Install Code-Server on Ubuntu 18.04 LTS

Updated on December 2, 2020
Install Code-Server on Ubuntu 18.04 LTS header image


Code-server is an open-source server application that serves Visual Studio Code on a remote server, accessible through a browser. Code-server allows developers to access their development environment from anywhere, as well as to have a consistent development environment across different devices. It allows leveraging powerful cloud servers to speed-up compilations and tests, and to save battery when on the go.

This tutorial will guide you through the process of installing code-server on an Ubuntu 18.04 LTS VPS, and securing the installation with SSL and fail2ban.


The following are required to successfully follow along the tutorial:

  • A Vultr Cloud Compute instance (Min. Recommended: 4 GB RAM, 2 CPUs)
  • A valid domain name pointing to the instance (Required for setting up SSL)
  • SSH access to the instance as root

Install Code-Server

Download the latest release of code-server from the official repository.

cd /home

Untar the downloaded archive and rename the extracted folder.

tar -xvzf code-server2.1688-vsc1.39.2-linux-x86_64.tar.gz && rm code-server2.1688-vsc1.39.2-linux-x86_64.tar.gz
mv code-server2.1688-vsc1.39.2-linux-x86_64 code-server

Make the code-server binary executable.

cd code-server
chmod +x code-server

Run code-server.

./code-server --port 8000

Navigate to http://<YOUR-SERVER-IP>:8000 in a browser window. You will be prompted for a password. Use the password displayed in the SSH terminal. The Visual Studio Code interface will open up. To stop the server, press Ctrl + C in the SSH terminal.

Run Code-Server on Startup

To run code-server on system startup, you can install it as a service. We will be using Linux's systemd service manager to create a service for code-server.

Create a new unit file for the code-server service.

nano /lib/systemd/system/code-server.service

Paste the following snippet into the file, replacing <password> with a strong password of your choice. This will be the password you will use to login to code-server.

Description=Code Server Service

ExecStart=/home/code-server/code-server --port 8000


Enable and start the newly created service.

systemctl enable code-server
systemctl start code-server

Navigate to http://<YOUR-SERVER-IP>:8000 in a browser window. Use the password you chose earlier to login to code-server. The Visual Studio Code interface will open up upon successful authentication

Setup an Nginx Reverse Proxy

To access your installation over a domain name and to add an SSL certificate for security, it is recommended to setup a reverse proxy. We will be using the Nginx web server as a reverse proxy to access the code-server installation.

Download and install Nginx.

apt-get update
apt-get install nginx

Disable the default Nginx site configuration file.

rm /etc/nginx/sites-enabled/default

Create a new Nginx site configuration file for code-server.

nano /etc/nginx/sites-available/code-server

Paste the following snippet into the file, replacing with your own domain name.

server {
  listen 80;
  listen [::]:80;
  location / {
      proxy_pass http://localhost:8000/;
      proxy_set_header Host $host;
      proxy_set_header Upgrade $http_upgrade;
      proxy_set_header Connection upgrade;
      proxy_set_header Accept-Encoding gzip;
      proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;

Enable the configuration and restart the Nginx web server.

ln -s /etc/nginx/sites-available/code-server /etc/nginx/sites-enabled/
systemctl restart nginx

Allow SSH and Nginx connections through the firewall, and enable the firewall. This will ensure that the code-server installation is only accessible through the Nginx reverse proxy.

ufw allow ssh
ufw allow 'Nginx Full'
ufw enable

Navigate to your domain name to test the installation.

Install an SSL Certificate

For enhanced security when using the code-server installation over the internet, the developers of code-server recommended installing an SSL certificate. The Certbot application automates the process of obtaining and installing a free Let's Encrypt SSL certificate.

Download and install Certbot.

apt-get install python-certbot-nginx

Execute the following command to launch Certbot's command-line installer, replacing with your own domain name.

certbot --nginx -d -d

Proceed through the interactive installer. When asked whether or not to redirect HTTP traffic to HTTPS, choose to redirect.

Please choose whether or not to redirect HTTP traffic to HTTPS, removing HTTP access.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
1: No redirect - Make no further changes to the webserver configuration.
2: Redirect - Make all requests redirect to secure HTTPS access. Choose this for
new sites, or if you're confident your site works on HTTPS. You can undo this
change by editing your web server's configuration.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Select the appropriate number [1-2] then [enter] (press 'c' to cancel): 2

Redirecting all traffic on port 80 to ssl in /etc/nginx/sites-enabled/code-server
Redirecting all traffic on port 80 to ssl in /etc/nginx/sites-enabled/code-server

Install fail2ban

The developers of code-server suggest setting up fail2ban to monitor code-server's log for protection against brute-force attacks. Fail2ban is an application that parses logs to detect and mitigate automated attacks on a server. When a predefined number of unsuccessful login attempts are detected, fail2ban will alter the server's iptables to block the attacker for a predefined amount of time.

Install setuptools. This is required to install fail2ban.

apt-get install python3-setuptools -y

Download and install fail2ban.

git clone
cd fail2ban
sudo python3 install
cp build/fail2ban.service /lib/systemd/system/fail2ban.service
cd .. && rm -rf fail2ban

Copy the default configuration file jails.conf to jails.local and open the copied file in a text editor.

cp /etc/fail2ban/jail.conf /etc/fail2ban/jail.local
nano /etc/fail2ban/jail.local

Paste the following snippet at the bottom of the file. You can change the maxretry, findtime, and bantime parameters.

enabled   = true
logpath   = /var/log/code-server-output.log
# maxretry: The amount of unsuccessful login attempts after which a ban is issued.
maxretry  = 5
# findtime: The amount of time within which the login attempts must occur.
findtime  = 10m
# bantime: The amount of time for which an IP is banned from accessing the server.
bantime   = 10m

Create a new filter configuration file to define the filter pattern to find unsuccessful login attempts in the code-server log.

nano /etc/fail2ban/filter.d/code-server.conf

Paste the following snippet into the file.

failregex = Failed login attempt {\"xForwardedFor\":\"<HOST>\".*
ignoreregex =
datepattern = "timestamp":{EPOCH}}$

Restart the rsyslog service and enable and start the fail2ban service.

systemctl restart rsyslog.service
systemctl enable fail2ban.service
systemctl start fail2ban.service


At this point we have successfully setup a code-server installation serving Visual Studio Code on a Vultr Cloud Compute instance, secured with SSL and fail2ban. Navigate to in a browser window to begin setting up your development environment.