-
Book Overview & Buying
-
Table Of Contents
Mastering NGINX - Second Edition
By :
We build and host websites because we want users to visit them. We want our websites to always be available for legitimate access. This means that we may have to take measures to limit access to abusive users. We may define abusive to mean anything from one request per second to a number of connections from the same IP address. Abuse can also take the form of a distributed denial-of-service (DDoS) attack, where bots running on multiple machines around the world all try to access the site as many times as possible at the same time. In this section, we will explore methods to counter each type of abuse to ensure that our websites are available.
First, let's take a look at the different configuration directives that will help us achieve our goal:
|
HTTP limits directives |
Explanation |
|---|---|
|
|
This directive specifies a shared memory zone (configured with |
|
|
Change the font size
Change margin width
Change background colour