Permalink
Find file Copy path
Fetching contributors…
Cannot retrieve contributors at this time
45 lines (27 sloc) 2.67 KB
outputFileName
index.html

Running Event Store

Event Store runs as a server that clients can connect to either over HTTP or using one of the client APIs. You can run both the open source and commercial versions as either a single node or a highly available cluster of nodes.

We distribute an open source version of Event Store as a console application. There are separate distributions for Windows on .NET and Linux/macOS on Mono.

[!include]

Solving 503 errors from the Admin UI

There is a known issue with the .NET HTTPListener class (which Event Store uses) and bad URL ACL registrations which can cause servers to return 503 errors for every request. If you see this, you can issue the following commands:

netsh http show urlacl

Look for an entry on the port you're trying to use (2113 unless you've specified a custom port), then issue:

netsh http delete urlacl <the entry you just found>

For example:

netsh http delete urlacl http://+:2113/

These steps should resolve the issue.

Shutting down an Event Store node

Event Store is designed to be safe by default, and it is expected that it will be shut down using kill -9. It is also possible to initiate a shutdown via the Admin UI, by clicking on the Shutdown Server button located on the Admin page. This may be useful if you do not have console access to the node or need to script initiating a shutdown.

Securing Event Store

To secure Event Store, you can bind the server to the localhost interface and install a reverse proxy such as nginx or Varnish on the public IP. Read this guide for an example of setting up Event Store with Varnish.

The reverse proxy is your public interface. Internally it handles the authentication and route requests to Event Store. Event Store is only accessible through the localhost adapter and is not exposed publicly. The locally running reverse proxy is allowed to cache responses, and because of this, reverse proxies are more performant than calling Event Store directly.

Even if you use a reverse proxy, you can support external authentication from Event Store itself. You do this by enabling the ES-TrustedAuth trusted intermediary option in your configuration. This allows the intermediary to write a header with the user information that Event Store uses.