Nginx Web Server Configuration

Configure Nginx for high-performance web serving, load balancing, and reverse proxy

# Nginx Configuration

This document provides comprehensive guidelines for nginx configuration development and best practices.

---

## Nginx Fundamentals

1. **Configuration**
   - Configuration file structure and syntax
   - Implement proper configuration file structure and syntax
   - Follow best practices for optimal results

2. **Server**
   - Server blocks and virtual hosts
   - Implement proper server blocks and virtual hosts
   - Follow best practices for optimal results

3. **Location**
   - Location directives and matching
   - Implement proper location directives and matching
   - Follow best practices for optimal results

4. **Upstream**
   - Upstream and proxy configurations
   - Implement proper upstream and proxy configurations
   - Follow best practices for optimal results

5. **Module**
   - Module system and extensions
   - Implement proper module system and extensions
   - Follow best practices for optimal results

---

## Web Server Configuration

6. **Static**
   - Static file serving optimization
   - Implement proper static file serving optimization
   - Follow best practices for optimal results

7. **MIME**
   - MIME type configuration
   - Implement proper mime type configuration
   - Follow best practices for optimal results

8. **Compression**
   - Compression and caching headers
   - Implement proper compression and caching headers
   - Follow best practices for optimal results

9. **Security**
   - Security headers implementation
   - Implement proper security headers implementation
   - Follow best practices for optimal results

10. **Error**
   - Error page customization
   - Implement proper error page customization
   - Follow best practices for optimal results

---

## Reverse Proxy Setup

11. **Proxy**
   - Proxy pass configuration
   - Implement proper proxy pass configuration
   - Follow best practices for optimal results

12. **Header**
   - Header manipulation
   - Implement proper header manipulation
   - Follow best practices for optimal results

13. **Backend**
   - Backend health checking
   - Implement proper backend health checking
   - Follow best practices for optimal results

14. **Session**
   - Session persistence
   - Implement proper session persistence
   - Follow best practices for optimal results

15. **SSL**
   - SSL termination
   - Implement proper ssl termination
   - Follow best practices for optimal results

---

## Load Balancing

16. **Round-robin**
   - Round-robin load balancing
   - Implement proper round-robin load balancing
   - Follow best practices for optimal results

17. **Least**
   - Least connections algorithm
   - Implement proper least connections algorithm
   - Follow best practices for optimal results

18. **IP**
   - IP hash and consistent hashing
   - Implement proper ip hash and consistent hashing
   - Follow best practices for optimal results

19. **Weighted**
   - Weighted load balancing
   - Implement proper weighted load balancing
   - Follow best practices for optimal results

20. **Backup**
   - Backup server configuration
   - Implement proper backup server configuration
   - Follow best practices for optimal results

---

## SSL/TLS Configuration

21. **SSL**
   - SSL certificate installation
   - Implement proper ssl certificate installation
   - Follow best practices for optimal results

22. **TLS**
   - TLS protocol optimization
   - Implement proper tls protocol optimization
   - Follow best practices for optimal results

23. **Cipher**
   - Cipher suite configuration
   - Implement proper cipher suite configuration
   - Follow best practices for optimal results

24. **HTTP/2**
   - HTTP/2 and HTTP/3 setup
   - Implement proper http/2 and http/3 setup
   - Follow best practices for optimal results

25. **SSL**
   - SSL session caching
   - Implement proper ssl session caching
   - Follow best practices for optimal results

---

## Performance Optimization

26. **Worker**
   - Worker process configuration
   - Implement proper worker process configuration
   - Follow best practices for optimal results

27. **Connection**
   - Connection limits and timeouts
   - Implement proper connection limits and timeouts
   - Follow best practices for optimal results

28. **Buffer**
   - Buffer size optimization
   - Implement proper buffer size optimization
   - Follow best practices for optimal results

29. **Sendfile**
   - Sendfile and TCP optimizations
   - Implement proper sendfile and tcp optimizations
   - Follow best practices for optimal results

30. **Rate**
   - Rate limiting implementation
   - Implement proper rate limiting implementation
   - Follow best practices for optimal results

---

## Security Features

31. **Access**
   - Access control and IP restrictions
   - Implement proper access control and ip restrictions
   - Follow best practices for optimal results

32. **Basic**
   - Basic and digest authentication
   - Implement proper basic and digest authentication
   - Follow best practices for optimal results

33. **Request**
   - Request filtering and validation
   - Implement proper request filtering and validation
   - Follow best practices for optimal results

34. **DDoS**
   - DDoS protection measures
   - Implement proper ddos protection measures
   - Follow best practices for optimal results

35. **Security**
   - Security header configuration
   - Implement proper security header configuration
   - Follow best practices for optimal results

---

## Caching Strategies

36. **Browser**
   - Browser caching headers
   - Implement proper browser caching headers
   - Follow best practices for optimal results

37. **Proxy**
   - Proxy caching setup
   - Implement proper proxy caching setup
   - Follow best practices for optimal results

38. **FastCGI**
   - FastCGI caching
   - Implement proper fastcgi caching
   - Follow best practices for optimal results

39. **Micro-caching**
   - Micro-caching techniques
   - Implement proper micro-caching techniques
   - Follow best practices for optimal results

40. **Cache**
   - Cache invalidation strategies
   - Implement proper cache invalidation strategies
   - Follow best practices for optimal results

