Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Copyright
Table of Contents
Part I. Part I: Load Balancing and HTTP Caching
Chapter 1. High-Performance Load Balancing
1.0 Introduction
1.1 HTTP Load Balancing
1.2 TCP Load Balancing
1.3 Load-Balancing Methods
1.4 Connection Limiting
1.0 Introduction
1.1 HTTP Load Balancing
1.2 TCP Load Balancing
1.3 Load-Balancing Methods
1.4 Connection Limiting
Chapter 2. Intelligent Session Persistence
2.0 Introduction
2.1 Sticky Cookie
2.2 Sticky Learn
2.3 Sticky Routing
2.4 Connection Draining
2.0 Introduction
2.1 Sticky Cookie
2.2 Sticky Learn
2.3 Sticky Routing
2.4 Connection Draining
Chapter 3. Application-Aware Health Checks
3.0 Introduction
3.1 What to Check
3.2 Slow Start
3.3 TCP Health Checks
3.4 HTTP Health Checks
3.0 Introduction
3.1 What to Check
3.2 Slow Start
3.3 TCP Health Checks
3.4 HTTP Health Checks
Chapter 4. High-Availability Deployment Modes
4.0 Introduction
4.1 NGINX HA Mode
4.2 Load-Balancing Load Balancers with DNS
4.3 Load Balancing on EC2
4.0 Introduction
4.1 NGINX HA Mode
4.2 Load-Balancing Load Balancers with DNS
4.3 Load Balancing on EC2
Chapter 5. Massively Scalable Content Caching
5.0 Introduction
5.1 Caching Zones
5.2 Caching Hash Keys
5.3 Cache Bypass
5.4 Cache Performance
5.5 Purging
5.0 Introduction
5.1 Caching Zones
5.2 Caching Hash Keys
5.3 Cache Bypass
5.4 Cache Performance
5.5 Purging
Chapter 6. Sophisticated Media Streaming
6.0 Introduction
6.1 Serving MP4 and FLV
6.2 Streaming with HLS
6.3 Streaming with HDS
6.4 Bandwidth Limits
6.0 Introduction
6.1 Serving MP4 and FLV
6.2 Streaming with HLS
6.3 Streaming with HDS
6.4 Bandwidth Limits
Chapter 7. Advanced Activity Monitoring
7.0 Introduction
7.1 NGINX Traffic Monitoring
7.2 The JSON Feed
7.0 Introduction
7.1 NGINX Traffic Monitoring
7.2 The JSON Feed
Chapter 8. DevOps On-the-Fly Reconfiguration
8.0 Introduction
8.1 The NGINX API
8.2 Seamless Reload
8.3 SRV Records
8.0 Introduction
8.1 The NGINX API
8.2 Seamless Reload
8.3 SRV Records
Chapter 9. UDP Load Balancing
9.0 Introduction
9.1 Stream Context
9.2 Load-Balancing Algorithms
9.3 Health Checks
9.0 Introduction
9.1 Stream Context
9.2 Load-Balancing Algorithms
9.3 Health Checks
Chapter 10. Cloud-Agnostic Architecture
10.0 Introduction
10.1 The Anywhere Load Balancer
10.2 The Importance of Versatility
10.0 Introduction
10.1 The Anywhere Load Balancer
10.2 The Importance of Versatility
Chapter 1. High-Performance Load Balancing
1.0 Introduction
1.1 HTTP Load Balancing
1.2 TCP Load Balancing
1.3 Load-Balancing Methods
1.4 Connection Limiting
1.0 Introduction
1.1 HTTP Load Balancing
1.2 TCP Load Balancing
1.3 Load-Balancing Methods
1.4 Connection Limiting
Chapter 2. Intelligent Session Persistence
2.0 Introduction
2.1 Sticky Cookie
2.2 Sticky Learn
2.3 Sticky Routing
2.4 Connection Draining
2.0 Introduction
2.1 Sticky Cookie
2.2 Sticky Learn
2.3 Sticky Routing
2.4 Connection Draining
Chapter 3. Application-Aware Health Checks
3.0 Introduction
3.1 What to Check
3.2 Slow Start
3.3 TCP Health Checks
3.4 HTTP Health Checks
3.0 Introduction
3.1 What to Check
3.2 Slow Start
3.3 TCP Health Checks
3.4 HTTP Health Checks
Chapter 4. High-Availability Deployment Modes
4.0 Introduction
4.1 NGINX HA Mode
4.2 Load-Balancing Load Balancers with DNS
4.3 Load Balancing on EC2
4.0 Introduction
4.1 NGINX HA Mode
4.2 Load-Balancing Load Balancers with DNS
4.3 Load Balancing on EC2
Chapter 5. Massively Scalable Content Caching
5.0 Introduction
5.1 Caching Zones
5.2 Caching Hash Keys
5.3 Cache Bypass
5.4 Cache Performance
5.5 Purging
5.0 Introduction
5.1 Caching Zones
5.2 Caching Hash Keys
5.3 Cache Bypass
5.4 Cache Performance
5.5 Purging
Chapter 6. Sophisticated Media Streaming
6.0 Introduction
6.1 Serving MP4 and FLV
6.2 Streaming with HLS
