Reverse Proxy Setup
If you are planning on running Pterodactyl behind a reverse proxy, either using NGINX or because you are using Cloudflare's Flexible SSL, you will need to make a quick modification to the Panel to ensure things continue to work as expected. By default when you are using these reverse proxies your Panel will not understand how to properly handle requests and you'll most likely be unable to login, or will see security warnings in your browser console as it attempts to load insecure assets. This is because the internal logic the Panel is using to determine how links should be generated thinks it is running over HTTP, and not over HTTPS.
You will need to edit the
.env file in the Panel's root directory to contain
TRUSTED_PROXIES=* at minimum. We
highly suggest providing a specific IP address (or comma seperated list of IPs) rather than allowing
*. For example,
if your proxy is running on the same machine as the server, chances are that something like
will work for you.
Cloudflare Specific Configuration
If you're using Cloudflares Flexible SSL you should set
TRUSTED_PROXIES to contain their IP addresses.
Below is an example of how to set this.
Increasing Editable File Size
By default the Panel attempts to set a reasonable limit for editing files through the web based file manager. However,
some users find it too restrictive and wish to increase the size. This is controlled by a configuration value that can
also be set using the
.env file. The default value is
50,000 bytes but this can be increased as you see fit.
By default Pterodactyl ships with the ability for clients to have their own per-server databases. If you wish to disable
this ability, set
PTERODACTYL_CLIENT_DATABASES_ENABLED to be
false. Pterodactyl also attempts to create databases
on a database host assigned to the current server's node but will use any host if one can't be found. If you would like
to force a database to be created only on a host belonging to that server's node, set
Forcing Environment From File
Out of the box Pterodactyl supports reading certain settings from the database rather than the
.env file. This is
mainly to make configuration easier for administrators, and let you avoid having to SSH into the server to make
changes. However, there are also instances where this behavior might be undesirable — for example, if you lock
yourself out of the Panel because of a bad reCAPTCHA key.
If you want to force the Panel to read only from
.env and not use settings stored in the database, add or edit
APP_ENVIRONMENT_ONLY in your
.env file to be
APP_ENVIRONMENT_ONLY=true. This will ignore settings in the
database, and read only from the environment file. Once you have resolved whatever issues you might be having
you can change it to be
false to go back to using the database.
Manually editing the database
If you need to manually edit a setting, you can do so by changing the value in the
settings table in the Pterodactyl
database. Some values are encrypted however, so you cannot just edit those, you'll either need to provide a new
encrypted value or follow the instructions above for reading from the environment until you fix it manually in the Panel.
Report All Exceptions
By default Pterodactyl only logs and reports exceptions that are, well, exceptional by nature. There are some exceptions that we expect to occur such as authentication failures or validation issues. However, in rare instances when developing, or even on production servers, you might need to have all exceptions logged to detect inconsistent behavior.
To do this, simply set
APP_REPORT_ALL_EXCEPTIONS=true in your
.env file. You'll want to turn this off once you've
completed whatever it is you're needing the exceptions for, otherwise your logs will become very large, very quickly.