Skip to content

NGINX docker build with CPU optimization and load balancer modules

License

Notifications You must be signed in to change notification settings

WSandwitch/docker-nginx

 
 

Repository files navigation

Supported tags and respective Dockerfile links

NGINX build with load balancer modules

Docker Pulls

Nginx built for many CPU architecture.

The difference from the official Nginx docker image:

How to use this image

Hosting some simple static content

docker run --name some-nginx -d -v /some/content:/usr/share/nginx/html:ro wsandwitch/nginx

Exposing ports

docker run --name some-nginx -d -p 80:80 -e 443 -p 443:443 wsandwitch/nginx

Complex configuration

docker run --name some-nginx -d -v /host/path/virtualhosts.d:/etc/nginx/sites-enabled:ro wsandwitch/nginx

For example porting Ubuntu nginx to docker:

docker run --name some-nginx -d -p 80:80 -e 443 -p 443:443 \
    -v /etc/nginx/conf.d:/etc/nginx/conf.d \
    -v /etc/nginx/sites-available:/etc/nginx/sites-available \
    -v /etc/nginx/sites-enabled:/etc/nginx/sites-enabled \
    -v /var/log/nginx:/var/log/nginx \
    wsandwitch/nginx

Modules

List dynamic modules in container:

docker run -t --rm wsandwitch/nginx ls /usr/lib/nginx/modules

Example of loading a module in nginx.conf:

load_module modules/ngx_http_js_module.so;

njs scripts development

docker run -it --rm wsandwitch/nginx njs
>> var a = {b: []};
undefined
>> console.log(a);
{b:[]}
undefined
>> JSON.stringify(a);
'{"b":[]}'
>>

Test & Examles

Sample configurations and module tests are located in a folder named test.

To run tests, go to the folder test and run command make.

To start a specific example, go to an example folder and run docker-compose up.

Image Variants

wsandwitch/nginx:<version>-alpine

This image is based on the popular Alpine Linux project, available in the alpine official image. Alpine Linux is much smaller than most distribution base images (~5MB), and thus leads to much slimmer images in general.

This variant is highly recommended when final image size being as small as possible is desired. The main caveat to note is that it does use musl libc instead of glibc and friends, so certain software might run into issues depending on the depth of their libc requirements. However, most software doesn't have an issue with this, so this variant is usually a very safe choice. See this Hacker News comment thread for more discussion of the issues that might arise and some pro/con comparisons of using Alpine-based images.

To minimize image size, it's uncommon for additional related tools (such as git or bash) to be included in Alpine-based images. Using this image as a base, add the things you need in your own Dockerfile (see the alpine image description for examples of how to install packages if you are unfamiliar).

License

View license information for the software contained in this image or license information for the Nginx Dockerfile.

As with all Docker images, these likely also contain other software which may be under other licenses (such as Bash, etc from the base distribution, along with any direct or indirect dependencies of the primary software being contained).

As for any pre-built image usage, it is the image user's responsibility to ensure that any use of this image complies with any relevant licenses for all software contained within.