6.3 Streaming with HDS
6.4 Bandwidth Limits
6.0 Introduction
6.1 Serving MP4 and FLV
6.2 Streaming with HLS
6.3 Streaming with HDS
6.4 Bandwidth Limits
Chapter 7. Advanced Activity Monitoring
7.0 Introduction
7.1 NGINX Traffic Monitoring
7.2 The JSON Feed
7.0 Introduction
7.1 NGINX Traffic Monitoring
7.2 The JSON Feed
Chapter 8. DevOps On-the-Fly Reconfiguration
8.0 Introduction
8.1 The NGINX API
8.2 Seamless Reload
8.3 SRV Records
8.0 Introduction
8.1 The NGINX API
8.2 Seamless Reload
8.3 SRV Records
Chapter 9. UDP Load Balancing
9.0 Introduction
9.1 Stream Context
9.2 Load-Balancing Algorithms
9.3 Health Checks
9.0 Introduction
9.1 Stream Context
9.2 Load-Balancing Algorithms
9.3 Health Checks
Chapter 10. Cloud-Agnostic Architecture
10.0 Introduction
10.1 The Anywhere Load Balancer
10.2 The Importance of Versatility
10.0 Introduction
10.1 The Anywhere Load Balancer
10.2 The Importance of Versatility
Part II. Part II: Security and Access
Chapter 11. Controlling Access
11.0 Introduction
11.1 Access Based on IP Address
Problem
Solution
Discussion
Problem
Solution
Discussion
11.2 Allowing Cross-Origin Resource Sharing
Problem
Solution
Discussion
Problem
Solution
Discussion
11.0 Introduction
11.1 Access Based on IP Address
Problem
Solution
Discussion
Problem
Solution
Discussion
11.2 Allowing Cross-Origin Resource Sharing
Problem
Solution
Discussion
Problem
Solution
Discussion
Chapter 12. Limiting Use
12.0 Introduction
12.1 Limiting Connections
Problem
Solution
Discussion
Problem
Solution
Discussion
12.2 Limiting Rate
Problem
Solution
Discussion
Problem
Solution
Discussion
12.3 Limiting Bandwidth
Problem
Solution
Discussion
Problem
Solution
Discussion
12.0 Introduction
12.1 Limiting Connections
Problem
Solution
Discussion
Problem
Solution
Discussion
12.2 Limiting Rate
Problem
Solution
Discussion
Problem
Solution
Discussion
12.3 Limiting Bandwidth
Problem
Solution
Discussion
Problem
Solution
Discussion
Chapter 13. Encrypting
13.0 Introduction
13.1 Client-Side Encryption
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
13.2 Upstream Encryption
Problem
Solution
Discussion
Problem
Solution
Discussion
13.0 Introduction
13.1 Client-Side Encryption
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
13.2 Upstream Encryption
Problem
Solution
Discussion
Problem
Solution
Discussion
Chapter 14. HTTP Basic Authentication
14.0 Introduction
14.1 Creating a User File
Problem
Solution
Discussion
Problem
Solution
Discussion
14.2 Using Basic Authentication
Problem
Solution
Discussion
Problem
Solution
Discussion
14.0 Introduction
14.1 Creating a User File
Problem
Solution
Discussion
Problem
Solution
Discussion
14.2 Using Basic Authentication
Problem
Solution
Discussion
Problem
Solution
Discussion
Chapter 15. HTTP Authentication Subrequests
15.0 Introduction
15.1 Authentication Subrequests
Problem
Solution
Discussion
Problem
Solution
Discussion
15.0 Introduction
15.1 Authentication Subrequests
Problem
Solution
Discussion
Problem
Solution
Discussion
Chapter 16. Secure Links
16.0 Introduction
16.1 Securing a Location
Problem
Solution
Discussion
Problem
Solution
Discussion
16.2 Generating a Secure Link with a Secret
Problem
Solution
Discussion
Problem
Solution
Discussion
16.3 Securing a Location with an Expire Date
Problem
Solution
Discussion
Problem
Solution
Discussion
16.4 Generating an Expiring Link
Problem
Solution
Discussion
Problem
Solution
Discussion
16.0 Introduction
16.1 Securing a Location
Problem
Solution
Discussion
Problem
Solution
Discussion
16.2 Generating a Secure Link with a Secret
Problem
Solution
Discussion
Problem
Solution
Discussion
16.3 Securing a Location with an Expire Date
Problem
Solution
Discussion
Problem
Solution
Discussion
16.4 Generating an Expiring Link
Problem
Solution
Discussion
Problem
