mastodon.xyz is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Mastodon instance, open to everyone, but mainly English and French speaking.

Administered by:

Server stats:

714
active users

#nginx

6 posts5 participants0 posts today
Dusty<p><span class="h-card" translate="no"><a href="https://mstdn.chrisalemany.ca/@chris" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>chris</span></a></span> I used to use that <a href="https://autistics.life/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nginx</span></a> rtmp module myself, in <a href="https://autistics.life/tags/Debian" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Debian</span></a>. I now use <a href="https://autistics.life/tags/Owncast" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Owncast</span></a> instead - recommended.</p>
:trone: Shalien<p>... <a href="https://mastodon.projetretro.io/tags/certbot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>certbot</span></a> can't figure how to manage hand compiled <a href="https://mastodon.projetretro.io/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nginx</span></a>... like great work there . I would like to NOT have to choose between having zstd / brotli support and automatic tls</p>
mazedlx<p>So, I’ve just replaced <a href="https://wien.rocks/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nginx</span></a> with <a href="https://wien.rocks/tags/caddyserver" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>caddyserver</span></a> thanks to <span class="h-card" translate="no"><a href="https://phpc.social/@theseer" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>theseer</span></a></span> for the talk/workshop at <a href="https://wien.rocks/tags/ipc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipc</span></a> <a href="https://wien.rocks/tags/phpconference" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phpconference</span></a> </p><p>Added bonus: the config file is 10 lines long and is for two hosts, one acting as a reverse proxy. This is brilliant.</p>
Batcastle<p>Working on moving my <span class="h-card" translate="no"><a href="https://mastodon.xyz/@nextcloud" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>nextcloud</span></a></span> off of <a href="https://linuxrocks.online/tags/Linode" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linode</span></a> and over to self-hosting. I was able to clone the drive over the internet, then flash the image to a drive along with making a swap partition and EFI partition. It boots, and connects to the internet, now to get it to play nicely with my <a href="https://linuxrocks.online/tags/NGINX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NGINX</span></a> reverse proxy. It's in a <span class="h-card" translate="no"><a href="https://cloud-native.social/@Docker" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Docker</span></a></span> container so this is going to be interesting.</p>
Problem FoxMy <a class="hashtag" href="https://corteximplant.net/tag/smolweb" rel="nofollow noopener noreferrer" target="_blank">#smolweb</a> <a class="hashtag" href="https://corteximplant.net/tag/selfhost" rel="nofollow noopener noreferrer" target="_blank">#selfhost</a> websites are down again but <a class="hashtag" href="https://corteximplant.net/tag/geminiprotocol" rel="nofollow noopener noreferrer" target="_blank">#geminiProtocol</a> is being served as usual.<br><br>An <a class="hashtag" href="https://corteximplant.net/tag/nginx" rel="nofollow noopener noreferrer" target="_blank">#NGINX</a> IP block list for the IP ranges I'd noted earlier worked for about a minute, long enough for me to watch the light on the WiFi dongle slow to a normal "just me connected" pulse. <br><br>Then it started again, netstat showed two new ranges. I blocked those and watched the cycle repeat again. Different ranges of addresses every time but always resolving to Brazil so I'm assuming the same controlling source which is almost certainly not in Brazil.<br><br>I don't want to region block as that seems extreme and inefficient but I'll keep it as a backup option if I can't make a cookie solution like <span class="h-card"><a class="u-url mention" href="https://social.pollux.casa/@adele" rel="nofollow noopener noreferrer" target="_blank">@<span>adele</span></a></span> suggested work.
Deekshith Allamaneni<p><span class="h-card" translate="no"><a href="https://chaos.social/@kubikpixel" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>kubikpixel</span></a></span> I wonder how it compares to Caddy. They mentioned <a href="https://techhub.social/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a>, <a href="https://techhub.social/tags/NGINX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NGINX</span></a> on their website but not <a href="https://techhub.social/tags/Caddy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Caddy</span></a>.</p>
ShnizmuffiN<p><span class="h-card" translate="no"><a href="https://front-end.social/@kizu" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>kizu</span></a></span> If I had to start my self-hosting journey over again, I'd start with the piece of technology that's responsible for accessing every other piece of technology: the reverse proxy.</p><p>I chose nginx. I wrote my configs by hand for every subdomain. Then, I discovered all of these:</p><p><a href="https://selfh.st/apps/?tag=Reverse+Proxy" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">selfh.st/apps/?tag=Reverse+Pro</span><span class="invisible">xy</span></a></p><p>It's been eight years. You're never going to refactor your reverse proxy. Make a good first choice!</p><p><a href="https://toots.inbutts.lol/tags/selfhosting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>selfhosting</span></a> <a href="https://toots.inbutts.lol/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nginx</span></a></p>
