Nginx Modules Reference r6
Nginx Modules Reference r6
1
Preface
About NGINX
NGINX (engine x) is a high performance, high concurrency web server
excelling at large scale content delivery, web acceleration and protecting
application containers. Its precise integration with modern operating systems
allows unprecedented levels of efficiency even when running on commodity
hardware.
Nginx, Inc. develops and maintains NGINX open source distribution, and
offers commercial support and professional services for NGINX.
NGINX and NGINX Plus Tutorial and Admin Guide is available here:
http://nginx.com/resources/admin-guide.
2
Contents
Title 1
Preface 2
Table of Contents 3
1 Core modules 6
1.1 Core functionality . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.2 Setting up hashes . . . . . . . . . . . . . . . . . . . . . . . . . . 16
1.3 Connection processing methods . . . . . . . . . . . . . . . . . . 17
1.4 Logging to syslog . . . . . . . . . . . . . . . . . . . . . . . . . . 18
3
CONTENTS CONTENTS
5 Miscellaneous 311
5.1 High Availability support for NGINX Plus . . . . . . . . . . . . 311
Index 325
Core modules
6
CHAPTER 1. CORE MODULES 1.1. CORE FUNCTIONALITY
events {
use kqueue ;
w o r k e r _ c o n n e c t i o n s 2048;
}
...
1.1.2 Directives
accept mutex
Syntax: accept_mutex on | off;
Default on
Context: events
daemon
Syntax: daemon on | off;
Default on
Context: main
debug connection
Syntax: debug_connection address | CIDR | unix:;
Default
Context: events
events {
d eb u g_ c on n ec t io n 127.0.0.1;
d eb u g_ c on n ec t io n localhost ;
d eb u g_ c on n ec t io n 192.0.2.0/24;
d eb u g_ c on n ec t io n ::1;
d eb u g_ c on n ec t io n 2001:0 db8 ::/32;
d eb u g_ c on n ec t io n unix :;
...
}
debug points
Syntax: debug_points abort | stop;
Default
Context: main
error log
Syntax: error_log file | stderr | syslog:server=address[,parameter=value] |
memory:size [debug | info | notice | warn | error | crit | alert |
emerg];
Default logs/error.log error
Context: main, http, stream, server, location
Configures logging. Several logs can be specified on the same level (1.5.2).
The first parameter defines a file that will store the log.
The special value stderr selects the standard error file. Logging to syslog
can be configured by specifying the syslog: prefix. Logging to a cyclic
memory buffer can be configured by specifying the memory: prefix and buffer
size, and is generally used for debugging (1.7.11).
The second parameter determines the level of logging. Log levels above
are listed in the order of increasing severity. Setting a certain log level will
cause all messages of the specified and more severe log levels to be logged. For
example, the default level error will cause error, crit, alert, and emerg
messages to be logged. If this parameter is omitted then error is used.
The directive can be specified on the stream level starting from version
1.7.11.
env
Syntax: env variable[=value];
Default TZ
Context: main
env MALLOC_OPTIONS ;
env PERL5LIB =/ data / site / modules ;
env O P E N S S L _ A L L O W _ P R O X Y _ C E R T S =1;
events
Syntax: events { . . . }
Default
Context: main
Provides the configuration file context in which the directives that affect
connection processing are specified.
include
Syntax: include file | mask;
Default
Context: any
lock file
Syntax: lock_file file;
Default logs/nginx.lock
Context: main
nginx uses the locking mechanism to implement accept mutex and serialize
access to shared memory. On most systems the locks are implemented using
atomic operations, and this directive is ignored. On other systems the lock
file mechanism is used. This directive specifies a prefix for the names of lock
files.
master process
Syntax: master_process on | off;
Default on
Context: main
multi accept
Syntax: multi_accept on | off;
Default off
Context: events
pcre jit
Syntax: pcre_jit on | off;
Default off
Context: main
This directive appeared in version 1.1.12.
The JIT is available in PCRE libraries starting from version 8.20 built
with the --enable-jit configuration parameter. When the PCRE library
is built with nginx (--with-pcre=), the JIT support is enabled via the
--with-pcre-jit configuration parameter.
pid
Syntax: pid file;
Default nginx.pid
Context: main
Defines a file that will store the process ID of the main process.
ssl engine
Syntax: ssl_engine device;
Default
Context: main
thread pool
Syntax: thread_pool name threads=number [max_queue=number];
Default default threads=32 max_queue=65536
Context: main
This directive appeared in version 1.7.11.
Defines named thread pools used for multi-threaded reading and sending
of files without blocking worker processes.
The threads parameter defines the number of threads in the pool.
In the event that all threads in the pool are busy, a new task will wait in
the queue. The max_queue parameter limits the number of tasks allowed to
be waiting in the queue. By default, up to 65536 tasks can wait in the queue.
When the queue overflows, the task is completed with an error.
timer resolution
Syntax: timer_resolution interval;
Default
Context: main
t im e r_ r es o lu t io n 100 ms ;
setitimer otherwise.
use
Syntax: use method;
Default
Context: events
user
Syntax: user user [group];
Default nobody nobody
Context: main
When using aio with the epoll connection processing method, sets the
maximum number of outstanding asynchronous I/O operations for a single
worker process.
worker connections
Syntax: worker_connections number;
Default 512
Context: events
Binds worker processes to the sets of CPUs. Each CPU set is represented
by a bitmask of allowed CPUs. There should be a separate set defined for each
of the worker processes. By default, worker processes are not bound to any
specific CPUs.
For example,
w or k er _ pr o ce s se s 4;
w o r k e r _ c p u _ a f f i n i t y 0001 0010 0100 1000;
w or k er _ pr o ce s se s 2;
w o r k e r _ c p u _ a f f i n i t y 0101 1010;
binds the first worker process to CPU0/CPU2, and the second worker
process to CPU1/CPU3. The second example is suitable for hyper-threading.
worker priority
Syntax: worker_priority number;
Default 0
Context: main
Defines the scheduling priority for worker processes like it is done by the
nice command: a negative number means higher priority. Allowed range
normally varies from -20 to 20.
Example:
worker processes
Syntax: worker_processes number | auto;
Default 1
Context: main
The auto parameter is supported starting from versions 1.3.8 and 1.2.5.
Changes the limit on the largest size of a core file (RLIMIT_CORE) for worker
processes. Used to increase the limit without restarting the main process.
working directory
Syntax: working_directory directory;
Default
Context: main
1.2.1 Overview
To quickly process static sets of data such as server names, map directives
values, MIME types, names of request header strings, nginx uses hash tables.
During the start and each re-configuration nginx selects the minimum possible
sizes of hash tables such that the bucket size that stores keys with identical
hash values does not exceed the configured parameter (hash bucket size). The
size of a table is expressed in buckets. The adjustment is continued until
the table size exceeds the hash max size parameter. Most hashes have the
corresponding directives that allow changing these parameters, for example,
for the server names hash they are server names hash max size and server -
names hash bucket size.
The hash bucket size parameter is aligned to the size that is a multiple of
the processors cache line size. This speeds up key search in a hash on modern
processors by reducing the number of memory accesses. If hash bucket size is
equal to one processors cache line size then the number of memory accesses
during the key search will be two in the worst case first to compute the
bucket address, and second during the key search inside the bucket. Therefore,
if nginx emits the message requesting to increase either hash max size or hash
bucket size then the first parameter should first be increased.
1.3.1 Overview
nginx supports a variety of connection processing methods. The availability
of a particular method depends on the platform used. On platforms that
support several methods nginx will normally select the most efficient method
automatically. However, if needed, a connection processing method can be
selected explicitly with the use directive.
The following connection processing methods are supported:
Some older distributions like SuSE 8.2 provide patches that add epoll
support to 2.4 kernels.
1.4.1 Overview
The error log and access log directives support logging to syslog. The
following parameters configure logging to syslog:
server=address
Defines the address of a syslog server. The address can be specified as a
domain name, IP address, or a UNIX-domain socket path (specified after
the unix: prefix). With a domain name or IP address, the port can be
specified. If port is not specified, the port 514 is used. If a domain name
resolves to several IP addresses, the first resolved address is used.
facility=string
Sets facility of syslog messages, as defined in RFC 3164. Facility can
be one of kern, user, mail, daemon, auth, intern, lpr,
news, uucp, clock, authpriv, ftp, ntp, audit, alert,
cron, local0..local7. Default is local7.
severity=string
Sets severity of syslog messages for access log, as defined in RFC 3164.
Possible values are the same as for the second parameter (level) of the
error log directive. Default is info.
tag=string
Sets the tag of syslog messages. Default is nginx.
19
CHAPTER 2. HTTP SERVER MODULES 2.1. MODULE NGX HTTP CORE MODULE
lingering time . . . . . . . . . . . . . . . . . . . . . . . . 32
lingering timeout . . . . . . . . . . . . . . . . . . . . . . 32
listen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
location . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
log not found . . . . . . . . . . . . . . . . . . . . . . . . 37
log subrequest . . . . . . . . . . . . . . . . . . . . . . . . 37
max ranges . . . . . . . . . . . . . . . . . . . . . . . . . 37
merge slashes . . . . . . . . . . . . . . . . . . . . . . . . 38
msie padding . . . . . . . . . . . . . . . . . . . . . . . . 38
msie refresh . . . . . . . . . . . . . . . . . . . . . . . . . 38
open file cache . . . . . . . . . . . . . . . . . . . . . . . 39
open file cache errors . . . . . . . . . . . . . . . . . . . . 39
open file cache min uses . . . . . . . . . . . . . . . . . . 39
open file cache valid . . . . . . . . . . . . . . . . . . . . 40
optimize server names . . . . . . . . . . . . . . . . . . . 40
output buffers . . . . . . . . . . . . . . . . . . . . . . . . 40
port in redirect . . . . . . . . . . . . . . . . . . . . . . . 40
postpone output . . . . . . . . . . . . . . . . . . . . . . 40
read ahead . . . . . . . . . . . . . . . . . . . . . . . . . 41
recursive error pages . . . . . . . . . . . . . . . . . . . . 41
request pool size . . . . . . . . . . . . . . . . . . . . . . 41
reset timedout connection . . . . . . . . . . . . . . . . . 41
resolver . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
resolver timeout . . . . . . . . . . . . . . . . . . . . . . . 42
root . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
satisfy . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
satisfy any . . . . . . . . . . . . . . . . . . . . . . . . . . 43
send lowat . . . . . . . . . . . . . . . . . . . . . . . . . . 43
send timeout . . . . . . . . . . . . . . . . . . . . . . . . 44
sendfile . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
sendfile max chunk . . . . . . . . . . . . . . . . . . . . . 44
server . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
server name . . . . . . . . . . . . . . . . . . . . . . . . . 45
server name in redirect . . . . . . . . . . . . . . . . . . . 47
server names hash bucket size . . . . . . . . . . . . . . . 47
server names hash max size . . . . . . . . . . . . . . . . 47
server tokens . . . . . . . . . . . . . . . . . . . . . . . . 47
tcp nodelay . . . . . . . . . . . . . . . . . . . . . . . . . 47
tcp nopush . . . . . . . . . . . . . . . . . . . . . . . . . 48
try files . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
types hash bucket size . . . . . . . . . . . . . . . . . . . 50
types hash max size . . . . . . . . . . . . . . . . . . . . 51
underscores in headers . . . . . . . . . . . . . . . . . . . 51
variables hash bucket size . . . . . . . . . . . . . . . . . 51
variables hash max size . . . . . . . . . . . . . . . . . . 51
2.1.1 Directives
aio
Syntax: aio on | off | threads[=pool];
Default off
Context: http, server, location
This directive appeared in version 0.8.11.
Enables or disables the use of asynchronous file I/O (AIO) on FreeBSD and
Linux:
location / video / {
aio on ;
output_buffers 1 64 k ;
}
On FreeBSD, AIO can be used starting from FreeBSD 4.3. AIO can either
be linked statically into a kernel:
options VFS_AIO
kldload aio
On Linux, AIO can be used starting from kernel version 2.6.22. Also, it is
necessary to enable directio, or otherwise reading will be blocking:
location / video / {
aio on ;
directio 512;
output_buffers 1 128 k ;
}
On Linux, directio can only be used for reading blocks that are aligned on
512-byte boundaries (or 4K for XFS). Files unaligned end is read in blocking
mode. The same holds true for byte range requests and for FLV requests not
from the beginning of a file: reading of unaligned data at the beginning and
end of a file will be blocking.
When both AIO and sendfile are enabled on Linux, AIO is used for files
that are larger than or equal to the size specified in the directio directive, while
sendfile is used for files of smaller sizes or when directio is disabled.
location / video / {
sendfile on ;
aio on ;
directio 8m;
}
Finally, files can be read and sent using multi-threading (1.7.11), without
blocking a worker process:
location / video / {
sendfile on ;
aio threads ;
}
Read and send file operations are offloaded to threads of the specified pool.
If the pool name is omitted, the pool with the name default is used. The
pool name can also be set with variables:
alias
Syntax: alias path;
Default
Context: location
Defines a replacement for the specified location. For example, with the
following configuration
location / i / {
alias / data / w3 / images /;
}
location / images / {
alias / data / w3 / images /;
}
location / images / {
root / data / w3 ;
}
Sets buffer size for reading client request body. In case the request body is
larger than the buffer, the whole body or only its part is written to a temporary
file. By default, buffer size is equal to two memory pages. This is 8K on x86,
other 32-bit platforms, and x86-64. It is usually 16K on other 64-bit platforms.
Determines whether nginx should save the entire client request body into
a file. This directive can be used during debugging, or when using the
$request body file variable, or the $r->request body file method of the module
ngx http perl module.
When set to the value on, temporary files are not removed after request
processing.
The value clean will cause the temporary files left after request processing
to be removed.
Determines whether nginx should save the entire client request body in
a single buffer. The directive is recommended when using the $request body
variable, to save the number of copy operations involved.
Defines a directory for storing temporary files holding client request bodies.
Up to three-level subdirectory hierarchy can be used under the specified
directory. For example, in the following configuration
Defines a timeout for reading client request body. The timeout is set only
for a period between two successive read operations, not for the transmission
of the whole request body. If a client does not transmit anything within this
time, the 408 Request Time-out error is returned to the client.
Sets buffer size for reading client request header. For most requests, a
buffer of 1K bytes is enough. However, if a request includes long cookies, or
comes from a WAP client, it may not fit into 1K. If a request line or a request
header field does not fit into this buffer then larger buffers, configured by the
large client header buffers directive, are allocated.
Defines a timeout for reading client request header. If a client does not
transmit the entire header within this time, the 408 Request Time-out error
is returned to the client.
Sets the maximum allowed size of the client request body, specified in the
Content-Length request header field. If the size in a request exceeds the
configured value, the 413 Request Entity Too Large error is returned to
the client. Please be aware that browsers cannot correctly display this error.
Setting size to 0 disables checking of client request body size.
default type
Syntax: default_type mime-type;
Default text/plain
Context: http, server, location
directio
Syntax: directio size | off;
Default off
Context: http, server, location
This directive appeared in version 0.7.7.
Enables the use of the O_DIRECT flag (FreeBSD, Linux), the F_NOCACHE flag
(Mac OS X), or the directio function (Solaris), when reading files that are
larger than or equal to the specified size. The directive automatically disables
(0.7.15) the use of sendfile for a given request. It can be useful for serving large
files:
directio 4 m ;
directio alignment
Syntax: directio_alignment size;
Default 512
Context: http, server, location
This directive appeared in version 0.8.11.
disable symlinks
Syntax: disable_symlinks off;
Syntax: disable_symlinks on | if_not_owner [from=part];
Default off
Context: http, server, location
This directive appeared in version 1.1.15.
off
Symbolic links in the pathname are allowed and not checked. This is the
default behavior.
on
If any component of the pathname is a symbolic link, access to a file is
denied.
if_not_owner
Access to a file is denied if any component of the pathname is a symbolic
link, and the link and object that the link points to have different owners.
from=part
When checking symbolic links (parameters on and if_not_owner), all
components of the pathname are normally checked. Checking of symbolic
links in the initial part of the pathname may be avoided by specifying
additionally the from=part parameter. In this case, symbolic links are
checked only from the pathname component that follows the specified
initial part. If the value is not an initial part of the pathname checked,
the whole pathname is checked as if this parameter was not specified
at all. If the value matches the whole file name, symbolic links are not
checked. The parameter value can contain variables.
Example:
d is a bl e _s y ml i nk s on from = $document_root ;
This directive is only available on systems that have the openat and
fstatat interfaces. Such systems include modern versions of FreeBSD, Linux,
and Solaris.
Parameters on and if_not_owner add a processing overhead.
The ngx http autoindex module, ngx http random index module, and
ngx http dav module modules currently ignore this directive.
error page
Syntax: error_page code . . . [=[response]] uri;
Default
Context: http, server, location, if in location
Defines the URI that will be shown for the specified errors. error_page
directives are inherited from the previous level only if there are no error_page
directives defined on the current level. A uri value can contain variables.
Example:
In this case, by default, the response code 302 is returned to the client. It
can only be changed to one of the redirect status codes (301, 302, 303, and
307).
If there is no need to change URI during internal redirection it is possible
to pass error processing into a named location:
location / {
error_page 404 = @fallback ;
}
location @fallback {
proxy_pass http :// backend ;
}
If uri processing leads to an error, the status code of the last occurred
error is returned to the client.
etag
Syntax: etag on | off;
Default on
Context: http, server, location
This directive appeared in version 1.3.3.
http
Syntax: http { . . . }
Default
Context: main
Provides the configuration file context in which the HTTP server directives
are specified.
if modified since
Syntax: if_modified_since off | exact | before;
Default exact
Context: http, server, location
This directive appeared in version 0.7.24.
off
the If-Modified-Since request header field is ignored (0.7.34);
exact
exact match;
before
modification time of a response is less than or equal to the time in the
If-Modified-Since request header field.
If the directive is specified on the server level, its value is only used if a
server is a default one. The value specified also applies to all virtual servers
listening on the same address and port.
internal
Syntax: internal;
Default
Context: location
Specifies that a given location can only be used for internal requests. For
external requests, the client error 404 Not Found is returned. Internal requests
are the following:
requests redirected by the error page, index, random index, and try files
directives;
Example:
keepalive disable
Syntax: keepalive_disable none | browser . . . ;
Default msie6
Context: http, server, location
Prior to version 1.1.18, the value safari matched all Safari and Safari-like
browsers on all operating systems, and keep-alive connections with them were
disabled by default.
keepalive requests
Syntax: keepalive_requests number;
Default 100
Context: http, server, location
This directive appeared in version 0.8.0.
Sets the maximum number of requests that can be served through one
keep-alive connection. After the maximum number of requests are made, the
connection is closed.
keepalive timeout
Syntax: keepalive_timeout timeout [header timeout];
Default 75s
Context: http, server, location
Sets the maximum number and size of buffers used for reading large client
request header. A request line cannot exceed the size of one buffer, or the 414
Request-URI Too Large error is returned to the client. A request header field
cannot exceed the size of one buffer as well, or the 400 Bad Request error is
returned to the client. Buffers are allocated only on demand. By default,
the buffer size is equal to 8K bytes. If after the end of request processing a
connection is transitioned into the keep-alive state, these buffers are released.
limit except
Syntax: limit_except method . . . { . . . }
Default
Context: location
limit_except GET {
allow 192 .168 .1.0 /32 ;
deny all ;
}
Please note that this will limit access to all methods except GET and
HEAD.
limit rate
Syntax: limit_rate rate;
Default 0
Context: http, server, location, if in location
server {
if ( $slow ) {
set $limit_rate 4 k ;
}
...
}
Sets the initial amount after which the further transmission of a response
to a client will be rate limited.
Example:
location / flv / {
flv ;
l im i t_ r at e _a f te r 500 k ;
limit_rate 50 k ;
}
lingering close
Syntax: lingering_close off | on | always;
Default on
Context: http, server, location
This directive appeared in versions 1.1.0 and 1.0.6.
lingering time
Syntax: lingering_time time;
Default 30s
Context: http, server, location
When lingering close is in effect, this directive specifies the maximum time
during which nginx will process (read and ignore) additional data coming from
a client. After that, the connection will be closed, even if there will be more
data.
lingering timeout
Syntax: lingering_timeout time;
Default 5s
Context: http, server, location
and nginx starts waiting for more data again. The wait-read-ignore cycle is
repeated, but no longer than specified by the lingering time directive.
listen
Syntax: listen address[:port] [default_server] [ssl] [spdy] [proxy_protocol]
[setfib=number] [fastopen=number] [backlog=number] [rcvbuf=size]
[sndbuf=size] [accept_filter=filter] [deferred] [bind]
[ipv6only=on|off]
[so_keepalive=on|off|[keepidle]:[keepintvl]:[keepcnt]];
Syntax: listen port [default_server] [ssl] [spdy] [proxy_protocol]
[setfib=number] [fastopen=number] [backlog=number] [rcvbuf=size]
[sndbuf=size] [accept_filter=filter] [deferred] [bind]
[ipv6only=on|off]
[so_keepalive=on|off|[keepidle]:[keepintvl]:[keepcnt]];
Syntax: listen unix:path [default_server] [ssl] [spdy] [proxy_protocol]
[backlog=number] [rcvbuf=size] [sndbuf=size] [accept_filter=filter]
[deferred] [bind] [so_keepalive=on|off|[keepidle]:[keepintvl]:[keepcnt]];
Default *:80 | *:8000
Context: server
Sets the address and port for IP, or the path for a UNIX-domain socket on
which the server will accept requests. Both address and port, or only address
or only port can be specified. An address may also be a hostname, for example:
listen [::]:8000;
listen [::1];
The ssl parameter (0.7.14) allows specifying that all connections accepted
on this port should work in SSL mode. This allows for a more compact
configuration for the server that handles both HTTP and HTTPS requests.
The spdy parameter (1.3.15) allows accepting SPDY connections on this
port. Normally, for this to work the ssl parameter should be specified as well,
but nginx can also be configured to accept SPDY connections without SSL.
The proxy_protocol parameter (1.5.12) allows specifying that all
connections accepted on this port should use the PROXY protocol.
The listen directive can have several additional parameters specific to
socket-related system calls. These parameters can be specified in any listen
directive, but only once for a given address:port pair.
setfib=number
this parameter (0.8.44) sets the associated routing table, FIB (the
SO_SETFIB option) for the listening socket. This currently works only
on FreeBSD.
fastopen=number
enables TCP Fast Open for the listening socket (1.5.8) and limits
the maximum length for the queue of connections that have not yet
completed the three-way handshake.
Do not enable this feature unless the server can handle receiving the
same SYN packet with data more than once.
backlog=number
sets the backlog parameter in the listen call that limits the maximum
length for the queue of pending connections. By default, backlog is set
to -1 on FreeBSD and Mac OS X, and to 511 on other platforms.
rcvbuf=size
sets the receive buffer size (the SO_RCVBUF option) for the listening socket.
sndbuf=size
sets the send buffer size (the SO_SNDBUF option) for the listening socket.
accept_filter=filter
sets the name of accept filter (the SO_ACCEPTFILTER option) for the
listening socket that filters incoming connections before passing them
to accept. This works only on FreeBSD and NetBSD 5.0+. Possible
values are dataready and httpready.
deferred
instructs to use a deferred accept (the TCP_DEFER_ACCEPT socket option)
on Linux.
bind
instructs to make a separate bind call for a given address:port pair.
This is useful because if there are several listen directives with the
same port but different addresses, and one of the listen directives
listens on all addresses for the given port (*:port), nginx will bind
only to *:port. It should be noted that the getsockname system call
will be made in this case to determine the address that accepted the
connection. If the setfib, backlog, rcvbuf, sndbuf, accept_filter,
deferred, ipv6only, or so_keepalive parameters are used then for a
given address:port pair a separate bind call will always be made.
ipv6only=on|off
this parameter (0.7.42) determines (via the IPV6_V6ONLY socket option)
whether an IPv6 socket listening on a wildcard address [::] will
accept only IPv6 connections or both IPv6 and IPv4 connections. This
parameter is turned on by default. It can only be set once on start.
Prior to version 1.3.4, if this parameter was omitted then the operating
systems settings were in effect for the socket.
so_keepalive=on|off|[keepidle]:[keepintvl]:[keepcnt]
this parameter (1.1.11) configures the TCP keepalive behavior for the
listening socket. If this parameter is omitted then the operating systems
settings will be in effect for the socket. If it is set to the value on, the
SO_KEEPALIVE option is turned on for the socket. If it is set to the
value off, the SO_KEEPALIVE option is turned off for the socket. Some
operating systems support setting of TCP keepalive parameters on a per-
socket basis using the TCP_KEEPIDLE, TCP_KEEPINTVL, and TCP_KEEPCNT
socket options. On such systems (currently, Linux 2.4+, NetBSD 5+,
and FreeBSD 9.0-STABLE), they can be configured using the keepidle,
keepintvl, and keepcnt parameters. One or two parameters may be
omitted, in which case the system default setting for the corresponding
socket option will be in effect. For example,
so_keepalive =30 m ::10
will set the idle timeout (TCP_KEEPIDLE) to 30 minutes, leave the probe
interval (TCP_KEEPINTVL) at its system default, and set the probes count
(TCP_KEEPCNT) to 10 probes.