Solution
Discussion
Chapter 17. API Authentication Using JWT
17.0 Introduction
17.1 Validating JWTs
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
17.2 Creating JSON Web Keys
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
17.0 Introduction
17.1 Validating JWTs
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
17.2 Creating JSON Web Keys
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
Chapter 18. OpenId Connect Single Sign-On
18.0 Introduction
18.1 Authenticate Users via Existing OpenId Connect Single Sign-On (SSO)
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
18.2 Obtaining JSON Web Key from Google
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
18.0 Introduction
18.1 Authenticate Users via Existing OpenId Connect Single Sign-On (SSO)
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
18.2 Obtaining JSON Web Key from Google
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
Chapter 19. ModSecurity Web Application Firewall
19.0 Introduction
19.1 Installing ModSecurity for NGINX Plus
Problem
Solution
Discussion
Problem
Solution
Discussion
19.2 Configuring ModSecurity in NGINX Plus
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
19.3 Installing ModSecurity from Source for a Web Application Firewall
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
19.0 Introduction
19.1 Installing ModSecurity for NGINX Plus
Problem
Solution
Discussion
Problem
Solution
Discussion
19.2 Configuring ModSecurity in NGINX Plus
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
19.3 Installing ModSecurity from Source for a Web Application Firewall
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
Chapter 20. Practical Security Tips
20.0 Introduction
20.1 HTTPS Redirects
Problem
Solution
Discussion
Problem
Solution
Discussion
20.2 Redirecting to HTTPS Where SSL/TLS Is Terminated Before NGINX
Problem
Solution
Discussion
Problem
Solution
Discussion
20.3 HTTP Strict Transport Security
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
20.4 Satisfying Any Number of Security Methods
Problem
Solution
Discussion
Problem
Solution
Discussion
20.0 Introduction
20.1 HTTPS Redirects
Problem
Solution
Discussion
Problem
Solution
Discussion
20.2 Redirecting to HTTPS Where SSL/TLS Is Terminated Before NGINX
Problem
Solution
Discussion
Problem
Solution
Discussion
20.3 HTTP Strict Transport Security
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
20.4 Satisfying Any Number of Security Methods
Problem
Solution
Discussion
Problem
Solution
Discussion
Chapter 11. Controlling Access
11.0 Introduction
11.1 Access Based on IP Address
Problem
Solution
Discussion
Problem
Solution
Discussion
11.2 Allowing Cross-Origin Resource Sharing
Problem
Solution
Discussion
Problem
Solution
Discussion
11.0 Introduction
11.1 Access Based on IP Address
Problem
Solution
Discussion
Problem
Solution
Discussion
11.2 Allowing Cross-Origin Resource Sharing
Problem
Solution
Discussion
Problem
Solution
Discussion
Chapter 12. Limiting Use
12.0 Introduction
12.1 Limiting Connections
Problem
Solution
Discussion
Problem
Solution
Discussion
12.2 Limiting Rate
Problem
Solution
Discussion
Problem
Solution
Discussion
12.3 Limiting Bandwidth
Problem
Solution
Discussion
Problem
Solution
Discussion
12.0 Introduction
12.1 Limiting Connections
Problem
Solution
Discussion
Problem
Solution
Discussion
12.2 Limiting Rate
Problem
Solution
Discussion
Problem
Solution
Discussion
12.3 Limiting Bandwidth
Problem
Solution
Discussion
Problem
Solution
Discussion
Chapter 13. Encrypting
13.0 Introduction
13.1 Client-Side Encryption
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
13.2 Upstream Encryption
Problem
Solution
Discussion
Problem
Solution
Discussion
13.0 Introduction
13.1 Client-Side Encryption
