Single container Budibase and using Minio in Azure PaaS #8040
PekkaJalonen
started this conversation in
Show and tell
Replies: 1 comment
-
Thanks @PekkaJalonen for posting info that will be helpful to other people. The limitations of Azure are frustrating as I have personally found with AAS. I'll try to make some time to play with ACA and your customizations. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Hi, I have deployed Budibase to Azure and wanted to share some insights so far.
I started testing with Azure App Service (Docker) for single image Budibase, but due to technical limitations in how App Service uses Azure File Storage mount, the Minio deployment does not work as it fails due file access errors. I was able to configure older Minio gateway with Azure storage, but I did not want to continue with old Minio version and on top of that, I found out that Budibase does not require authentication to attachments.
To ensure attachment authentication, I wanted to use App Service build-in easy-auth functionality which is middleware container authorizing all requests before they reach my Budibase instance. This configuration in App Service uses IP scope 169.254.x.y which is usually private host networking, and for some reason some budibase components fails to bind ports when easy-auth is enabled. This was a deal breaker for me. So I ditched the whole App Service idea and moved towards Azure Container Apps which is a little bit more expensive, but more flexible around the configuration.
Azure Container Apps (ACA) supports also both easy-auth and azure file storage mounts. Both works as expected. Also ACA support direct console access to container without requiring the SSH access which the App Service required. Downsize with ACA compared to App Service was that it does not allow as simple custom domain integration. It allows you so set custom domain, but requires you to bring your own TLS certificate for ingress (compared to App Service, it allows custom domain but also generates valid managed TSL certificate). ACA also limits the inbound traffic to port 443 and requires the TLS, so you cannot allow traffic to both 80 and 443 and configure the Budibase bundled let's encrypt. These two limitations required few customizations:
So that's it, wanted to share as I have done a huge amount testing and playing around with Azure and figured that I was looking this type of info and now, I'm sharing to others what works and what does not.
Beta Was this translation helpful? Give feedback.
All reactions