Shoe Bill :yellowShield: :yellowHat: :yellowSparkles: :yellowFivePlus: :yellowCrown:<p>Thinking about setting up an Onion site to mirror this domain.</p><p>I'm running everything through Nginx first, and then having Cloudflare Tunnel talk to Nginx ("everything," at the moment, is just this subdomain, although I just have the other one commented out for now… anyway).</p><p>So, do I just set up my torrc to serve the Onion site from the same port Cloudflare Tunnel talks to, and give Nginx both server names (for the clearnet site and the Onion site respectively), or…?</p><p>Also, is there anything else I need to know, or anything that might improve performance and/or security, or whatever?</p><p>EDIT: oh, and do I need the SSL certificate for the Onion site in order for it to federate properly, or is the one I already have on the clearnet site enough? Asking because, if not, I won't even bother and I'll just serve the Onion site on port 80 and do http only. Thanks.</p><p><a href="https://ultracrepidarian.mysteriar.ch/tags/tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tor</span></a> <a href="https://ultracrepidarian.mysteriar.ch/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Nginx</span></a> <a href="https://ultracrepidarian.mysteriar.ch/tags/cloudflare" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cloudflare</span></a> <a href="https://ultracrepidarian.mysteriar.ch/tags/selfhosted" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SelfHosted</span></a> <a href="https://ultracrepidarian.mysteriar.ch/tags/askfedi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AskFedi</span></a> <a href="https://ultracrepidarian.mysteriar.ch/tags/fedihelp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FediHelp</span></a></p>
zolaris<p>A <a href="https://mastodon.illumos.cafe/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> application runs inside an LX-branded zone, where the <a href="https://mastodon.illumos.cafe/tags/Illumos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Illumos</span></a> kernel (descended from <a href="https://mastodon.illumos.cafe/tags/Solaris" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Solaris</span></a>) natively implements the Linux kernel ABI. A <a href="https://mastodon.illumos.cafe/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a> connection, terminated in a separate Solaris-style zone, routes the application's traffic to a VPN endpoint on an <a href="https://mastodon.illumos.cafe/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a> system running <a href="https://mastodon.illumos.cafe/tags/Nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Nginx</span></a>, which serves <a href="https://mastodon.illumos.cafe/tags/HTTPS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HTTPS</span></a> content on a custom domain.<br>Life is great!</p>
Baa<p>Word on the grapevine is NGINX source-code leaked ​:btr_ikuyo_panic:​<span><br></span><a href="https://mk.absturztau.be/tags/nginx" rel="nofollow noopener noreferrer" target="_blank">#nginx</a></p>
Plone<p>Vitaliy Podoba shows Integrating Plone and Django: A Real-World Case Study with Nginx SSI</p><p><a href="https://2025.ploneconf.org/schedule/talks/integrating-plone-and-django-a-real-world-case-study-with-nginx-ssi" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">2025.ploneconf.org/schedule/ta</span><span class="invisible">lks/integrating-plone-and-django-a-real-world-case-study-with-nginx-ssi</span></a></p><p><a href="https://plone.social/tags/PloneConf2025" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PloneConf2025</span></a> <a href="https://plone.social/tags/CMS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CMS</span></a> <a href="https://plone.social/tags/Plone" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Plone</span></a> <a href="https://plone.social/tags/Python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Python</span></a> <a href="https://plone.social/tags/Volto" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Volto</span></a> <a href="https://plone.social/tags/ReactJS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReactJS</span></a> <a href="https://plone.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a> <a href="https://plone.social/tags/Django" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Django</span></a> <a href="https://plone.social/tags/Nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Nginx</span></a> <a href="https://plone.social/tags/SSI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSI</span></a> <a href="https://plone.social/tags/CaseStudy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CaseStudy</span></a></p>
Joel Carnat ♑ 🤪<p>I have discovered a simple way to host a <code>What's My IP</code>-like service with just a little of <a href="https://gts.tumfatig.net/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nginx</span></a> and <a href="https://gts.tumfatig.net/tags/geolite2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GeoLite2</span></a>. Should you want to do it yourself, here are the notes: <a href="https://www.tumfatig.net/2025/check-your-ip-infos-using-nginx/" rel="nofollow noopener noreferrer" target="_blank">https://www.tumfatig.net/2025/check-your-ip-infos-using-nginx/</a></p><p>If you're not into hosting it yourself, I have also made it available on <a href="https://ip.nogoo.me" rel="nofollow noopener noreferrer" target="_blank">https://ip.nogoo.me</a>, of course running on <a href="https://gts.tumfatig.net/tags/openbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a>.</p><p><a href="https://gts.tumfatig.net/tags/runbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RunBSD</span></a></p>