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
13.2 Upstream Encryption
Problem
Solution
Discussion
Problem
Solution
Discussion
Chapter 14. HTTP Basic Authentication
14.0 Introduction
14.1 Creating a User File
Problem
Solution
Discussion
Problem
Solution
Discussion
14.2 Using Basic Authentication
Problem
Solution
Discussion
Problem
Solution
Discussion
14.0 Introduction
14.1 Creating a User File
Problem
Solution
Discussion
Problem
Solution
Discussion
14.2 Using Basic Authentication
Problem
Solution
Discussion
Problem
Solution
Discussion
Chapter 15. HTTP Authentication Subrequests
15.0 Introduction
15.1 Authentication Subrequests
Problem
Solution
Discussion
Problem
Solution
Discussion
15.0 Introduction
15.1 Authentication Subrequests
Problem
Solution
Discussion
Problem
Solution
Discussion
Chapter 16. Secure Links
16.0 Introduction
16.1 Securing a Location
Problem
Solution
Discussion
Problem
Solution
Discussion
16.2 Generating a Secure Link with a Secret
Problem
Solution
Discussion
Problem
Solution
Discussion
16.3 Securing a Location with an Expire Date
Problem
Solution
Discussion
Problem
Solution
Discussion
16.4 Generating an Expiring Link
Problem
Solution
Discussion
Problem
Solution
Discussion
16.0 Introduction
16.1 Securing a Location
Problem
Solution
Discussion
Problem
Solution
Discussion
16.2 Generating a Secure Link with a Secret
Problem
Solution
Discussion
Problem
Solution
Discussion
16.3 Securing a Location with an Expire Date
Problem
Solution
Discussion
Problem
Solution
Discussion
16.4 Generating an Expiring Link
Problem
Solution
Discussion
Problem
Solution
Discussion
Chapter 17. API Authentication Using JWT
17.0 Introduction
17.1 Validating JWTs
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
17.2 Creating JSON Web Keys
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
17.0 Introduction
17.1 Validating JWTs
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
17.2 Creating JSON Web Keys
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
Chapter 18. OpenId Connect Single Sign-On
18.0 Introduction
18.1 Authenticate Users via Existing OpenId Connect Single Sign-On (SSO)
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
18.2 Obtaining JSON Web Key from Google
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
18.0 Introduction
18.1 Authenticate Users via Existing OpenId Connect Single Sign-On (SSO)
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
18.2 Obtaining JSON Web Key from Google
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
Chapter 19. ModSecurity Web Application Firewall
19.0 Introduction
19.1 Installing ModSecurity for NGINX Plus
Problem
Solution
Discussion
Problem
Solution
Discussion
19.2 Configuring ModSecurity in NGINX Plus
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
19.3 Installing ModSecurity from Source for a Web Application Firewall
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
19.0 Introduction
19.1 Installing ModSecurity for NGINX Plus
Problem
Solution
Discussion
Problem
Solution
Discussion
19.2 Configuring ModSecurity in NGINX Plus
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
19.3 Installing ModSecurity from Source for a Web Application Firewall
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
Chapter 20. Practical Security Tips
20.0 Introduction
20.1 HTTPS Redirects
Problem
Solution
Discussion
Problem
Solution
Discussion
20.2 Redirecting to HTTPS Where SSL/TLS Is Terminated Before NGINX
Problem
Solution
Discussion
Problem
Solution
Discussion
20.3 HTTP Strict Transport Security
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
20.4 Satisfying Any Number of Security Methods
Problem
Solution
Discussion
Problem
Solution
Discussion
20.0 Introduction
20.1 HTTPS Redirects
Problem
Solution
Discussion
Problem
Solution
Discussion
