How to run ASP.NET Core Web Application as a service on Linux without reverse proxy, no NGINX or Apache

This article walks us through running a ASP.NET Core web application on Linux (RHEL) using systemd. Here's what we'll cover:
- Running ASP.NET Core using systemd`
- Adding Systemd integration package
- Making ASP.NET Core accessible externally (Kestrel only, no reverse proxy)
- Serving ASP.NET Core over port 80 & 443 (Kestrel only, no reverse proxy)
The end goal is to serve ASP.NET Core directly via the built-in Kestrel webserver over port 80/443.
No reverse proxy, no NGINX and no Apache. Reverse proxies are great and still recommended but there's enough of documentation on that already.
To learn how to run .NET Core services (non web stuff) on Linux, check out "How to run a .NET Core as a service using Systemd on Linux"
Prerequisites:
- Red Hat Enterprise Linux (or a compatible Unix based OS)
- .NET Core 3.1 installed (Get started instructions from Red Hat)
- Sudo privileges
This walkthrough should work for most .NET Core supported Linux distributions, not just RHEL.
Run ASP.NET Core using Systemd #
Let's start by creating a new ASP.NET Core application using the web-template:
mkdir ~/AspNetSite cd ~/AspNetSite dotnet new web
We'll be using this application throughout the walkthrough. Let's verify that the web application works:
dotnet run # Output should looks like this: # info: Microsoft.Hosting.Lifetime[0] # Now listening on: https://localhost:5001 # info: Microsoft.Hosting.Lifetime[0] # Now listening on: http://localhost:5000 # info: Microsoft.Hosting.Lifetime[0] # Application started. Press Ctrl+C to shut down. # info: Microsoft.Hosting.Lifetime[0] # Hosting environment: Development # info: Microsoft.Hosting.Lifetime[0] # Content root path: /home/yourusername/AspNetSite
Open a separate shell (leave the other shell running) and use the curl HTTP-client to send an HTTP request to the application:
# while 'dotnet run' is running, open a new shell to run this curl command curl http://localhost:5000 # Output should be 'Hello World!'
If the application works, we can publish it somewhere logical such as '/srv/AspNetSite':
sudo mkdir /srv/AspNetSite sudo chown yourusername /srv/AspNetSite/ dotnet publish -c Release -o /srv/AspNetSite/
The published result contains an executable called 'AspNetSite' which will run the application. Let's verify we can also run the published application:
cd /srv/AspNetSite/ ./AspNetSite # Output should looks like this: # info: Microsoft.Hosting.Lifetime[0] # Now listening on: http://localhost:5000 # info: Microsoft.Hosting.Lifetime[0] # Now listening on: https://localhost:5001 # info: Microsoft.Hosting.Lifetime[0] # Application started. Press Ctrl+C to shut down. # info: Microsoft.Hosting.Lifetime[0] # Hosting environment: Production # info: Microsoft.Hosting.Lifetime[0] # Content root path: /srv/AspNetSite
Make sure to return to the original directory by running `cd ~/AspNetSite
`. To run services on Linux, Systemd uses 'service unit configuration' files to describe how to run services. Let's create the file 'AspNetSite.service' inside our project so we can store it in source control along with our code. Add the following content to 'AspNetSite.service':
[Unit] Description=ASP.NET Core web template [Service] # will set the Current Working Directory (CWD) WorkingDirectory=/srv/AspNetSite # systemd will run this executable to start the service ExecStart=/srv/AspNetSite/AspNetSite # to query logs using journalctl, set a logical name here SyslogIdentifier=AspNetSite # Use your username to keep things simple, for production scenario's I recommend a dedicated user/group. # If you pick a different user, make sure dotnet and all permissions are set correctly to run the app. # To update permissions, use 'chown yourusername -R /srv/AspNetSite' to take ownership of the folder and files, # Use 'chmod +x /srv/AspNetSite/AspNetSite' to allow execution of the executable file. User=yourusername # ensure the service restarts after crashing Restart=always # amount of time to wait before restarting the service RestartSec=5 # copied from dotnet documentation at # https://docs.microsoft.com/en-us/aspnet/core/host-and-deploy/linux-nginx?view=aspnetcore-3.1#code-try-7 KillSignal=SIGINT Environment=ASPNETCORE_ENVIRONMENT=Production Environment=DOTNET_PRINT_TELEMETRY_MESSAGE=false # This environment variable is necessary when dotnet isn't loaded for the specified user. # To figure out this value, run 'env | grep DOTNET_ROOT' when dotnet has been loaded into your shell. Environment=DOTNET_ROOT=/opt/rh/rh-dotnet31/root/usr/lib64/dotnet [Install] WantedBy=multi-user.target
Make sure to update the 'User' to your username. Refer to the comments for an explanation of the specified options. For more information on the service unit configuration file, read the freedesktop manual page or the Red Hat documentation.
