx-elb-websocket

Dreams of Websockets

We use this docker container to enable Websocket connections through AWS Elastic Load Balancers.

The container uses confd for a one-time configuration of Nginx when the container starts, using environment variables. The Nginx configuration file is written to work in conjunction with an Elastic Load Balancer, itself using ProxyProtocol.


The container requires the presence of three environment variables. These variables will be used to configure Nginx when the container starts.

Note: The resulting configuration is checked for validity.

Env Purpose
LISTEN_ON Determines which port Nginx will listen to for connections that are not TLS-originating
LISTEN_ON_TLS Determines which port Nginx will listen on for connections that are TLS inbound
DESTINATION_HOSTNAME The hostname to proxy traffic to. This should typically be the name of the linked docker container (explained below)
DESTINATION_PORT The port to proxy traffic to on the destination container

Requests made to the LISTEN_ON port are automatically redirected to https, using the same host and request uri.

Brief Example

Lets say that we have the following container running on a host:

docker run -p 45490:45490 -n app -d my_websocket_application

To enable this container to proxy traffic to that application, we would run the following command:

docker run --link app:app \
           -p 81:81 -p 444:444 \
           -e LISTEN_ON=81 \
           -e LISTEN_ON_TLS=444 \
           -e DESTINATION_HOSTNAME=app \
           -e DESTINATION_PORT=45490 \
           -d mikesir87/nginx-elb-websocket

This container would then start listening to traffic on ports 81 and 444. Requests made to port 81 will redirect the request to HTTPS and requests made to port 444 will be forwarded to the application container on port 45490.

If you were running these containers on EC2 hosts that were part of a load balanced auto scaling group, the load balancer would be configured with the aforementioned ProxyProtocol on ports 81 and 444.

aws elb create-load-balancer-policy --load-balancer-name [my-loadbalancer] --policy-name proxyProtocol-policy --policy-type-name ProxyProtocolPolicyType --policy-attributes AttributeName=ProxyProtocol,AttributeValue=true
aws elb set-load-balancer-policies-for-backend-server --load-balancer-name [my-loadbalancer] --instance-port 81 --policy-names proxyProtocol-policy 
aws elb set-load-balancer-policies-for-backend-server --load-balancer-name [my-loadbalancer] --instance-port 444 --policy-names proxyProtocol-policy

Simply replace [my-loadbalancer] with the name of the ELB you've created. The container also provides a naive health check for ELBs located at /ping.


Any /config-overrides/*.conf files will be included in the server's HTTP config. You can see where it's being included in the etc/confd/templates/nginx.conf.tmpl file.

Why is this needed?

Out-of-the-box, ELBs do not support Websockets and therefore require an additional proxy for which the connections must be negotiated through. There exist many blog posts on the internet, documenting the process for what we've done here. We wanted to create a more generic and complete approach to this. Below are some of the resources that we used:

Docker Pull Command

Comments (0)