Example:
location
Syntax: location [ = | ~ | ~* | ^~ ] uri { . . . }
Syntax: location @name { . . . }
Default
Context: server, location
location = / {
[ configuration A ]
}
location / {
[ configuration B ]
}
location / documents / {
[ configuration C ]
}
location ^~ / images / {
[ configuration D ]
}
location / user / {
proxy_pass http :// user . example . com ;
}
location = / user {
proxy_pass http :// login . example . com ;
}
Enables or disables logging of errors about not found files into error log.
log subrequest
Syntax: log_subrequest on | off;
Default off
Context: http, server, location
max ranges
Syntax: max_ranges number;
Default
Context: http, server, location
This directive appeared in version 1.1.2.
merge slashes
Syntax: merge_slashes on | off;
Default on
Context: http, server
location / scripts / {
...
}
msie padding
Syntax: msie_padding on | off;
Default on
Context: http, server, location
msie refresh
Syntax: msie_refresh on | off;
Default off
Context: http, server, location
file lookup errors, such as file not found, no read permission, and so
on.
max
sets the maximum number of elements in the cache; on cache overflow
the least recently used (LRU) elements are removed;
inactive
defines a time after which an element is removed from the cache if it has
not been accessed during this time; by default, it is 60 seconds;
off
disables the cache.
Example:
Sets the minimum number of file accesses during the period configured by
the inactive parameter of the open file cache directive, required for a file
descriptor to remain open in the cache.
Sets a time after which open file cache elements should be validated.
output buffers
Syntax: output_buffers number size;
Default 1 32k
Context: http, server, location
Sets the number and size of the buffers used for reading a response from a
disk.
port in redirect
Syntax: port_in_redirect on | off;
Default on
Context: http, server, location
postpone output
Syntax: postpone_output size;
Default 1460
Context: http, server, location
read ahead
Syntax: read_ahead size;
Default 0
Context: http, server, location
Sets the amount of pre-reading for the kernel when working with file.
On Linux, the posix_fadvise(0, 0, 0, POSIX_FADV_SEQUENTIAL) sys-
tem call is used, and so the size parameter is ignored.
On FreeBSD, the fcntl(O_READAHEAD, size) system call, supported since
FreeBSD 9.0-CURRENT, is used. FreeBSD 7 has to be patched.
Enables or disables doing several redirects using the error page directive.
The number of such redirects is limited.
resolver
Syntax: resolver address . . . [valid=time] [ipv6=on|off];
Default
Context: http, server, location
By default, nginx will look up both IPv4 and IPv6 addresses while resolving.
If looking up of IPv6 addresses is not desired, the ipv6=off parameter can be
specified.
Before version 1.1.9, tuning of caching time was not possible, and nginx
always cached answers for the duration of 5 minutes.
resolver timeout
Syntax: resolver_timeout time;
Default 30s
Context: http, server, location
r es o lv e r_ t im e ou t 5 s ;
root
Syntax: root path;
Default html
Context: http, server, location, if in location
Sets the root directory for requests. For example, with the following
configuration
location / i / {
root / data / w3 ;
}
satisfy
Syntax: satisfy all | any;
Default all
Context: http, server, location
Allows access if all (all) or at least one (any) of the ngx http -
access module, ngx http auth basic module or ngx http auth request module
modules allow access.
Example:
location / {
satisfy any ;
satisfy any
Syntax: satisfy_any on | off;
Default off
Context: http, server, location
This directive has been replaced by the any parameter of the satisfy
directive.
send lowat
Syntax: send_lowat size;
Default 0
Context: http, server, location
If the directive is set to a non-zero value, nginx will try to minimize the
number of send operations on client sockets by using either NOTE_LOWAT flag
of the kqueue method or the SO_SNDLOWAT socket option. In both cases the
specified size is used.
This directive is ignored on Linux, Solaris, and Windows.
send timeout
Syntax: send_timeout time;
Default 60s
Context: http, server, location
Sets a timeout for transmitting a response to the client. The timeout is set
only between two successive write operations, not for the transmission of the
whole response. If the client does not receive anything within this time, the
connection is closed.
sendfile
Syntax: sendfile on | off;
Default off
Context: http, server, location, if in location
location / video / {
sendfile on ;
tcp_nopush on ;
aio on ;
}
When set to a non-zero value, limits the amount of data that can be
transferred in a single sendfile call. Without the limit, one fast connection
may seize the worker process entirely.
server
Syntax: server { . . . }
Default
Context: http
server name
Syntax: server_name name . . . ;
Default ""
Context: server
server {
server_name example . com www . example . com ;
}
server {
server_name example . com *. example . com www . example .*;
}
server {
server_name . example . com ;
}
server {
server_name www . example . com ~^ www \ d +\. example \. com$ ;
}
Regular expressions can contain captures (0.7.40) that can later be used in
other directives:
server {
server_name ~^( www \.) ?(.+) $ ;
location / {
root / sites / $2 ;
}
}
server {
server_name _ ;
location / {
root / sites / default ;
}
}
server {
server_name ~^( www \.) ?(? < domain >.+) $ ;
location / {
root / sites / $domain ;
}
}
server {
server_name _ ;
location / {
root / sites / default ;
}
}
server {
server_name www . example . com "";
}
It allows this server to process requests without the Host header field
instead of the default server for the given address:port pair. This is the
default setting.
During searching for a virtual server by name, if the name matches more
than one of the specified variants, (e.g. both a wildcard name and regular
expression match), the first matching variant will be chosen, in the following
order of priority:
Enables or disables the use of the primary server name, specified by the
server name directive, in redirects issued by nginx. When the use of the
primary server name is disabled, the name from the Host request header field
is used. If this field is not present, the IP address of the server is used.
The use of a port in redirects is controlled by the port in redirect directive.
Sets the bucket size for the server names hash tables. The default value
depends on the size of the processors cache line. The details of setting up
hash tables are provided in a separate document.
Sets the maximum size of the server names hash tables. The details of
setting up hash tables are provided in a separate document.
server tokens
Syntax: server_tokens on | off;
Default on
Context: http, server, location
tcp nodelay
Syntax: tcp_nodelay on | off;
Default on
Context: http, server, location
tcp nopush
Syntax: tcp_nopush on | off;
Default off
Context: http, server, location
try files
Syntax: try_files file . . . uri;
Syntax: try_files file . . . =code;
Default
Context: server, location
Checks the existence of files in the specified order and uses the first found
file for request processing; the processing is performed in the current context.
The path to a file is constructed from the file parameter according to the root
and alias directives. It is possible to check directorys existence by specifying
a slash at the end of a name, e.g. $uri/. If none of the files were found,
an internal redirect to the uri specified in the last parameter is made. For
example:
location / images / {
try_files $uri / images / default . gif ;
}
location / {
try_files $uri $uri / index . html $uri . html =404;
}
location / {
try_files / system / maintenance . html
location @mongrel {
proxy_pass http :// mongrel ;
}
location / {
try_files $uri $uri / @drupal ;
}
location ~ \. php$ {
try_files $uri @drupal ;
fastcgi_pass ...;
location @drupal {
fastcgi_pass ...;
location / {
try_files $uri $uri / @drupal ;
}
location / {
error_page 404 = @drupal ;
log_not_found off ;
}
And here,
location ~ \. php$ {
try_files $uri @drupal ;
fastcgi_pass ...;
...
}
try_files checks the existence of the PHP file before passing the request
to the FastCGI server.
location / {
try_files $uri $uri / @wordpress ;
}
location ~ \. php$ {
try_files $uri @wordpress ;
fastcgi_pass ...;
location @wordpress {
fastcgi_pass ...;
types
Syntax: types { . . . }
Default text/html html; image/gif gif; image/jpeg jpg;
Context: http, server, location
types {
application / octet - stream bin exe dll ;
application / octet - stream deb ;
application / octet - stream dmg ;
}
location / download / {
types { }
default_type application / octet - stream ;
}
Sets the bucket size for the types hash tables. The details of setting up
hash tables are provided in a separate document.
Prior to version 1.5.13, the default value depended on the size of the
processors cache line.
Sets the maximum size of the types hash tables. The details of setting up
hash tables are provided in a separate document.
underscores in headers
Syntax: underscores_in_headers on | off;
Default off
Context: http, server
Sets the bucket size for the variables hash table. The details of setting up
hash tables are provided in a separate document.
Sets the maximum size of the variables hash table. The details of setting
up hash tables are provided in a separate document.
$arg name
argument name in the request line
$args
arguments in the request line
$binary remote addr
client address in a binary form, values length is always 4 bytes
$body bytes sent
number of bytes sent to a client, not counting the response header; this
variable is compatible with the %B parameter of the mod_log_config
Apache module
$bytes sent
number of bytes sent to a client (1.3.8, 1.2.5)
$connection
connection serial number (1.3.8, 1.2.5)
$connection requests
current number of requests made through a connection (1.3.8, 1.2.5)
$content length
Content-Length request header field
$content type
Content-Type request header field
$cookie name
the name cookie
$document root
root or alias directives value for the current request
$document uri
same as $uri
$host
in this order of precedence: host name from the request line, or host
name from the Host request header field, or the server name matching a
request
$hostname
host name
$http name
arbitrary request header field; the last part of a variable name is the field
name converted to lower case with dashes replaced by underscores
$https
on if connection operates in SSL mode, or an empty string otherwise
$is args
? if a request line has arguments, or an empty string otherwise
$limit rate
setting this variable enables response rate limiting; see limit rate
$msec
current time in seconds with the milliseconds resolution (1.3.9, 1.2.6)
$nginx version
nginx version
$pid
PID of the worker process
$pipe
p if request was pipelined, . otherwise (1.3.12, 1.2.7)
$proxy protocol addr
client address from the PROXY protocol header, or an empty string
otherwise (1.5.12)
The PROXY protocol must be previously enabled by setting the
proxy_protocol parameter in the listen directive.
$query string
same as $args
$realpath root
an absolute pathname corresponding to the root or alias directives value
for the current request, with all symbolic links resolved to real paths
$remote addr
client address
$remote port
client port
$remote user
user name supplied with the Basic authentication
$request
full original request line
$request body
request body
The variables value is made available in locations processed by the
proxy pass, fastcgi pass, uwsgi pass, and scgi pass directives.
$request body file
name of a temporary file with the request body
At the end of processing, the file needs to be removed. To always write
the request body to a file, client body in file only needs to be enabled.
When the name of a temporary file is passed in a proxied request or in
a request to a FastCGI/uwsgi/SCGI server, passing the request body
should be disabled by the proxy pass request body off, fastcgi pass -
request body off, uwsgi pass request body off, or scgi pass request -
body off directives, respectively.
$request completion
OK if a request has completed, or an empty string otherwise
$request filename
file path for the current request, based on the root or alias directives,
2.2.1 Summary
The ngx_http_access_module module allows limiting access to certain
client addresses.
Access can also be limited by password or by the result of subrequest.
Simultaneous limitation of access by address and by password is controlled by
the satisfy directive.
location / {
deny 192.168.1.1;
allow 192 .168 .1.0 /24 ;
allow 10.1.1.0/16;
allow 2001:0 db8 ::/32;
deny all ;
}
The rules are checked in sequence until the first match is found. In
this example, access is allowed only for IPv4 networks 10.1.1.0/16 and
192.168.1.0/24 excluding the address 192.168.1.1, and for IPv6 network
2001:0db8::/32. In case of a lot of rules, the use of the ngx http geo module
module variables is preferable.
2.2.3 Directives
allow
Syntax: allow address | CIDR | unix: | all;
Default
Context: http, server, location, limit except
Allows access for the specified network or address. If the special value
unix: is specified (1.5.1), allows access for all UNIX-domain sockets.
deny
Syntax: deny address | CIDR | unix: | all;
Default
Context: http, server, location, limit except
Denies access for the specified network or address. If the special value
unix: is specified (1.5.1), denies access for all UNIX-domain sockets.
2.3.1 Summary
The ngx_http_addition_module module is a filter that adds text before
and after a response. This module is not built by default, it should be enabled
with the --with-http_addition_module configuration parameter.
location / {
ad d_be fore _bod y / before_action ;
add_after_body / after_action ;
}
2.3.3 Directives
add before body
Syntax: add_before_body uri;
Default
Context: http, server, location
Adds the text returned as a result of processing a given subrequest after the
response body. An empty string ("") as a parameter cancels addition inherited
from the previous configuration level.
addition types
Syntax: addition_types mime-type . . . ;
Default text/html
Context: http, server, location
Allows adding text in responses with the specified MIME types, in addition
to text/html. The special value * matches any MIME type (0.8.29).
2.4.1 Summary
The ngx_http_auth_basic_module module allows limiting access to
resources by validating the user name and password using the HTTP Basic
Authentication protocol.
Access can also be limited by address or by the result of subrequest.
Simultaneous limitation of access by address and by password is controlled
by the satisfy directive.
location / {
auth_basic " closed site ";
a u t h _ b a s i c _ u s e r _ f i l e conf / htpasswd ;
}
2.4.3 Directives
auth basic
Syntax: auth_basic string | off;
Default off
Context: http, server, location, limit except
Enables validation of user name and password using the HTTP Basic
Authentication protocol. The specified parameter is used as a realm.
Parameter value can contain variables (1.3.10, 1.2.7). The special value off
allows cancelling the effect of the auth_basic directive inherited from the
previous configuration level.
Specifies a file that keeps user names and passwords, in the following format:
# comment
name1 : password1
name2 : password2 : comment
name3 : password3
Support for SHA scheme was added only to aid in migration from other
web servers. It should not be used for new passwords, since unsalted
SHA-1 hashing that it employs is vulnerable to rainbow table attacks.
2.5.1 Summary
The ngx_http_auth_request_module module (1.5.4+) implements client
authorization based on the result of a subrequest. If the subrequest returns a
2xx response code, the access is allowed. If it returns 401 or 403, the access is
denied with the corresponding error code. Any other response code returned
by the subrequest is considered an error.
For the 401 error, the client also receives the WWW-Authenticate header
from the subrequest response.
This module is not built by default, it should be enabled with the
--with-http_auth_request_module configuration parameter.
The module may be combined with other access modules, such as ngx -
http access module and ngx http auth basic module, via the satisfy directive.
location / private / {
auth_request / auth ;
...
}
location = / auth {
proxy_pass ...
p r o x y _ p a s s _ r e q u e s t _ b o d y off ;
p ro x y_ s et _ he a de r Content - Length "";
p ro x y_ s et _ he a de r X - Original - URI $request_uri ;
}
2.5.3 Directives
auth request
Syntax: auth_request uri | off;
Default off
Context: http, server, location
Enables authorization based on the result of a subrequest and sets the URI
to which the subrequest will be sent.
Sets the request variable to the given value after the authorization request
completes. The value may contain variables from the authorization request,
such as $upstream http *.
2.6.1 Summary
The ngx_http_autoindex_module module processes requests ending with
the slash character (/) and produces a directory listing. Usually a request
is passed to the ngx_http_autoindex_module module when the ngx http -
index module module cannot find an index file.
location / {
autoindex on ;
}
2.6.3 Directives
autoindex
Syntax: autoindex on | off;
Default off
Context: http, server, location
For the HTML format, specifies whether exact file sizes should be output in
the directory listing, or rather rounded to kilobytes, megabytes, and gigabytes.
autoindex format
Syntax: autoindex_format html | xml | json | jsonp;
Default html
Context: http, server, location
This directive appeared in version 1.7.9.
autoindex localtime
Syntax: autoindex_localtime on | off;
Default off
Context: http, server, location
For the HTML format, specifies whether times in the directory listing
should be output in the local time zone or UTC.
2.7.1 Summary
The ngx_http_browser_module module creates variables whose values
depend on the value of the User-Agent request header field:
$modern browser
equals the value set by the modern browser value directive, if a browser
was identified as modern;
$ancient browser
equals the value set by the ancient browser value directive, if a browser
was identified as ancient;
$msie
equals 1 if a browser was identified as MSIE of any version.
modern_browser unlisted ;
if ( $ an c ie n t_ b ro w se r ) {
rewrite ^ / ancient . html ;
}
2.7.3 Directives
ancient browser
Syntax: ancient_browser string . . . ;
Default
Context: http, server, location
modern browser
Syntax: modern_browser browser version;
Syntax: modern_browser unlisted;
Default
Context: http, server, location
2.8.1 Summary
The ngx_http_charset_module module adds the specified charset to the
Content-Type response header field. In addition, the module can convert data
from one charset to another, with some limitations:
2.8.3 Directives
charset
Syntax: charset charset | off;
Default off
Context: http, server, location, if in location
charset $charset ;
charset map
Syntax: charset_map charset1 charset2 { . . . }
Default
Context: http
When describing a conversion table to UTF-8, codes for the UTF-8 charset
should be given in the second column, for example:
Full conversion tables from koi8-r to windows-1251, and from koi8-r and
windows-1251 to utf-8 are provided in the distribution files conf/koi-win,
conf/koi-utf, and conf/win-utf.
charset types
Syntax: charset_types mime-type . . . ;
Default text/html text/xml text/plain text/vnd.wap.wml
application/javascript application/rss+xml
Context: http, server, location
This directive appeared in version 0.7.9.
override charset
Syntax: override_charset on | off;
Default off
Context: http, server, location, if in location
source charset
Syntax: source_charset charset;
Default
Context: http, server, location, if in location
2.9.1 Summary
The ngx_http_dav_module module is intended for file management
automation via the WebDAV protocol. The module processes HTTP and
WebDAV methods PUT, DELETE, MKCOL, COPY, and MOVE.
This module is not built by default, it should be enabled with the
--with-http_dav_module configuration parameter.
location / {
root / data / www ;
c l i e n t _ b o d y _ t e m p _ p a t h / data / client_temp ;
create_full_put_path on ;
dav_access group : rw all : r ;
limit_except GET {
allow 192 .168 .1.0 /32 ;
deny all ;
}
}
2.9.3 Directives
dav access
Syntax: dav_access users:permissions . . . ;
Default user:rw
Context: http, server, location
Sets access permissions for newly created files and directories, e.g.:
If any group or all access permissions are specified then user permissions
may be omitted:
dav methods
Syntax: dav_methods off | method . . . ;
Default off
Context: http, server, location
Allows the specified HTTP and WebDAV methods. The parameter off
denies all methods processed by this module. The following methods are
supported: PUT, DELETE, MKCOL, COPY, and MOVE.
A file uploaded with the PUT method is first written to a temporary file,
and then the file is renamed. Starting from version 0.8.9, temporary files and
the persistent store can be put on different file systems. However, be aware
that in this case a file is copied across two file systems instead of the cheap
renaming operation. It is thus recommended that for any given location both
saved files and a directory holding temporary files, set by the client body -
temp path directive, are put on the same file system.
When creating a file with the PUT method, it is possible to specify the
modification date by passing it in the Date header field.
Allows the DELETE method to remove files provided that the number of
elements in a request path is not less than the specified number. For example,
the directive
m in _ de l et e _d e pt h 4;
/ users /00/00
2.10.1 Summary
The ngx_http_empty_gif_module module emits single-pixel transparent
GIF.
location = / _ . gif {
empty_gif ;
}
2.10.3 Directives
empty gif
Syntax: empty_gif;
Default
Context: location
2.11.1 Summary
The ngx_http_f4f_module module provides server-side support for Adobe
HTTP Dynamic Streaming (HDS).
This module implements handling of HTTP Dynamic Streaming requests
in the /videoSeg1-Frag1 form extracting the needed fragment from the
videoSeg1.f4f file using the videoSeg1.f4x index file. This module is an
alternative to the Adobes f4f module (HTTP Origin Module) for Apache.
Usual pre-processing with Adobes f4fpackager is required, see relevant
documentation for details.
location / video / {
f4f ;
...
}
2.11.3 Directives
f4f
Syntax: f4f;
Default
Context: location
Sets the size of the buffer used for reading the .f4x index file.
2.12.1 Summary
The ngx_http_fastcgi_module module allows passing requests to a
FastCGI server.
location / {
fastcgi_pass localhost :9000;
fastcgi_index index . php ;
2.12.3 Directives
fastcgi bind
Syntax: fastcgi_bind address | off;
Default
Context: http, server, location
This directive appeared in version 0.8.22.
Sets the size of the buffer used for reading the first part of the response
received from the FastCGI server. This part usually contains a small response
header. By default, the buffer size is equal to the size of one buffer set by the
fastcgi buffers directive. It can be made smaller, however.
fastcgi buffering
Syntax: fastcgi_buffering on | off;
Default on
Context: http, server, location
This directive appeared in version 1.5.6.
fastcgi buffers
Syntax: fastcgi_buffers number size;
Default 8 4k|8k
Context: http, server, location
Sets the number and size of the buffers used for reading a response from
the FastCGI server, for a single connection. By default, the buffer size is equal
to one memory page. This is either 4K or 8K, depending on a platform.
When buffering of responses from the FastCGI server is enabled, limits the
total size of buffers that can be busy sending a response to the client while the
response is not yet fully read. In the meantime, the rest of the buffers can be
used for reading the response and, if needed, buffering part of the response to
a temporary file. By default, size is limited by the size of two buffers set by
the fastcgi buffer size and fastcgi buffers directives.
fastcgi cache
Syntax: fastcgi_cache zone | off;
Default off
Context: http, server, location
Defines a shared memory zone used for caching. The same zone can be
used in several places. Parameter value can contain variables (1.7.9). The off
parameter disables caching inherited from the previous configuration level.
Defines conditions under which the response will not be taken from a cache.
If at least one value of the string parameters is not empty and is not equal to
0 then the response will not be taken from the cache:
When enabled, only one request at a time will be allowed to populate a new
cache element identified according to the fastcgi cache key directive by passing
a request to a FastCGI server. Other requests of the same cache element will
either wait for a response to appear in the cache or the cache lock for this
element to be released, up to the time set by the fastcgi cache lock timeout
directive.
If the last request passed to the FastCGI server for populating a new cache
element has not completed for the specified time, one more request may be
passed to the FastCGI server.
Sets a timeout for fastcgi cache lock. When the time expires, the request
will be passed to the FastCGI server, however, the response will not be cached.
If the client request method is listed in this directive then the response will
be cached. GET and HEAD methods are always added to the list, though
it is recommended to specify them explicitly. See also the fastcgi no cache
directive.
Sets the number of requests after which the response will be cached.
Sets the path and other parameters of a cache. Cache data are stored in
files. Both the key and file name in a cache are a result of applying the MD5
function to the proxied URL.
The levels parameter defines hierarchy levels of a cache. For example, in
the following configuration
A cached response is first written to a temporary file, and then the file is
renamed. Starting from version 0.8.9, temporary files and the cache can be put
on different file systems. However, be aware that in this case a file is copied
across two file systems instead of the cheap renaming operation. It is thus
recommended that for any given location both cache and a directory holding
temporary files are put on the same file system. A directory for temporary
files is set based on the use_temp_path parameter (1.7.10). If this parameter
is omitted or set to the value on, the directory set by the fastcgi temp path
directive for the given location will be used. If the value is set to off, temporary
files will be put directly in the cache directory.
In addition, all active keys and information about data are stored in a
shared memory zone, whose name and size are configured by the keys_zone
parameter. One megabyte zone can store about 8 thousand keys.
Cached data that are not accessed during the time specified by the
inactive parameter get removed from the cache regardless of their freshness.
By default, inactive is set to 10 minutes.
The special cache manager process monitors the maximum cache size set
by the max_size parameter. When this size is exceeded, it removes the least
recently used data.
A minute after the start the special cache loader process is activated. It
loads information about previously cached data stored on file system into a
cache zone. The loading is done in iterations. During one iteration no more
than loader_files items are loaded (by default, 100). Besides, the duration of
one iteration is limited by the loader_threshold parameter (by default, 200
milliseconds). Between iterations, a pause configured by the loader_sleep
parameter (by default, 50 milliseconds) is made.
Defines conditions under which the request will be considered a cache purge
request. If at least one value of the string parameters is not empty and
is not equal to 0 then the cache entry with a corresponding cache key is
removed. The result of successful operation is indicated by returning the 204
No Content response.
If the cache key of a purge request ends with an asterisk (*), all cache
entries matching the wildcard key will be removed from the cache.
Example configuration:
server {
...
location / {
fastcgi_pass backend ;
fastcgi_cache cache_zone ;
fastcgi_cache_key $uri ;
fastcgi_cache_purge $purge_method ;
}
}
Sets caching time for different response codes. For example, the following
directives
f a s t c g i _ c a c h e _ v a l i d 200 302 10 m ;
f a s t c g i _ c a c h e _ v a l i d 404 1m;
set 10 minutes of caching for responses with codes 200 and 302 and 1 minute
for responses with code 404.
If only caching time is specified
fastcgi_cache_valid 5m;
f a s t c g i _ c a c h e _ v a l i d 200 302 10 m ;
f a s t c g i _ c a c h e _ v a l i d 301 1h;
f a s t c g i _ c a c h e _ v a l i d any 1m;
Parameters of caching can also be set directly in the response header. This
has higher priority than setting of caching time using the directive.
The X-Accel-Expires header field sets caching time of a response in
seconds. The zero value disables caching for a response. If the value
starts with the @ prefix, it sets an absolute time in seconds since Epoch,
up to which the response may be cached.
If the header includes the Set-Cookie field, such a response will not be
cached.
If the header includes the Vary field with the special value *, such a
response will not be cached (1.7.7). If the header includes the Vary field
with another value, such a response will be cached taking into account
the corresponding request header fields (1.7.7).
Processing of one or more of these response header fields can be disabled using
the fastcgi ignore headers directive.