20.2 Redirecting to HTTPS Where SSL/TLS Is Terminated Before NGINX
Problem
Solution
Discussion
Problem
Solution
Discussion
20.3 HTTP Strict Transport Security
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
20.4 Satisfying Any Number of Security Methods
Problem
Solution
Discussion
Problem
Solution
Discussion
Part III. Part III: Deployment and Operations
Chapter 21. Deploying on AWS
21.0 Introduction
21.1 Auto-Provisioning on AWS
Problem
Solution
Discussion
Problem
Solution
Discussion
21.2 Routing to NGINX Nodes Without an ELB
Problem
Solution
Discussion
Problem
Solution
Discussion
21.3 The ELB Sandwich
Problem
Solution
Discussion
Problem
Solution
Discussion
21.4 Deploying from the Marketplace
Problem
Solution
Discussion
Problem
Solution
Discussion
21.0 Introduction
21.1 Auto-Provisioning on AWS
Problem
Solution
Discussion
Problem
Solution
Discussion
21.2 Routing to NGINX Nodes Without an ELB
Problem
Solution
Discussion
Problem
Solution
Discussion
21.3 The ELB Sandwich
Problem
Solution
Discussion
Problem
Solution
Discussion
21.4 Deploying from the Marketplace
Problem
Solution
Discussion
Problem
Solution
Discussion
Chapter 22. Deploying on Azure
22.0 Introduction
22.1 Creating an NGINX Virtual Machine Image
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
22.2 Load Balancing Over NGINX Scale Sets
Problem
Solution
Discussion
Problem
Solution
Discussion
22.3 Deploying Through the Marketplace
Problem
Solution
Discussion
Problem
Solution
Discussion
22.0 Introduction
22.1 Creating an NGINX Virtual Machine Image
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
22.2 Load Balancing Over NGINX Scale Sets
Problem
Solution
Discussion
Problem
Solution
Discussion
22.3 Deploying Through the Marketplace
Problem
Solution
Discussion
Problem
Solution
Discussion
Chapter 23. Deploying on Google Cloud Compute
23.0 Introduction
23.1 Deploying to Google Compute Engine
Problem
Solution
Discussion
Problem
Solution
Discussion
23.2 Creating a Google Compute Image
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
23.3 Creating a Google App Engine Proxy
Problem
Solution
Discussion
Problem
Solution
Discussion
23.0 Introduction
23.1 Deploying to Google Compute Engine
Problem
Solution
Discussion
Problem
Solution
Discussion
23.2 Creating a Google Compute Image
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
23.3 Creating a Google App Engine Proxy
Problem
Solution
Discussion
Problem
Solution
Discussion
Chapter 24. Deploying on Docker
24.0 Introduction
24.1 Running Quickly with the NGINX Image
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
24.2 Creating an NGINX Dockerfile
Problem
Solution
Discussion
Problem
Solution
Discussion
24.3 Building an NGINX Plus Image
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
24.4 Using Environment Variables in NGINX
Problem
Solution
Discussion
Problem
Solution
Discussion
24.0 Introduction
24.1 Running Quickly with the NGINX Image
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
24.2 Creating an NGINX Dockerfile
Problem
Solution
Discussion
Problem
Solution
Discussion
24.3 Building an NGINX Plus Image
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
24.4 Using Environment Variables in NGINX
Problem
Solution
Discussion
Problem
Solution
Discussion
Chapter 25. Using Puppet/Chef/Ansible/SaltStack
25.0 Introduction
25.1 Installing with Puppet
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
25.2 Installing with Chef
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
25.3 Installing with Ansible
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
25.4 Installing with SaltStack
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
25.0 Introduction
25.1 Installing with Puppet
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
25.2 Installing with Chef