Systemd expects all configuration files to be put under '/etc/systemd/system/'. Copy the service configuration file to '/etc/systemd/system/AspNetSite.service' and tell systemd to reload the configuration files.
sudo cp AspNetSite.service /etc/systemd/system/AspNetSite.service sudo systemctl daemon-reload
Now systemd is aware of the new 'AspNetSite' service. Using `systemctl start AspNetSite
` we can start the service.
Using `systemctl status AspNetSite
` we can query the status of the service. Let's start the service and check its status:
sudo systemctl start AspNetSite sudo systemctl status AspNetSite # Output should be similar to below: # ● AspNetSite.service - ASP.NET Core web template # Loaded: loaded (/etc/systemd/system/AspNetSite.service; enabled; vendor preset: disabled) # Active: active (running) since Wed 2020-01-29 17:06:24 UTC; 13s ago # Main PID: 5187 (AspNetSite) # CGroup: /system.slice/AspNetSite.service # └─5187 /srv/AspNetSite/AspNetSite # # Jan 29 17:06:25 rhtest AspNetSite[5187]: info: Microsoft.Hosting.Lifetime[0] # Jan 29 17:06:25 rhtest AspNetSite[5187]: Now listening on: http://localhost:5000 # Jan 29 17:06:25 rhtest AspNetSite[5187]: info: Microsoft.Hosting.Lifetime[0] # Jan 29 17:06:25 rhtest AspNetSite[5187]: Now listening on: https://localhost:5001 # Jan 29 17:06:25 rhtest AspNetSite[5187]: info: Microsoft.Hosting.Lifetime[0] # Jan 29 17:06:25 rhtest AspNetSite[5187]: Application started. Press Ctrl+C to shut down. # Jan 29 17:06:25 rhtest AspNetSite[5187]: info: Microsoft.Hosting.Lifetime[0] # Jan 29 17:06:25 rhtest AspNetSite[5187]: Hosting environment: Production # Jan 29 17:06:25 rhtest AspNetSite[5187]: info: Microsoft.Hosting.Lifetime[0] # Jan 29 17:06:25 rhtest AspNetSite[5187]: Content root path: /srv/AspNetSite
Due to the `Restart=always
` option, systemd will restart our service in case it crashed. But it will not automatically start the service when the machine reboots. To enable automatic startup, use the following command:
sudo systemctl enable AspNetSite
If everything is working correctly, we should be able to curl the application via localhost:5000:
curl http://localhost:5000 # Output should be 'Hello World!'
The website is now running as a systemd service. There's a systemd-package provided by Microsoft to improve the integration with systemd. Let's set that up next.
Add Systemd integration package #
Microsoft recently added a package to better integrate with systemd. When the integration is installed, the application will notify systemd when it's ready and when it's stopping. Additionally, systemd will understand the different log levels that the application logs.