Sets a string to search for in the error stream of a response received from
a FastCGI server. If the string is found then it is considered that the FastCGI
server has returned an invalid response. This allows handling application errors
in nginx, for example:
location / php {
fastcgi_pass backend :9000;
...
f a s t c g i _ c a t c h _ s t d e r r " PHP Fatal error ";
f a s t c g i _ n e x t _ u p s t r e a m error timeout invalid_header ;
}
Enables byte-range support for both cached and uncached responses from
the FastCGI server regardless of the Accept-Ranges field in these responses.
By default, nginx does not pass the header fields Status and X-Accel-...
from the response of a FastCGI server to a client. The fastcgi_hide_header
directive sets additional fields that will not be passed. If, on the contrary, the
passing of fields needs to be permitted, the fastcgi pass header directive can
be used.
fastcgi index
Syntax: fastcgi_index name;
Default
Context: http, server, location
Sets a file name that will be appended after a URI that ends with a slash, in
the value of the $fastcgi script name variable. For example, with these settings
By default, a FastCGI server will close a connection right after sending the
response. However, when this directive is set to the value on, nginx will instruct
a FastCGI server to keep connections open. This is necessary, in particular,
for keepalive connections to FastCGI servers to function.
Limits the speed of reading the response from the FastCGI server. The
rate is specified in bytes per second. The zero value disables rate limiting. The
limit is set per a request, and so if nginx simultaneously opens two connections
to the FastCFI server, the overall rate will be twice as much as the specified
limit. The limitation works only if buffering of responses from the FastCGI
server is enabled.
When buffering of responses from the FastCGI server is enabled, and the
whole response does not fit into the buffers set by the fastcgi buffer size and
fastcgi buffers directives, a part of the response can be saved to a temporary
file. This directive sets the maximum size of the temporary file. The size of
data written to the temporary file at a time is set by the fastcgi temp file -
write size directive.
The zero value disables buffering of responses to temporary files.
This restriction does not apply to responses that will be cached or stored
on disk.
error
an error occurred while establishing a connection with the server, passing
a request to it, or reading the response header;
timeout
a timeout has occurred while establishing a connection with the server,
passing a request to it, or reading the response header;
invalid_header
a server returned an empty or invalid response;
http_500
a server returned a response with the code 500;
http_503
a server returned a response with the code 503;
http_403
a server returned a response with the code 403;
http_404
a server returned a response with the code 404;
off
disables passing a request to the next server.
One should bear in mind that passing a request to the next server is only
possible if nothing has been sent to a client yet. That is, if an error or timeout
occurs in the middle of the transferring of a response, fixing this is impossible.
The directive also defines what is considered an unsuccessful attempt
of communication with a server. The cases of error, timeout and
invalid_header are always considered unsuccessful attempts, even if they
are not specified in the directive. The cases of http_500 and http_503 are
considered unsuccessful attempts only if they are specified in the directive. The
cases of http_403 and http_404 are never considered unsuccessful attempts.
Passing a request to the next server can be limited by the number of tries
and by time.
Limits the time allowed to pass a request to the next server. The 0 value
turns off this limitation.
Limits the number of possible tries for passing a request to the next server.
The 0 value turns off this limitation.
fastcgi no cache
Syntax: fastcgi_no_cache string . . . ;
Default
Context: http, server, location
Defines conditions under which the response will not be saved to a cache.
If at least one value of the string parameters is not empty and is not equal to
0 then the response will not be saved:
fastcgi param
Syntax: fastcgi_param parameter value [if_not_empty];
Default
Context: http, server, location
fastcgi pass
Syntax: fastcgi_pass address;
Default
Context: location, if in location
Defines a timeout for reading a response from the FastCGI server. The
timeout is set only between two successive read operations, not for the
transmission of the whole response. If the FastCGI server does not transmit
anything within this time, the connection is closed.
Indicates whether the original request body is passed to the FastCGI server.
See also the fastcgi pass request headers directive.
Indicates whether the header fields of the original request are passed to the
FastCGI server. See also the fastcgi pass request body directive.
If the directive is set to a non-zero value, nginx will try to minimize the
number of send operations on outgoing connections to a FastCGI server by
using either NOTE_LOWAT flag of the kqueue method, or the SO_SNDLOWAT socket
option, with the specified size.
This directive is ignored on Linux, Solaris, and Windows.
Defines a regular expression that captures a value for the $fastcgi path info
variable. The regular expression should have two captures: the first becomes
a value of the $fastcgi script name variable, the second becomes a value of the
$fastcgi path info variable. For example, with these settings
fastcgi store
Syntax: fastcgi_store on | off | string;
Default off
Context: http, server, location
Enables saving of files to a disk. The on parameter saves files with paths
corresponding to the directives alias or root. The off parameter disables saving
of files. In addition, the file name can be set explicitly using the string with
variables:
fastcgi_store / data / ww w $o r ig i na l _u r i ;
location / images / {
root / data / www ;
error_page 404 = / fetch$uri ;
}
location / fetch / {
internal ;
fastcgi_store on ;
f a s t c g i _ s t o r e _ a c c e s s user : rw group : rw all : r ;
fastcgi_temp_path / data / temp ;
Sets access permissions for newly created files and directories, e.g.:
If any group or all access permissions are specified then user permissions
may be omitted:
f a s t c g i _ s t o r e _ a c c e s s group : rw all : r ;
Limits the size of data written to a temporary file at a time, when buffering
of responses from the FastCGI server to temporary files is enabled. By default,
size is limited by two buffers set by the fastcgi buffer size and fastcgi buffers
directives. The maximum size of a temporary file is set by the fastcgi max -
temp file size directive.
Defines a directory for storing temporary files with data received from
FastCGI servers. Up to three-level subdirectory hierarchy can be used
underneath the specified directory. For example, in the following configuration
See also the use_temp_path parameter of the fastcgi cache path directive.
2.13.1 Summary
The ngx_http_flv_module module provides pseudo-streaming server-side
support for Flash Video (FLV) files.
It handles requests with the start argument in the request URIs query
string specially, by sending back the contents of a file starting from the
requested byte offset and with the prepended FLV header.
This module is not built by default, it should be enabled with the
--with-http_flv_module configuration parameter.
location ~ \. flv$ {
flv ;
}
2.13.3 Directives
flv
Syntax: flv;
Default
Context: location
2.14.1 Summary
The ngx_http_geo_module module creates variables with values depending
on the client IP address.
geo $geo {
default 0;
127.0.0.1 2;
192.168.1.0/24 1;
10.1.0.0/16 1;
::1 2;
2001:0 db8 ::/32 1;
}
2.14.3 Directives
geo
Syntax: geo [$address] $variable { . . . }
Default
Context: http
geo $ a rg _ re mo t e_ a dd r $geo {
...;
}
Since variables are evaluated only when used, the mere existence of even
a large number of declared geo variables does not cause any extra costs for
request processing.
If the value of a variable does not represent a valid IP address then the
255.255.255.255 address is used.
Addresses are specified either as prefixes in CIDR notation (including
individual addresses) or as ranges (0.7.23).
IPv6 prefixes are supported starting from versions 1.3.10 and 1.2.7.
delete
deletes the specified network (0.7.23).
default
a value set to the variable if the client address does not match any of
the specified addresses. When addresses are specified in CIDR notation,
0.0.0.0/0 and ::/0 can be used instead of default. When default
is not specified, the default value will be an empty string.
include
includes a file with addresses and values. There can be several inclusions.
proxy
defines trusted addresses (0.8.7, 0.7.63). When a request comes from a
trusted address, an address from the X-Forwarded-For request header
field will be used instead. In contrast to the regular addresses, trusted
addresses are checked sequentially.
Trusted IPv6 addresses are supported starting from versions 1.3.0 and
1.2.1.
proxy_recursive
enables recursive address search (1.3.0, 1.2.1). If recursive search is
disabled then instead of the original client address that matches one
of the trusted addresses, the last address sent in X-Forwarded-For will
be used. If recursive search is enabled then instead of the original client
address that matches one of the trusted addresses, the last non-trusted
address sent in X-Forwarded-For will be used.
ranges
indicates that addresses are specified as ranges (0.7.23). This parameter
should be the first. To speed up loading of a geo base, addresses should
be put in ascending order.
Example:
geo $country {
default ZZ ;
include conf / geo . conf ;
delete 127.0.0.0/16;
proxy 192.168.100.0/24;
proxy 2001:0 db8 ::/32;
127.0.0.0/24 US ;
127.0.0.1/32 RU ;
10.1.0.0/16 RU ;
192.168.1.0/24 UK ;
}
10.2.0.0/16 RU ;
192.168.2.0/24 RU ;
A value of the most specific match is used. For example, for the 127.0.0.1
address the value RU will be chosen, not US.
Example with ranges:
geo $country {
ranges ;
default ZZ ;
127.0.0.0 -127.0.0.0 US ;
127.0.0.1 -127.0.0.1 RU ;
127.0.0.1 -127.0.0.255 US ;
10.1.0.0 -10.1.255.255 RU ;
192.168.1.0 -192.168.1.255 UK ;
}
2.15.1 Summary
The ngx_http_geoip_module module (0.8.6+) creates variables with
values depending on the client IP address, using the precompiled MaxMind
databases.
When using the databases with IPv6 support (1.3.12, 1.2.7), IPv4 addresses
are looked up as IPv4-mapped IPv6 addresses.
This module is not built by default, it should be enabled with the
--with-http_geoip_module configuration parameter.
http {
geoip_country GeoIP . dat ;
geoip_city GeoLiteCity . dat ;
geoip_proxy 192.168.100.0/24;
geoip_proxy 2001:0 db8 ::/32;
geoip_proxy_recursive on ;
...
2.15.3 Directives
geoip country
Syntax: geoip_country file;
Default
Context: http
geoip city
Syntax: geoip_city file;
Default
Context: http
geoip org
Syntax: geoip_org file;
Default
Context: http
This directive appeared in version 1.0.3.
$geoip org
organization name, for example, The University of Melbourne.
geoip proxy
Syntax: geoip_proxy address | CIDR;
Default
Context: http
This directive appeared in versions 1.3.0 and 1.2.1.
If recursive search is disabled then instead of the original client address that
matches one of the trusted addresses, the last address sent in X-Forwarded-For
will be used. If recursive search is enabled then instead of the original client
address that matches one of the trusted addresses, the last non-trusted address
sent in X-Forwarded-For will be used.
2.16.1 Summary
The ngx_http_gunzip_module module is a filter that decompresses
responses with Content-Encoding: gzip for clients that do not support
gzip encoding method. The module will be useful when it is desirable to
store data compressed to save space and reduce I/O costs.
This module is not built by default, it should be enabled with the
--with-http_gunzip_module configuration parameter.
location / storage / {
gunzip on ;
...
}
2.16.3 Directives
gunzip
Syntax: gunzip on | off;
Default off
Context: http, server, location
gunzip buffers
Syntax: gunzip_buffers number size;
Default 32 4k|16 8k
Context: http, server, location
2.17.1 Summary
The ngx_http_gzip_module module is a filter that compresses responses
using the gzip method. This often helps to reduce the size of transmitted
data by half or even more.
gzip on ;
gz ip_m in_l engt h 1000;
gzip_proxied expired no - cache no - store private auth ;
gzip_types text / plain application / xml ;
The $gzip ratio variable can be used to log the achieved compression ratio.
2.17.3 Directives
gzip
Syntax: gzip on | off;
Default off
Context: http, server, location, if in location
gzip buffers
Syntax: gzip_buffers number size;
Default 32 4k|16 8k
Context: http, server, location
Sets the number and size of buffers used to compress a response. By default,
the buffer size is equal to one memory page. This is either 4K or 8K, depending
on a platform.
gzip disable
Syntax: gzip_disable regex . . . ;
Default
Context: http, server, location
This directive appeared in version 0.6.23.
Sets the minimum length of a response that will be gzipped. The length is
determined only from the Content-Length response header field.
gzip proxied
Syntax: gzip_proxied off | expired | no-cache | no-store | private |
no_last_modified | no_etag | auth | any . . . ;
Default off
Context: http, server, location
off
disables compression for all proxied requests, ignoring other parameters;
expired
enables compression if a response header includes the Expires field with
a value that disables caching;
no-cache
enables compression if a response header includes the Cache-Control
field with the no-cache parameter;
no-store
enables compression if a response header includes the Cache-Control
field with the no-store parameter;
private
enables compression if a response header includes the Cache-Control
field with the private parameter;
no_last_modified
enables compression if a response header does not include the
Last-Modified field;
no_etag
enables compression if a response header does not include the ETag field;
auth
enables compression if a request header includes the Authorization field;
any
enables compression for all proxied requests.
gzip types
Syntax: gzip_types mime-type . . . ;
Default text/html
Context: http, server, location
gzip vary
Syntax: gzip_vary on | off;
Default off
Context: http, server, location
2.18.1 Summary
The ngx_http_gzip_static_module module allows sending precom-
pressed files with the .gz filename extension instead of regular files.
This module is not built by default, it should be enabled with the
--with-http_gzip_static_module configuration parameter.
gzip_static on ;
gzip_proxied expired no - cache no - store private auth ;
2.18.3 Directives
gzip static
Syntax: gzip_static on | off | always;
Default off
Context: http, server, location
2.19.1 Summary
The ngx_http_headers_module module allows adding the Expires and
Cache-Control header fields, and arbitrary fields, to a response header.
expires 24 h ;
expires modified +24 h ;
expires @24h ;
expires 0;
expires -1;
expires epoch ;
expires $expires ;
add_header Cache - Control private ;
2.19.3 Directives
add header
Syntax: add_header name value [always];
Default
Context: http, server, location, if in location
Adds the specified field to a response header provided that the response
code equals 200, 201, 204, 206, 301, 302, 303, 304, or 307. A value can contain
variables.
There could be several add_header directives. These directives are
inherited from the previous level if and only if there are no add_header
directives defined on the current level.
If the always parameter is specified (1.7.5), the header field will be added
regardless of the response code.
expires
Syntax: expires [modified] time;
Syntax: expires epoch | max | off;
Default off
Context: http, server, location, if in location
206, 301, 302, 303, 304, or 307. A parameter can be a positive or negative
time.
A time in the Expires field is computed as a sum of the current time
and time specified in the directive. If the modified parameter is used (0.7.0,
0.6.32) then time is computed as a sum of the files modification time and time
specified in the directive.
In addition, it is possible to specify a time of the day using the @ prefix
(0.7.9, 0.6.34):
expires @15h30m ;
map $ s e n t _ h t t p _ c o n t e n t _ t y p e $expires {
default off ;
application / pdf 42 d ;
~ image / max ;
}
expires $expires ;
2.20.1 Summary
The ngx_http_hls_module module provides HTTP Live Streaming (HLS)
server-side support for H.264/AAC files. Such files typically have the .mp4,
.m4v, or .m4a filename extensions.
nginx supports two URIs for each MP4 file:
The playlist URI that ends with .m3u8 and accepts the optional len
argument that defines the fragment length in seconds;
The fragment URI that ends with .ts and accepts start and end
arguments that define fragment boundaries in seconds.
location / video / {
hls ;
hls_fragment 5s;
hls_buffers 10 10 m ;
hls_mp4_buffer_size 1m;
hls_mp4_max_buffer_size 5m;
alias / var / video /;
}
With this configuration, the following URIs are supported for the /var
/video/test.mp4 file:
http :// hls . example . com / video / test . mp4 . m3u8 ? len =8.000
http :// hls . example . com / video / test . mp4 . ts ? start =1.000& end =2.200
2.20.3 Directives
hls
Syntax: hls;
Default
Context: location
hls buffers
Syntax: hls_buffers number size;
Default 8 2m
Context: http, server, location
Sets the maximum number and size of buffers that are used for reading and
writing data frames.
# EXTM3U
# EXT -X - VERSION :3
# EXT -X - TARGETDURATION :15
# EXT -X - PLAYLIST - TYPE : VOD
# EXTINF :9.333 ,
test . mp4 . ts ? start =0.000& end =9.333& a =1& b =2
# EXTINF :7.167 ,
test . mp4 . ts ? start =9.333& end =16.500& a =1& b =2
# EXTINF :5.416 ,
test . mp4 . ts ? start =16.500& end =21.916& a =1& b =2
# EXTINF :5.500 ,
test . mp4 . ts ? start =21.916& end =27.416& a =1& b =2
# EXTINF :15.167 ,
test . mp4 . ts ? start =27.416& end =42.583& a =1& b =2
# EXTINF :9.626 ,
test . mp4 . ts ? start =42.583& end =52.209& a =1& b =2
# EXT -X - ENDLIST
If an HLS stream is protected with the ngx http secure link module
module, $uri should not be used in the secure link md5 expression because
this will cause errors when requesting the fragments. Base URI should be used
instead of $uri ($hls uri in the example):
http {
...
server {
...
location / hls {
hls ;
h ls _ fo r wa r d_ a rg s on ;
if ( $secure_link = "") {
return 403;
}
if ( $secure_link = "0") {
return 410;
}
}
}
}
hls fragment
Syntax: hls_fragment time;
Default 5s
Context: http, server, location
Defines the default fragment length for playlist URIs requested without the
len argument.
Sets the initial size of the buffer used for processing MP4 files.
During metadata processing, a larger buffer may become necessary. Its size
cannot exceed the specified size, or else nginx will return the server error 500
Internal Server Error, and log the following message:
"/ some / movie / file . mp4 " mp4 moov atom is too large :
12583268 , you may want to increase h l s _ m p 4 _ m a x _ b u f f e r _ s i z e
2.21.1 Summary
The ngx_http_image_filter_module module (0.7.54+) is a filter that
transforms images in JPEG, GIF, and PNG formats.
This module is not built by default, it should be enabled with the
--with-http_image_filter_module configuration parameter.
This module utilizes the libgd library. It is recommended to use the latest
available version of the library.
location / img / {
proxy_pass http :// backend ;
image_filter resize 150 100;
image_filter rotate 90;
error_page 415 = / empty ;
}
location = / empty {
empty_gif ;
}
2.21.3 Directives
image filter
Syntax: image_filter off;
Syntax: image_filter test;
Syntax: image_filter size;
Syntax: image_filter rotate 90 | 180 | 270;
Syntax: image_filter resize width height;
Syntax: image_filter crop width height;
Default off
Context: location
off
turns off module processing in a surrounding location.
test
ensures that responses are images in either JPEG, GIF, or PNG format.
Otherwise, the 415 Unsupported Media Type error is returned.
size
outputs information about images in a JSON format, e.g.:
{ " img " : { " width ": 100 , " height ": 100 , " type ": " gif " } }
{}
rotate 90|180|270
rotates images counter-clockwise by the specified number of degrees.
Parameter value can contain variables. This mode can be used either
alone or along with the resize and crop transformations.
resize width height
proportionally reduces an image to the specified sizes. To reduce by
only one dimension, another dimension can be specified as -. In case
of an error, the server will return code 415 Unsupported Media Type.
Parameter values can contain variables. When used along with the
rotate parameter, the rotation happens after reduction.
crop width height
proportionally reduces an image to the larger side size and crops
extraneous edges by another side. To reduce by only one dimension,
another dimension can be specified as -. In case of an error, the server
will return code 415 Unsupported Media Type. Parameter values can
contain variables. When used along with the rotate parameter, the
rotation happens before reduction.
Sets the maximum size of the buffer used for reading images. When the
size is exceeded the server returns error 415 Unsupported Media Type.
If enabled, final images will be interlaced. For JPEG, final images will be
in progressive JPEG format.
Sets the desired quality of the transformed JPEG images. Acceptable values
are in the range from 1 to 100. Lesser values usually imply both lower image
quality and less data to transfer. The maximum recommended value is 95.
Parameter value can contain variables.
2.22.1 Summary
The ngx_http_index_module module processes requests ending with the
slash character (/). Such requests can also be processed by the ngx http -
autoindex module and ngx http random index module modules.
location / {
index index . $geo . html index . html ;
}
2.22.3 Directives
index
Syntax: index file . . . ;
Default index.html
Context: http, server, location
Defines files that will be used as an index. The file name can contain
variables. Files are checked in the specified order. The last element of the list
can be a file with an absolute path. Example:
It should be noted that using an index file causes an internal redirect, and
the request can be processed in a different location. For example, with the
following configuration:
location = / {
index index . html ;
}
location / {
...
}
2.23.1 Summary
The ngx_http_limit_conn_module module is used to limit the number of
connections per the defined key, in particular, the number of connections from
a single IP address.
Not all connections are counted. A connection is counted only if it has a
request processed by the server and the whole request header has already been
read.
http {
li mit_ conn _zon e $ b i n a r y _ r e m o t e _ a d d r zone = addr :10 m ;
...
server {
...
location / download / {
limit_conn addr 1;
}
2.23.3 Directives
limit conn
Syntax: limit_conn zone number;
Default
Context: http, server, location
Sets the shared memory zone and the maximum allowed number of
connections for a given key value. When this limit is exceeded, the server
will return the 503 Service Temporarily Unavailable error in reply to a
request. For example, the directives
server {
location / download / {
limit_conn addr 1;
}
server {
...
limit_conn perip 10;
limit_conn perserver 100;
}
These directives are inherited from the previous level if and only if there
are no limit_conn directives on the current level.
Sets the desired logging level for cases when the server limits the number
of connections.
Sets parameters for a shared memory zone that will keep states for various
keys. In particular, the state includes the current number of connections. The
key can contain text, variables, and their combination. Requests with an empty
key value are not accounted.
Usage example:
Here, a client IP address serves as a key. Note that instead of $remote addr,
the $binary remote addr variable is used here. The $remote addr variables
size can vary from 7 to 15 bytes. The stored state occupies either 32 or 64
bytes of memory on 32-bit platforms and always 64 bytes on 64-bit platforms.
The $binary remote addr variables size is always 4 bytes. The stored state
always occupies 32 bytes on 32-bit platforms and 64 bytes on 64-bit platforms.
One megabyte zone can keep about 32 thousand 32-byte states or about 16
thousand 64-byte states. If the zone storage is exhausted, the server will return
the 503 Service Temporarily Unavailable error to all further requests.
limit zone
Syntax: limit_zone name $variable size;
Default
Context: http
This directive was made obsolete in version 1.1.8 and was removed in
version 1.7.6. An equivalent limit conn zone directive with a changed syntax
should be used instead:
2.24.1 Summary
The ngx_http_limit_req_module module (0.7.21) is used to limit the
request processing rate per a defined key, in particular, the processing rate
of requests coming from a single IP address. The limitation is done using the
leaky bucket method.
http {
limit_req_zone $ b i n a r y _ r e m o t e _ a d d r zone = one :10 m rate =1 r / s ;
...
server {
...
location / search / {
limit_req zone = one burst =5;
}
2.24.3 Directives
limit req
Syntax: limit_req zone=name [burst=number] [nodelay];
Default
Context: http, server, location
Sets the shared memory zone and the maximum burst size of requests. If the
requests rate exceeds the rate configured for a zone, their processing is delayed
such that requests are processed at a defined rate. Excessive requests are
delayed until their number exceeds the maximum burst size in which case the
request is terminated with an error 503 Service Temporarily Unavailable.
By default, the maximum burst size is equal to zero. For example, the
directives
server {
location / search / {
limit_req zone = one burst =5;
}
allow not more than 1 request per second at an average, with bursts not
exceeding 5 requests.
If delaying of excessive requests while requests are being limited is not
desired, the parameter nodelay should be used:
Sets the desired logging level for cases when the server refuses to process
requests due to rate exceeding, or delays request processing. Logging
level for delays is one point less than for refusals; for example, if
limit_req_log_level notice is specified, delays are logged with the info
level.
Sets parameters for a shared memory zone that will keep states for various
keys. In particular, the state stores the current number of excessive requests.
The key can contain text, variables, and their combination. Requests with an
empty key value are not accounted.
Usage example:
Here, the states are kept in a 10 megabyte zone one, and an average
request processing rate for this zone cannot exceed 1 request per second.
A client IP address serves as a key. Note that instead of $remote addr, the
$binary remote addr variable is used here, that allows decreasing the state size
down to 64 bytes. One megabyte zone can keep about 16 thousand 64-byte
states. If the zone storage is exhausted, the server will return the 503 Service
Temporarily Unavailable error to all further requests.
The rate is specified in requests per second (r/s). If a rate of less than one
request per second is desired, it is specified in request per minute (r/m). For
example, half-request per second is 30r/m.
2.25.1 Summary
The ngx_http_log_module module writes request logs in the specified
format.
Requests are logged in the context of a location where processing ends.
It may be different from the original location, if an internal redirect happens
during request processing.
2.25.3 Directives
access log
Syntax: access_log path [format [buffer=size [flush=time]] [if=condition]];
Syntax: access_log path format gzip[=level] [buffer=size] [flush=time]
[if=condition];
Syntax: access_log syslog:server=address[,parameter=value] [format
[if=condition]];
Syntax: access_log off;
Default logs/access.log combined
Context: http, server, location, if in location, limit except
Sets the path, format, and configuration for a buffered log write. Several
logs can be specified on the same level. Logging to syslog can be configured
by specifying the syslog: prefix in the first parameter. The special value
off cancels all access_log directives on the current level. If the format is not
specified then the predefined combined format is used.
If either the buffer or gzip (1.3.10, 1.2.7) parameter is used, writes to log
will be buffered.
The buffer size must not exceed the size of an atomic write to a disk file.