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
25.3 Installing with Ansible
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
25.4 Installing with SaltStack
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
Chapter 26. Automation
26.0 Introduction
26.1 Automating with NGINX Plus
Problem
Solution
Discussion
Problem
Solution
Discussion
26.2 Automating Configurations with Consul Templating
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
26.0 Introduction
26.1 Automating with NGINX Plus
Problem
Solution
Discussion
Problem
Solution
Discussion
26.2 Automating Configurations with Consul Templating
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
Chapter 27. A/B Testing with split_clients
27.0 Introduction
27.1 A/B Testing
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
27.0 Introduction
27.1 A/B Testing
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
Chapter 28. Locating Users by IP Address Using the GeoIP Module
28.0 Introduction
28.1 Using the GeoIP Module and Database
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
28.2 Restricting Access Based on Country
Problem
Solution
Discussion
Problem
Solution
Discussion
28.3 Finding the Original Client
Problem
Solution
Discussion
Problem
Solution
Discussion
28.0 Introduction
28.1 Using the GeoIP Module and Database
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
28.2 Restricting Access Based on Country
Problem
Solution
Discussion
Problem
Solution
Discussion
28.3 Finding the Original Client
Problem
Solution
Discussion
Problem
Solution
Discussion
Chapter 29. Debugging and Troubleshooting with Access Logs, Error Logs, and Request Tracing
29.0 Introduction
29.1 Configuring Access Logs
Problem
Solution
Discussion
Problem
Solution
Discussion
29.2 Configuring Error Logs
Problem
Solution
Discussion
Problem
Solution
Discussion
29.3 Forwarding to Syslog
Problem
Solution
Discussion
Problem
Solution
Discussion
29.4 Request Tracing
Problem
Solution
Discussion
Problem
Solution
Discussion
29.0 Introduction
29.1 Configuring Access Logs
Problem
Solution
Discussion
Problem
Solution
Discussion
29.2 Configuring Error Logs
Problem
Solution
Discussion
Problem
Solution
Discussion
29.3 Forwarding to Syslog
Problem
Solution
Discussion
Problem
Solution
Discussion
29.4 Request Tracing
Problem
Solution
Discussion
Problem
Solution
Discussion
Chapter 30. Performance Tuning
30.0 Introduction
30.1 Automating Tests with Load Drivers
Problem
Solution
Discussion
Problem
Solution
Discussion
30.2 Keeping Connections Open to Clients
Problem
Solution
Discussion
Problem
Solution
Discussion
30.3 Keeping Connections Open Upstream
Problem
Solution
Discussion
Problem
Solution
Discussion
30.4 Buffering Responses
Problem
Solution
Discussion
Problem
Solution
Discussion
30.5 Buffering Access Logs
Problem
Solution
Discussion
Problem
Solution
Discussion
30.6 OS Tuning
Problem
Solution
Discussion
Problem
Solution
Discussion
30.0 Introduction
30.1 Automating Tests with Load Drivers
Problem
Solution
Discussion
Problem
Solution
Discussion
30.2 Keeping Connections Open to Clients
Problem
Solution
Discussion
Problem
Solution
Discussion
30.3 Keeping Connections Open Upstream
Problem
Solution
Discussion
Problem
Solution
Discussion
30.4 Buffering Responses
Problem
Solution
Discussion
Problem
Solution
Discussion
30.5 Buffering Access Logs
Problem
Solution
Discussion
Problem
Solution
Discussion
30.6 OS Tuning
Problem
Solution
Discussion
Problem
Solution
Discussion
Chapter 31. Practical Ops Tips and Conclusion
31.0 Introduction
31.1 Using Includes for Clean Configs
Problem
Solution
Discussion
Problem
Solution
Discussion
31.2 Debugging Configs
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
31.3 Conclusion
31.0 Introduction
31.1 Using Includes for Clean Configs
Problem
