TCP redirections are now available!

tcp_redirection
We were regularly asked to simplify the access to this feature by adding it to our web interface: the Console. It's done.A "TCP Redirections" section is now available in the menu of your applications.

When you deploy an application on Clever Cloud, it listens by default on port 8080 and responds to HTTP(S) requests. In the past, customers have asked us for an additional TCP listening port. Their goal was to handle specific protocols or interactions.

At first, we responded to these requests on a case-by-case basis. Two years ago, we added a TCP port forwarding feature to our Clever Tools CLI: as we explained then, one command is enough to open a port.

However, we were regularly asked to simplify the access to this feature by adding it to our web interface: the Console. It’s done. A “TCP Redirections” section is now available in the menu of your applications:

Clever Cloud Console TCP Redirection EN

It allows you to create a redirection in the default namespace (used by all custom domain names) or cleverapps (used by all cleverapps.io domain names). Both can be used simultaneously.

Once the redirection is created, an external access port will be assigned to the application, which will systematically redirect to its internal port 4040. Note that this feature is still in a testing phase. It can be used freely and is not charged.

Blog

À lire également

Elasticsearch Observability: logs, metrics, and traces explained

Modern architectures generate ever-growing volumes of data. Microservices, APIs, cloud workloads, and serverless environments multiply potential failure points. In this context, understanding what is really happening in production has become a central challenge.
Engineering

ELK Stack: what it is used for and how to use it for observability

Understanding what is really happening inside a modern application has become increasingly complex. Microservices, cloud environments, and the growing number of physical or virtual servers all contribute to an explosion of technical signals. This distribution makes so-called “traditional” log analysis—based on directly connecting to a single machine—hard to sustain at scale.
Engineering

Identity Access Management: pillar of security and compliance

Identity Access Management (IAM) is now one of the foundations of information system security and governance.…

Engineering