For FreeBSD this size is unlimited.
if the next log line does not fit into the buffer;
if the buffered data is older than specified by the flush parameter (1.3.10,
1.2.7);
If the gzip parameter is used, then the buffered data will be compressed
before writing to the file. The compression level can be set between 1 (fastest,
less compression) and 9 (slowest, best compression). By default, the buffer
size is equal to 64K bytes, and the compression level is set to 1. Since the data
is compressed in atomic blocks, the log file can be decompressed or read by
zcat at any time.
Example:
For gzip compression to work, nginx must be built with the zlib library.
The file path can contain variables (0.7.6+), but such logs have some
constraints:
the user whose credentials are used by worker processes should have
permissions to create files in a directory with such logs;
the file is opened and closed for each log write. However, since the
descriptors of frequently used files can be stored in a cache, writing to
the old file can continue during the time specified by the open log file -
cache directives valid parameter
during each log write the existence of the requests root directory is
checked, and if it does not exist the log is not created. It is thus a good
idea to specify both root and access_log on the same level:
server {
root / spool / vhost / data / $host ;
access_log / spool / vhost / logs / $host ;
...
log format
Syntax: log_format name string . . . ;
Default combined "..."
Context: http
Header lines sent to a client have the prefix sent_http_, for example,
$sent http content range.
Defines a cache that stores the file descriptors of frequently used logs whose
names contain variables. The directive has the following parameters:
max
sets the maximum number of descriptors in a cache; if the cache becomes
full the least recently used (LRU) descriptors are closed
inactive
sets the time after which the cached descriptor is closed if there were no
access during this time; by default, 10 seconds
min_uses
sets the minimum number of file uses during the time defined by the
inactive parameter to let the descriptor stay open in a cache; by default,
1
valid
sets the time after which it should be checked that the file still exists
with the same name; by default, 60 seconds
off
disables caching
Usage example:
2.26.1 Summary
The ngx_http_map_module module creates variables whose values depend
on values of other variables.
default 0;
example . com 1;
*. example . com 1;
example . org 2;
*. example . org 2;
. example . net 3;
wap .* 4;
}
map $ h tt p _u se r _a g en t $mobile {
default 0;
"~ Opera Mini " 1;
}
2.26.3 Directives
map
Syntax: map string $variable { . . . }
Default
Context: http
Before version 0.9.0 only a single variable could be specified in the first
parameter.
Since variables are evaluated only when they are used, the mere
declaration even of a large number of map variables does not add any extra
costs to request processing.
Parameters inside the map block specify a mapping between source and
resulting values.
Source values are specified as strings or regular expressions (0.9.6).
A regular expression should either start from the ~ symbol for a case-
sensitive matching, or from the ~* symbols (1.0.4) for case-insensitive
matching. A regular expression can contain named and positional captures
that can later be used in other directives along with the resulting variable.
If a source value matches one of the names of special parameters described
below, it should be prefixed with the \ symbol.
The resulting value can be a string or another variable (0.9.0).
The directive also supports three special parameters:
default value
sets the resulting value if the source value matches none of the specified
variants. When default is not specified, the default resulting value will
be an empty string.
hostnames
indicates that source values can be hostnames with a prefix or suffix
mask:
*. example . com 1;
example .* 1;
example . com 1;
*. example . com 1;
can be combined:
. example . com 1;
If the source value matches more than one of the specified variants, e.g.
both a mask and a regular expression match, the first matching variant will be
chosen, in the following order of priority:
5. default value
Sets the bucket size for the map variables hash tables. Default value
depends on the processors cache line size. The details of setting up hash
tables are provided in a separate document.
Sets the maximum size of the map variables hash tables. The details of
setting up hash tables are provided in a separate document.
2.27.1 Summary
The ngx_http_memcached_module module is used to obtain responses from
a memcached server. The key is set in the $memcached key variable. A
response should be put in memcached in advance by means external to nginx.
server {
location / {
set $memcached_key " $uri ? $args ";
memcached_pass host :11211;
error_page 404 502 504 = @fallback ;
}
location @fallback {
proxy_pass http :// backend ;
}
}
2.27.3 Directives
memcached bind
Syntax: memcached_bind address | off;
Default
Context: http, server, location
This directive appeared in version 0.8.22.
inherited from the previous configuration level, which allows the system to
auto-assign the local IP address.
Sets the size of the buffer used for reading the response received from the
memcached server. The response is passed to the client synchronously, as soon
as it is received.
Enables byte-range support for both cached and uncached responses from
the memcached server regardless of the Accept-Ranges field in these responses.
Enables the test for the flag presence in the memcached server response
and sets the Content-Encoding response header field to gzip if the flag is
set.
error
an error occurred while establishing a connection with the server, passing
a request to it, or reading the response header;
timeout
a timeout has occurred while establishing a connection with the server,
passing a request to it, or reading the response header;
invalid_response
a server returned an empty or invalid response;
not_found
a response was not found on the server;
off
disables passing a request to the next server.
One should bear in mind that passing a request to the next server is only
possible if nothing has been sent to a client yet. That is, if an error or timeout
occurs in the middle of the transferring of a response, fixing this is impossible.
The directive also defines what is considered an unsuccessful attempt
of communication with a server. The cases of error, timeout and
invalid_header are always considered unsuccessful attempts, even if they
are not specified in the directive. The case of not_found is never considered
an unsuccessful attempt.
Passing a request to the next server can be limited by the number of tries
and by time.
Limits the time allowed to pass a request to the next server. The 0 value
turns off this limitation.
Limits the number of possible tries for passing a request to the next server.
The 0 value turns off this limitation.
memcached pass
Syntax: memcached_pass address;
Default
Context: location, if in location
2.28.1 Summary
The ngx_http_mp4_module module provides pseudo-streaming server-side
support for MP4 files. Such files typically have the .mp4, .m4v, or .m4a
filename extensions.
Pseudo-streaming works in alliance with a compatible Flash player. The
player sends an HTTP request to the server with the start time specified in
the query string argument (named simply start and specified in seconds), and
the server responds with the stream such that its start position corresponds to
the requested time, for example:
http :// example . com / ele phan ts_d ream . mp4 ? start =238.88
http :// example . com / ele phan ts_d ream . mp4 ? start =238.88& end =555.55
For a matching request with a non-zero start or end argument, nginx will
read the metadata from the file, prepare the stream with the requested time
range, and send it to the client. This has the same overhead as described
above.
If a matching request does not include the start and end arguments, there
is no overhead, and the file is sent simply as a static resource. Some players
also support byte-range requests, and thus do not require this module.
This module is not built by default, it should be enabled with the
--with-http_mp4_module configuration parameter.
location / video / {
mp4 ;
mp 4_bu ffer _siz e 1m;
mp4_max_buffer_size 5m;
mp4_limit_rate on ;
mp4_limit_rate_after 30 s ;
}
2.28.3 Directives
mp4
Syntax: mp4;
Default
Context: location
Sets the initial size of the buffer used for processing MP4 files.
During metadata processing, a larger buffer may become necessary. Its size
cannot exceed the specified size, or else nginx will return the 500 Internal
Server Error server error, and log the following message:
"/ some / movie / file . mp4 " mp4 moov atom is too large :
12583268 , you may want to increase m p 4 _ m a x _ b u f f e r _ s i z e
Sets the initial amount of media data (measured in playback time) after
which the further transmission of the response to a client will be rate limited.
2.29.1 Summary
The ngx_http_perl_module module is used to implement location and
variable handlers in Perl and insert Perl calls into SSI.
This module is not built by default, it should be enabled with the
--with-http_perl_module configuration parameter.
This module requires Perl version 5.6.1 or higher. The C compiler should
be compatible with the one used to build Perl.
http {
perl_set $msie6
sub {
my $r = shift ;
my $ua = $r - > header_in (" User - Agent ") ;
server {
location / {
perl hello :: handler ;
}
}
package hello ;
use nginx ;
sub handler {
my $r = shift ;
if ( - f $r - > filename or -d _ ) {
$r - > print ( $r - > uri , " exists !\ n ") ;
}
return OK ;
}
1;
__END__
2.29.4 Directives
perl
Syntax: perl module::function|sub { . . . };
Default
Context: location, limit except
perl modules
Syntax: perl_modules path;
Default
Context: http
perl require
Syntax: perl_require module;
Default
Context: http
perl set
Syntax: perl_set $variable module::function|sub { . . . };
Default
Context: http
package hello ;
use nginx ;
sub handler {
my $r = shift ;
if ( $r - > ha s _r e qu e st _ bo d y (&post ) ) {
return OK ;
}
return HT T P_ B AD_R E QU E ST ;
}
sub post {
my $r = shift ;
$r - > s e nd _ ht t p_ hea d er ;
$r - > print (" request_body : \"" , $r - > request_body , "\" < br / >") ;
$r - > print (" r e q u e s t _ b o d y _ f i l e : \"" , $r - > request_body_file , "\" < br
/ >\ n ") ;
return OK ;
}
1;
__END__
$r->allow_ranges
enables the use of byte ranges when sending responses.
$r->discard_request_body
instructs nginx to discard the request body.
$r->header_in(field)
returns the value of the specified client request header field.
$r->header_only
determines whether the whole response or only its header should be sent
to the client.
$r->header_out(field, value)
sets a value for the specified response header field.
$r->internal_redirect(uri)
does an internal redirect to the specified uri. An actual redirect happens
after the Perl handler execution is completed.
$r->log_error(errno, message)
writes the specified message into the error log. If errno is non-zero, an
error code and its description will be appended to the message.
$r->print(text, ...)
passes data to a client.
$r->request_body
returns the client request body if it has not been written to a temporary
file. To ensure that the client request body is in memory, its size should
be limited by client max body size, and a sufficient buffer size should be
set using client body buffer size.
$r->request_body_file
returns the name of the file with the client request body. After the
processing, the file should be removed. To always write a request body
to a file, client body in file only should be enabled.
$r->request_method
returns the client request HTTP method.
$r->remote_addr
returns the client IP address.
$r->flush
immediately sends data to the client.
$r->sendfile(name[, offset[, length]])
sends the specified file content to the client. Optional parameters specify
the initial offset and length of the data to be transmitted. The actual
data transmission happens after the Perl handler has completed.
$r->send_http_header([type])
sends the response header to the client. The optional type parameter sets
the value of the Content-Type response header field. If the value is an
empty string, the Content-Type header field will not be sent.
$r->status(code)
sets a response code.
$r->sleep(milliseconds, handler)
sets the specified handler and stops request processing for the specified
time. In the meantime, nginx continues to process other requests. After
the specified time has elapsed, nginx will call the installed handler. Note
that the handler function should be passed by reference. In order to pass
data between handlers, $r->variable() should be used. Example:
package hello ;
use nginx ;
sub handler {
my $r = shift ;
$r - > d i s c a r d _ r e q u e s t _ b o d y ;
$r - > variable (" var " , " OK ") ;
$r - > sleep (1000 , &next ) ;
return OK ;
}
sub next {
my $r = shift ;
$r - > s e nd _ ht t p_ hea d er ;
$r - > print ( $r - > variable (" var ") ) ;
return OK ;
}
1;
__END__
$r->unescape(text)
decodes a text encoded in the %XX form.
$r->uri
returns a request URI.
$r->variable(name[, value])
returns or sets the value of the specified variable. Variables are local to
each request.
2.30.1 Summary
The ngx_http_proxy_module module allows passing requests to another
server.
location / {
proxy_pass http :// localhost :8000;
p ro x y_ s et _ he a de r Host $host ;
p ro x y_ s et _ he a de r X - Real - IP $remote_addr ;
}
2.30.3 Directives
proxy bind
Syntax: proxy_bind address | off;
Default
Context: http, server, location
This directive appeared in version 0.8.22.
Sets the size of the buffer size used for reading the first part of the response
received from the proxied server. This part usually contains a small response
header. By default, the buffer size is equal to the size of one buffer set by the
proxy buffers directive. It can be made smaller, however.
proxy buffering
Syntax: proxy_buffering on | off;
Default on
Context: http, server, location
proxy buffers
Syntax: proxy_buffers number size;
Default 8 4k|8k
Context: http, server, location
Sets the number and size of the buffers used for reading a response from
the proxied server, for a single connection. By default, the buffer size is equal
to one memory page. This is either 4K or 8K, depending on a platform.
When buffering of responses from the proxied server is enabled, limits the
total size of buffers that can be busy sending a response to the client while the
response is not yet fully read. In the meantime, the rest of the buffers can be
used for reading the response and, if needed, buffering part of the response to
a temporary file. By default, size is limited by the size of two buffers set by
the proxy buffer size and proxy buffers directives.
proxy cache
Syntax: proxy_cache zone | off;
Default off
Context: http, server, location
Defines a shared memory zone used for caching. The same zone can be
used in several places. Parameter value can contain variables (1.7.9). The off
parameter disables caching inherited from the previous configuration level.
Defines conditions under which the response will not be taken from a cache.
If at least one value of the string parameters is not empty and is not equal to
0 then the response will not be taken from the cache:
When enabled, only one request at a time will be allowed to populate a new
cache element identified according to the proxy cache key directive by passing
a request to a proxied server. Other requests of the same cache element will
either wait for a response to appear in the cache or the cache lock for this
element to be released, up to the time set by the proxy cache lock timeout
directive.
If the last request passed to the proxied server for populating a new cache
element has not completed for the specified time, one more request may be
passed to the proxied server.
Sets a timeout for proxy cache lock. When the time expires, the request
will be passed to the proxied server, however, the response will not be cached.
If the client request method is listed in this directive then the response will
be cached. GET and HEAD methods are always added to the list, though it is
recommended to specify them explicitly. See also the proxy no cache directive.
Sets the number of requests after which the response will be cached.
Sets the path and other parameters of a cache. Cache data are stored in
files. The file name in a cache is a result of applying the MD5 function to
the cache key. The levels parameter defines hierarchy levels of a cache. For
example, in the following configuration
A cached response is first written to a temporary file, and then the file
is renamed. Starting from version 0.8.9, temporary files and the cache can
be put on different file systems. However, be aware that in this case a file
is copied across two file systems instead of the cheap renaming operation. It
is thus recommended that for any given location both cache and a directory
holding temporary files are put on the same file system. The directory for
temporary files is set based on the use_temp_path parameter (1.7.10). If this
parameter is omitted or set to the value on, the directory set by the proxy -
temp path directive for the given location will be used. If the value is set to
off, temporary files will be put directly in the cache directory.
In addition, all active keys and information about data are stored in a
shared memory zone, whose name and size are configured by the keys_zone
parameter. One megabyte zone can store about 8 thousand keys.
Cached data that are not accessed during the time specified by the
inactive parameter get removed from the cache regardless of their freshness.
By default, inactive is set to 10 minutes.
The special cache manager process monitors the maximum cache size set
by the max_size parameter. When this size is exceeded, it removes the least
recently used data.
A minute after the start the special cache loader process is activated. It
loads information about previously cached data stored on file system into a
cache zone. The loading is done in iterations. During one iteration no more
than loader_files items are loaded (by default, 100). Besides, the duration of
one iteration is limited by the loader_threshold parameter (by default, 200
milliseconds). Between iterations, a pause configured by the loader_sleep
parameter (by default, 50 milliseconds) is made.
Defines conditions under which the request will be considered a cache purge
request. If at least one value of the string parameters is not empty and
is not equal to 0 then the cache entry with a corresponding cache key is
removed. The result of successful operation is indicated by returning the 204
No Content response.
If the cache key of a purge request ends with an asterisk (*), all cache
entries matching the wildcard key will be removed from the cache.
Example configuration:
server {
...
location / {
proxy_pass http :// backend ;
proxy_cache cache_zone ;
pro xy_ cach e_ke y $uri ;
p r o x y _ c a c h e _ p u r g e $purge_method ;
}
}
Sets caching time for different response codes. For example, the following
directives
p r o x y _ c a c h e _ v a l i d 200 302 10 m ;
p r o x y _ c a c h e _ v a l i d 404 1m;
set 10 minutes of caching for responses with codes 200 and 302 and 1 minute
for responses with code 404.
If only caching time is specified
proxy_cache_valid 5m;
p r o x y _ c a c h e _ v a l i d 200 302 10 m ;
p r o x y _ c a c h e _ v a l i d 301 1h;
p r o x y _ c a c h e _ v a l i d any 1m;
Parameters of caching can also be set directly in the response header. This
has higher priority than setting of caching time using the directive.
The X-Accel-Expires header field sets caching time of a response in
seconds. The zero value disables caching for a response. If the value
starts with the @ prefix, it sets an absolute time in seconds since Epoch,
up to which the response may be cached.
If the header does not include the X-Accel-Expires field, parameters of
caching may be set in the header fields Expires or Cache-Control.
If the header includes the Set-Cookie field, such a response will not be
cached.
If the header includes the Vary field with the special value *, such a
response will not be cached (1.7.7). If the header includes the Vary field
with another value, such a response will be cached taking into account
the corresponding request header fields (1.7.7).
Processing of one or more of these response header fields can be disabled using
the proxy ignore headers directive.
The directive can also be specified using regular expressions. In this case,
domain should start from the ~ symbol. A regular expression can contain
named and positional captures, and replacement can reference them:
p r o x y _ c o o k i e _ d o m a i n off ;
p r o x y _ c o o k i e _ d o m a i n localhost example . org ;
p r o x y _ c o o k i e _ d o m a i n www . example . org example . org ;
Sets a text that should be changed in the path attribute of the Set-Cookie
header fields of a proxied server response. Suppose a proxied server returned
the Set-Cookie header field with the attribute path=/two/some/uri/. The
directive
p r o x y _ c o o k i e _ p a t h / two / /;
p r o x y _ c o o k i e _ p a t h $uri / some$uri ;
The directive can also be specified using regular expressions. In this case,
path should either start from the ~ symbol for a case-sensitive matching, or
from the ~* symbols for case-insensitive matching. The regular expression
can contain named and positional captures, and replacement can reference
them:
p r o x y _ c o o k i e _ p a t h / one / /;
p r o x y _ c o o k i e _ p a t h / / two /;
p r o x y _ c o o k i e _ p a t h off ;
p r o x y _ c o o k i e _ p a t h / two / /;
p r o x y _ c o o k i e _ p a t h ~*^/ user /([^/]+) / u / $1 ;
Enables byte-range support for both cached and uncached responses from
the proxied server regardless of the Accept-Ranges field in these responses.
Sets the bucket size for hash tables used by the proxy hide header and
proxy set header directives. The details of setting up hash tables are provided
in a separate document.
Sets the maximum size of hash tables used by the proxy hide header and
proxy set header directives. The details of setting up hash tables are provided
in a separate document.
By default, nginx does not pass the header fields Date, Server, X-Pad,
and X-Accel-... from the response of a proxied server to a client. The
proxy_hide_header directive sets additional fields that will not be passed.
If, on the contrary, the passing of fields needs to be permitted, the proxy -
pass header directive can be used.
Sets the HTTP protocol version for proxying. By default, version 1.0 is
used. Version 1.1 is recommended for use with keepalive connections.
Disables processing of certain response header fields from the proxied server.
The following fields can be ignored: X-Accel-Redirect, X-Accel-Expires,
X-Accel-Limit-Rate (1.1.6), X-Accel-Buffering (1.1.6), X-Accel-Charset
(1.1.6), Expires, Cache-Control, Set-Cookie (0.8.44), and Vary (1.7.7).
If not disabled, processing of these header fields has the following effect:
X-Accel-Expires, Expires, Cache-Control, Set-Cookie, and Vary set
the parameters of response caching;
Limits the speed of reading the response from the proxied server. The rate
is specified in bytes per second. The zero value disables rate limiting. The limit
When buffering of responses from the proxied server is enabled, and the
whole response does not fit into the buffers set by the proxy buffer size and
proxy buffers directives, a part of the response can be saved to a temporary file.
This directive sets the maximum size of the temporary file. The size of data
written to the temporary file at a time is set by the proxy temp file write size
directive.
The zero value disables buffering of responses to temporary files.
This restriction does not apply to responses that will be cached or stored
on disk.
proxy method
Syntax: proxy_method method;
Default
Context: http, server, location
error
an error occurred while establishing a connection with the server, passing
a request to it, or reading the response header;
timeout
a timeout has occurred while establishing a connection with the server,
passing a request to it, or reading the response header;
invalid_header
a server returned an empty or invalid response;
http_500
a server returned a response with the code 500;
http_502
a server returned a response with the code 502;
http_503
a server returned a response with the code 503;
http_504
a server returned a response with the code 504;
http_403
a server returned a response with the code 403;
http_404
a server returned a response with the code 404;
off
disables passing a request to the next server.
One should bear in mind that passing a request to the next server is only
possible if nothing has been sent to a client yet. That is, if an error or timeout
occurs in the middle of the transferring of a response, fixing this is impossible.
The directive also defines what is considered an unsuccessful attempt
of communication with a server. The cases of error, timeout and
invalid_header are always considered unsuccessful attempts, even if they
are not specified in the directive. The cases of http_500, http_502, http_503
and http_504 are considered unsuccessful attempts only if they are specified
in the directive. The cases of http_403 and http_404 are never considered
unsuccessful attempts.
Passing a request to the next server can be limited by the number of tries
and by time.
Limits the time allowed to pass a request to the next server. The 0 value
turns off this limitation.
Limits the number of possible tries for passing a request to the next server.
The 0 value turns off this limitation.
proxy no cache
Syntax: proxy_no_cache string . . . ;
Default
Context: http, server, location
Defines conditions under which the response will not be saved to a cache.
If at least one value of the string parameters is not empty and is not equal to
0 then the response will not be saved:
proxy pass
Syntax: proxy_pass URL;
Default
Context: location, if in location, limit except
Sets the protocol and address of a proxied server and an optional URI to
which a location should be mapped. As a protocol, http or https can be
specified. The address can be specified as a domain name or IP address, and
an optional port:
location / name / {
proxy_pass http ://127.0.0.1/ remote /;
}
When the URI is changed inside a proxied location using the rewrite
directive, and this same configuration will be used to process a request
(break):
location / name / {
rewrite / name /([^/]+) / users ? name = $1 break ;
proxy_pass http ://127.0.0.1;
}
In this case, the URI specified in the directive is ignored and the full
changed request URI is passed to the server.
A server name, its port and the passed URI can also be specified using
variables:
proxy_pass $request ;
In this case, the server name is searched among the described server groups,
and, if not found, is determined using a resolver.
WebSocket proxying requires special configuration and is supported since
version 1.3.13.
Defines a timeout for reading a response from the proxied server. The
timeout is set only between two successive read operations, not for the
transmission of the whole response. If the proxied server does not transmit
anything within this time, the connection is closed.
Indicates whether the original request body is passed to the proxied server.
proxy_pass ...
}
See also the proxy set header and proxy pass request headers directives.
Indicates whether the header fields of the original request are passed to the
proxied server.
proxy_pass ...
}
See also the proxy set header and proxy pass request body directives.
proxy redirect
Syntax: proxy_redirect default;
Syntax: proxy_redirect off;
Syntax: proxy_redirect redirect replacement;
Default default
Context: http, server, location
Sets the text that should be changed in the Location and Refresh header
fields of a proxied server response. Suppose a proxied server returned the
header field Location: http://localhost:8000/two/some/uri/. The
directive
proxy_redirect http :// localhost :8000/ two / http :// frontend / one /;
then the primary servers name and port, if different from 80, will be
inserted.
The default replacement specified by the default parameter uses the
parameters of the location and proxy pass directives. Hence, the two
configurations below are equivalent:
location / one / {
proxy_pass http :// upstream : port / two /;
proxy_redirect default ;
location / one / {
proxy_pass http :// upstream : port / two /;
proxy_redirect http :// upstream : port / two / / one /;
proxy_redirect default ;
proxy_redirect http :// localhost :8000/ /;
proxy_redirect http :// www . example . com / /;
proxy_redirect off ;
proxy_redirect default ;
proxy_redirect http :// localhost :8000/ /;
proxy_redirect http :// www . example . com / /;
Using this directive, it is also possible to add host names to relative redirects
issued by a proxied server:
proxy_redirect / /;
If the directive is set to a non-zero value, nginx will try to minimize the
number of send operations on outgoing connections to a proxied server by
using either NOTE_LOWAT flag of the kqueue method, or the SO_SNDLOWAT socket
option, with the specified size.
This directive is ignored on Linux, Solaris, and Windows.
Sets a timeout for transmitting a request to the proxied server. The timeout
is set only between two successive write operations, not for the transmission of
the whole request. If the proxied server does not receive anything within this
time, the connection is closed.
Allows redefining the request body passed to the proxied server. The value
can contain text, variables, and their combination.
p ro x y_ s et _ he a de r Host $proxy_host ;
p ro x y_ s et _ he a de r Connection close ;
p ro x y_ s et _ he a de r Host $http_host ;
However, if this field is not present in a client request header then nothing
will be passed. In such a case it is better to use the $host variable - its value
equals the server name in the Host request header field or the primary server
name if this field is not present:
p ro x y_ s et _ he a de r Host $host ;
In addition, the server name can be passed together with the port of the
proxied server:
If the value of a header field is an empty string then this field will not be
passed to a proxied server:
Specifies a file with the certificate in the PEM format used for
authentication to a proxied HTTPS server.
Specifies a file with the secret key in the PEM format used for
authentication to a proxied HTTPS server.