Using the dotnet CLI, add the 'Microsoft.Extensions.Hosting.Systemd' (nuget) package:
dotnet add package Microsoft.Extensions.Hosting.Systemd --version 3.1.1
Next, we'll need to add one line to the 'Program.cs', `.UseSystemd()
`:
using System; using System.Collections.Generic; using System.Linq; using System.Threading.Tasks; using Microsoft.AspNetCore.Hosting; using Microsoft.Extensions.Configuration; using Microsoft.Extensions.Hosting; using Microsoft.Extensions.Logging; namespace AspNetSite { public class Program { public static void Main(string[] args) { CreateHostBuilder(args).Build().Run(); } public static IHostBuilder CreateHostBuilder(string[] args) => Host.CreateDefaultBuilder(args) .UseSystemd() .ConfigureWebHostDefaults(webBuilder => { webBuilder.UseStartup<Startup>(); }); } }
For demonstration purposes of the logging integration, update the 'Program.cs' file with the following:
using System; using System.Collections.Generic; using System.Linq; using System.Threading.Tasks; using Microsoft.AspNetCore.Builder; using Microsoft.AspNetCore.Hosting; using Microsoft.AspNetCore.Http; using Microsoft.Extensions.DependencyInjection; using Microsoft.Extensions.Hosting; using Microsoft.Extensions.Logging; namespace AspNetSite { public class Startup { // This method gets called by the runtime. Use this method to add services to the container. // For more information on how to configure your application, visit https://go.microsoft.com/fwlink/?LinkID=398940 public void ConfigureServices(IServiceCollection services) { } // This method gets called by the runtime. Use this method to configure the HTTP request pipeline. public void Configure(IApplicationBuilder app, IWebHostEnvironment env, ILogger<Startup> logger) { if (env.IsDevelopment()) { app.UseDeveloperExceptionPage(); } app.UseRouting(); app.UseEndpoints(endpoints => { endpoints.MapGet("/", async context => { logger.LogInformation("Information - Hello World"); logger.LogWarning("Warning - Hello World"); logger.LogError("Error - Hello World"); logger.LogCritical("Critical - Hello World"); await context.Response.WriteAsync("Hello World!"); }); }); } } }
Lastly, we need to update the file 'AspNetSite.service' to specify 'type=Notify':
[Unit] Description=ASP.NET Core web template [Service] Type=notify # will set the Current Working Directory (CWD) WorkingDirectory=/srv/AspNetSite # systemd will run this executable to start the service ExecStart=/srv/AspNetSite/AspNetSite # to query logs using journalctl, set a logical name here SyslogIdentifier=AspNetSite # Use your username to keep things simple, for production scenario's I recommend a dedicated user/group. # If you pick a different user, make sure dotnet and all permissions are set correctly to run the app. # To update permissions, use 'chown yourusername -R /srv/AspNetSite' to take ownership of the folder and files, # Use 'chmod +x /srv/AspNetSite/AspNetSite' to allow execution of the executable file. User=yourusername # ensure the service restarts after crashing Restart=always # amount of time to wait before restarting the service RestartSec=5 # copied from dotnet documentation at # https://docs.microsoft.com/en-us/aspnet/core/host-and-deploy/linux-nginx?view=aspnetcore-3.1#code-try-7 KillSignal=SIGINT Environment=ASPNETCORE_ENVIRONMENT=Production Environment=DOTNET_PRINT_TELEMETRY_MESSAGE=false # This environment variable is necessary when dotnet isn't loaded for the specified user. # To figure out this value, run 'env | grep DOTNET_ROOT' when dotnet has been loaded into your shell. Environment=DOTNET_ROOT=/opt/rh/rh-dotnet31/root/usr/lib64/dotnet [Install] WantedBy=multi-user.target
Let's deploy all our changes. We'll need to publish the .NET app and stop/reload/start the systemd service:
sudo systemctl stop AspNetSite dotnet publish -c Release -o /srv/AspNetSite/ sudo cp AspNetSite.service /etc/systemd/system/AspNetSite.service sudo systemctl daemon-reload sudo systemctl start AspNetSite
The application logs are being captured by systemd. We can query the logs using 'journalctl', here are some examples:
sudo journalctl -u AspNetSite #query all output, oldest to newest sudo journalctl -u AspNetSite -f #query all output and follow live sudo journalctl -u AspNetSite -r #query all output, newest to oldest sudo journalctl -u AspNetSite --since="2020-01-17 11:00:00" --until="2020-01-17 11:15:00" #filter by time
The unit-flag (-u) allows us to filter by 'SyslogIdentifier' which we specified in 'AspNetSite.service'.
We can verify that the .NET Core logging integrates correctly by using the priority-flag (-p) on 'journalctl'. This will filter the output according the log levels below:
LogLevel | Syslog level | systemd name |
Trace/Debug | 7 | debug |
Information | 6 | info |
Warning | 4 | warning |
Error | 3 | err |
Critical | 2 | crit |
For example, the following command will only print output with log level 4 and below meaning warning, error, and critical:
sudo journalctl -u AspNetSite -p 4 # Output should be empty
Let's first make a couple of HTTP request to the application using curl and then run the 'journalctl' query:
curl http://localhost:5000 curl http://localhost:5000 curl http://localhost:5000 sudo journalctl -u AspNetSite -p 4
The 'journalctl' command should now return the different log statements we wrote 3 times.
The 'UseSystemd' function will not do anything when run outside of a systemd service. The implementation checks if the OS is a Unix system and whether the parent process is systemd.
If not, the systemd integration is skipped.
We now have our systemd-integration ready, but the application is still not accessible outside of the machine. Let's make the application accessible externally.
Make ASP.NET Core accessible externally #
As demonstrated below, the application is only accessible via localhost on the machine and not via the machine's IP-address.
curl http://localhost:5000 # Output should be 'Hello World!' # try curl'ing using your machine's IP, to list IP's on RHEL use 'ip addr show' curl http://10.0.0.4:5000 # Output should be 'curl: (7) Failed to connect to 10.0.0.4 port 5000: Connection refused'
Out of the box, the application is configured to listen to http://localhost:5000 & https://localhost:5001. This works great for development, but we want to expose our application to other machines in the network or even to the internet. In ASP.NET Core there are many ways to configure the URL's. We can configure it through code, appsettings.json, environment variables, or command line arguments.
Let's go with environment variables. Add the 'ASPNETCORE_URLS' environment variable to the 'AspNetSite.service' file:
[Unit] Description=ASP.NET Core web template [Service] Type=notify # will set the Current Working Directory (CWD) WorkingDirectory=/srv/AspNetSite # systemd will run this executable to start the service ExecStart=/srv/AspNetSite/AspNetSite # to query logs using journalctl, set a logical name here SyslogIdentifier=AspNetSite # Use your username to keep things simple, for production scenario's I recommend a dedicated user/group. # If you pick a different user, make sure dotnet and all permissions are set correctly to run the app. # To update permissions, use 'chown yourusername -R /srv/AspNetSite' to take ownership of the folder and files, # Use 'chmod +x /srv/AspNetSite/AspNetSite' to allow execution of the executable file. User=yourusername # ensure the service restarts after crashing Restart=always # amount of time to wait before restarting the service RestartSec=5 # copied from dotnet documentation at # https://docs.microsoft.com/en-us/aspnet/core/host-and-deploy/linux-nginx?view=aspnetcore-3.1#code-try-7 KillSignal=SIGINT Environment=ASPNETCORE_ENVIRONMENT=Production Environment=DOTNET_PRINT_TELEMETRY_MESSAGE=false # This environment variable is necessary when dotnet isn't loaded for the specified user. # To figure out this value, run 'env | grep DOTNET_ROOT' when dotnet has been loaded into your shell. Environment=DOTNET_ROOT=/opt/rh/rh-dotnet31/root/usr/lib64/dotnet # When using the out of the box ASP.NET Tempates, this environment variable will allow you to override # which IP & ports the Kestrel Web Server will listen to. # Using the * as a wildcard will listen to any IP, localhost and other IP's the machine may have Environment=ASPNETCORE_URLS=http://*:5000;https://*:5001 [Install] WantedBy=multi-user.target
Instead of specifying localhost or an IP-address, the asterisk (*) will act as a wildcard. The application will now listen to localhost and all IP-addresses assigned to the machine.