Solution
Discussion
Problem
Solution
Discussion
31.2 Debugging Configs
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
31.3 Conclusion
Chapter 21. Deploying on AWS
21.0 Introduction
21.1 Auto-Provisioning on AWS
Problem
Solution
Discussion
Problem
Solution
Discussion
21.2 Routing to NGINX Nodes Without an ELB
Problem
Solution
Discussion
Problem
Solution
Discussion
21.3 The ELB Sandwich
Problem
Solution
Discussion
Problem
Solution
Discussion
21.4 Deploying from the Marketplace
Problem
Solution
Discussion
Problem
Solution
Discussion
21.0 Introduction
21.1 Auto-Provisioning on AWS
Problem
Solution
Discussion
Problem
Solution
Discussion
21.2 Routing to NGINX Nodes Without an ELB
Problem
Solution
Discussion
Problem
Solution
Discussion
21.3 The ELB Sandwich
Problem
Solution
Discussion
Problem
Solution
Discussion
21.4 Deploying from the Marketplace
Problem
Solution
Discussion
Problem
Solution
Discussion
Chapter 22. Deploying on Azure
22.0 Introduction
22.1 Creating an NGINX Virtual Machine Image
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
22.2 Load Balancing Over NGINX Scale Sets
Problem
Solution
Discussion
Problem
Solution
Discussion
22.3 Deploying Through the Marketplace
Problem
Solution
Discussion
Problem
Solution
Discussion
22.0 Introduction
22.1 Creating an NGINX Virtual Machine Image
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
22.2 Load Balancing Over NGINX Scale Sets
Problem
Solution
Discussion
Problem
Solution
Discussion
22.3 Deploying Through the Marketplace
Problem
Solution
Discussion
Problem
Solution
Discussion
Chapter 23. Deploying on Google Cloud Compute
23.0 Introduction
23.1 Deploying to Google Compute Engine
Problem
Solution
Discussion
Problem
Solution
Discussion
23.2 Creating a Google Compute Image
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
23.3 Creating a Google App Engine Proxy
Problem
Solution
Discussion
Problem
Solution
Discussion
23.0 Introduction
23.1 Deploying to Google Compute Engine
Problem
Solution
Discussion
Problem
Solution
Discussion
23.2 Creating a Google Compute Image
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
23.3 Creating a Google App Engine Proxy
Problem
Solution
Discussion
Problem
Solution
Discussion
Chapter 24. Deploying on Docker
24.0 Introduction
24.1 Running Quickly with the NGINX Image
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
24.2 Creating an NGINX Dockerfile
Problem
Solution
Discussion
Problem
Solution
Discussion
24.3 Building an NGINX Plus Image
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
24.4 Using Environment Variables in NGINX
Problem
Solution
Discussion
Problem
Solution
Discussion
24.0 Introduction
24.1 Running Quickly with the NGINX Image
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
24.2 Creating an NGINX Dockerfile
Problem
Solution
Discussion
Problem
Solution
Discussion
24.3 Building an NGINX Plus Image
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
24.4 Using Environment Variables in NGINX
Problem
Solution
Discussion
Problem
Solution
Discussion
Chapter 25. Using Puppet/Chef/Ansible/SaltStack
25.0 Introduction
25.1 Installing with Puppet
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
25.2 Installing with Chef
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
25.3 Installing with Ansible
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
25.4 Installing with SaltStack
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
25.0 Introduction
25.1 Installing with Puppet
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
25.2 Installing with Chef
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
25.3 Installing with Ansible
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
25.4 Installing with SaltStack
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