---

## Monitoring & Logging

41. **Access**
   - Access log configuration
   - Implement proper access log configuration
   - Follow best practices for optimal results

42. **Error**
   - Error log management
   - Implement proper error log management
   - Follow best practices for optimal results

43. **Custom**
   - Custom log formats
   - Implement proper custom log formats
   - Follow best practices for optimal results

44. **Log**
   - Log rotation setup
   - Implement proper log rotation setup
   - Follow best practices for optimal results

45. **Real-time**
   - Real-time monitoring
   - Implement proper real-time monitoring
   - Follow best practices for optimal results

---

## Location Blocks

46. **URL**
   - URL matching patterns
   - Implement proper url matching patterns
   - Follow best practices for optimal results

47. **Regular**
   - Regular expression locations
   - Implement proper regular expression locations
   - Follow best practices for optimal results

48. **Nested**
   - Nested location handling
   - Implement proper nested location handling
   - Follow best practices for optimal results

49. **Try**
   - Try files and fallbacks
   - Implement proper try files and fallbacks
   - Follow best practices for optimal results

50. **Rewrite**
   - Rewrite rules and redirects
   - Implement proper rewrite rules and redirects
   - Follow best practices for optimal results

---

## Advanced Features

51. **Map**
   - Map module for variable mapping
   - Implement proper map module for variable mapping
   - Follow best practices for optimal results

52. **Geo**
   - Geo module for geographic restrictions
   - Implement proper geo module for geographic restrictions
   - Follow best practices for optimal results

53. **Limit**
   - Limit request and connection modules
   - Implement proper limit request and connection modules
   - Follow best practices for optimal results

54. **Stream**
   - Stream module for TCP/UDP proxy
   - Implement proper stream module for tcp/udp proxy
   - Follow best practices for optimal results

55. **Custom**
   - Custom module development
   - Implement proper custom module development
   - Follow best practices for optimal results

---

## API Gateway Patterns

56. **REST**
   - REST API proxying
   - Implement proper rest api proxying
   - Follow best practices for optimal results

57. **GraphQL**
   - GraphQL endpoint handling
   - Implement proper graphql endpoint handling
   - Follow best practices for optimal results

58. **WebSocket**
   - WebSocket proxy configuration
   - Implement proper websocket proxy configuration
   - Follow best practices for optimal results

59. **Microservices**
   - Microservices routing
   - Implement proper microservices routing
   - Follow best practices for optimal results

60. **API**
   - API versioning strategies
   - Implement proper api versioning strategies
   - Follow best practices for optimal results

---

## Container Integration

61. **Docker**
   - Docker deployment
   - Implement proper docker deployment
   - Follow best practices for optimal results

62. **Kubernetes**
   - Kubernetes ingress controller
   - Implement proper kubernetes ingress controller
   - Follow best practices for optimal results

63. **Service**
   - Service mesh integration
   - Implement proper service mesh integration
   - Follow best practices for optimal results

64. **Container**
   - Container orchestration
   - Implement proper container orchestration
   - Follow best practices for optimal results

65. **Dynamic**
   - Dynamic configuration updates
   - Implement proper dynamic configuration updates
   - Follow best practices for optimal results

---

## High Availability

66. **Failover**
   - Failover configuration
   - Implement proper failover configuration
   - Follow best practices for optimal results

67. **Health**
   - Health check implementation
   - Implement proper health check implementation
   - Follow best practices for optimal results

68. **Graceful**
   - Graceful shutdown handling
   - Implement proper graceful shutdown handling
   - Follow best practices for optimal results

69. **Zero-downtime**
   - Zero-downtime deployments
   - Implement proper zero-downtime deployments
   - Follow best practices for optimal results

70. **Disaster**
   - Disaster recovery setup
   - Implement proper disaster recovery setup
   - Follow best practices for optimal results

---

## Troubleshooting

71. **Configuration**
   - Configuration testing
   - Implement proper configuration testing
   - Follow best practices for optimal results

72. **Log**
   - Log analysis techniques
   - Implement proper log analysis techniques
   - Follow best practices for optimal results

73. **Performance**
   - Performance debugging
   - Implement proper performance debugging
   - Follow best practices for optimal results

74. **Connection**
   - Connection troubleshooting
   - Implement proper connection troubleshooting
   - Follow best practices for optimal results

75. **SSL/TLS**
   - SSL/TLS issue resolution
   - Implement proper ssl/tls issue resolution
   - Follow best practices for optimal results

---

## Best Practices

76. **Configuration**
   - Configuration organization
   - Implement proper configuration organization
   - Follow best practices for optimal results

77. **Security**
   - Security hardening
   - Implement proper security hardening
   - Follow best practices for optimal results

78. **Performance**
   - Performance tuning
   - Implement proper performance tuning
   - Follow best practices for optimal results

79. **Maintenance**
   - Maintenance procedures
   - Implement proper maintenance procedures
   - Follow best practices for optimal results

80. **Documentation**
   - Documentation standards
   - Implement proper documentation standards
   - Follow best practices for optimal results

---

## Summary Checklist

- [ ] Core principles implemented
- [ ] Best practices followed
- [ ] Performance optimized
- [ ] Security measures in place
- [ ] Testing strategy implemented
- [ ] Documentation completed
- [ ] Monitoring configured
- [ ] Production deployment ready

---

Follow these comprehensive guidelines for successful nginx configuration implementation.
Nginx Web Server Configuration - Cursor IDE AI Rule