WARN could not unmount /rootfs: EINVAL: Invalid argument
2024-12-31 16:43:14.489
INFO Starting clean up.
2024-12-31 16:43:14.475
INFO Main child exited normally with code: 0
2024-12-31 16:43:13.888
Application is shutting down…
2024-12-31 16:43:13.888
info: Microsoft.Hosting.Lifetime[0]
2024-12-31 16:43:13.884 INFO Sending signal SIGINT to main child process w/ PID 321
However, attempting to contact the machine using curl fails:
curl --request POST [fdaa:9:7823:a7b:8d:af16:44bd:2]:65432
curl: (7) Failed to connect to fdaa:9:7823:a7b:8d:af16:44bd:2 port 65432 after 70 ms: Could not connect to server
Is your app running? You may have it auto-stopping. When you make a request directly to the machine you are not going through the fly proxy and the machine will not auto-start due to a request.
You can use fly machine list to see the status of your machines, and their internal IPv6 addresses. If a machine is not running you can use fly machine start to start it. Also note if you’re trying to reach your HTTP server directly instead of through the fly proxy, you will need to access it via HTTP on the port it is listening on, and not HTTPS via the standard HTTPS port:
% fly machine list
178117d9fe9e28 damp-field-6004 started sjc testkms:deployment-01JFAKB11HH8C0JY6YMEA7H0CY fdaa:9:1094:a7b:152:672d:55f:2 2024-12-17T15:19:26Z 2024-12-17T15:21:56Z app shared-cpu-1x:1024MB
% curl 'http://[fdaa:9:1094:a7b:152:672d:55f:2]:8080'
<!DOCTYPE html>
<html lang="en">
<body>
<h2>I'm running in the sjc region</h2>
</body>
</html>
PING fdaa:9:7823:a7b:8d:af16:44bd:2 (fdaa:9:7823:a7b:8d:af16:44bd:2) 56 data bytes
64 bytes from fdaa:9:7823:a7b:8d:af16:44bd:2: icmp_seq=2 ttl=62 time=72.4 ms
nmap -6 fdaa:9:7823:a7b:8d:af16:44bd:2
Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-01-01 11:17 EET
Nmap scan report for 5683607b470d18.vm.02029a5f-319f-44e6-ad57-2be6e3035d1a.internal (fdaa:9:7823:a7b:8d:af16:44bd:2)
Host is up (0.071s latency).
Not shown: 999 closed tcp ports (conn-refused)
PORT STATE SERVICE
22/tcp open ssh
Nmap done: 1 IP address (1 host up) scanned in 1.23 seconds
Why is this happening? The machine is running, and this is the JSON I used to set it up:
Are you listening on 65432 on all interfaces in your machine?
If you have netstat installed you can use fly ssh console -C "netstat -an" to see what is listening.