photog.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A place for your photos and banter. Photog first is our motto Please refer to the site rules before posting.

Administered by:

Server stats:

274
active users

#nginx

6 posts5 participants0 posts today
Neustradamus :xmpp: :linux:<p><a href="https://mastodon.social/tags/Freenginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Freenginx</span></a> 1.27.6 has been released (<a href="https://mastodon.social/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nginx</span></a> / <a href="https://mastodon.social/tags/http" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>http</span></a> / <a href="https://mastodon.social/tags/http2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>http2</span></a> / <a href="https://mastodon.social/tags/http3" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>http3</span></a> / <a href="https://mastodon.social/tags/httpd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>httpd</span></a> / <a href="https://mastodon.social/tags/Web" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Web</span></a> / <a href="https://mastodon.social/tags/Webserver" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Webserver</span></a> / <a href="https://mastodon.social/tags/TLS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TLS</span></a> / <a href="https://mastodon.social/tags/TLS13" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TLS13</span></a>) <a href="https://freenginx.org/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">freenginx.org/</span><span class="invisible"></span></a></p>
Neustradamus :xmpp: :linux:<p><a href="https://mastodon.social/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nginx</span></a> 1.27.5 (dev) has been released (<a href="https://mastodon.social/tags/http" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>http</span></a> / <a href="https://mastodon.social/tags/http2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>http2</span></a> / <a href="https://mastodon.social/tags/http3" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>http3</span></a> / <a href="https://mastodon.social/tags/httpd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>httpd</span></a> / <a href="https://mastodon.social/tags/Web" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Web</span></a> / <a href="https://mastodon.social/tags/Webserver" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Webserver</span></a> / <a href="https://mastodon.social/tags/TLS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TLS</span></a> / <a href="https://mastodon.social/tags/TLS13" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TLS13</span></a>) <a href="https://nginx.org/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">nginx.org/</span><span class="invisible"></span></a></p>
Jessie (they/she) 🍓 🏳️‍⚧️ 🍉<p>GRRRR!!!</p><p>I just spent the last hour of my life chasing round in circles just because <a href="https://mstdn.social/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nginx</span></a> wouldnt serve up my css file for some reason. I forced the mime types in the nginx config and everything...</p><p>Weirdly, Chrome was fine but firefox wasnt when loading this?</p><p>Anyway, turns out the reason why is because nginx has this *14 year old* bug that means it falls apart whenever there's a dash in a file name. Wtf?! How has no one looked at that yet 😫</p>
Jan ☕🎼🎹☁️🏋️‍♂️<p>Ive built a setup for hosting websites which consists of:<br>* Host running <a href="https://fedi.kcore.org/tags/microos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>microos</span></a> with <a href="https://fedi.kcore.org/tags/podman" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>podman</span></a><br>* <a href="https://fedi.kcore.org/tags/Treafik" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Treafik</span></a> and <a href="https://fedi.kcore.org/tags/sshpiper" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sshpiper</span></a> at the edge<br>* <a href="https://fedi.kcore.org/tags/Nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Nginx</span></a>, php-fpm, <a href="https://fedi.kcore.org/tags/mariadb" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mariadb</span></a> + phpmyadmin + nginx or <a href="https://fedi.kcore.org/tags/postgres" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>postgres</span></a> + dbadmin, openssh for each site</p><p>It actually works quite well, openssh keybased access is to transfer files into the containers, traefik does the reverse proxying.</p><p>I'm just wondering if its a sustainable and maintainable setup. Sometimes just going with a "standard" solution seems so much easier.</p>