Let's copy the updated configuration file and reload/restart the systemd service:
sudo cp AspNetSite.service /etc/systemd/system/AspNetSite.service sudo systemctl daemon-reload sudo systemctl restart AspNetSite sudo systemctl status AspNetSite # Output should be similar to below: # ● AspNetSite.service - ASP.NET Core web template # Loaded: loaded (/etc/systemd/system/AspNetSite.service; enabled; vendor preset: disabled) # Active: active (running) since Wed 2020-01-29 17:17:48 UTC; 5s ago # Main PID: 5937 (AspNetSite) # CGroup: /system.slice/AspNetSite.service # └─5937 /srv/AspNetSite/AspNetSite # # Jan 29 17:17:48 rhtest AspNetSite[5937]: info: Microsoft.Hosting.Lifetime[0] # Jan 29 17:17:48 rhtest AspNetSite[5937]: Now listening on: http://[::]:5000 # Jan 29 17:17:48 rhtest AspNetSite[5937]: info: Microsoft.Hosting.Lifetime[0] # Jan 29 17:17:48 rhtest AspNetSite[5937]: Now listening on: https://[::]:5001 # Jan 29 17:17:48 rhtest AspNetSite[5937]: info: Microsoft.Hosting.Lifetime[0] # Jan 29 17:17:48 rhtest AspNetSite[5937]: Application started. Press Ctrl+C to shut down. # Jan 29 17:17:48 rhtest AspNetSite[5937]: info: Microsoft.Hosting.Lifetime[0] # Jan 29 17:17:48 rhtest AspNetSite[5937]: Hosting environment: Production # Jan 29 17:17:48 rhtest AspNetSite[5937]: info: Microsoft.Hosting.Lifetime[0] # Jan 29 17:17:48 rhtest AspNetSite[5937]: Content root path: /srv/AspNetSite
Instead of http://localhost:5000, we can now see http://[::]:5000. Now that the application is bound to the machine's IP-address, we should be able to curl it via IP from within the machine:
# try curl'ing using your machine's IP, to list IP's on RHEL use 'ip addr show' curl http://10.0.0.4:5000 # Output should be 'Hello World!'
Does this mean the website is accessible from outside the machine now?
Almost, Red Hat comes with a built-in firewall which will block the traffic. Using the 'firewall-cmd' utility, we can update the firewall configuration to allow TCP traffic over port 5000 & 5001:
sudo firewall-cmd --zone=public --add-port 5000/tcp --permanent sudo firewall-cmd --zone=public --add-port 5001/tcp --permanent sudo firewall-cmd --reload
Now the website will be accessible from other machines within the network.
In case you're running this RHEL machine in the cloud, you will also have to ensure whatever security is provided by the cloud also allow TCP over port 5000 & 5001.
Once that's done, the website should be accessible to the internet.
Serve ASP.NET Core over port 80 & 443 #
By default, Linux machines won't allow processes to use well known ports (ports lower than 1024).
If we try to run the application using port 80 and/or 443, we'll get a permission error:
/srv/AspNetSite/AspNetSite --urls "http://*:80;https://*:443" # Output: # crit: Microsoft.AspNetCore.Server.Kestrel[0] # Unable to start Kestrel. # System.Net.Sockets.SocketException (13): Permission denied # ...
There are many ways to work around this restriction.
Use a Reverse Proxy #
We can setup a reverse proxy to listen to port 80 & 443 and have it forward traffic to the ASP.NET Core application. This process is well documented by Microsoft:
This is a great option for many reasons, but we're not going to do this since our goal for this walkthrough is to stick to the built-in Kestrel server exclusively.
Grant CAP_NET_BIND_SERVICE capability #
Using the following command, we can give the AspNetSite executable the 'CAP_NET_BIND_SERVICE' capability. This capability will allow the process to bind to well known ports.
sudo setcap CAP_NET_BIND_SERVICE=+eip /srv/AspNetSite/AspNetSite /srv/AspNetSite/AspNetSite --urls "http://*:80;https://*:443" # Output: # info: Microsoft.Hosting.Lifetime[0] # Now listening on: http://[::]:80 # info: Microsoft.Hosting.Lifetime[0] # Now listening on: https://[::]:443 # info: Microsoft.Hosting.Lifetime[0] # Application started. Press Ctrl+C to shut down. # info: Microsoft.Hosting.Lifetime[0] # Hosting environment: Production # info: Microsoft.Hosting.Lifetime[0] # Content root path: /home/yourusername/AspNetSite
Every time the executable is updated the 'CAP_NET_BIND_SERVICE' capability will be lost. We could make this command as part of a deployment script, but the systemd service unit configuration files has an option called 'AmbientCapabilities'.
When configuring this option to 'CAP_NET_BIND_SERVICE', systemd will grant the capability to the service for us. Let's update the 'AspNetSite.service' file to update the ports and add the capability to bind to well known ports.
[Unit] Description=ASP.NET Core web template [Service] Type=notify # will set the Current Working Directory (CWD) WorkingDirectory=/srv/AspNetSite # systemd will run this executable to start the service ExecStart=/srv/AspNetSite/AspNetSite # to query logs using journalctl, set a logical name here SyslogIdentifier=AspNetSite # Use your username to keep things simple, for production scenario's I recommend a dedicated user/group. # If you pick a different user, make sure dotnet and all permissions are set correctly to run the app. # To update permissions, use 'chown yourusername -R /srv/AspNetSite' to take ownership of the folder and files, # Use 'chmod +x /srv/AspNetSite/AspNetSite' to allow execution of the executable file. User=yourusername # ensure the service restarts after crashing Restart=always # amount of time to wait before restarting the service RestartSec=5 # copied from dotnet documentation at # https://docs.microsoft.com/en-us/aspnet/core/host-and-deploy/linux-nginx?view=aspnetcore-3.1#code-try-7 KillSignal=SIGINT Environment=ASPNETCORE_ENVIRONMENT=Production Environment=DOTNET_PRINT_TELEMETRY_MESSAGE=false # This environment variable is necessary when dotnet isn't loaded for the specified user. # To figure out this value, run 'env | grep DOTNET_ROOT' when dotnet has been loaded into your shell. Environment=DOTNET_ROOT=/opt/rh/rh-dotnet31/root/usr/lib64/dotnet # When using the out of the box ASP.NET Tempates, this environment variable will allow you to override # which IP & ports the Kestrel Web Server will listen to Environment=ASPNETCORE_URLS=http://*:80;https://*:443 # give the executed process the CAP_NET_BIND_SERVICE capability. This capability allows the process to bind to well known ports. AmbientCapabilities=CAP_NET_BIND_SERVICE [Install] WantedBy=multi-user.target
For the last time, copy the 'AspNetSite.service' file and reload/restart the AspNetSite service.
sudo cp AspNetSite.service /etc/systemd/system/AspNetSite.service sudo systemctl daemon-reload sudo systemctl restart AspNetSite sudo systemctl status AspNetSite # Output should be similar to below: # ● AspNetSite.service - ASP.NET Core web template # Loaded: loaded (/etc/systemd/system/AspNetSite.service; enabled; vendor preset: disabled) # Active: active (running) since Wed 2020-01-29 17:17:48 UTC; 5s ago # Main PID: 5937 (AspNetSite) # CGroup: /system.slice/AspNetSite.service # └─5937 /srv/AspNetSite/AspNetSite # # Jan 29 17:17:48 rhtest AspNetSite[5937]: info: Microsoft.Hosting.Lifetime[0] # Jan 29 17:17:48 rhtest AspNetSite[5937]: Now listening on: http://[::]:80 # Jan 29 17:17:48 rhtest AspNetSite[5937]: info: Microsoft.Hosting.Lifetime[0] # Jan 29 17:17:48 rhtest AspNetSite[5937]: Now listening on: https://[::]:443 # Jan 29 17:17:48 rhtest AspNetSite[5937]: info: Microsoft.Hosting.Lifetime[0] # Jan 29 17:17:48 rhtest AspNetSite[5937]: Application started. Press Ctrl+C to shut down. # Jan 29 17:17:48 rhtest AspNetSite[5937]: info: Microsoft.Hosting.Lifetime[0] # Jan 29 17:17:48 rhtest AspNetSite[5937]: Hosting environment: Production # Jan 29 17:17:48 rhtest AspNetSite[5937]: info: Microsoft.Hosting.Lifetime[0] # Jan 29 17:17:48 rhtest AspNetSite[5937]: Content root path: /srv/AspNetSite
The web application is now listening to port 80 & 443, but the built-in firewall will still block traffic coming in over those ports. Update the built-in firewall and any other network security to allow traffic over port 80 & 443:
sudo firewall-cmd --zone=public --add-port 80/tcp --permanent sudo firewall-cmd --zone=public --add-port 443/tcp --permanent sudo firewall-cmd --reload
Visiting the website over port 80 using the browser should now return "Hello World!".
Summary #
We now have a public facing ASP.NET Core application served by the built-in Kestrel web server by taking the following steps:
- deploy ASP.NET Core to RHEL under /srv/AspNetSite
- configure systemd to run the application as a service
- add systemd .NET Core integration to the application
- configure the application to listen to all IP's and different ports using environment variables
- update the built-in firewall to allow TCP traffic over 5000, 5001, 80, and 443
- grant 'CAP_NET_BIND_SERVICE' capability to the service to allow the application to bind to well known ports such as 80 & 443