Specifies the enabled ciphers for requests to a proxied HTTPS server. The
ciphers are specified in the format understood by the OpenSSL library.
The full list can be viewed using the openssl ciphers command.
Specifies a file with revoked certificates (CRL) in the PEM format used to
verify the certificate of the proxied HTTPS server.
Allows to override the server name used to verify the certificate of the
proxied HTTPS server and to be passed through SNI when establishing a
connection with the proxied HTTPS server.
Specifies a file with passphrases for secret keys where each passphrase is
specified on a separate line. Passphrases are tried in turn when loading the
key.
Enables or disables passing of the server name through TLS Server Name
Indication extension (SNI, RFC 6066) when establishing a connection with the
proxied HTTPS server.
Determines whether SSL sessions can be reused when working with the
proxied server. If the errors SSL3_GET_FINISHED:digest check failed
appear in the logs, try disabling session reuse.
Sets the verification depth in the proxied HTTPS server certificates chain.
proxy store
Syntax: proxy_store on | off | string;
Default off
Context: http, server, location
Enables saving of files to a disk. The on parameter saves files with paths
corresponding to the directives alias or root. The off parameter disables saving
of files. In addition, the file name can be set explicitly using the string with
variables:
proxy_store / data / w w w$ or i gi n al _ ur i ;
location / images / {
root / data / www ;
error_page 404 = / fetch$uri ;
}
location / fetch / {
internal ;
or like this:
location / images / {
root / data / www ;
error_page 404 = @fetch ;
}
location @fetch {
internal ;
Sets access permissions for newly created files and directories, e.g.:
If any group or all access permissions are specified then user permissions
may be omitted:
p r o x y _ s t o r e _ a c c e s s group : rw all : r ;
Limits the size of data written to a temporary file at a time, when buffering
of responses from the proxied server to temporary files is enabled. By default,
size is limited by two buffers set by the proxy buffer size and proxy buffers
directives. The maximum size of a temporary file is set by the proxy max -
temp file size directive.
Defines a directory for storing temporary files with data received from
proxied servers. Up to three-level subdirectory hierarchy can be used
underneath the specified directory. For example, in the following configuration
See also the use_temp_path parameter of the proxy cache path directive.
$proxy host
name and port of a proxied server as specified in the proxy pass directive;
$proxy port
port of a proxied server as specified in the proxy pass directive, or the
protocols default port;
$proxy add x forwarded for
the X-Forwarded-For client request header field with the $remote addr
variable appended to it, separated by a comma. If the
X-Forwarded-For field is not present in the client request header, the
$proxy add x forwarded for variable is equal to the $remote addr vari-
able.
2.31.1 Summary
The ngx_http_random_index_module module processes requests ending
with the slash character (/) and picks a random file in a directory to serve
as an index file. The module is processed before the ngx http index module
module.
This module is not built by default, it should be enabled with the
--with-http_random_index_module configuration parameter.
location / {
random_index on ;
}
2.31.3 Directives
random index
Syntax: random_index on | off;
Default off
Context: location
2.32.1 Summary
The ngx_http_realip_module module is used to change the client address
to the one sent in the specified header field.
This module is not built by default, it should be enabled with the
--with-http_realip_module configuration parameter.
2.32.3 Directives
set real ip from
Syntax: set_real_ip_from address | CIDR | unix:;
Default
Context: http, server, location
IPv6 addresses are supported starting from versions 1.3.0 and 1.2.1.
real ip header
Syntax: real_ip_header field | X-Real-IP | X-Forwarded-For |
proxy_protocol;
Default X-Real-IP
Context: http, server, location
Defines a request header field used to send the address for a replacement.
The proxy_protocol parameter (1.5.12) changes the client address to
the one from the PROXY protocol header. The PROXY protocol must be
real ip recursive
Syntax: real_ip_recursive on | off;
Default off
Context: http, server, location
This directive appeared in versions 1.3.0 and 1.2.1.
If recursive search is disabled, the original client address that matches one of
the trusted addresses is replaced by the last address sent in the request header
field defined by the real ip header directive. If recursive search is enabled, the
original client address that matches one of the trusted addresses is replaced by
the last non-trusted address sent in the request header field.
2.33.1 Summary
The ngx_http_referer_module module is used to block access to a site
for requests with invalid values in the Referer header field. It should be kept
in mind that fabricating a request with an appropriate Referer field value is
quite easy, and so the intended purpose of this module is not to block such
requests thoroughly but to block the mass flow of requests sent by regular
browsers. It should also be taken into consideration that regular browsers may
not send the Referer field even for valid requests.
if ( $ in v al i d_ r ef e re r ) {
return 403;
}
2.33.3 Directives
referer hash bucket size
Syntax: referer_hash_bucket_size size;
Default 64
Context: server, location
This directive appeared in version 1.0.5.
Sets the bucket size for the valid referers hash tables. The details of setting
up hash tables are provided in a separate document.
Sets the maximum size of the valid referers hash tables. The details of
setting up hash tables are provided in a separate document.
valid referers
Syntax: valid_referers none | blocked | server_names | string . . . ;
Default
Context: server, location
Specifies the Referer request header field values that will cause the
embedded $invalid referer variable to be set to an empty string. Otherwise,
the variable will be set to 1. Search for a match is case-insensitive.
Parameters can be as follows:
none
the Referer field is missing in the request header;
blocked
the Referer field is present in the request header, but its value has been
deleted by a firewall or proxy server; such values are strings that do not
start with http:// or https://;
server_names
the Referer request header field contains one of the server names;
arbitrary string
defines a server name and an optional URI prefix. A server name can
have an * at the beginning or end. During the checking, the servers
port in the Referer field is ignored;
regular expression
the first symbol should be a~. It should be noted that an expression will
be matched against the text starting after the http:// or https://.
Example:
2.34.1 Summary
The ngx_http_rewrite_module module is used to change request
URI using regular expressions, return redirects, and conditionally select
configurations.
The ngx_http_rewrite_module module directives are processed in the
following order:
the directives of this module specified on the server level are executed
sequentially;
repeatedly:
a location is searched based on a request URI;
the directives of this module specified inside the found location are
executed sequentially;
the loop is repeated if a request URI was rewritten, but not more
than 10 times.
2.34.2 Directives
break
Syntax: break;
Default
Context: server, location, if
if ( $slow ) {
limit_rate 10 k ;
break ;
}
if
Syntax: if (condition) { . . . }
Default
Context: server, location
Before version 1.0.1, any string starting with 0 was considered a false
value.
if ( $ ht t p_ u se r _a g en t ~ MSIE ) {
rewrite ^(.*) $ / msie / $1 break ;
}
if ( $slow ) {
limit_rate 10 k ;
}
if ( $ in v al i d_ r ef e re r ) {
return 403;
}
return
Syntax: return code [text];
Syntax: return code URL;
Syntax: return URL;
Default
Context: server, location, if
Stops processing and returns the specified code to a client. The non-
standard code 444 closes a connection without sending a response header.
Starting from version 0.8.42, it is possible to specify either a redirect URL
(for codes 301, 302, 303, and 307), or the response body text (for other codes).
A response body text and redirect URL can contain variables. As a special
case, a redirect URL can be specified as a URI local to this server, in which
case the full redirect URL is formed according to the request scheme ($scheme)
and the server name in redirect and port in redirect directives.
In addition, a URL for temporary redirect with the code 302 can be specified
as the sole parameter. Such a parameter should start with the http://,
https://, or $scheme string. A URL can contain variables.
Only the following codes could be returned before version 0.7.51: 204,
400, 402 406, 408, 410, 411, 413, 416, and 500 504.
The code 307 was not treated as a redirect until versions 1.1.16 and 1.0.13.
rewrite
Syntax: rewrite regex replacement [flag];
Default
Context: server, location, if
last
stops processing the current set of ngx_http_rewrite_module directives
and starts a search for a new location matching the changed URI;
break
stops processing the current set of ngx_http_rewrite_module directives
as with the break directive;
redirect
returns a temporary redirect with the 302 code; used if a replacement
string does not start with http:// or https://;
permanent
returns a permanent redirect with the 301 code.
The full redirect URL is formed according to the request scheme ($scheme)
and the server name in redirect and port in redirect directives.
Example:
server {
...
rewrite ^(/ download /.*) / media /(.*) \..* $ $1 / mp3 / $2 . mp3 last ;
rewrite ^(/ download /.*) / audio /(.*) \..* $ $1 / mp3 / $2 . ra last ;
return 403;
...
}
But if these directives are put inside the /download/ location, the last
flag should be replaced by break, or otherwise nginx will make 10 cycles and
return the 500 error:
location / download / {
rewrite ^(/ download /.*) / media /(.*) \..* $ $1 / mp3 / $2 . mp3 break ;
rewrite ^(/ download /.*) / audio /(.*) \..* $ $1 / mp3 / $2 . ra break ;
return 403;
}
rewrite log
Syntax: rewrite_log on | off;
Default off
Context: http, server, location, if
set
Syntax: set $variable value;
Default
Context: server, location, if
Sets a value for the specified variable. The value can contain text, variables,
and their combination.
location / download / {
if ( $forbidden ) {
return 403;
}
if ( $slow ) {
limit_rate 10 k ;
}
rewrite ^/( download /.*) / media /(.*) \..* $ / $1 / mp3 / $2 . mp3 break ;
}
variable $forbidden
check against zero
return 403
end of code
variable $slow
check against zero
match of regular expression
copy "/"
copy $1
copy "/ mp3 /"
copy $2
copy ". mp3 "
end of regular expression
end of code
Note that there are no instructions for the limit rate directive above as it is
unrelated to the ngx_http_rewrite_module module. A separate configuration
is created for the if block. If the condition holds true, a request is assigned
this configuration where limit_rate equals to 10k.
The directive
rewrite ^/( download /.*) / media /(.*) \..* $ / $1 / mp3 / $2 . mp3 break ;
can be made smaller by one instruction if the first slash in the regular
expression is put inside the parentheses:
rewrite ^(/ download /.*) / media /(.*) \..* $ $1 / mp3 / $2 . mp3 break ;
2.35.1 Summary
The ngx_http_scgi_module module allows passing requests to an SCGI
server.
location / {
include scgi_params ;
scgi_pass localhost :9000;
}
2.35.3 Directives
scgi bind
Syntax: scgi_bind address | off;
Default
Context: http, server, location
Sets the size of the buffer used for reading the first part of the response
received from the SCGI server. This part usually contains a small response
header. By default, the buffer size is equal to the size of one buffer set by the
scgi buffers directive. It can be made smaller, however.
scgi buffering
Syntax: scgi_buffering on | off;
Default on
Context: http, server, location
scgi buffers
Syntax: scgi_buffers number size;
Default 8 4k|8k
Context: http, server, location
Sets the number and size of the buffers used for reading a response from
the SCGI server, for a single connection. By default, the buffer size is equal to
one memory page. This is either 4K or 8K, depending on a platform.
When buffering of responses from the SCGI server is enabled, limits the
total size of buffers that can be busy sending a response to the client while the
response is not yet fully read. In the meantime, the rest of the buffers can be
used for reading the response and, if needed, buffering part of the response to
a temporary file. By default, size is limited by the size of two buffers set by
the scgi buffer size and scgi buffers directives.
scgi cache
Syntax: scgi_cache zone | off;
Default off
Context: http, server, location
Defines a shared memory zone used for caching. The same zone can be
used in several places. Parameter value can contain variables (1.7.9). The off
parameter disables caching inherited from the previous configuration level.
Defines conditions under which the response will not be taken from a cache.
If at least one value of the string parameters is not empty and is not equal to
0 then the response will not be taken from the cache:
When enabled, only one request at a time will be allowed to populate a new
cache element identified according to the scgi cache key directive by passing a
request to an SCGI server. Other requests of the same cache element will either
wait for a response to appear in the cache or the cache lock for this element
to be released, up to the time set by the scgi cache lock timeout directive.
If the last request passed to the SCGI server for populating a new cache
element has not completed for the specified time, one more request may be
passed to the SCGI server.
Sets a timeout for scgi cache lock. When the time expires, the request will
be passed to the SCGI server, however, the response will not be cached.
If the client request method is listed in this directive then the response will
be cached. GET and HEAD methods are always added to the list, though it is
recommended to specify them explicitly. See also the scgi no cache directive.
Sets the number of requests after which the response will be cached.
Sets the path and other parameters of a cache. Cache data are stored in
files. The file name in a cache is a result of applying the MD5 function to
the cache key. The levels parameter defines hierarchy levels of a cache. For
example, in the following configuration
sc gi_c ache _pat h / data / nginx / cache levels =1:2 keys_zone = one :10 m ;
A cached response is first written to a temporary file, and then the file is
renamed. Starting from version 0.8.9, temporary files and the cache can be put
on different file systems. However, be aware that in this case a file is copied
across two file systems instead of the cheap renaming operation. It is thus
recommended that for any given location both cache and a directory holding
temporary files are put on the same file system. A directory for temporary
Defines conditions under which the request will be considered a cache purge
request. If at least one value of the string parameters is not empty and
is not equal to 0 then the cache entry with a corresponding cache key is
removed. The result of successful operation is indicated by returning the 204
No Content response.
If the cache key of a purge request ends with an asterisk (*), all cache
entries matching the wildcard key will be removed from the cache.
Example configuration:
server {
...
location / {
scgi_pass backend ;
scgi_cache cache_zone ;
scgi_cache_key $uri ;
s cg i _c a ch e _p ur g e $purge_method ;
}
}
Sets caching time for different response codes. For example, the following
directives
s cg i _c a ch e _v a li d 200 302 10 m ;
s cg i _c a ch e _v a li d 404 1m;
set 10 minutes of caching for responses with codes 200 and 302 and 1 minute
for responses with code 404.
If only caching time is specified
s cg i _c a ch e _v a li d 5 m ;
s cg i _c a ch e _v a li d 200 302 10 m ;
s cg i _c a ch e _v a li d 301 1h;
s cg i _c a ch e _v a li d any 1m;
Parameters of caching can also be set directly in the response header. This
has higher priority than setting of caching time using the directive.
If the header includes the Set-Cookie field, such a response will not be
cached.
If the header includes the Vary field with the special value *, such a
response will not be cached (1.7.7). If the header includes the Vary field
with another value, such a response will be cached taking into account
the corresponding request header fields (1.7.7).
Processing of one or more of these response header fields can be disabled using
the scgi ignore headers directive.
Enables byte-range support for both cached and uncached responses from
the SCGI server regardless of the Accept-Ranges field in these responses.
By default, nginx does not pass the header fields Status and X-Accel-...
from the response of an SCGI server to a client. The scgi_hide_header
directive sets additional fields that will not be passed. If, on the contrary, the
passing of fields needs to be permitted, the scgi pass header directive can be
used.
Disables processing of certain response header fields from the SCGI server.
The following fields can be ignored: X-Accel-Redirect, X-Accel-Expires,
X-Accel-Limit-Rate (1.1.6), X-Accel-Buffering (1.1.6), X-Accel-Charset
(1.1.6), Expires, Cache-Control, Set-Cookie (0.8.44), and Vary (1.7.7).
If not disabled, processing of these header fields has the following effect:
Limits the speed of reading the response from the SCGI server. The rate is
specified in bytes per second. The zero value disables rate limiting. The limit
is set per a request, and so if nginx simultaneously opens two connections to
the SCGI server, the overall rate will be twice as much as the specified limit.
The limitation works only if buffering of responses from the SCGI server is
enabled.
When buffering of responses from the SCGI server is enabled, and the
whole response does not fit into the buffers set by the scgi buffer size and
scgi buffers directives, a part of the response can be saved to a temporary file.
This directive sets the maximum size of the temporary file. The size of data
written to the temporary file at a time is set by the scgi temp file write size
directive.
The zero value disables buffering of responses to temporary files.
This restriction does not apply to responses that will be cached or stored
on disk.
error
an error occurred while establishing a connection with the server, passing
a request to it, or reading the response header;
timeout
a timeout has occurred while establishing a connection with the server,
passing a request to it, or reading the response header;
invalid_header
a server returned an empty or invalid response;
http_500
a server returned a response with the code 500;
http_503
a server returned a response with the code 503;
http_403
a server returned a response with the code 403;
http_404
a server returned a response with the code 404;
off
disables passing a request to the next server.
One should bear in mind that passing a request to the next server is only
possible if nothing has been sent to a client yet. That is, if an error or timeout
occurs in the middle of the transferring of a response, fixing this is impossible.
The directive also defines what is considered an unsuccessful attempt
of communication with a server. The cases of error, timeout and
invalid_header are always considered unsuccessful attempts, even if they
are not specified in the directive. The cases of http_500 and http_503 are
considered unsuccessful attempts only if they are specified in the directive. The
cases of http_403 and http_404 are never considered unsuccessful attempts.
Passing a request to the next server can be limited by the number of tries
and by time.
Limits the time allowed to pass a request to the next server. The 0 value
turns off this limitation.
Limits the number of possible tries for passing a request to the next server.
The 0 value turns off this limitation.
scgi no cache
Syntax: scgi_no_cache string . . . ;
Default
Context: http, server, location
Defines conditions under which the response will not be saved to a cache.
If at least one value of the string parameters is not empty and is not equal to
0 then the response will not be saved:
scgi param
Syntax: scgi_param parameter value [if_not_empty];
Default
Context: http, server, location
Sets a parameter that should be passed to the SCGI server. The value can
contain text, variables, and their combination. These directives are inherited
from the previous level if and only if there are no scgi_param directives defined
on the current level.
Standard CGI environment variables should be provided as SCGI headers,
see the scgi_params file provided in the distribution:
location / {
include scgi_params ;
...
}
scgi pass
Syntax: scgi_pass address;
Default
Context: location, if in location
Defines a timeout for reading a response from the SCGI server. The timeout
is set only between two successive read operations, not for the transmission of
the whole response. If the SCGI server does not transmit anything within this
time, the connection is closed.
Indicates whether the original request body is passed to the SCGI server.
See also the scgi pass request headers directive.
Indicates whether the header fields of the original request are passed to the
SCGI server. See also the scgi pass request body directive.
Sets a timeout for transmitting a request to the SCGI server. The timeout
is set only between two successive write operations, not for the transmission
of the whole request. If the SCGI server does not receive anything within this
time, the connection is closed.
scgi store
Syntax: scgi_store on | off | string;
Default off
Context: http, server, location
Enables saving of files to a disk. The on parameter saves files with paths
corresponding to the directives alias or root. The off parameter disables saving
of files. In addition, the file name can be set explicitly using the string with
variables:
scgi_store / data / w ww $ or i gi n al _ ur i ;
location / images / {
root / data / www ;
error_page 404 = / fetch$uri ;
}
location / fetch / {
internal ;
scgi_store on ;
s c g i _ s t o r e _ a c c e s s user : rw group : rw all : r ;
scgi_temp_path / data / temp ;
Sets access permissions for newly created files and directories, e.g.:
If any group or all access permissions are specified then user permissions
may be omitted:
s c g i _ s t o r e _ a c c e s s group : rw all : r ;
Limits the size of data written to a temporary file at a time, when buffering
of responses from the SCGI server to temporary files is enabled. By default, size
is limited by two buffers set by the scgi buffer size and scgi buffers directives.
The maximum size of a temporary file is set by the scgi max temp file size
directive.
Defines a directory for storing temporary files with data received from SCGI
servers. Up to three-level subdirectory hierarchy can be used underneath the
specified directory. For example, in the following configuration
See also the use_temp_path parameter of the scgi cache path directive.
2.36.1 Summary
The ngx_http_secure_link_module module (0.7.18) is used to check
authenticity of requested links, protect resources from unauthorized access,
and limit link lifetime.
The authenticity of a requested link is verified by comparing the checksum
value passed in a request with the value computed for the request. If a link has
a limited lifetime and the time has expired, the link is considered outdated.
The status of these checks is made available in the $secure link variable.
The module provides two alternative operation modes. The first mode is
enabled by the secure link secret directive and is used to check authenticity
of requested links as well as protect resources from unauthorized access.
The second mode (0.8.50) is enabled by the secure link and secure link md5
directives and is also used to limit lifetime of links.
This module is not built by default, it should be enabled with the
--with-http_secure_link_module configuration parameter.
2.36.2 Directives
secure link
Syntax: secure_link expression;
Default
Context: http, server, location
Defines a string with variables from which the checksum value and lifetime
of a link will be extracted.
Variables used in an expression are usually associated with a request; see
example below.
The checksum value extracted from the string is compared with the MD5
hash value of the expression defined by the secure link md5 directive. If the
checksums are different, the $secure link variable is set to an empty string.
If the checksums are the same, the link lifetime is checked. If the link has a
limited lifetime and the time has expired, the $secure link variable is set to
0. Otherwise, it is set to 1. The MD5 hash value passed in a request is
encoded in base64url.
If a link has a limited lifetime, the expiration time is set in seconds
since Epoch (Thu, 01 Jan 1970 00:00:00 GMT). The value is specified in the
expression after the MD5 hash, and is separated by a comma. The expiration
time passed in a request is available through the $secure link expires variable
for a use in the secure link md5 directive. If the expiration time is not specified,
a link has the unlimited lifetime.
Defines an expression for which the MD5 hash value will be computed and
compared with the value passed in a request.
The expression should contain the secured part of a link (resource) and a
secret ingredient. If the link has a limited lifetime, the expression should also
contain $secure link expires.
To prevent unauthorized access, the expression may contain some
information about the client, such as its address and browser version.
Example:
location / s / {
secure_link $arg_md5 , $arg_expires ;
se cure _lin k_md 5 " $ s e c u r e _ l i n k _ e x p i r e s $ u r i $ r e m o t e _ a d d r secret ";
if ( $secure_link = "") {
return 403;
}
if ( $secure_link = "0") {
return 410;
}
...
}
/prefix/hash/link
location / p / {
s e c u r e _ l i n k _ s e c r e t secret ;
if ( $secure_link = "") {
return 403;
}
location / secure / {
internal ;
}
2.37.1 Summary
The ngx_http_session_log_module module enables logging sessions (that
is, aggregates of multiple HTTP requests) instead of individual HTTP requests.
location / media / {
session_log one ;
}
2.37.3 Directives
session log format
Syntax: session_log_format name string . . . ;
Default combined "..."
Context: http
Specifies the output format of a log. The value of the $body bytes sent
variable is aggregated across all requests in a session. The values of all other
variables available for logging correspond to the first request in a session.
Sets the path to a log file and configures the shared memory zone that is
used to store currently active sessions.
A session is considered active for as long as the time elapsed since the last
request in the session does not exceed the specified timeout (by default, 30
seconds). Once a session is no longer active, it is written to the log.
The id parameter identifies the session to which a request is mapped. The
id parameter is set to the hexadecimal representation of an MD5 hash (for
example, obtained from a cookie using variables). If this parameter is not
specified or does not represent the valid MD5 hash, nginx computes the MD5
hash from the value of the md5 parameter and creates a new session using this
hash. Both the id and md5 parameters can contain variables.
The format parameter sets the custom session log format configured by
the session log format directive. If format is not specified, the predefined
combined format is used.
session log
Syntax: session_log name | off;
Default off
Context: http, server, location
Enables the use of the specified session log. The special value off cancels
all session_log directives inherited from the previous configuration level.
$session log id
current session ID;
$session log binary id
current session ID in binary form (16 bytes).
2.38.1 Summary
The ngx_http_spdy_module module provides experimental support for
SPDY. Currently, draft 3.1 of SPDY protocol is implemented.
server {
listen 443 ssl spdy ;
2.38.4 Directives
spdy chunk size
Syntax: spdy_chunk_size size;
Default 8k
Context: http, server, location
This directive appeared in version 1.5.9.
Sets the maximum size of chunks into which the response body is sliced. A
too low value results in higher overhead. A too high value impairs prioritization
due to HOL blocking.
$spdy
SPDY protocol version for SPDY connections, or an empty string
otherwise;
$spdy request priority
request priority for SPDY connections, or an empty string otherwise.
2.39.1 Summary
The ngx_http_split_clients_module module creates variables suitable
for A/B testing, also known as split testing.
http {
split_clients " $ { remote_addr } AAA " $variant {
0.5% . one ;
2.0% . two ;
* "";
}
server {
location / {
index index$ { variant }. html ;
2.39.3 Directives
split clients
Syntax: split_clients string $variable { . . . }
Default
Context: http
2.40.1 Summary
The ngx_http_ssi_module module is a filter that processes SSI (Server
Side Includes) commands in responses passing through it. Currently, the list
of supported SSI commands is incomplete.
location / {
ssi on ;
...
