NGINX in ASAB Maestro¶
NGINX technology provides:
- Application gateway capabilities
- Load balancing
- Service discovery
- Authorization for other services in the cluster
Servers¶
ASAB Maestro organizes NGINX configuration into following structure:
- HTTP server:
http
, see the config - HTTPS server:
https
, see the config - Internal HTTP server on a port tcp/8890:
internal
, see the config - Upstreams
NGINX configuration in descriptors¶
nginx
section of a descriptor provides information about how the respective service expects the NGINX to be configured.
It means that it specifies proxy forwarding rules that expose the microservice API.
The example of a descriptor /Site/.../Descriptors/foobar.yaml
:
define:
type: rc/descriptor
...
nginx:
api:
port: 5678
upstreams:
upstream-foobar-extra: 1234
https:
location = /_introspect:
- internal
- proxy_method POST
- proxy_pass http://{{UPSTREAM}}/introspect
- proxy_ignore_headers Cache-Control Expires Set-Cookie
location /subpath/api/foobar:
- rewrite ^/subpath/api/(.*) /$1 break
- proxy_pass http://upstream-foobar-extra
server:
- ssl_client_certificate shared/custom-certificate.pem
- ssl_verify_client optional
NGINX configuration to YAML conversion
NGINX configuration in ASAB Maestro is translated into YAML, so it can be included in the model or descriptors.
Following NGINX configuration snipplet:
location /api/myapp {
rewrite ^/api/myapp/(.*) /myapp/$1 break;
proxy_pass http://my-server:8080;
}
becomes in ASAB Maestro YAML files:
location /api/myapp:
- rewrite ^/api/myapp/(.*) /myapp/$1 break
- proxy_pass http://my-server:8080
Similarly, you can add configuration to server block:
server:
- ssl_client_certificate shared/lmio-receiver/client-ca-cert.pem
- ssl_verify_client optional
Section api
¶
api
section allows quick specification of the "main" API of the service.
The key port
specifies TCP port on which the API is exposed by the service.
This entry will generate respective location
and upstream
entries.
Full automation
The api
section can be easily the only section in the nginx
part of the service descriptor.
Section upstream
¶
Defines specific upstreams for a service. Each service instance is added to the upstreams record in the NGINX configuration.
Visit Nginx docs to learn more about the upstream directive.
Example:
nginx:
upstreams:
upstream-foobar: 1234
Service foobar
has published API on port tcp/1234
. The additional upstream
record is defined and named upstream-foobar
.
Assuming three instances of foobar
service on three nodes, the resulting upstream
configuration is:
upstream upstream-foobar {
keepalive 32;
server server1:3081;
server server2:3081;
server server3:3081;
}
Advanced usage of upstreams
You can define an upstream as a list to add more configuration options.
For example, SeaCat Auth, an authorization server, requires that requests from one user during a single session are sent to the same instance of the service. NGINX can ensure this using the ip_hash balancing method.
Here is the descriptor section defining upstreams for SeaCat Auth:
nginx:
upstreams:
upstream-seacat-auth-public:
- port 3081
- ip_hash
upstream-seacat-auth-private:
- port 8900
- ip_hash
Considering node1
and node2
are hostnames of the nodes in the cluster, the resulting NGINX configuration for the upstreams will be:
upstream upstream-seacat-auth-public {
keepalive 32;
server node1:3081;
server node2:3081;
ip_hash;
}
upstream upstream-seacat-auth-private {
keepalive 32;
server node1:8900;
server node2:8900;
ip_hash;
}
In the list, you can specify any additional configuration you want to add to the upstream configuration.
The port
directive is not used by NGINX directly but is processed by Maestro.
The server
configuration is added for each instance of the service (in this case, SeaCat Auth) present in the cluster.
Server configuration¶
Other possibilities are implemented for each server separately (http
, https
, internal
).
Additional locations can be specified for the server.
Section location
¶
Typically, a proxy configuration of the particular component or the location of the statically served content.
Each additional location is added to the nginx configuration once per service, unless INSTANCE_ID parameter is used in the header of the location. Then, the location is introduced for each instance.
Section server
¶
Server-block configuration.
Model-level NGINX configuration¶
You can specify custom NGINX configuration on the model-level. It overrides generated configuration.
In the example, extra section in the model.yaml
adds location
"/my-special-location" to https
server.
define:
type: rc/model
...
nginx:
https:
location /my-special-location:
- gzip_static on
- alias /webroot/lmio-webui/dist
You can set also server and upstream configuration. port
option in the upsstream configuration is not supported in model overrides.
Web applications distribution¶
NGINX technology serves web applications.
webapp-dist
sherpa downloads and installs web applications defined in the model.
Web applications are deployed (if needed) everytime the model is applied (i.e. "up" command is issued).
Example of model.yaml
:
define:
type: rc/model
...
webapps:
/: My Web application
/auth: SeaCat Auth WebUI
/influxdb: InfluxDB UI
...
The section webapps
in the model prescribes deployment of three web applications:
- "My Web application" will be deployed to
/
location of the HTTPS server - "SeaCat Auth WebUI" will be deployed to
/auth
location of the HTTPS server - "InfluxDB UI" will be deployed to
/influxdb
location of the HTTPS server
Supported web application types: