El experimentador que no sabe lo que está buscando no comprenderá lo que encuentra. (Claude Bernard).
Building a Quick Reverse Proxy
Obtener enlace
Facebook
X
Pinterest
Correo electrónico
Otras aplicaciones
Thanks to: https://joshuarogers.net
In theory, a reverse proxy is extremely similar. The difference is that whereas a proxy server normally proxies outbound traffic, a reverse proxy proxies inbound traffic. By parsing all of the incoming requests, we can perform filtering and load balancing, or as we plan in this case, we can hide several servers behind a pool of IPs and decide which one to should be used to field our request based on the HTTP headers.
###The Setup### Assuming we’ve already got an Ubuntu machine available, we should be able to get NGinx installed extremely quickly. If you’re using another platform, be it Windows, Mac, or another Linux, you can still run NGinx, but you’ll need to find the correct installation method for your particular system.
sudo apt-get install nginx
Simple enough.
###Configuration### Next, we’ll need to add some configuration directives for NGinx to follow. For the following steps, I’ll assume NGinx configuration to reside in /etc/nginx. Let’s create a new configuration file in /etc/nginx/sites-available. We’ll name it after the site we’re proxying. In this case, we’ll do /etc/nginx/sites-available/jira.conf.
The first thing that we’re going to need to add is a definition of our upstream server. In our case, we’ll assume that Jira is using it’s default port (8080) and that it is hosted internally on 10.1.2.3.
upstreamjira{server10.1.2.3:8080;}
Next we’re going to need to let NGinx know which requests should be handled by our new rules. For this, we’ll add a server section to the configuration. This will tell it to listen on port 80 of all NICs, and to only field requests for jira.example.com.
server{listen*:80;server_namejira.example.com;}
Now that we’ve directed NGinx which sites should be affected by our directives, we should define what the directives actually are. For this, we’ll add a location item inside of the server item.
We’re doing several things here. To start with, we’re defining that requests should be proxied to the upstream that we defined earlier. 2 Next, we’re going to define a few headers that should be passed along upstream. To start with, we’re going to make sure that the host header being sent to the final server is the same as we received. Next, we add some information about the machine requesting the page into X-Real-IP and X-Forwarded-For. Finally, we set a three minute timeout for connecting to the proxy, and another three minutes for receiving, or sending data. 3
At this point, our completed configuration file should look as follows:
###Verification### With the configuration complete, we have a total of three more actions before we’re done. Earlier, we placed our configuration file in /etc/nginx/sites-available. While it is good to keep a copy of the configuration there, NGinx won’t actually load it from here, so we need to create a symlink to this file in sites-enabled.
Now that we’ve linked the file into place, let’s have NGinx verify our configuration doesn’t have a problem.
sudo nginx -t
nginx: the configuration file /etc/nginx/nginx.conf syntax is ok
nginx: configuration file /etc/nginx/nginx.conf test is successful
If there were no errors, we should be able to restart NGinx now.
sudo service nginx restart
Requests to jira.example.com should now show our actual Jira instance, without having to dedicate an IP just for it. By repeating this strategy at the network gateway, we can greatly expand the number of servers we can provide external access for without having to add more IPs. 45
###Edit### The last configuration file said ‘localhost’ originally instead of ‘10.1.2.3’. Props to David Ruttka for noticing. Also, added note four about timeout length.
###Footnotes### [^1]: They noticed. Oh, believe me, they noticed. They’re probably emailing you about it right now.
Actual content filtering assumes that we aren’t using HTTPS. At that point, the best we could do would really be host-based filtering. ↩
Technically we didn’t have to defined the upstream. We could have just defined our address in the proxy_pass line. While this would have worked, it doesn’t lend itself to a maintainable script, as addresses change or fallbacks are added. ↩
Three minutes is a bit long, right? Well, most of the time, yes. If you’re doing bulk operations on a large number of items in Jira, however, you’ll discover that everything is run in one go rather than in batches. Now, three minutes goes from being a long stretch of time to a gamble that it might not be long enough. ↩
An important detail here. We now have the capability to expose large numbers of internal servers to our public network. However, it seems a reminder might be necessary that could != should. ↩
It is important to note that this only works for HTTP and HTTPS traffic. ↩
Gracias a: http://profesoremiliobarco.blogspot.com/ El comando FOR sirve para ejecutar bucles de instrucciones, y es una instrucción que se encuentra disponible en todos los lenguajes de programación. Un bucle son varias repeticiones de algunas instrucciones. Este comando suele ser el más complicado de entender para las personas que empiezan a escribir archivos BAT complejos. Aqui intentaré explicar todas las opciones y usos del comando FOR, así como intentar resolver las dudas que los usuarios de Internet me puedan plantear. La sintaxis normal del comando FOR es: FOR %var IN (lista) DO ( comando comando ... ) Pero si lo vamos a usar dentro de un archivo BAT será así: FOR %%var IN (lista) DO ( comando comando ... ) Observa que la variable "var" ahora va precedida por dos simbolos de "%". Además, si este for está dentro de un archivo BA...
Thank to: https://techviewleo.com/ iSCSI is a protocol used to transport packets over TCP/IP networks. It is often used to set up shared storage where multiple servers can access central resources as if they existed on the local device. This setup works using a client-server model with the iSCSI target holding the block storage and the iSCSI initiator configured to send and receive packets from the target. In our previous guide, we walked through how to configure the iSCSI Target on Ubuntu 22.04|20.04. Today we will cover the required steps on how to configure iSCSI Initiator on Ubuntu 22.04|20.04. Requirements This guide will work best if you have the following: Ubuntu 22.04|20.04 iSCSI target installed and configured. The guide below can be used to install and configure the iSCSI target on Ubuntu 22.04|20.04. How To Configure iSCSI Target on Ubuntu Once the requirements have been met, proceed as shown. #1. Install iSCSI initiator on...
Thanks to: https://www.telecomworld101.com/ Session Initiation Protocol (SIP)) is a signalling protocol used for setting up and tearing down Voice over Internet Protocol (VOIP) calls . Voice over Internet Protocol makes the transition from traditional conference calls to conference calling via the world wide web. A SIP call uses two protocols: SIP and RTP. Real Time Protocol (RTP) is used for the transfer of the actual voice data. If you want to find out more about SIP visit Wikipedia's SIP page . The first step in setting up an SIP trunk is to draw a picture of what you need to do. Here's an example of a simple PBX to PBX connection that will be using a User/Peer pairing to form a SIP trunk. The two PBXs are name 106 and 111 after their IP host address. They could very well be named Montreal and New York. PBX 106 has all their extensions starting with 3xxx while PBX 111 has all of their extensions starting with 2xxx. This will be handy w...
Comentarios
Publicar un comentario
Dime si la información de este blog te sirvio.