}
2.40.3 Directives
ssi
Syntax: ssi on | off;
Default off
Context: http, server, location, if in location
Sets the minimum size for parts of a response stored on disk, starting from
which it makes sense to send them using sendfile.
ssi types
Syntax: ssi_types mime-type . . . ;
Default text/html
Context: http, server, location
Example:
config
Sets some parameters used during SSI processing, namely:
errmsg
a string that is output if an error occurs during SSI processing. By
default, the following string is output:
timefmt
a format string passed to the strftime function used to output date
and time. By default, the following format is used:
"% A , %d -% b -% Y % H :% M :% S % Z "
<! - -# echo var =" name " default ="no " -->
<! - -# if expr =" $name " - - > <! - -# echo var =" name " - - > <! - -#
else -->no <! - -# endif -->
if
Performs a conditional inclusion. The following commands are
supported:
Only one level of nesting is currently supported. The command has the
following parameter:
expr
expression. An expression can be:
variable existence check:
<! - -# if expr =" $name = /(.+) @ (? P < domain >.+) /" -->
<! - -# echo var ="1" -->
<! - -# echo var =" domain " -->
<! - -# endif -->
include
Includes the result of another request into a response. The command has
the following parameters:
file
specifies an included file, for example:
virtual
specifies an included request, for example:
<! - -# include virtual ="/ remote / body . php ? argument = value " -->
stub
a non-standard parameter that names the block whose content will
be output if the included request results in an empty body or if an
error occurs during the request processing, for example:
<! - -# block name =" one " - - >& nbsp ; <! - -# endblock -->
<! - -# include virtual ="/ remote / body . php ? argument = value " stub ="
one " -->
<! - -# include virtual ="/ remote / body . php ? argument = value " wait ="
yes " -->
set
a non-standard parameter that instructs to write a successful result
of request processing to the specified variable, for example:
<! - -# include virtual ="/ remote / body . php ? argument = value " set ="
one " -->
2.41.1 Summary
The ngx_http_ssl_module module provides the necessary support for
HTTPS.
This module is not built by default, it should be enabled with the
--with-http_ssl_module configuration parameter.
worker_processes auto;
http {
...
server {
listen 443 ssl ;
keepalive_timeout 70;
...
}
2.41.3 Directives
ssl
Syntax: ssl on | off;
Default off
Context: http, server
ssl certificate
Syntax: ssl_certificate file;
Default
Context: http, server
Specifies a file with the certificate in the PEM format for the given virtual
server. If intermediate certificates should be specified in addition to a primary
certificate, they should be specified in the same file in the following order: the
primary certificate comes first, then the intermediate certificates. A secret key
in the PEM format may be placed in the same file.
It should be kept in mind that due to the HTTPS protocol limitations
virtual servers should listen on different IP addresses:
server {
listen 1 9 2. 1 68 . 1. 1 :4 4 3;
server_name one . example . com ;
ss l_ce rtif icat e / usr / local / nginx / conf / one . example . com . cert ;
...
}
server {
listen 1 9 2. 1 68 . 1. 2 :4 4 3;
server_name two . example . com ;
ss l_ce rtif icat e / usr / local / nginx / conf / two . example . com . cert ;
...
}
otherwise the first servers certificate will be issued for the second site.
Specifies a file with the secret key in the PEM format for the given virtual
server.
ssl ciphers
Syntax: ssl_ciphers ciphers;
Default HIGH:!aNULL:!MD5
Context: http, server
Specifies the enabled ciphers. The ciphers are specified in the format
understood by the OpenSSL library, for example:
ssl_ciphers ALL :! aNULL :! EXPORT56 : RC4 + RSA :+ HIGH :+ MEDIUM :+ LOW :+ SSLv2 :+ EXP ;
The full list can be viewed using the openssl ciphers command.
ssl crl
Syntax: ssl_crl file;
Default
Context: http, server
This directive appeared in version 0.8.7.
Specifies a file with revoked certificates (CRL) in the PEM format used to
verify client certificates.
ssl dhparam
Syntax: ssl_dhparam file;
Default
Context: http, server
This directive appeared in version 0.7.2.
Specifies a file with passphrases for secret keys where each passphrase is
specified on a separate line. Passphrases are tried in turn when loading the
key.
Example:
http {
s s l _ p a s s w o r d _ f i l e / etc / keys / global . pass ;
...
server {
server_name www1 . example . com ;
s s l _ c e r t i f i c a t e _ k e y / etc / keys / first . key ;
}
server {
server_name www2 . example . com ;
Specifies that server ciphers should be preferred over client ciphers when
using the SSLv3 and TLS protocols.
ssl protocols
Syntax: ssl_protocols [SSLv2] [SSLv3] [TLSv1] [TLSv1.1] [TLSv1.2];
Default SSLv3 TLSv1 TLSv1.1 TLSv1.2
Context: http, server
Sets the types and sizes of caches that store session parameters. A cache
can be of any of the following types:
off
the use of a session cache is strictly prohibited: nginx explicitly tells a
client that sessions may not be reused.
none
the use of a session cache is gently disallowed: nginx tells a client that
sessions may be reused, but does not actually store session parameters
in the cache.
builtin
a cache built in OpenSSL; used by one worker process only. The cache
size is specified in sessions. If size is not given, it is equal to 20480
sessions. Use of the built-in cache can cause memory fragmentation.
shared
a cache shared between all worker processes. The cache size is specified
in bytes; one megabyte can store about 4000 sessions. Each shared cache
should have an arbitrary name. A cache with the same name can be used
in several virtual servers.
Both cache types can be used simultaneously, for example:
but using only shared cache without the built-in cache should be more
efficient.
Sets a file with the secret key used to encrypt and decrypt TLS session
tickets. The directive is necessary if the same key has to be shared between
multiple servers. By default, a randomly generated key is used.
If several keys are specified, only the first key is used to encrypt TLS session
tickets. This allows configuring key rotation, for example:
s s l _ s e s s i o n _ t i c k e t _ k e y current . key ;
s s l _ s e s s i o n _ t i c k e t _ k e y previous . key ;
The file must contain 48 bytes of random data and can be created using
the following command:
Specifies a time during which a client may reuse the session parameters
stored in a cache.
ssl stapling
Syntax: ssl_stapling on | off;
Default off
Context: http, server
This directive appeared in version 1.3.7.
ssl_stapling on ;
resolver 192.0.2.1;
For the OCSP stapling to work, the certificate of the server certificate
issuer should be known. If the ssl certificate file does not contain intermediate
certificates, the certificate of the server certificate issuer should be present in
the ssl trusted certificate file.
For a resolution of the OCSP responder hostname, the resolver directive
should also be specified.
When set, the stapled OCSP response will be taken from the specified file
instead of querying the OCSP responder specified in the server certificate.
The file should be in the DER format as produced by the openssl ocsp
command.
495
an error has occurred during the client certificate verification;
496
a client has not presented the required certificate;
497
a regular request has been sent to the HTTPS port.
The redirection happens after the request is fully parsed and the variables,
such as $request uri, $uri, $args and others, are available.
$ssl cipher
returns the string of ciphers used for an established SSL connection;
$ssl client cert
returns the client certificate in the PEM format for an established SSL
connection, with each line except the first prepended with the tab
character; this is intended for the use in the proxy set header directive;
$ssl client fingerprint
returns the SHA1 fingerprint of the client certificate for an established
SSL connection (1.7.1);
$ssl client raw cert
returns the client certificate in the PEM format for an established SSL
connection;
$ssl client serial
returns the serial number of the client certificate for an established SSL
connection;
$ssl client s dn
returns the subject DN string of the client certificate for an established
SSL connection;
$ssl client i dn
returns the issuer DN string of the client certificate for an established
SSL connection;
$ssl client verify
returns the result of client certificate verification: SUCCESS, FAILED,
and NONE if a certificate was not present;
$ssl protocol
returns the protocol of an established SSL connection;
2.42.1 Summary
The ngx_http_status_module module provides access to various status
information.
http {
upstream backend {
zone http_backend 64 k ;
server {
server_name backend . example . com ;
location / {
proxy_pass http :// backend ;
proxy_cache cache_backend ;
health_check ;
}
status_zone server_backend;
}
server {
listen 127.0.0.1;
location / upstream_conf {
upstream_conf ;
}
location / status {
status ;
}
stream {
upstream backend {
zone stream_backend 64 k ;
server {
listen 12 7. 0 .0 . 1: 1 23 4 5;
proxy_pass backend ;
status_zone server_backend;
health_check ;
}
}
2.42.3 Directives
status
Syntax: status;
Default
Context: location
status format
Syntax: status_format json;
Syntax: status_format jsonp [callback];
Default json
Context: http, server, location
status zone
Syntax: status_zone zone;
Default
Context: server
2.42.4 Data
The following status information is provided:
version
Version of the provided data set. The current version is 5.
nginx_version
Version of nginx.
address
The address of the server that accepted status request.
generation
The total number of configuration reloads.
load_timestamp
Time of the last reload of configuration, in milliseconds since Epoch.
timestamp
Current time in milliseconds since Epoch.
processes
respawned
The total number of abnormally terminated and respawned child
processes.
connections
accepted
The total number of accepted client connections.
dropped
The total number of dropped client connections.
active
The current number of active client connections.
idle
The current number of idle client connections.
requests
total
The total number of client requests.
current
The current number of client requests.
server_zones
For each status zone:
processing
The number of client requests that are currently being processed.
requests
The total number of client requests received from clients.
responses
total
The total number of responses sent to clients.
1xx, 2xx, 3xx, 4xx, 5xx
The number of responses with status codes 1xx, 2xx, 3xx, 4xx,
and 5xx.
received
The total number of bytes received from clients.
sent
The total number of bytes sent to clients.
upstreams
For each server in the dynamically configurable group, the following data
are provided:
id
The ID of the server.
server
An address of the server.
backup
A boolean value indicating whether the server is a backup server.
weight
Weight of the server.
state
Current state, which may be one of up, draining, down,
unavail, or unhealthy.
active
The current number of active connections.
max_conns
The max conns limit for the server.
requests
The total number of client requests forwarded to this server.
responses
total
The total number of responses obtained from this server.
1xx, 2xx, 3xx, 4xx, 5xx
The number of responses with status codes 1xx, 2xx, 3xx, 4xx,
and 5xx.
sent
The total number of bytes sent to this server.
received
The total number of bytes received from this server.
fails
The total number of unsuccessful attempts to communicate with
the server.
unavail
How many times the server became unavailable for client requests
(state unavail) due to the number of unsuccessful attempts
reaching the max fails threshold.
health_checks
checks
The total number of health check requests made.
fails
The number of failed health checks.
unhealthy
How many times the server became unhealthy (state
unhealthy).
last_passed
Boolean indicating if the last health check request was
successful and passed tests.
downtime
Total time the server was in the unavail and unhealthy states.
downstart
The time (in milliseconds since Epoch) when the server became
unavail or unhealthy.
selected
The time (in milliseconds since Epoch) when the server was last
selected to process a request (1.7.5).
header_time
The average time to get the response header from the server (1.7.10).
The field is available when using the least time load balancing
method.
response_time
The average time to get the full response from the server (1.7.10).
The field is available when using the least time load balancing
method.
caches
For each cache (configured by proxy cache path and the likes):
size
The current size of the cache.
max_size
The limit on the maximum size of the cache specified in the
configuration.
cold
2.42.5 Compatibility
The keepalive field of an upstream server was removed in version 5.
The header time and response time fields in upstreams were added in
version 5.
The server zones, caches, and load timestamp status data were added in
version 2.
2.43.1 Summary
The ngx_http_stub_status_module module provides access to basic
status information.
This module is not built by default, it should be enabled with the
--with-http_stub_status_module configuration parameter.
location / basic_status {
stub_status ;
}
This configuration creates a simple web page with basic status data which
may look like as follows:
2.43.3 Directives
stub status
Syntax: stub_status;
Default
Context: server, location
2.43.4 Data
The following status information is provided:
Active connections
The current number of active client connections including Waiting
connections.
accepts
The total number of accepted client connections.
handled
The total number of handled connections. Generally, the parameter value
is the same as accepts unless some resource limits have been reached
(for example, the worker connections limit).
requests
The total number of client requests.
Reading
The current number of connections where nginx is reading the request
header.
Writing
The current number of connections where nginx is writing the response
back to the client.
Waiting
The current number of idle client connections waiting for a request.
$connections active
same as the Active connections value;
$connections reading
same as the Reading value;
$connections writing
same as the Writing value;
$connections waiting
same as the Waiting value.
2.44.1 Summary
The ngx_http_sub_module module is a filter that modifies a response by
replacing one specified string by another.
This module is not built by default, it should be enabled with the
--with-http_sub_module configuration parameter.
location / {
sub_filter </ head >
</ head > < script language =" javascript " src =" $script " > </ script > ;
su b_fi lter _onc e on ;
}
2.44.3 Directives
sub filter
Syntax: sub_filter string replacement;
Default
Context: http, server, location
2.45.1 Summary
The ngx_http_upstream_module module is used to define groups of servers
that can be referenced by the proxy pass, fastcgi pass, uwsgi pass, scgi pass,
and memcached pass directives.
upstream backend {
server backend1 . example . com weight =5;
server backend2 . example . com :8080;
server unix :/ tmp / backend3 ;
server {
location / {
proxy_pass http ://backend ;
}
}
resolver 10.0.0.1;
upstream dynamic {
zone up s tr e am _ dy n am i c 64 k ;
server {
location / {
proxy_pass http ://dynamic ;
health_check ;
}
}
2.45.3 Directives
upstream
Syntax: upstream name { . . . }
Default
Context: http
upstream backend {
server backend1 . example . com weight =5;
server 127.0.0.1:8080 max_fails =3 fail_timeout =30 s ;
server unix :/ tmp / backend3 ;
server
Syntax: server address [parameters];
Default
Context: upstream
Defines the address and other parameters of a server. The address can
be specified as a domain name or IP address, with an optional port, or as
a UNIX-domain socket path specified after the unix: prefix. If a port is
not specified, the port 80 is used. A domain name that resolves to several IP
addresses defines multiple servers at once.
weight=number
sets the weight of the server, by default, 1.
max_fails=number
sets the number of unsuccessful attempts to communicate with the
server that should happen in the duration set by the fail_timeout
parameter to consider the server unavailable for a duration also set by
the fail_timeout parameter. By default, the number of unsuccessful
attempts is set to 1. The zero value disables the accounting of
attempts. What is considered an unsuccessful attempt is defined by
the proxy next upstream, fastcgi next upstream, uwsgi next upstream,
scgi next upstream, and memcached next upstream directives.
fail_timeout=time
sets
the time during which the specified number of unsuccessful attempts
to communicate with the server should happen to consider the server
unavailable;
and the period of time the server will be considered unavailable.
By default, the parameter is set to 10 seconds.
backup
marks the server as a backup server. It will be passed requests when the
primary servers are unavailable.
down
marks the server as permanently unavailable.
max_conns=number
limits the maximum number of simultaneous connections to the proxied
server (1.5.9). Default value is zero, meaning there is no limit.
resolve
monitors changes of the IP addresses that correspond to a domain name
of the server, and automatically modifies the upstream configuration
without the need of restarting nginx (1.5.12).
In order for this parameter to work, the resolver directive must be
specified in the http block. Example:
http {
resolver 10.0.0.1;
upstream u {
zone ...;
...
server example . com resolve ;
}
}
route=string
sets the server route name.
slow_start=time
sets the time during which the server will recover its weight from zero
to a nominal value, when unhealthy server becomes healthy, or when
the server becomes available after a period of time it was considered
unavailable. Default value is zero, i.e. slow start is disabled.
zone
Syntax: zone name size;
Default
Context: upstream
Defines the name and size of the shared memory zone that keeps the groups
configuration and run-time state that are shared between worker processes.
Such groups allow changing the group membership or modifying the settings
of a particular server without the need of restarting nginx. The configuration
is accessible via a special location handled by upstream conf.
hash
Syntax: hash key [consistent];
Default
Context: upstream
This directive appeared in version 1.7.2.
Specifies a load balancing method for a server group where the client-server
mapping is based on the hashed key value. The key can contain text, variables,
and their combinations. Note that adding or removing a server from the group
may result in remapping most of the keys to different servers. The method is
compatible with the Cache::Memcached Perl library.
If the consistent parameter is specified the ketama consistent hashing
method will be used instead. The method ensures that only a few keys will be
remapped to different servers when a server is added to or removed from the
group. This helps to achieve a higher cache hit ratio for caching servers. The
method is compatible with the Cache::Memcached::Fast Perl library with the
ketama points parameter set to 160.
ip hash
Syntax: ip_hash;
Default
Context: upstream
Specifies that a group should use a load balancing method where requests
are distributed between servers based on client IP addresses. The first three
octets of the client IPv4 address, or the entire IPv6 address, are used as a
hashing key. The method ensures that requests from the same client will
always be passed to the same server except when this server is unavailable. In
the latter case client requests will be passed to another server. Most probably,
it will always be the same server as well.
IPv6 addresses are supported starting from versions 1.3.2 and 1.2.2.
upstream backend {
ip_hash ;
Until versions 1.3.1 and 1.2.2, it was not possible to specify a weight for
servers using the ip_hash load balancing method.
keepalive
Syntax: keepalive connections;
Default
Context: upstream
This directive appeared in version 1.1.4.
It should be particularly noted that the keepalive directive does not limit
the total number of connections to upstream servers that an nginx worker
process can open. The connections parameter should be set to a number
small enough to let upstream servers process new incoming connections as
well.
upstream m e m c a c h e d _ b a c k e n d {
server 12 7 .0 . 0. 1: 1 12 1 1;
server 10 .0. 0.2: 1121 1;
keepalive 32;
}
server {
...
location / memcached / {
set $memcached_key $uri ;
memcached_pass m e m c a c h e d _ b a c k e n d ;
}
For HTTP, the proxy http version directive should be set to 1.1 and the
Connection header field should be cleared:
upstream http_backend {
server 12 7.0 .0.1 :808 0;
keepalive 16;
}
server {
...
location / http / {
proxy_pass http :// http_backend ;
p r o x y _ h t t p _ v e r s i o n 1.1;
p ro x y_ s et _ he ad e r Connection "";
...
}
}
For FastCGI servers, it is required to set fastcgi keep conn for keepalive
connections to work:
keepalive 8;
}
server {
...
location / fastcgi / {
fastcgi_pass fast cgi_ bac kend ;
f a s t c g i _ k e e p _ c o n n on ;
...
}
}
When using load balancer methods other than the default round-robin
method, it is necessary to activate them before the keepalive directive.
least conn
Syntax: least_conn;
Default
Context: upstream
This directive appeared in versions 1.3.1 and 1.2.2.
Specifies that a group should use a load balancing method where a request
is passed to the server with the least number of active connections, taking into
account weights of servers. If there are several such servers, they are tried in
turn using a weighted round-robin balancing method.
least time
Syntax: least_time header | last_byte;
Default
Context: upstream
This directive appeared in version 1.7.10.
Specifies that a group should use a load balancing method where a request
is passed to the server with the least average response time and least number of
active connections, taking into account weights of servers. If there are several
such servers, they are tried in turn using a weighted round-robin balancing
method.
If the header parameter is specified, time to receive the response header is
used. If the last_byte parameter is specified, time to receive the full response
is used.
health check
Syntax: health_check [parameters];
Default
Context: location
interval=time
sets the interval between two consecutive health checks, by default, 5
seconds;
fails=number
sets the number of consecutive failed health checks of a particular server
after which this server will be considered unhealthy, by default, 1;
passes=number
sets the number of consecutive passed health checks of a particular server
after which the server will be considered healthy, by default, 1;
uri=uri
defines the URI used in health check requests, by default, /;
match=name
specifies the match block configuring the tests that a response should
pass in order for a health check to pass; by default, the response should
have status code 2xx or 3xx.
For example,
location / {
proxy_pass http :// backend ;
health_check ;
}
will send/requests to each server in the backend group every five seconds.
If any communication error or timeout occurs, or a proxied server responds
with the status code other than 2xx or 3xx, the health check will fail, and
the server will be considered unhealthy. Client requests are not passed to
unhealthy servers.
Health checks can be configured to test the status code of a response,
presence of certain header fields and their values, and the body contents. Tests
are configured separately using the match directive and referenced in the match
parameter. For example:
http {
server {
...
location / {
proxy_pass http :// backend ;
health_check match = welcome ;
}
}
match welcome {
status 200;
header Content - Type = text / html ;
body ~ " Welcome to nginx !";
}
}
This configuration tells that for a health check to pass, the response
to a health check request should succeed, have status 200, content type
text/html, and contain Welcome to nginx! in the body.
The server group must reside in the shared memory.
If several health checks are defined for the same group of servers, a single
failure of any check will make the corresponding server be considered unhealthy.
Please note that most of the variables will have empty values when used
with health checks.
match
Syntax: match name { . . . }
Default
Context: http
Defines the named test set used to verify responses to health check requests.
The following items can be tested in a response:
status 200;
status is 200
status ! 500;
status is not 500
status 200 204;
status is 200 or 204
status ! 301 302;
status is neither 301 nor 302
status 200-399;
status is in the range from 200 to 399
status ! 400-599;
status is not in the range from 400 to 599
status 301-303 307;
status is either 301, 302, 303, or 307
If several tests are specified, the response matches only if it matches all
tests.
Examples:
# status is not one of 301 , 302 , 303 , or 307 , and header does not have "
Refresh :"
match not_redirect {
status ! 301 -303 307;
header ! Refresh ;
}
queue
Syntax: queue number [timeout=time];
Default
Context: upstream
This directive appeared in version 1.5.12.
sticky
Syntax: sticky cookie name [expires=time] [domain=domain] [httponly]
[secure] [path=path];
Syntax: sticky route $variable . . . ;
Syntax: sticky learn create=$variable lookup=$variable zone=name:size
[timeout=time];
Default
Context: upstream
This directive appeared in version 1.5.7.
Enables session affinity, which causes requests from the same client to be
passed to the same server in a group of servers. Three methods are available:
cookie
When the cookie method is used, information about the designated
server is passed in an HTTP cookie generated by nginx:
upstream backend {
server backend1 . example . com ;
server backend2 . example . com ;
A request that comes from a client not yet bound to a particular server
is passed to the server selected by the configured balancing method.
Further requests with this cookie will be passed to the designated server.
If the designated server cannot process a request, the new server is
selected as if the client has not been bound yet.
The first parameter sets the name of the cookie to be set or inspected.
Additional parameters may be as follows:
expires=time
Sets the time for which a browser should keep the cookie.
The special value max will cause the cookie to expire on
31 Dec 2037 23:55:55 GMT. If the parameter is not specified,
it will cause the cookie to expire at the end of a browser session.
domain=domain
Defines the domain for which the cookie is set.
httponly
Adds the HttpOnly attribute to the cookie (1.7.11).
secure
Adds the Secure attribute to the cookie (1.7.11).
path=path
Defines the path for which the cookie is set.
If any parameters are omitted, the corresponding cookie fields are not
set.
route
When the route method is used, proxied server assigns client a route
on receipt of the first request. All subsequent requests from this client
will carry routing information in a cookie or URI. This information is
compared with the route parameter of the server directive to identify
the server to which the request should be proxied. If the designated server
cannot process a request, the new server is selected by the configured
balancing method as if there is no routing information in the request.
The parameters of the route method specify variables that may contain
routing information. The first non-empty variable is used to find the
matching server.
Example:
map $ c o o k i e _ j s e s s i o n i d $route_cookie {
~.+\.(? P < route >\ w +) $ $route ;
}
upstream backend {
server backend1 . example . com route = a ;
server backend2 . example . com route = b ;
upstream backend {
server backend1 . example . com :8080;
server backend2 . example . com :8081;
sticky learn
create = $ u p s t r e a m _ c o o k i e _ s e s s i o n i d
lookup = $ c o o k i e _ s e s s i o n i d
zone = cl ient _se ssio ns :1 m ;
}
configured by the zone parameter. One megabyte zone can store about
8000 sessions on the 64-bit platform. The sessions that are not accessed
during the time specified by the timeout parameter get removed from
the zone. By default, timeout is set to 10 minutes.
$upstream addr
keeps the IP address and port, or the path to the UNIX-domain
socket of the upstream server. If several servers were contacted
during request processing, their addresses are separated by com-
mas, e.g. 192.168.1.1:80, 192.168.1.2:80, unix:/tmp/sock.
If an internal redirect from one server group to another hap-
pens, initiated by X-Accel-Redirect or error page, then the
server addresses from different groups are separated by colons, e.g.
192.168.1.1:80, 192.168.1.2:80, unix:/tmp/sock : 192.168.10.1:80, 192.16
$upstream cache status
keeps the status of accessing a response cache (0.8.3). The status
can be either MISS, BYPASS, EXPIRED, STALE, UPDATING,
REVALIDATED, or HIT.
$upstream cookie name
cookie with the specified name sent by the upstream server in the
Set-Cookie response header field (1.7.1). Only the cookies from the
response of the last server are saved.
$upstream header time
keeps time spent on receiving the response header from the upstream
server (1.7.10); the time is kept in seconds with millisecond resolution.
Times of several responses are separated by commas and colons like
addresses in the $upstream addr variable.
2.46.1 Summary
The ngx_http_upstream_conf_module module allows configuring up-
stream server groups on-the-fly via a simple HTTP interface without the need
of restarting nginx. The http or stream server group must reside in the shared
memory.
upstream backend {
zone up s tr e am _ ba c ke n d 64 k ;
...
}
server {
location / upstream_conf {
upstream_conf ;
allow 127.0.0.1;
deny all ;
}
}
2.46.3 Directives
upstream conf
Syntax: upstream_conf;
Default
Context: location
stream=
Selects a stream upstream server group. Without this parameter, selects
an http upstream server group.
upstream=name
Selects a group to work with. This parameter is mandatory.
id=number
Selects a server for viewing, modifying, or removing.
remove=
Removes a server from the group.
add=
Adds a new server to the group.
backup=
Required to add a backup server.
server=address
Same as the address parameter of the http or stream upstream server.
When adding a server, it is possible to specify it as a domain name.
