


The following editor will bring you an article about TOMCAT cluster under NGINX reverse proxy in LINUX (detailed explanation). The editor thinks it’s pretty good, so I’ll share it with you now and give it as a reference. Let’s follow the editor and take a look.
Nginx has the characteristics of reverse proxy (note the difference with forward proxy) and load balancing.
This time Nginx is installed on the linux machine 192.168.1.108. To install Nginx, you must first install the openssl library, gcc, PCRE, zlib library, etc.
Tomcat is installed on two machines, 192.168.1.168 and 192.168.1.178. The client accesses the project content deployed by Tomcat in
192.168.1.168 and 192.168.1.178 by accessing the 192.168.1.108 reverse proxy.
1. Install Nginx under Linux (machine 192.168.1.108)
Install openssl library.
yum install -y openssl openssl-devel
Need to install gcc: yum install gcc-c++
Install PCRE yum install -y pcre pcre-devel
yum install -y zlib zlib-devel
##Installed under /usr/local/
Extract tar -zxvf nginx-1.13.0.tar.gz
##Enter the directory and run ./configure to generate makefile
There is an extra makefile in the directory
Compile make
Installation: make install
Start nginx
Window access 192.168.1.108 nginx default port is 80
top
configuration file after startup Suitable for modifying the configuration file during startup
2. Install Tomcat under Linux (192.168.1.168 and 192.168.1.178 machines)
The installation process is very simple and will not be described. . Install Tomcat on the other two Linux machines (192.168.1.168 and 192.168.1.178), and deploy any project nginxTest. One content is 1111... and the other is 22222...
At this time, I am accessing a different IP address, and I have not yet configured Nginx as a reverse proxy server.3. Nginx serves as a reverse proxy server
Mainly configure the contents of nginx.confa.
Configure servergroup, add upstream configuration between http{} nodes.
192.168.1.168:9090 and 192.168.1.178:9191 are Tomcat of the other two Linux machines (see 2 above)upstream lxstest{
server 192.168.1.168:9090;
server 192.168.1.178:9191;
}
b. 修改nginx监听的端口号80,改为7777(随便改个都行,不改也行)。
server { listen 7777; ...... }
c. 在location{}中,利用proxy_pass配置反向代理地址;此处“http://”不能少,后面的地址要和第一步upstream定义的名称保持一致。(上述的是 lxstest,所以http://lxstest)
location / { root html; index index.html index.htm; proxy_pass http://lxstest; }
上述修改完后,启动 192.168.1.108机器的Nginx
最后访问 192.168.1.108:7777/nginxTest 同一个地址出来不同的页面,说明一会儿访问的是192.168.1.168,一会儿访问的是192.168.1.178
http://192.168.1.108:7777
等同于====
等同于=====
最后就会找到对应的Tomcat
再找到对应的nginxTest工程。
The above is the detailed content of Detailed introduction to TOMCAT cluster under NGINX reverse proxy in LINUX. For more information, please follow other related articles on the PHP Chinese website!

The timing and reasons for using Linux maintenance mode: 1) When the system starts up, 2) When performing major system updates or upgrades, 3) When performing file system maintenance. Maintenance mode provides a safe and controlled environment, ensuring operational safety and efficiency, reducing impact on users, and enhancing system security.

Indispensable commands in Linux include: 1.ls: list directory contents; 2.cd: change working directory; 3.mkdir: create a new directory; 4.rm: delete file or directory; 5.cp: copy file or directory; 6.mv: move or rename file or directory. These commands help users manage files and systems efficiently by interacting with the kernel.

In Linux, file and directory management uses ls, cd, mkdir, rm, cp, mv commands, and permission management uses chmod, chown, and chgrp commands. 1. File and directory management commands such as ls-l list detailed information, mkdir-p recursively create directories. 2. Permission management commands such as chmod755file set file permissions, chownuserfile changes file owner, and chgrpgroupfile changes file group. These commands are based on file system structure and user and group systems, and operate and control through system calls and metadata.

MaintenanceModeinLinuxisaspecialbootenvironmentforcriticalsystemmaintenancetasks.Itallowsadministratorstoperformtaskslikeresettingpasswords,repairingfilesystems,andrecoveringfrombootfailuresinaminimalenvironment.ToenterMaintenanceMode,interrupttheboo

The core components of Linux include kernel, file system, shell, user and kernel space, device drivers, and performance optimization and best practices. 1) The kernel is the core of the system, managing hardware, memory and processes. 2) The file system organizes data and supports multiple types such as ext4, Btrfs and XFS. 3) Shell is the command center for users to interact with the system and supports scripting. 4) Separate user space from kernel space to ensure system stability. 5) The device driver connects the hardware to the operating system. 6) Performance optimization includes tuning system configuration and following best practices.

The five basic components of the Linux system are: 1. Kernel, 2. System library, 3. System utilities, 4. Graphical user interface, 5. Applications. The kernel manages hardware resources, the system library provides precompiled functions, system utilities are used for system management, the GUI provides visual interaction, and applications use these components to implement functions.

Linux maintenance mode can be entered through the GRUB menu. The specific steps are: 1) Select the kernel in the GRUB menu and press 'e' to edit, 2) Add 'single' or '1' at the end of the 'linux' line, 3) Press Ctrl X to start. Maintenance mode provides a secure environment for tasks such as system repair, password reset and system upgrade.

The steps to enter Linux recovery mode are: 1. Restart the system and press the specific key to enter the GRUB menu; 2. Select the option with (recoverymode); 3. Select the operation in the recovery mode menu, such as fsck or root. Recovery mode allows you to start the system in single-user mode, perform file system checks and repairs, edit configuration files, and other operations to help solve system problems.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

Dreamweaver CS6
Visual web development tools

SAP NetWeaver Server Adapter for Eclipse
Integrate Eclipse with SAP NetWeaver application server.

SublimeText3 Linux new version
SublimeText3 Linux latest version

SublimeText3 Mac version
God-level code editing software (SublimeText3)
