search
HomeOperation and MaintenanceLinux Operation and MaintenanceDetailed introduction to TOMCAT cluster under NGINX reverse proxy in LINUX

The following editor will bring you an article about TOMCAT cluster under NGINX reverse proxy in LINUX (detailed explanation). The editor thinks it’s pretty good, so I’ll share it with you now and give it as a reference. Let’s follow the editor and take a look.

Nginx has the characteristics of reverse proxy (note the difference with forward proxy) and load balancing.

This time Nginx is installed on the linux machine 192.168.1.108. To install Nginx, you must first install the openssl library, gcc, PCRE, zlib library, etc.

Tomcat is installed on two machines, 192.168.1.168 and 192.168.1.178. The client accesses the project content deployed by Tomcat in

192.168.1.168 and 192.168.1.178 by accessing the 192.168.1.108 reverse proxy.

1. Install Nginx under Linux (machine 192.168.1.108)

Install openssl library.

yum install -y openssl openssl-devel

Need to install gcc: yum install gcc-c++

Install PCRE yum install -y pcre pcre-devel

##Install zlib library

yum install -y zlib zlib-devel

##Installed under /usr/local/


Extract tar -zxvf nginx-1.13.0.tar.gz

##Enter the directory and run ./configure to generate makefile

There is an extra makefile in the directory

Compile make

Installation: make install

After completion, there will be an additional nginx in the local directory

Start nginx

Enter sbin directory execution./nginx

##View startup results

Window access 192.168.1.108 nginx default port is 80

Close ./nginx -s s

top

After closing, the corresponding data cannot be accessed at this time.

./nginx -s reload can reload the

configuration file after startup Suitable for modifying the configuration file during startup

2. Install Tomcat under Linux (192.168.1.168 and 192.168.1.178 machines)

The installation process is very simple and will not be described. . Install Tomcat on the other two Linux machines (192.168.1.168 and 192.168.1.178), and deploy any project nginxTest. One content is 1111... and the other is 22222...

At this time, I am accessing a different IP address, and I have not yet configured Nginx as a reverse proxy server.

3. Nginx serves as a reverse proxy server

Mainly configure the contents of nginx.confa.

Configure server

group, add upstream configuration between http{} nodes.

192.168.1.168:9090 and 192.168.1.178:9191 are Tomcat of the other two Linux machines (see 2 above)

upstream lxstest{
server 192.168.1.168:9090;
server 192.168.1.178:9191;
}

b. 修改nginx监听的端口号80,改为7777(随便改个都行,不改也行)。

server {
listen 7777;
......
}

c. 在location{}中,利用proxy_pass配置反向代理地址;此处“http://”不能少,后面的地址要和第一步upstream定义的名称保持一致。(上述的是 lxstest,所以http://lxstest)

location / {
root html;
index index.html index.htm;
proxy_pass http://lxstest;
}

上述修改完后,启动 192.168.1.108机器的Nginx

最后访问 192.168.1.108:7777/nginxTest 同一个地址出来不同的页面,说明一会儿访问的是192.168.1.168,一会儿访问的是192.168.1.178

http://192.168.1.108:7777

等同于====

等同于=====

最后就会找到对应的Tomcat

再找到对应的nginxTest工程。

The above is the detailed content of Detailed introduction to TOMCAT cluster under NGINX reverse proxy in LINUX. For more information, please follow other related articles on the PHP Chinese website!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Maintenance Mode in Linux: When and Why to Use ItMaintenance Mode in Linux: When and Why to Use ItApr 25, 2025 am 12:15 AM

The timing and reasons for using Linux maintenance mode: 1) When the system starts up, 2) When performing major system updates or upgrades, 3) When performing file system maintenance. Maintenance mode provides a safe and controlled environment, ensuring operational safety and efficiency, reducing impact on users, and enhancing system security.

Linux: Essential Commands and OperationsLinux: Essential Commands and OperationsApr 24, 2025 am 12:20 AM

Indispensable commands in Linux include: 1.ls: list directory contents; 2.cd: change working directory; 3.mkdir: create a new directory; 4.rm: delete file or directory; 5.cp: copy file or directory; 6.mv: move or rename file or directory. These commands help users manage files and systems efficiently by interacting with the kernel.

Linux Operations: Managing Files, Directories, and PermissionsLinux Operations: Managing Files, Directories, and PermissionsApr 23, 2025 am 12:19 AM

In Linux, file and directory management uses ls, cd, mkdir, rm, cp, mv commands, and permission management uses chmod, chown, and chgrp commands. 1. File and directory management commands such as ls-l list detailed information, mkdir-p recursively create directories. 2. Permission management commands such as chmod755file set file permissions, chownuserfile changes file owner, and chgrpgroupfile changes file group. These commands are based on file system structure and user and group systems, and operate and control through system calls and metadata.

What is Maintenance Mode in Linux? ExplainedWhat is Maintenance Mode in Linux? ExplainedApr 22, 2025 am 12:06 AM

MaintenanceModeinLinuxisaspecialbootenvironmentforcriticalsystemmaintenancetasks.Itallowsadministratorstoperformtaskslikeresettingpasswords,repairingfilesystems,andrecoveringfrombootfailuresinaminimalenvironment.ToenterMaintenanceMode,interrupttheboo

Linux: A Deep Dive into Its Fundamental PartsLinux: A Deep Dive into Its Fundamental PartsApr 21, 2025 am 12:03 AM

The core components of Linux include kernel, file system, shell, user and kernel space, device drivers, and performance optimization and best practices. 1) The kernel is the core of the system, managing hardware, memory and processes. 2) The file system organizes data and supports multiple types such as ext4, Btrfs and XFS. 3) Shell is the command center for users to interact with the system and supports scripting. 4) Separate user space from kernel space to ensure system stability. 5) The device driver connects the hardware to the operating system. 6) Performance optimization includes tuning system configuration and following best practices.

Linux Architecture: Unveiling the 5 Basic ComponentsLinux Architecture: Unveiling the 5 Basic ComponentsApr 20, 2025 am 12:04 AM

The five basic components of the Linux system are: 1. Kernel, 2. System library, 3. System utilities, 4. Graphical user interface, 5. Applications. The kernel manages hardware resources, the system library provides precompiled functions, system utilities are used for system management, the GUI provides visual interaction, and applications use these components to implement functions.

Linux Operations: Utilizing the Maintenance ModeLinux Operations: Utilizing the Maintenance ModeApr 19, 2025 am 12:08 AM

Linux maintenance mode can be entered through the GRUB menu. The specific steps are: 1) Select the kernel in the GRUB menu and press 'e' to edit, 2) Add 'single' or '1' at the end of the 'linux' line, 3) Press Ctrl X to start. Maintenance mode provides a secure environment for tasks such as system repair, password reset and system upgrade.

Linux: How to Enter Recovery Mode (and Maintenance)Linux: How to Enter Recovery Mode (and Maintenance)Apr 18, 2025 am 12:05 AM

The steps to enter Linux recovery mode are: 1. Restart the system and press the specific key to enter the GRUB menu; 2. Select the option with (recoverymode); 3. Select the operation in the recovery mode menu, such as fsck or root. Recovery mode allows you to start the system in single-user mode, perform file system checks and repairs, edit configuration files, and other operations to help solve system problems.

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

SecLists

SecLists

SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SAP NetWeaver Server Adapter for Eclipse

SAP NetWeaver Server Adapter for Eclipse

Integrate Eclipse with SAP NetWeaver application server.

SublimeText3 Linux new version

SublimeText3 Linux new version

SublimeText3 Linux latest version

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)