In this case, changes of the IP addresses that correspond to a domain
name will be monitored and automatically applied to the upstream
configuration without the need of restarting nginx (1.7.2). This requires
the resolver directive in the http or stream block. See also the
resolve parameter of the http or stream upstream server.
weight=number
Same as the weight parameter of the http or stream upstream server.
max_conns=number
Same as the max_conns parameter of the http or stream upstream
server.
max_fails=number
Same as the max_fails parameter of the http or stream upstream
server.
fail_timeout=time
Same as the fail_timeout parameter of the http or stream upstream
server.
slow_start=time
Same as the slow_start parameter of the http or stream upstream
server.
down=
Same as the down parameter of the http or stream upstream server.
drain=
Puts the http upstream server in the draining mode (1.7.5). In this
mode, only requests of the bound to the server will be proxied to it.
up=
The opposite of the down parameter of the http or stream upstream
server.
route=string
Same as the route parameter of the http upstream server.
The first three parameters select an object. This can be either the whole
http or stream upstream server group, or a specific server. Without other
parameters, the configuration of the selected group or server is shown.
For example, to view the configuration of the whole group, send:
http ://127.0.0.1/ upstream_conf ? add =& upstream = backend & server =12 7.0. 0.1: 808 0
http ://127.0.0.1/ upstream_conf ? add =& upstream = backend & backup =& server
=1 27.0 .0.1 :808 0
To add a new primary server, set its parameters to non-default values and
mark it as down, send:
http ://127.0.0.1/ upstream_conf ? upstream = backend & id =42& max_fails =3& weight =4
The above examples are for an http upstream server group. Similar
examples for a stream upstream server group require the stream= parameter.
2.47.1 Summary
The ngx_http_userid_module module sets cookies suitable for client
identification. Received and set cookies can be logged using the embedded
variables $uid got and $uid set. This module is compatible with the mod uid
module for Apache.
userid on ;
userid_name uid ;
userid_domain example . com ;
userid_path /;
userid_expires 365 d ;
userid_p3p policyref ="/ w3c / p3p . xml " , CP =" CUR ADM OUR NOR STA NID " ;
2.47.3 Directives
userid
Syntax: userid on | v1 | log | off;
Default off
Context: http, server, location
on
enables the setting of version 2 cookies and logging of the received
cookies;
v1
enables the setting of version 1 cookies and logging of the received
cookies;
log
disables the setting of cookies, but enables logging of the received cookies;
off
disables the setting of cookies and logging of the received cookies.
userid domain
Syntax: userid_domain name | none;
Default none
Context: http, server, location
Defines a domain for which the cookie is set. The none parameter disables
setting of a domain for the cookie.
userid expires
Syntax: userid_expires time | max | off;
Default off
Context: http, server, location
Sets a time during which a browser should keep the cookie. The parameter
max will cause the cookie to expire on 31 Dec 2037 23:55:55 GMT. The
parameter off will cause the cookie to expire at the end of a browser session.
userid mark
Syntax: userid_mark letter | digit | = | off;
Default off
Context: http, server, location
If the parameter is not off, enables the cookie marking mechanism and sets
the character used as a mark. This mechanism is used to add or change userid -
p3p and/or a cookie expiration time while preserving the client identifier. A
mark can be any letter of the English alphabet (case-sensitive), digit, or the
= character.
If the mark is set, it is compared with the first padding symbol in the
base64 representation of the client identifier passed in a cookie. If they do not
match, the cookie is resent with the specified mark, expiration time, and P3P
header.
userid name
Syntax: userid_name name;
Default uid
Context: http, server, location
userid p3p
Syntax: userid_p3p string | none;
Default none
Context: http, server, location
Sets a value for the P3P header field that will be sent along with the cookie.
If the directive is set to the special value none, the P3P header will not be sent
in a response.
userid path
Syntax: userid_path path;
Default /
Context: http, server, location
userid service
Syntax: userid_service number;
Default IP address of the server
Context: http, server, location
$uid got
The cookie name and received client identifier.
$uid reset
If the variable is set to a non-empty string that is not 0, the client
identifiers are reset. The special value log additionally leads to the
output of messages about the reset identifiers to the error log.
$uid set
The cookie name and sent client identifier.
2.48.1 Summary
The ngx_http_uwsgi_module module allows passing requests to a uwsgi
server.
location / {
include uwsgi_params ;
uwsgi_pass localhost :9000;
}
2.48.3 Directives
uwsgi bind
Syntax: uwsgi_bind address | off;
Default
Context: http, server, location
Sets the size of the buffer used for reading the first part of the response
received from the uwsgi server. This part usually contains a small response
header. By default, the buffer size is equal to the size of one buffer set by the
uwsgi buffers directive. It can be made smaller, however.
uwsgi buffering
Syntax: uwsgi_buffering on | off;
Default on
Context: http, server, location
uwsgi buffers
Syntax: uwsgi_buffers number size;
Default 8 4k|8k
Context: http, server, location
Sets the number and size of the buffers used for reading a response from
the uwsgi server, for a single connection. By default, the buffer size is equal to
one memory page. This is either 4K or 8K, depending on a platform.
When buffering of responses from the uwsgi server is enabled, limits the
total size of buffers that can be busy sending a response to the client while the
response is not yet fully read. In the meantime, the rest of the buffers can be
used for reading the response and, if needed, buffering part of the response to
a temporary file. By default, size is limited by the size of two buffers set by
the uwsgi buffer size and uwsgi buffers directives.
uwsgi cache
Syntax: uwsgi_cache zone | off;
Default off
Context: http, server, location
Defines a shared memory zone used for caching. The same zone can be
used in several places. Parameter value can contain variables (1.7.9). The off
parameter disables caching inherited from the previous configuration level.
Defines conditions under which the response will not be taken from a cache.
If at least one value of the string parameters is not empty and is not equal to
0 then the response will not be taken from the cache:
When enabled, only one request at a time will be allowed to populate a new
cache element identified according to the uwsgi cache key directive by passing
a request to a uwsgi server. Other requests of the same cache element will
either wait for a response to appear in the cache or the cache lock for this
element to be released, up to the time set by the uwsgi cache lock timeout
directive.
If the last request passed to the uwsgi server for populating a new cache
element has not completed for the specified time, one more request may be
passed to the uwsgi server.
Sets a timeout for uwsgi cache lock. When the time expires, the request
will be passed to the uwsgi server, however, the response will not be cached.
If the client request method is listed in this directive then the response will
be cached. GET and HEAD methods are always added to the list, though it is
recommended to specify them explicitly. See also the uwsgi no cache directive.
Sets the number of requests after which the response will be cached.
Sets the path and other parameters of a cache. Cache data are stored in
files. The file name in a cache is a result of applying the MD5 function to
the cache key. The levels parameter defines hierarchy levels of a cache. For
example, in the following configuration
A cached response is first written to a temporary file, and then the file is
renamed. Starting from version 0.8.9, temporary files and the cache can be put
on different file systems. However, be aware that in this case a file is copied
across two file systems instead of the cheap renaming operation. It is thus
recommended that for any given location both cache and a directory holding
temporary files are put on the same file system. A directory for temporary
files is set based on the use_temp_path parameter (1.7.10). If this parameter
is omitted or set to the value on, the directory set by the uwsgi temp path
directive for the given location will be used. If the value is set to off, temporary
files will be put directly in the cache directory.
In addition, all active keys and information about data are stored in a
shared memory zone, whose name and size are configured by the keys_zone
parameter. One megabyte zone can store about 8 thousand keys.
Cached data that are not accessed during the time specified by the
inactive parameter get removed from the cache regardless of their freshness.
By default, inactive is set to 10 minutes.
The special cache manager process monitors the maximum cache size set
by the max_size parameter. When this size is exceeded, it removes the least
recently used data.
A minute after the start the special cache loader process is activated. It
loads information about previously cached data stored on file system into a
cache zone. The loading is done in iterations. During one iteration no more
than loader_files items are loaded (by default, 100). Besides, the duration of
one iteration is limited by the loader_threshold parameter (by default, 200
milliseconds). Between iterations, a pause configured by the loader_sleep
parameter (by default, 50 milliseconds) is made.
Defines conditions under which the request will be considered a cache purge
request. If at least one value of the string parameters is not empty and
is not equal to 0 then the cache entry with a corresponding cache key is
server {
...
location / {
uwsgi_pass backend ;
uwsgi_cache cache_zone ;
uws gi_ cach e_ke y $uri ;
uwsgi_cache_purge $purge_method ;
}
}
Sets caching time for different response codes. For example, the following
directives
u w s g i _ c a c h e _ v a l i d 200 302 10 m ;
u w s g i _ c a c h e _ v a l i d 404 1m;
set 10 minutes of caching for responses with codes 200 and 302 and 1 minute
for responses with code 404.
If only caching time is specified
uwsgi_cache_valid 5m;
u w s g i _ c a c h e _ v a l i d 200 302 10 m ;
u w s g i _ c a c h e _ v a l i d 301 1h;
u w s g i _ c a c h e _ v a l i d any 1m;
Parameters of caching can also be set directly in the response header. This
has higher priority than setting of caching time using the directive.
The X-Accel-Expires header field sets caching time of a response in
seconds. The zero value disables caching for a response. If the value
starts with the @ prefix, it sets an absolute time in seconds since Epoch,
up to which the response may be cached.
If the header includes the Set-Cookie field, such a response will not be
cached.
If the header includes the Vary field with the special value *, such a
response will not be cached (1.7.7). If the header includes the Vary field
with another value, such a response will be cached taking into account
the corresponding request header fields (1.7.7).
Processing of one or more of these response header fields can be disabled using
the uwsgi ignore headers directive.
Enables byte-range support for both cached and uncached responses from
the uwsgi server regardless of the Accept-Ranges field in these responses.
By default, nginx does not pass the header fields Status and X-Accel-...
from the response of a uwsgi server to a client. The uwsgi_hide_header
directive sets additional fields that will not be passed. If, on the contrary, the
passing of fields needs to be permitted, the uwsgi pass header directive can be
used.
Disables processing of certain response header fields from the uwsgi server.
The following fields can be ignored: X-Accel-Redirect, X-Accel-Expires,
X-Accel-Limit-Rate (1.1.6), X-Accel-Buffering (1.1.6), X-Accel-Charset
(1.1.6), Expires, Cache-Control, Set-Cookie (0.8.44), and Vary (1.7.7).
If not disabled, processing of these header fields has the following effect:
Limits the speed of reading the response from the uwsgi server. The rate is
specified in bytes per second. The zero value disables rate limiting. The limit
is set per a request, and so if nginx simultaneously opens two connections to
the uwsgi server, the overall rate will be twice as much as the specified limit.
The limitation works only if buffering of responses from the uwsgi server is
enabled.
When buffering of responses from the uwsgi server is enabled, and the whole
response does not fit into the buffers set by the uwsgi buffer size and uwsgi -
buffers directives, a part of the response can be saved to a temporary file.
This directive sets the maximum size of the temporary file. The size of data
written to the temporary file at a time is set by the uwsgi temp file write size
directive.
The zero value disables buffering of responses to temporary files.
This restriction does not apply to responses that will be cached or stored
on disk.
uwsgi modifier1
Syntax: uwsgi_modifier1 number;
Default 0
Context: http, server, location
Sets the value of the modifier1 field in the uwsgi packet header.
uwsgi modifier2
Syntax: uwsgi_modifier2 number;
Default 0
Context: http, server, location
Sets the value of the modifier2 field in the uwsgi packet header.
error
an error occurred while establishing a connection with the server, passing
a request to it, or reading the response header;
timeout
a timeout has occurred while establishing a connection with the server,
passing a request to it, or reading the response header;
invalid_header
a server returned an empty or invalid response;
http_500
a server returned a response with the code 500;
http_503
a server returned a response with the code 503;
http_403
a server returned a response with the code 403;
http_404
a server returned a response with the code 404;
off
disables passing a request to the next server.
One should bear in mind that passing a request to the next server is only
possible if nothing has been sent to a client yet. That is, if an error or timeout
occurs in the middle of the transferring of a response, fixing this is impossible.
The directive also defines what is considered an unsuccessful attempt
of communication with a server. The cases of error, timeout and
Limits the time allowed to pass a request to the next server. The 0 value
turns off this limitation.
Limits the number of possible tries for passing a request to the next server.
The 0 value turns off this limitation.
uwsgi no cache
Syntax: uwsgi_no_cache string . . . ;
Default
Context: http, server, location
Defines conditions under which the response will not be saved to a cache.
If at least one value of the string parameters is not empty and is not equal to
0 then the response will not be saved:
uwsgi param
Syntax: uwsgi_param parameter value [if_not_empty];
Default
Context: http, server, location
Sets a parameter that should be passed to the uwsgi server. The value can
contain text, variables, and their combination. These directives are inherited
from the previous level if and only if there are no uwsgi_param directives
defined on the current level.
Standard CGI environment variables should be provided as uwsgi headers,
see the uwsgi_params file provided in the distribution:
location / {
include uwsgi_params ;
...
}
uwsgi pass
Syntax: uwsgi_pass [protocol://]address;
Default
Context: location, if in location
Indicates whether the original request body is passed to the uwsgi server.
See also the uwsgi pass request headers directive.
Indicates whether the header fields of the original request are passed to the
uwsgi server. See also the uwsgi pass request body directive.
Defines a timeout for reading a response from the uwsgi server. The timeout
is set only between two successive read operations, not for the transmission of
the whole response. If the uwsgi server does not transmit anything within this
time, the connection is closed.
Sets a timeout for transmitting a request to the uwsgi server. The timeout
is set only between two successive write operations, not for the transmission
of the whole request. If the uwsgi server does not receive anything within this
time, the connection is closed.
Specifies a file with the certificate in the PEM format used for
authentication to a secured uwsgi server.
Specifies a file with the secret key in the PEM format used for
authentication to a secured uwsgi server.
Specifies the enabled ciphers for requests to a secured uwsgi server. The
ciphers are specified in the format understood by the OpenSSL library.
The full list can be viewed using the openssl ciphers command.
Specifies a file with revoked certificates (CRL) in the PEM format used to
verify the certificate of the secured uwsgi server.
Allows overriding the server name used to verify the certificate of the
secured uwsgi server and to be passed through SNI when establishing a
connection with the secured uwsgi server.
By default, the host part from uwsgi pass is used.
Specifies a file with passphrases for secret keys where each passphrase is
specified on a separate line. Passphrases are tried in turn when loading the
key.
Enables or disables passing of the server name through TLS Server Name
Indication extension (SNI, RFC 6066) when establishing a connection with the
secured uwsgi server.
Determines whether SSL sessions can be reused when working with a se-
cured uwsgi server. If the errorsSSL3_GET_FINISHED:digest check failed
appear in the logs, try disabling session reuse.
Sets the verification depth in the secured uwsgi server certificates chain.
uwsgi store
Syntax: uwsgi_store on | off | string;
Default off
Context: http, server, location
Enables saving of files to a disk. The on parameter saves files with paths
corresponding to the directives alias or root. The off parameter disables saving
of files. In addition, the file name can be set explicitly using the string with
variables:
uwsgi_store / data / w w w$ or i gi n al _ ur i ;
location / images / {
root / data / www ;
error_page 404 = / fetch$uri ;
}
location / fetch / {
internal ;
uwsgi_store on ;
u w s g i _ s t o r e _ a c c e s s user : rw group : rw all : r ;
uw sgi_ temp _pat h / data / temp ;
Sets access permissions for newly created files and directories, e.g.:
If any group or all access permissions are specified then user permissions
may be omitted:
u w s g i _ s t o r e _ a c c e s s group : rw all : r ;
Limits the size of data written to a temporary file at a time, when buffering
of responses from the uwsgi server to temporary files is enabled. By default,
size is limited by two buffers set by the uwsgi buffer size and uwsgi buffers
directives. The maximum size of a temporary file is set by the uwsgi max -
temp file size directive.
Defines a directory for storing temporary files with data received from uwsgi
servers. Up to three-level subdirectory hierarchy can be used underneath the
specified directory. For example, in the following configuration
See also the use_temp_path parameter of the uwsgi cache path directive.
2.49.1 Summary
The ngx_http_xslt_module (0.7.8+) is a filter that transforms XML
responses using one or more XSLT stylesheets.
This module is not built by default, it should be enabled with the
--with-http_xslt_module configuration parameter.
location / {
xml_entities / site / dtd / entities . dtd ;
xs lt_s tyle shee t / site / xslt / one . xslt param = value ;
xs lt_s tyle shee t / site / xslt / two . xslt ;
}
2.49.3 Directives
xml entities
Syntax: xml_entities path;
Default
Context: http, server, location
Specifies the DTD file that declares character entities. This file is compiled
at the configuration stage. For technical reasons, the module is unable to
use the external subset declared in the processed XML, so it is ignored and a
specially defined file is used instead. This file should not describe the XML
structure. It is enough to declare just the required character entities, for
example:
xslt param
Syntax: xslt_param parameter value;
Default
Context: http, server, location
This directive appeared in version 1.1.18.
xslt stylesheet
Syntax: xslt_stylesheet stylesheet [parameter=value . . . ];
Default
Context: location
The parameters description can contain variables, for example, the whole
line of parameters can be taken from a single variable:
location / {
xs lt_s tyle shee t / site / xslt / one . xslt
$ ar g _x s lt _ pa ra m s
param1 = $value1 : param2 = value2
param3 = value3 ;
}
xslt types
Syntax: xslt_types mime-type . . . ;
Default text/xml
Context: http, server, location
3.1.1 Summary
w or k er _ pr o ce s se s auto ;
stream {
upstream backend {
hash $remote_addr consistent ;
server {
listen 12345;
proxy_connect_timeout 1s;
proxy_timeout 3 s ;
proxy_pass backend ;
}
server {
listen [::1]:12345;
proxy_pass unix :/ tmp / stream . socket ;
271
CHAPTER 3. STREAM PROXY MODULES 3.1. MODULE NGX STREAM CORE MODULE
}
}
3.1.3 Directives
listen
Syntax: listen address:port [ssl] [bind] [ipv6only=on|off]
[so_keepalive=on|off|[keepidle]:[keepintvl]:[keepcnt]];
Default
Context: server
Sets the address and port for the socket on which the server will accept
connections. It is possible to specify just the port. The address can also be a
hostname, for example:
listen 12 7 .0 .0 . 1: 1 23 4 5;
listen *:12345;
listen 12345; # same as *:12345
listen localhost :12345;
listen [::1]:12345;
listen [::]:12345;
The ssl parameter (1.7.10) allows specifying that all connections accepted
on this port should work in SSL mode.
The listen directive can have several additional parameters specific to
socket-related system calls.
bind
this parameter instructs to make a separate bind call for a given
address:port pair. The fact is that if there are several listen directives
with the same port but different addresses, and one of the listen
directives listens on all addresses for the given port (*:port), nginx will
bind only to *:port. It should be noted that the getsockname system
call will be made in this case to determine the address that accepted the
connection. If the ipv6only or so_keepalive parameters are used then
for a given address:port pair a separate bind call will always be made.
ipv6only=on|off
this parameter determines (via the IPV6_V6ONLY socket option) whether
an IPv6 socket listening on a wildcard address [::] will accept only
IPv6 connections or both IPv6 and IPv4 connections. This parameter is
turned on by default. It can only be set once on start.
so_keepalive=on|off|[keepidle]:[keepintvl]:[keepcnt]
this parameter configures the TCP keepalive behavior for the listening
socket. If this parameter is omitted then the operating systems settings
will be in effect for the socket. If it is set to the value on, the
SO_KEEPALIVE option is turned on for the socket. If it is set to the
value off, the SO_KEEPALIVE option is turned off for the socket. Some
operating systems support setting of TCP keepalive parameters on a per-
socket basis using the TCP_KEEPIDLE, TCP_KEEPINTVL, and TCP_KEEPCNT
socket options. On such systems (currently, Linux 2.4+, NetBSD 5+,
and FreeBSD 9.0-STABLE), they can be configured using the keepidle,
keepintvl, and keepcnt parameters. One or two parameters may be
omitted, in which case the system default setting for the corresponding
socket option will be in effect. For example,
so_keepalive =30 m ::10
will set the idle timeout (TCP_KEEPIDLE) to 30 minutes, leave the probe
interval (TCP_KEEPINTVL) at its system default, and set the probes count
(TCP_KEEPCNT) to 10 probes.
Different servers must listen on different address:port pairs.
resolver
Syntax: resolver address . . . [valid=time] [ipv6=on|off];
Default
Context: stream, server
This directive appeared in version 1.7.10.
resolver timeout
Syntax: resolver_timeout time;
Default 30s
Context: stream, server
r es o lv e r_ t im e ou t 5 s ;
server
Syntax: server { . . . }
Default
Context: stream
stream
Syntax: stream { . . . }
Default
Context: main
Provides the configuration file context in which the stream server directives
are specified.
3.2.1 Summary
The ngx_stream_proxy_module module (1.7.7) allows passing connections
to another server over TCP and UNIX-domain sockets.
server {
listen 12 7 .0 . 0. 1: 1 23 4 5;
proxy_pass 1 27.0 .0.1 :808 0;
}
server {
listen 12345;
proxy_connect_timeout 1s;
proxy_timeout 3 s ;
proxy_pass example . com :12345;
}
server {
listen [::1]:12345;
proxy_pass unix :/ tmp / stream . socket ;
}
3.2.3 Directives
proxy connect timeout
Syntax: proxy_connect_timeout time;
Default 60s
Context: stream, server
Sets the size of the buffer used for reading data from the client.
Limits the time allowed to pass a connection to the next server. The 0
value turns off this limitation.
Limits the number of possible tries for passing a connection to the next
server. The 0 value turns off this limitation.
proxy pass
Syntax: proxy_pass address;
Default
Context: server
proxy ssl
Syntax: proxy_ssl on | off;
Default off
Context: stream, server
This directive appeared in version 1.7.10.
Specifies a file with the certificate in the PEM format used for
authentication to a proxied server.
Specifies a file with the secret key in the PEM format used for
authentication to a proxied server.
Specifies a file with revoked certificates (CRL) in the PEM format used to
verify the certificate of the proxied server.
Allows to override the server name used to verify the certificate of the
proxied server and to be passed through SNI when establishing a connection
with the proxied server.
By default, the host part of the proxy pass address is used.
Specifies a file with passphrases for secret keys where each passphrase is
specified on a separate line. Passphrases are tried in turn when loading the
key.
Enables or disables passing of the server name through TLS Server Name
Indication extension (SNI, RFC 6066) when establishing a connection with the
proxied server.
Determines whether SSL sessions can be reused when working with the
proxied server. If the errors SSL3_GET_FINISHED:digest check failed
appear in the logs, try disabling session reuse.
proxy timeout
Syntax: proxy_timeout timeout;
Default 10m
Context: stream, server
Defines a timeout used after the proxying to the backend had started.
Sets the size of the buffer used for reading data from the upstream server.
3.3.1 Summary
The ngx_stream_ssl_module module (1.7.10) provides the necessary
support for a stream proxy server to work with the SSL/TLS protocol.
3.3.2 Directives
ssl certificate
Syntax: ssl_certificate file;
Default
Context: stream, server
Specifies a file with the certificate in the PEM format for the given server. If
intermediate certificates should be specified in addition to a primary certificate,
they should be specified in the same file in the following order: the primary
certificate comes first, then the intermediate certificates. A secret key in the
PEM format may be placed in the same file.
Specifies a file with the secret key in the PEM format for the given server.
ssl ciphers
Syntax: ssl_ciphers ciphers;
Default HIGH:!aNULL:!MD5
Context: stream, server
Specifies the enabled ciphers. The ciphers are specified in the format
understood by the OpenSSL library, for example:
ssl_ciphers ALL :! aNULL :! EXPORT56 : RC4 + RSA :+ HIGH :+ MEDIUM :+ LOW :+ SSLv2 :+ EXP ;
The full list can be viewed using the openssl ciphers command.
ssl dhparam
Syntax: ssl_dhparam file;
Default
Context: stream, server
Specifies a file with passphrases for secret keys where each passphrase is
specified on a separate line. Passphrases are tried in turn when loading the
key.
Example:
stream {
s s l _ p a s s w o r d _ f i l e / etc / keys / global . pass ;
...
server {
listen 1 2 7. 0 .0 . 1: 1 23 4 5;
s s l _ c e r t i f i c a t e _ k e y / etc / keys / first . key ;
}
server {
listen 1 2 7. 0 .0 . 1: 1 23 4 6;
Specifies that server ciphers should be preferred over client ciphers when
the SSLv3 and TLS protocols are used.
ssl protocols
Syntax: ssl_protocols [SSLv2] [SSLv3] [TLSv1] [TLSv1.1] [TLSv1.2];
Default SSLv3 TLSv1 TLSv1.1 TLSv1.2
Context: stream, server
Sets the types and sizes of caches that store session parameters. A cache
can be of any of the following types:
off
the use of a session cache is strictly prohibited: nginx explicitly tells a
client that sessions may not be reused.
none
the use of a session cache is gently disallowed: nginx tells a client that
sessions may be reused, but does not actually store session parameters
in the cache.
builtin
a cache built in OpenSSL; used by one worker process only. The cache
size is specified in sessions. If size is not given, it is equal to 20480
sessions. Use of the built-in cache can cause memory fragmentation.
shared
a cache shared between all worker processes. The cache size is specified
in bytes; one megabyte can store about 4000 sessions. Each shared cache
should have an arbitrary name. A cache with the same name can be used
in several servers.
but using only shared cache without the built-in cache should be more
efficient.