seungjin<p>First switched from <a href="https://mstd.seungjin.net/tags/Nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Nginx</span></a> to Ferron(<a href="https://mstd.seungjin.net/tags/ferronweb" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ferronweb</span></a>) on one of my personal servers.</p>
jexner<p>When you self-host immich behind an nginx reverse proxy, be aware that the nginx default configuration blocks uploads of big files!</p><p>I fell into that trap!</p><p><a href="https://discussion.scottibyte.com/t/immich-how-to-bust-the-upload-limits/475" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">discussion.scottibyte.com/t/im</span><span class="invisible">mich-how-to-bust-the-upload-limits/475</span></a></p><p><a href="https://tooting.ch/tags/immich" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>immich</span></a> <a href="https://tooting.ch/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nginx</span></a></p>
Artanux - Simon Lefort<p>Mon serveur <a href="https://framapiaf.org/tags/yunohost" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>yunohost</span></a> est à nouveau opérationnel.</p><p>Cependant, j'ai l'impression de ne pas avoir trouvé la racine du problème. J'ai pu déterminer que Nginx était en cause (il est devenu lent à démarrer alors il timeout et ça a causé les problèmes de mises à jours des applications).</p><p>J'ai résolu en augmentant le temps avant qu'il timeout. Mais ça me semble un contournement du problème...</p><p>Il y a des spécialistes en <a href="https://framapiaf.org/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nginx</span></a> dans le coin ? J'ai décris le problème là : <a href="https://forum.yunohost.org/t/applications-qui-se-desinstallent-parce-que-la-mise-a-jour-bloque-nginx-qui-ne-demarre-plus/36447/27" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">forum.yunohost.org/t/applicati</span><span class="invisible">ons-qui-se-desinstallent-parce-que-la-mise-a-jour-bloque-nginx-qui-ne-demarre-plus/36447/27</span></a></p>
Bob<p><a href="https://mastodon.acc.sunet.se/tags/TIL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TIL</span></a> <a href="https://mastodon.acc.sunet.se/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nginx</span></a> has a `random_index` directive. Pointing this at a folder with images can be used in static websites to get random background images (or similar shenanigans).</p><p><a href="https://mastodon.acc.sunet.se/tags/selfhosting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>selfhosting</span></a> <a href="https://mastodon.acc.sunet.se/tags/selfhosted" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>selfhosted</span></a></p>
MelLinux 👩‍💻<p>Gibt es jemanden oder mehrere die <a href="https://mastodontech.de/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nginx</span></a> als Reverse Proxy UND Webserver unter Docker laufen lassen?<br>Hab es heute einen Tag lang versucht und nicht hinbekommen...<br>Kein Plan warum es nicht funktionieren will.</p>
Felix Palmen :freebsd: :c64:<p><a href="https://mastodon.bsd.cafe/tags/Documentation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Documentation</span></a> ... better start early I guess. What would you think of this sample <a href="https://mastodon.bsd.cafe/tags/configuration" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>configuration</span></a> file?</p><p>Hint: the tokens surrounded by %% will be replaced by my build system before installing this thing.</p><p>For context, this is a web <a href="https://mastodon.bsd.cafe/tags/authentication" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>authentication</span></a> service offering cookie+forms login meant for e.g. <a href="https://mastodon.bsd.cafe/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nginx</span></a>' "auth_request".</p><p><a href="https://mastodon.bsd.cafe/tags/C" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>C</span></a> <a href="https://mastodon.bsd.cafe/tags/coding" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>coding</span></a></p>
Felix Palmen :freebsd: :c64:<p>DId lots of smaller improvements to <a href="https://mastodon.bsd.cafe/tags/swad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>swad</span></a> ... but first, I had to hunt down a crash 🤯. Finally found it was caused by my <a href="https://mastodon.bsd.cafe/tags/poser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>poser</span></a> lib (to be fixed later): A connection there can resolve the hostname of a remote end and does so in a thread job to avoid blocking. If the connection dies meanwhile, the job is canceled. Seems my canceling mechanism relying on a signal to the thread is, well, not reliable (the signal can arrive delayed). Ok, for now just disabled name resolution to sidestep that.