The Console Server is an internal Node.js application that runs alongside MultiPortal, creating a secure WebSocket connect between your MultiPortal to your Proxmox servers. It automatically starts when MultiPortal is installed and is monitored every minute to ensure it's running smoothly.
When setting up the Proxmox integration, ensure that the username and password provided have the necessary permissions to access the Proxmox console. Without proper access, MultiPortal will be unable to establish console connections to your virtual machines. To set up your user you can read Creating A Proxmox API User.
Your MultiPortal instance must have a valid SSL certificate to establish a secure connection between itself and your Proxmox instances.
The Console Control Panel is now fully integrated into the Web GUI, simplifying monitoring and management tasks. PM2 continues to ensure the service's reliability in the background, but manual command-line interaction is no longer required for routine operations.
For advanced users or troubleshooting purposes, the PM2 tool is still available on the server. You can manually verify the service status or perform actions using commands like:
View the PM2 process list:
sudo -u www-data pm2 list
Check logs:
sudo -u www-data pm2 logs
However, these steps are typically unnecessary, as the Web GUI now centralizes all key functionalities.
After version 0.6.1, when the system restarts the PM2 service, a new log file called console_output.log is created. This file is crucial for debugging and troubleshooting any issues related to the Console Server.
The log file can be found in:
/var/www/FQDN/logs/console_output.log
Follow the video below for a step-by-step walkthrough of resolving common console server issues, or read on for detailed instructions.
./yii generate-api-key
./yii generate-api-key/replace
If you're using a custom DNS name that is not publicly accessible, your MultiPortal server might encounter issues when attempting to establish a secure connection for the console server. These issues can manifest as latency or connection failures, as the server struggles to resolve its own domain name.
To ensure your MultiPortal Console communicates correctly with itself, update the host file to map the MultiPortal domain to the localhost.
sudo nano /etc/hosts
127.0.0.1
:127.0.0.1 multiportal.example.com
Ctrl+O
, Enter
, Ctrl+X
).sudo systemctl restart caddy
By making this change, the MultiPortal server will correctly route requests to itself, resolving potential connection issues. You can verify the resolution by testing the console connection functionality.
Issue: In older MultiPortal versions, data center credentials were not validated during setup. This could result in connection failures or errors after the production release.
Solution:
Troubleshooting:
Issue: When using Custom SSL, connecting to virtual machines' console doesn't work and shows 'Connecting.'
When viewing the Console logs, you will also see the following error:
Error in WebSocket connection: unable to verify the first certificate
Solution:
openssl s_client -connect your-domain:443 -showcerts
Ensure that the output lists all certificates in the chain, up to the root certificate.systemctl restart caddy
If you have completed the steps above and are still encountering issues, please reach out to MultiPortal Support for assistance.