Chapter 26. Automation
26.0 Introduction
26.1 Automating with NGINX Plus
Problem
Solution
Discussion
Problem
Solution
Discussion
26.2 Automating Configurations with Consul Templating
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
26.0 Introduction
26.1 Automating with NGINX Plus
Problem
Solution
Discussion
Problem
Solution
Discussion
26.2 Automating Configurations with Consul Templating
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
Chapter 27. A/B Testing with split_clients
27.0 Introduction
27.1 A/B Testing
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
27.0 Introduction
27.1 A/B Testing
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
Chapter 28. Locating Users by IP Address Using the GeoIP Module
28.0 Introduction
28.1 Using the GeoIP Module and Database
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
28.2 Restricting Access Based on Country
Problem
Solution
Discussion
Problem
Solution
Discussion
28.3 Finding the Original Client
Problem
Solution
Discussion
Problem
Solution
Discussion
28.0 Introduction
28.1 Using the GeoIP Module and Database
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
28.2 Restricting Access Based on Country
Problem
Solution
Discussion
Problem
Solution
Discussion
28.3 Finding the Original Client
Problem
Solution
Discussion
Problem
Solution
Discussion
Chapter 29. Debugging and Troubleshooting with Access Logs, Error Logs, and Request Tracing
29.0 Introduction
29.1 Configuring Access Logs
Problem
Solution
Discussion
Problem
Solution
Discussion
29.2 Configuring Error Logs
Problem
Solution
Discussion
Problem
Solution
Discussion
29.3 Forwarding to Syslog
Problem
Solution
Discussion
Problem
Solution
Discussion
29.4 Request Tracing
Problem
Solution
Discussion
Problem
Solution
Discussion
29.0 Introduction
29.1 Configuring Access Logs
Problem
Solution
Discussion
Problem
Solution
Discussion
29.2 Configuring Error Logs
Problem
Solution
Discussion
Problem
Solution
Discussion
29.3 Forwarding to Syslog
Problem
Solution
Discussion
Problem
Solution
Discussion
29.4 Request Tracing
Problem
Solution
Discussion
Problem
Solution
Discussion
Chapter 30. Performance Tuning
30.0 Introduction
30.1 Automating Tests with Load Drivers
Problem
Solution
Discussion
Problem
Solution
Discussion
30.2 Keeping Connections Open to Clients
Problem
Solution
Discussion
Problem
Solution
Discussion
30.3 Keeping Connections Open Upstream
Problem
Solution
Discussion
Problem
Solution
Discussion
30.4 Buffering Responses
Problem
Solution
Discussion
Problem
Solution
Discussion
30.5 Buffering Access Logs
Problem
Solution
Discussion
Problem
Solution
Discussion
30.6 OS Tuning
Problem
Solution
Discussion
Problem
Solution
Discussion
30.0 Introduction
30.1 Automating Tests with Load Drivers
Problem
Solution
Discussion
Problem
Solution
Discussion
30.2 Keeping Connections Open to Clients
Problem
Solution
Discussion
Problem
Solution
Discussion
30.3 Keeping Connections Open Upstream
Problem
Solution
Discussion
Problem
Solution
Discussion
30.4 Buffering Responses
Problem
Solution
Discussion
Problem
Solution
Discussion
30.5 Buffering Access Logs
Problem
Solution
Discussion
Problem
Solution
Discussion
30.6 OS Tuning
Problem
Solution
Discussion
Problem
Solution
Discussion
Chapter 31. Practical Ops Tips and Conclusion
31.0 Introduction
31.1 Using Includes for Clean Configs
Problem
Solution
Discussion
Problem
Solution
Discussion
31.2 Debugging Configs
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
31.3 Conclusion
31.0 Introduction
31.1 Using Includes for Clean Configs
Problem
Solution
Discussion
Problem
Solution
Discussion
31.2 Debugging Configs
Problem
Solution
Discussion
Also See
Problem
Solution
Discussion
Also See
31.3 Conclusion
About the Author
← Prev
Back
Next →
← Prev
Back
Next →