# Deploying with Nginx
Nginx is an extremely fast, battle tested, and easy-to-configure HTTP server and proxy. While Jiny supports directly serving HTTP requests with or without TLS, proxying behind Nginx can provide increased performance, security, and ease-of-use.
Note
We recommend proxying Jiny HTTP servers behind Nginx.
# Overview
What does it mean to proxy an HTTP server? In short, a proxy acts as a middleman between the public internet and your HTTP server. Requests come to the proxy and then it sends them to Jiny.
An important feature of this middleman proxy is that it can alter or even redirect the requests. For instance, the proxy can require that the client use TLS (https), rate limit requests, or even serve public files without talking to your Jiny application.
# More Detail
The default port for receiving HTTP requests is port 80
(and 443
for HTTPS). When you bind a Jiny server to port 80
, it will directly receive and respond to the HTTP requests that come to your server. When adding a proxy like Nginx, you bind Jiny to an internal port, like port 1234
.
Note
Ports greater than 1024 do not require sudo
to bind.
When Jiny is bound to a port besides 80
or 443
, it will not be accessible to the outside internet. You then bind Nginx to port 80
and configure it to route requests to your Jiny server bound at port 1234
(or whichever port you've chosen).
And that's it. If Nginx is properly configured, you will see your Jiny app responding to requests on port 80
. Nginx proxies the requests and responses invisibly.
# Install Nginx
The first step is installing Nginx. One of the great parts of Nginx is the tremendous amount of community resources and documentation surrounding it. Because of this, we will not go into great detail here about installing Nginx as there is almost definitely a tutorial for your specific platform, OS, and provider.
Tutorials:
- How To Install Nginx on Ubuntu 20.04
- How To Install Nginx on Ubuntu 18.04
- How to Install Nginx on CentOS 8
- How To Install Nginx on Ubuntu 16.04
- How to Deploy Nginx on Heroku
# Package Managers
Nginx can be installed through package managers on Linux.
# Ubuntu
sudo apt-get update
sudo apt-get install nginx
# CentOS and Amazon Linux
sudo yum install nginx
# Fedora
sudo dnf install nginx
# Validate Installation
Check whether Nginx was installed correctly by visiting your server's IP address in a browser
http://server_domain_name_or_IP
# Service
The service can be started or stopped.
sudo service nginx stop
sudo service nginx start
sudo service nginx restart
# Booting Jiny
Nginx can be started and stopped with the sudo service nginx ...
commands. You will need something similar to start and stop your Jiny server.
There are many ways to do this, and they depend on which platform you are deploying to. Check out the Supervisor instructions to add commands for starting and stopping your Jiny app.
# Configure Proxy
The configuration files for enabled sites can be found in /etc/nginx/sites-enabled/
.
Create a new file or copy the example template from /etc/nginx/sites-available/
to get started.
Here is an example configuration file for a Jiny project called Hello
in the home directory.
server {
server_name hello.com;
listen 80;
root /home/Jiny/Hello/Public/;
location @proxy {
proxy_pass http://127.0.0.1:1234;
proxy_pass_header Server;
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_pass_header Server;
proxy_connect_timeout 3s;
proxy_read_timeout 10s;
}
}
This configuration file assumes the Hello
project binds to port 1234
when started in production mode.
# Serving Files
Nginx can also serve public files without asking your Jiny app. This can improve performance by freeing up the Jiny process for other tasks under heavy load.
server {
...
# Serve all public/static files via nginx and then fallback to Jiny for the rest
location / {
try_files $uri @proxy;
}
location @proxy {
...
}
}
# TLS
Adding TLS is relatively straightforward as long as the certificates have been properly generated. To generate TLS certificates for free, check out Let's Encrypt.
server {
...
listen 443 ssl;
ssl_certificate /etc/letsencrypt/live/hello.com/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/hello.com/privkey.pem;
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
ssl_prefer_server_ciphers on;
ssl_dhparam /etc/ssl/certs/dhparam.pem;
ssl_ciphers 'ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:CAMELLIA:DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA';
ssl_session_timeout 1d;
ssl_session_cache shared:SSL:50m;
ssl_stapling on;
ssl_stapling_verify on;
add_header Strict-Transport-Security max-age=15768000;
...
location @proxy {
...
}
}
The configuration above are the relatively strict settings for TLS with Nginx. Some of the settings here are not required, but enhance security.
← Supervisor Benchmark →