/dev/loop0<p>I feel defeated, I was not able to make <a href="https://freeradical.zone/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nginx</span></a> running under docker to get the request real ip. It seems like <a href="https://freeradical.zone/tags/docker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>docker</span></a> userland-proxy just fucks it up.</p>
release_candidate<p>Is there a way to have nginx calling blocklistd in NetBSD?</p><p>Like, when it returns 444 or 403 statuses?</p><p><a href="https://mastodon.bsd.cafe/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nginx</span></a> <a href="https://mastodon.bsd.cafe/tags/NetBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetBSD</span></a> <a href="https://mastodon.bsd.cafe/tags/homelab" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>homelab</span></a></p>
Torger Åge Sinnes<p><a href="https://snabelen.no/tags/Vevtenar" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vevtenar</span></a> på <a href="https://snabelen.no/tags/solceller" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>solceller</span></a>. 🤘🎉 </p><p>Ikkje så avansert som <a href="https://solar.lowtechmagazine.com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">solar.lowtechmagazine.com/</span><span class="invisible"></span></a>, men heilt greit proof of concept. </p><p>Lærte og å sette opp <a href="https://snabelen.no/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nginx</span></a> til å levera fleire nettstader. Ikkje så vanskeleg. Alt ein får gjort.... 🤓 <a href="https://snabelen.no/tags/justbecauseican" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>justbecauseican</span></a></p>
Olivier Mehani<p><strong>Enabling HTTP/3 and QUIC in nginx</strong></p><p><a href="https://blog.narf.ssji.net/2025/10/10/enabling-http-3-and-quic-in-nginx/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.narf.ssji.net/2025/10/10/</span><span class="invisible">enabling-http-3-and-quic-in-nginx/</span></a></p><p>Enabling HTTP/3 and QUIC in nginx is relatively straight forwards, and well documented. This was also an opportunity to update my basic configuration.</p><p>tl;dr:</p><p>* `http3 on` and `listen [::]:443 quic reuseport default_server` need to be added.</p><p>* QUIC is over UDP, so the port needs to be opened in the firewall.</p><p>* User-agents need to be told that it is now available., e.g., with an `add_header Alt-Svc ‘h3=”:443″; ma=86400’`.</p><p>* HTTP/3 requires `ssl_protocols TLSv1.3`.</p><p><a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://blog.narf.ssji.net/tag/curl/" target="_blank">#cURL</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://blog.narf.ssji.net/tag/http3/" target="_blank">#http3</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://blog.narf.ssji.net/tag/nginx/" target="_blank">#nginx</a></p>
Thoralf Will 🇺🇦🇮🇱🇹🇼<p>Der <a href="https://soc.umrath.net/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nginx</span></a> proxy manager (npm) hat ein cooles Interface und ist leicht zu bedienen - hat dafür aber eklige Einschränkungen (z.B. nur ein Port pro URL).</p><p>traefik kann echt alles, hat aber kein intuitiv zu bedienendes Interface.</p><p>Dilemma.</p>
Hadi<p>Finally managed to finish rewriting my <a href="https://fosstodon.org/tags/website" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>website</span></a> with a very lean <a href="https://fosstodon.org/tags/Python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Python</span></a> script that exports <a href="https://fosstodon.org/tags/org" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>org</span></a>-mode files to HTML and serves using <a href="https://fosstodon.org/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nginx</span></a>. It needs some polishing down the road, but it does the job a rather heavy <a href="https://fosstodon.org/tags/FastAPI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FastAPI</span></a> app used to do.</p><p><a href="https://hadi.timachi.com/posts/new_website_pandoc_python_nginx" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hadi.timachi.com/posts/new_web</span><span class="invisible">site_pandoc_python_nginx</span></a></p>
Nico -telmich- Schottelius<p>Created a bug report to request <a href="https://ipv6.social/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nginx</span></a>-ingress to move away from <a href="https://ipv6.social/tags/github" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>github</span></a> - see my previous toot for details. <a href="https://github.com/kubernetes/ingress-nginx/issues/14009" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/kubernetes/ingress-</span><span class="invisible">nginx/issues/14009</span></a></p>
Fabio Manganiello<p>Best <a class="hashtag" href="https://manganiello.social/tag/nginx" rel="nofollow noopener noreferrer" target="_blank">#nginx</a> hack to get rid of most of Google’s bots from your website:</p><pre><code>map $http_user_agent $block_user_agent { default 0; # do not block by default ~*"(Nexus 5X)"* 1; } server { if ($block_user_agent) { return 403; } }</code></pre><p>Don’t worry, nobody uses a Nexus 5X anymore.</p><p>For some reason in the past 1-2 years Google bots have stopped abiding to the gentlemen’s convention of using the<code>+http://www.google.com/bot.html</code> string somewhere in their UA and they just dump you user agents like this where they pretend to be a 10-year-old Android device:</p><pre><code>Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5X Build/MMB29P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/139.0.7258.127 Mobile Safari/537.36 (compatible; GoogleOther)</code></pre><p>And, since apparently in some cases they also stopped abiding to the gentlemen’s agreement of respecting the <code>robots.txt</code>, this is probably a more explicit way of keeping them at bay.</p>