Sets a file with the secret key used to encrypt and decrypt TLS session
tickets. The directive is necessary if the same key has to be shared between
multiple servers. By default, a randomly generated key is used.
If several keys are specified, only the first key is used to encrypt TLS session
tickets. This allows configuring key rotation, for example:
s s l _ s e s s i o n _ t i c k e t _ k e y current . key ;
s s l _ s e s s i o n _ t i c k e t _ k e y previous . key ;
The file must contain 48 bytes of random data and can be created using
the following command:
Specifies a time during which a client may reuse the session parameters
stored in a cache.
3.4.1 Summary
The ngx_stream_upstream_module module (1.7.7) is used to define groups
of servers that can be referenced by the proxy pass directive.
resolver 10.0.0.1;
upstream backend {
zone up s tr e am _ ba c ke n d 64 k ;
server {
listen 12346;
proxy_pass backend ;
health_check ;
}
3.4.3 Directives
upstream
Syntax: upstream name { . . . }
Default
Context: stream
upstream backend {
server backend1 . example . com :12345 weight =5;
server 12 7.0 .0.1 :123 45 max_fails =3 fail_timeout =30 s ;
server unix :/ tmp / backend2 ;
server backend3 . example . com :12345 resolve ;
server
Syntax: server address [parameters];
Default
Context: upstream
Defines the address and other parameters of a server. The address can be
specified as a domain name or IP address with an obligatory port, or as a
UNIX-domain socket path specified after the unix: prefix. A domain name
that resolves to several IP addresses defines multiple servers at once.
The following parameters can be defined:
weight=number
sets the weight of the server, by default, 1.
max_fails=number
sets the number of unsuccessful attempts to communicate with the
server that should happen in the duration set by the fail_timeout
parameter to consider the server unavailable for a duration also set by
the fail_timeout parameter. By default, the number of unsuccessful
attempts is set to 1. The zero value disables the accounting of attempts.
Here, an unsuccessful attempt is an error or timeout while establishing
a connection with the server.
fail_timeout=time
sets
the time during which the specified number of unsuccessful attempts
to communicate with the server should happen to consider the server
unavailable;
and the period of time the server will be considered unavailable.
stream {
resolver 10.0.0.1;
upstream u {
zone ...;
...
server example . com :12345 resolve ;
}
}
slow_start=time
sets the time during which the server will recover its weight from zero to
a nominal value, or when the server becomes available after a period of
time it was considered unavailable. Default value is zero, i.e. slow start
is disabled.
zone
Syntax: zone name size;
Default
Context: upstream
This directive appeared in version 1.7.10.
Defines the name and size of the shared memory zone that keeps the groups
configuration and run-time state that are shared between worker processes.
Such groups allow changing the group membership or modifying the settings
of a particular server without the need of restarting nginx. The configuration
is accessible via a special location handled by upstream conf.
hash
Syntax: hash key [consistent];
Default
Context: upstream
least conn
Syntax: least_conn;
Default
Context: upstream
Specifies that a server group should use a load balancing method where a
connection is passed to the server with the least number of active connections,
taking into account weights of servers. If there are several such servers, they
are tried in turn using a weighted round-robin balancing method.
least time
Syntax: least_time connect | first_byte | last_byte;
Default
Context: upstream
This directive appeared in version 1.7.11.
health check
Syntax: health_check [parameters];
Default
Context: server
This directive appeared in version 1.7.10.
interval=time
sets the interval between two consecutive health checks, by default, 5
seconds;
fails=number
sets the number of consecutive failed health checks of a particular server
after which this server will be considered unhealthy, by default, 1;
passes=number
sets the number of consecutive passed health checks of a particular server
after which the server will be considered healthy, by default, 1;
match=name
specifies the match block configuring the tests that a successful
connection should pass in order for a health check to pass; by default,
only the ability to connect to the server is checked.
For example,
server {
proxy_pass backend ;
health_check ;
}
will check the ability to connect to each server in the backend group every
five seconds. When a connection to the server cannot be established, the health
check will fail, and the server will be considered unhealthy. Client connections
are not passed to unhealthy servers.
Health checks can also be configured to test data obtained from the server.
Tests are configured separately using the match directive and referenced in the
match parameter.
The server group must reside in the shared memory.
If several health checks are defined for the same group of servers, a single
failure of any check will make the corresponding server be considered unhealthy.
match
Syntax: match name { . . . }
Default
Context: stream
This directive appeared in version 1.7.10.
Defines the named test set used to verify server responses to health checks.
The following parameters can be configured:
send string;
sends a string to the server;
expect ~ regexp;
a regular expression that the data obtained from the server should match.
The regular expression is specified with the preceding ~* modifier
(for case-insensitive matching), or the ~ modifier (for case-sensitive
matching).
the data obtained from the server matched the regular expression from
the expect parameter, if specified;
the time elapsed does not exceed the value specified in the health check -
timeout directive.
Example:
upstream backend {
zone up s tr e am _ ba ck e nd 10 m ;
server 1 27 . 0. 0 .1 : 12 3 45 ;
}
match http {
send " GET / HTTP /1.0\ r \ nHost : localhost \ r \ n \ r \ n ";
expect ~ "200 OK ";
}
server {
listen 12346;
proxy_pass backend ;
health_check match = http ;
}
Only the first proxy upstream buffer bytes of data obtained from the
server are examined.
4.1.1 Summary
This module is not built by default, it should be enabled with the
--with-mail configuration parameter.
w or k er _ pr o ce s se s 1;
mail {
server_name mail . example . com ;
auth_http localhost :9000/ cgi - bin / nginxauth . cgi ;
291
CHAPTER 4. MAIL SERVER MODULES 4.1. MODULE NGX MAIL CORE MODULE
server {
listen 25;
protocol smtp ;
}
server {
listen 110;
protocol pop3 ;
p r o x y _ p a s s _ e r r o r _ m e s s a g e on ;
}
server {
listen 143;
protocol imap ;
}
server {
listen 587;
protocol smtp ;
}
}
4.1.3 Directives
listen
Syntax: listen address:port [bind];
Default
Context: server
Sets the address and port for the socket on which the server will accept
requests. It is possible to specify just the port. The address can also be a
hostname, for example:
listen 127.0.0.1:110;
listen *:110;
listen 110; # same as *:110
listen localhost :110;
listen [::1]:110;
listen [::]:110;
The optional bind parameter instructs to make a separate bind call for a
given address:port pair. The fact is that if there are several listen directives
with the same port but different addresses, and one of the listen directives
listens on all addresses for the given port (*:port), nginx will bind only to
*:port. It should be noted that the getsockname system call will be made in
this case to determine the address that accepted the connection.
Different servers must listen on different address:port pairs.
mail
Syntax: mail { . . . }
Default
Context: main
Provides the configuration file context in which the mail server directives
are specified.
protocol
Syntax: protocol imap | pop3 | smtp;
Default
Context: server
Sets the protocol for a proxied server. Supported protocols are IMAP,
POP3, and SMTP.
If the directive is not set, the protocol can be detected automatically based
on the well-known port specified in the listen directive:
resolver
Syntax: resolver address . . . [valid=time];
Syntax: resolver off;
Default off
Context: mail, server
Configures name servers used to find the clients hostname to pass it to the
authentication server, and in the XCLIENT command when proxying SMTP.
For example:
Before version 1.1.9, tuning of caching time was not possible, and nginx
always cached answers for the duration of 5 minutes.
resolver timeout
Syntax: resolver_timeout time;
Default 30s
Context: mail, server
r es o lv e r_ t im e ou t 5 s ;
server
Syntax: server { . . . }
Default
Context: mail
server name
Syntax: server_name name;
Default hostname
Context: mail, server
so keepalive
Syntax: so_keepalive on | off;
Default off
Context: mail, server
timeout
Syntax: timeout time;
Default 60s
Context: mail, server
Sets the timeout that is used before proxying to the backend starts.
4.2.1 Directives
auth http
Syntax: auth_http URL;
Default
Context: mail, server
Sets the URL of the HTTP authentication server. The protocol is described
below.
Appends the Auth-SSL-Cert header with the client certificate in the PEM
format (urlencoded) to requests sent to the authentication server.
4.2.2 Protocol
The HTTP protocol is used to communicate with the authentication server.
The data in the response body is ignored, the information is passed only in
the headers.
Examples of requests and responses:
Request:
Good response:
Bad response:
Good response:
If proxying SMTP does not require authentication, the request will look as
follows:
For the SSL/TLS client connection (1.7.11), the Auth-SSL header is added,
and Auth-SSL-Verify will contain the result of client certificate verification,
if enabled: SUCCESS, FAILED, and NONE if a certificate was not present.
When the client certificate was present, its details are passed in the following
request headers: Auth-SSL-Subject, Auth-SSL-Issuer, Auth-SSL-Serial,
and Auth-SSL-Fingerprint. If auth http pass client cert is enabled, the
certificate itself is passed in the Auth-SSL-Cert header. The request will look
as follows:
4.3.1 Directives
proxy buffer
Syntax: proxy_buffer size;
Default 4k|8k
Context: mail, server
Sets the size of the buffer used for proxying. By default, the buffer size is
equal to one memory page. Depending on a platform, it is either 4K or 8K.
proxy timeout
Syntax: proxy_timeout timeout;
Default 24h
Context: mail, server
Defines a timeout used after the proxying to the backend had started.
xclient
Syntax: xclient on | off;
Default on
Context: mail, server
XCLIENT
If the name found by the client IP address points to the same address, it
is passed in the NAME parameter of the XCLIENT command. If the name could
not be found, points to a different address, or resolver is not specified, the
[UNAVAILABLE] is passed in the NAME parameter. If an error has occurred in
the process of resolving, the [TEMPUNAVAIL] value is used.
If XCLIENT is disabled then nginx passes the EHLO command with the server
name when connecting to the backend if the client has passed EHLO, or HELO
with the server name, otherwise.
4.4.1 Summary
The ngx_mail_ssl_module module provides the necessary support for a
mail proxy server to work with the SSL/TLS protocol.
This module is not built by default, it should be enabled with the
--with-mail_ssl_module configuration parameter.
4.4.2 Directives
ssl
Syntax: ssl on | off;
Default off
Context: mail, server
ssl certificate
Syntax: ssl_certificate file;
Default
Context: mail, server
Specifies a file with the certificate in the PEM format for the given server. If
intermediate certificates should be specified in addition to a primary certificate,
they should be specified in the same file in the following order: the primary
certificate comes first, then the intermediate certificates. A secret key in the
PEM format may be placed in the same file.
Specifies a file with the secret key in the PEM format for the given server.
ssl ciphers
Syntax: ssl_ciphers ciphers;
Default HIGH:!aNULL:!MD5
Context: mail, server
Specifies the enabled ciphers. The ciphers are specified in the format
understood by the OpenSSL library, for example:
ssl_ciphers ALL :! aNULL :! EXPORT56 : RC4 + RSA :+ HIGH :+ MEDIUM :+ LOW :+ SSLv2 :+ EXP ;
The full list can be viewed using the openssl ciphers command.
ssl crl
Syntax: ssl_crl file;
Default
Context: mail, server
Specifies a file with revoked certificates (CRL) in the PEM format used to
verify client certificates.
ssl dhparam
Syntax: ssl_dhparam file;
Default
Context: mail, server
This directive appeared in version 0.7.2.
Specifies a file with passphrases for secret keys where each passphrase is
specified on a separate line. Passphrases are tried in turn when loading the
key.
Example:
mail {
s s l _ p a s s w o r d _ f i l e / etc / keys / global . pass ;
...
server {
server_name mail1 . example . com ;
s s l _ c e r t i f i c a t e _ k e y / etc / keys / first . key ;
}
server {
server_name mail2 . example . com ;
Specifies that server ciphers should be preferred over client ciphers when
the SSLv3 and TLS protocols are used.
ssl protocols
Syntax: ssl_protocols [SSLv2] [SSLv3] [TLSv1] [TLSv1.1] [TLSv1.2];
Default SSLv3 TLSv1 TLSv1.1 TLSv1.2
Context: mail, server
Sets the types and sizes of caches that store session parameters. A cache
can be of any of the following types:
off
the use of a session cache is strictly prohibited: nginx explicitly tells a
client that sessions may not be reused.
none
the use of a session cache is gently disallowed: nginx tells a client that
sessions may be reused, but does not actually store session parameters
in the cache.
builtin
a cache built in OpenSSL; used by one worker process only. The cache
size is specified in sessions. If size is not given, it is equal to 20480
sessions. Use of the built-in cache can cause memory fragmentation.
shared
a cache shared between all worker processes. The cache size is specified
in bytes; one megabyte can store about 4000 sessions. Each shared cache
should have an arbitrary name. A cache with the same name can be used
in several servers.
but using only shared cache without the built-in cache should be more
efficient.
Sets a file with the secret key used to encrypt and decrypt TLS session
tickets. The directive is necessary if the same key has to be shared between
multiple servers. By default, a randomly generated key is used.
If several keys are specified, only the first key is used to encrypt TLS session
tickets. This allows configuring key rotation, for example:
s s l _ s e s s i o n _ t i c k e t _ k e y current . key ;
s s l _ s e s s i o n _ t i c k e t _ k e y previous . key ;
The file must contain 48 bytes of random data and can be created using
the following command:
Specifies a time during which a client may reuse the session parameters
stored in a cache.
starttls
Syntax: starttls on | off | only;
Default off
Context: mail, server
on
allow usage of the STLS command for the POP3 and the STARTTLS
command for the IMAP;
off
deny usage of the STLS and STARTTLS commands;
only
require preliminary TLS transition.
4.5.1 Directives
imap auth
Syntax: imap_auth method . . . ;
Default plain
Context: mail, server
imap capabilities
Syntax: imap_capabilities extension . . . ;
Default IMAP4 IMAP4rev1 UIDPLUS
Context: mail, server
Sets the IMAP protocol extensions list that is passed to the client in
response to the CAPABILITY command. The authentication methods specified
in the imap auth and STARTTLS directives are automatically added to this
list if the starttls directive is enabled.
It makes sense to specify the extensions supported by the IMAP backends to
which the clients are proxied (if these extensions are related to commands used
after the authentication, when nginx transparently proxies a client connection
to the backend).
The current list of standardized extensions is published at www.iana.org.
Sets the IMAP commands read buffer size. By default, the buffer size is
equal to one memory page. This is either 4K or 8K, depending on a platform.
4.6.1 Directives
pop3 auth
Syntax: pop3_auth method . . . ;
Default plain
Context: mail, server
plain
USER/PASS, AUTH PLAIN, AUTH LOGIN. It is not possible to disable
these methods.
apop
APOP. In order for this method to work, the password must be stored
unencrypted.
cram-md5
AUTH CRAM-MD5. In order for this method to work, the password
must be stored unencrypted.
pop3 capabilities
Syntax: pop3_capabilities extension . . . ;
Default TOP USER UIDL
Context: mail, server
Sets the POP3 protocol extensions list that is passed to the client in
response to the CAPA command.
The authentication methods specified in the pop3 auth and (SASL
extension) and STLS directives, are automatically added to this list if the
starttls directive is enabled.
It makes sense to specify the extensions supported by the POP3 backends
to which the clients are proxied (if these extensions are related to commands
used after the authentication, when nginx transparently proxies the client
connection to the backend).
The current list of standardized extensions is published at www.iana.org.
4.7.1 Directives
smtp auth
Syntax: smtp_auth method . . . ;
Default login plain
Context: mail, server
login
AUTH LOGIN
plain
AUTH PLAIN
cram-md5
AUTH CRAM-MD5. In order for this method to work, the password
must be stored unencrypted.
none
Authentication is not required.
smtp capabilities
Syntax: smtp_capabilities extension . . . ;
Default
Context: mail, server
Sets the SMTP protocol extensions list that is passed to the client in
response to the EHLO command. Authentication methods specified in the
smtp auth directive are automatically added to this list.
It makes sense to specify the extensions supported by the MTA to which
the clients are proxied (if these extensions are related to commands used after
the authentication, when nginx transparently proxies the client connection to
the backend).
The current list of standardized extensions is published at www.iana.org.
Miscellaneous
311
CHAPTER 5. MISCELLANEOUS 5.1. HIGH AVAILABILITY SUPPORT FOR NGINX PLUS
IP address of the local and remote nodes (one of which will be configured
as a master, the other one as a backup.
vrrp_script c h k _ n g i n x _ s e r v i c e {
script "/ usr / libexec / keepalived / nginx - ha - check "
interval 3
weight 50
}
vrrp_instance VI_1 {
interface eth0
state BACKUP
priority 101
v i r t u a l _ r o u t e r _ i d 51
advert_int 1
unicast_src_ip 1 92.1 68.1 00.1 00
unicast_peer {
192 .16 8.10 0.10 1
}
authentication {
auth_type PASS
auth_pass f 8 f 0 e 5 1 1 4 c b e 0 3 1 a 3 e 1 e 6 2 2 d a f 1 8 f 8 2 a
}
virtual_ipaddress {
192 .16 8.10 0.15 0
}
track_script {
chk_nginx_service
}
notify "/ usr / libexec / keepalived / nginx - ha - notify "
}
Each node in the HA setup needs its own copy of the configuration
file, with values for the priority, unicast_src_ip, and unicast_peer
directives that are appropriate to the nodes status (master or backup).
The priority of the first node (which has a base priority of 101) is set to
151.
The priority of the second node (which has a base priority of 100) is set
to 150.
The first node has higher priority (151 in this case) and becomes master.
Use the interval directive to specify how often the check script executes, in
seconds (it is set to 3 in the default configuration). Note that the check also
fails when the timeout is reached (by default, the timeout is the same as the
check interval).
Use the rise and fall directives to specify how many times the script
must succeed or fail before action is taken (they are not set in the default
configuration).
The default script provided with the nginx-ha-keepalived package checks
if nginx is up. We recommend creating additional scripts as appropriate for
your local setup.
virtual_ipaddress {
192 .16 8.10 0.15 0
192 .16 8.10 0.20 0
1234:5678:9 abc : def ::1/64
}
Feb 27 14:42:04 centos7 -1 systemd : Starting LVS and VRRP High Availability
Monitor ...
Feb 27 14:42:04 centos7 -1 Keepalived [19242]: Starting Keepalived v1 .2.15
(02/26 ,2015)
Feb 27 14:42:04 centos7 -1 Keepalived [19243]: Starting VRRP child process ,
pid =19244
Feb 27 14:42:04 centos7 -1 Keep aliv ed_ vrrp [19244]: Registering Kernel
netlink reflector
Feb 27 14:42:04 centos7 -1 Keep aliv ed_ vrrp [19244]: Registering Kernel
netlink command channel
Feb 27 14:42:04 centos7 -1 Keep aliv ed_ vrrp [19244]: Registering gratuitous
ARP shared channel
Feb 27 14:42:05 centos7 -1 systemd : Started LVS and VRRP High Availability
Monitor .
Feb 27 14:42:05 centos7 -1 Keep aliv ed_ vrrp [19244]: Opening file / etc /
keepalived / keepalived . conf .
Feb 27 14:42:05 centos7 -1 Keep aliv ed_ vrrp [19244]: Truncating auth_pass to
8 characters
Feb 27 14:42:05 centos7 -1 Keep aliv ed_ vrrp [19244]: Configuration is using :
64631 Bytes
Feb 27 14:42:05 centos7 -1 Keep aliv ed_ vrrp [19244]: Using LinkWatch kernel
netlink reflector ...
Feb 27 14:42:05 centos7 -1 Keep aliv ed_ vrrp [19244]: VRRP_Instance ( VI_1 )
Entering BACKUP STATE
Feb 27 14:42:05 centos7 -1 Keep aliv ed_ vrrp [19244]: VRRP sockpool : [ ifindex
(2) , proto (112) , unicast (1) , fd (14 ,15) ]
Feb 27 14:42:05 centos7 -1 nginx - ha - keepalived : Transition to state BACKUP
on VRRP instance VI_1 .
Feb 27 14:42:05 centos7 -1 Keep aliv ed_ vrrp [19244]: VRRP_Script (
c h k _ n g i n x _ s e r v i c e ) succeeded
Feb 27 14:42:06 centos7 -1 Keep aliv ed_ vrrp [19244]: VRRP_Instance ( VI_1 )
forcing a new MASTER election
Feb 27 14:42:06 centos7 -1 Keep aliv ed_ vrrp [19244]: VRRP_Instance ( VI_1 )
forcing a new MASTER election
Feb 27 14:42:07 centos7 -1 Keep aliv ed_ vrrp [19244]: VRRP_Instance ( VI_1 )
Transition to MASTER STATE
Feb 27 14:42:08 centos7 -1 Keep aliv ed_ vrrp [19244]: VRRP_Instance ( VI_1 )
Entering MASTER STATE
Feb 27 14:42:08 centos7 -1 Keep aliv ed_ vrrp [19244]: VRRP_Instance ( VI_1 )
setting protocol VIPs .
Feb 27 14:42:08 centos7 -1 Keep aliv ed_ vrrp [19244]: VRRP_Instance ( VI_1 )
Sending gratuitous ARPs on eth0 for 19 2.16 8.10 0.15 0
Feb 27 14:42:08 centos7 -1 nginx - ha - keepalived : Transition to state MASTER
on VRRP instance VI_1 .
Feb 27 14:42:13 centos7 -1 Keep aliv ed_ vrrp [19244]: VRRP_Instance ( VI_1 )
Sending gratuitous ARPs on eth0 for 19 2.16 8.10 0.15 0
If the system log does not explain the source of a problem, run the tcpdump
command with the following parameters to display the VRRP advertisements
that are sent on the local network:
If you have multiple VRRP instances on the local network and want to
filter the traffic for select hosts, include the host parameter to specify the IP
address that is defined in the unicast_peer block, as in the following example:
centos7 -1 # tcpdump - vvv - ni eth0 proto vrrp and host 192 .168 .100 .101
tcpdump : listening on eth0 , link - type EN10MB ( Ethernet ) , capture size
65535 bytes
14 :48: 27.1 8810 0 IP ( tos 0 xc0 , ttl 255 , id 382 , offset 0 , flags [ none ] ,
proto VRRP (112) , length 40)
19 2.16 8.10 0.10 0 > 1 9 2. 1 68 . 10 0 .1 01 : vrrp 1 92.1 68. 100. 100 >
1 92 . 16 8 .1 0 0. 10 1 : VRRPv2 , Advertisement , vrid 51 , prio 151 ,
authtype simple , intvl 1s , length 20 , addrs : 192 .16 8.10 0.15 0 auth
" f8f0e511 "
5.1.8 Miscellaneous
Note that NGINX configuration files on both nodes must define the services
that are being made highly available. Keeping the configuration files in sync
is outside the scope of the provided clustering software.
The nginx-ha-keepalived package comes with numerous configuration
examples, in the /usr/share/doc/nginx-ha-keepalived/ directory. They
show how to configure numerous aspects of an HA setup.
This appendix contains the most important changes that may apply to both NGINX Plus
and nginx/OSS. Full changelog for nginx/OSS is available in the packages and by the
following link: http://nginx.org/en/CHANGES
317
APPENDIX A. CHANGELOG FOR NGINX PLUS
Legal Notices
At the release moment of this document, there are three versions of NGINX Plus package
in distribution:
NGINX Plus (package name is nginx-plus)
NGINX Plus Lua (package name is nginx-plus-lua)
NGINX Plus Extras (package name is nginx-plus-extras)
These distributions contain a different set of various open source software components
described below.
Open source components included in NGINX Plus, NGINX Plus Lua and NGINX Plus
Extras are:
nginx/OSS, distributed under 2-clause BSD license.
1. Redistributions of source code must retain the above copyright notice, this list
of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice,
this list of conditions and the following disclaimer in the documentation
and/or other materials provided with the distribution.
320
APPENDIX B. LEGAL NOTICES
without restriction, including without limitation the rights to use, copy, modify,
merge, publish, distribute, sublicense, and/or sell copies of the Software, and to
permit persons to whom the Software is furnished to do so, subject to the following
conditions:
The above copyright notice and this permission notice shall be included in all copies
or substantial portions of the Software.
THE SOFTWARE IS PROVIDED AS IS, WITHOUT WARRANTY OF ANY
KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE
WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR
PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS
OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR
OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
Open source components included in NGINX Plus Lua and NGINX Plus Extras are:
Nginx Development Kit (NDK) module, distributed under BSD license.
Copyright Marcus Clyne
Redistributions of source code must retain the above copyright notice, this list
of conditions and the following disclaimer.
Redistributions in binary form must reproduce the above copyright notice,
this list of conditions and the following disclaimer in the documentation
and/or other materials provided with the distribution.
Redistributions of source code must retain the above copyright notice, this list
of conditions and the following disclaimer.
Redistributions in binary form must reproduce the above copyright notice,
this list of conditions and the following disclaimer in the documentation
and/or other materials provided with the distribution.
Redistributions of source code must retain the above copyright notice, this list
of conditions and the following disclaimer.
Redistributions in binary form must reproduce the above copyright notice,
this list of conditions and the following disclaimer in the documentation
and/or other materials provided with the distribution.
The above copyright notice and this permission notice shall be included in all copies
or substantial portions of the Software.
Redistributions of source code must retain the above copyright notice, this list
of conditions and the following disclaimer.
Redistributions in binary form must reproduce the above copyright notice,
this list of conditions and the following disclaimer in the documentation
and/or other materials provided with the distribution.
325
INDEX INDEX