</p><p>Now, integration with <a href="https://mastodon.bsd.cafe/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nginx</span></a> is much better. I intrdoduced (optional) custom headers to transport the authentication realm and the redirect URI, plus state management in the session, so these can be passed to the "auth" endpoint. This requires to make sure nginx always passes the session <a href="https://mastodon.bsd.cafe/tags/cookie" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cookie</span></a>, Unfortunately, I still need a "hacky" redirect configuration for login in nginx. If auth_request could just pass the response body, this would be unnecessary .... 🙄 </p><p>The nginx configuration shows <a href="https://mastodon.bsd.cafe/tags/swad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>swad</span></a> running on "files" and another nginx running on "wwwint" serving <a href="https://mastodon.bsd.cafe/tags/poudriere" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>poudriere</span></a> output there. This nginx instance helpfully adds cache hints, which I have to override, so a redirect works as expected when for example the swad session times out.</p><p><a href="https://mastodon.bsd.cafe/tags/C" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>C</span></a> <a href="https://mastodon.bsd.cafe/tags/coding" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>coding</span></a></p>
Martin Owens :inkscape:<p>I've set up my new <a href="https://floss.social/tags/inkscape" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>inkscape</span></a> website AI bot trap. It works by giving everyone a chance to not fall into it.</p><p>An anchor link that says "I am a bot" and links to /P3W-451/{datetime}/ it's got a fixed position at top -100px so should never be seen</p><p>The robots.txt says "Disallow: /P3W-451/" so if you were reading the robots, you'd know.</p><p>Then <a href="https://floss.social/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nginx</span></a> logs the requests to a log of their ip-addresses and browser strings and sends them a 301 redirect to google.com</p><p><a href="https://floss.social/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a> <a href="https://floss.social/tags/Scraping" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Scraping</span></a> </p><p>1/2</p>
Felix Palmen :freebsd: :c64:<p>First "production test" successful 💪 ... after band-aid "deployment" (IOW, scp binaries to the prod jail).</p><p><a href="https://mastodon.bsd.cafe/tags/swad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>swad</span></a> integrates with <a href="https://mastodon.bsd.cafe/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nginx</span></a> exactly as I planned it. And <a href="https://mastodon.bsd.cafe/tags/PAM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PAM</span></a> authentication using a child process running as root also just works (while the main process dropped privileges). 🥳 </p><p>So, I guess I can say goodbye to <a href="https://mastodon.bsd.cafe/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://mastodon.bsd.cafe/tags/bots" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bots</span></a> hammering my poor DSL connection just to download poudriere build logs.</p><p>Still a lot to do for <a href="https://mastodon.bsd.cafe/tags/swad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>swad</span></a>: Make it nicer. So many ideas. Best start would probably be to implement more credentials checking modules besides PAM.</p><p><a href="https://mastodon.bsd.cafe/tags/C" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>C</span></a> <a href="https://mastodon.bsd.cafe/tags/coding" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>coding</span></a></p>
Xavier «X» Santolaria :verified_paw: :donor:<p>📨 Latest issue of my curated <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> and <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> list of resources for week #13/2025 is out!</p><p>It includes the following and much more:</p><p>➝ DNA of 15 Million People for Sale in <a href="https://infosec.exchange/tags/23andMe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>23andMe</span></a> Bankruptcy,</p><p>➝ <a href="https://infosec.exchange/tags/Trump" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Trump</span></a> administration accidentally texted a journalist its war plans,</p><p>➝ Critical Ingress <a href="https://infosec.exchange/tags/NGINX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NGINX</span></a> controller vulnerability allows RCE without authentication,</p><p>➝ <a href="https://infosec.exchange/tags/Cyberattack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberattack</span></a> hits Ukraine's state railway,</p><p>➝ Troy Hunt's Mailchimp account was successfully phished,</p><p>➝ <a href="https://infosec.exchange/tags/OpenAI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenAI</span></a> Offering $100K Bounties for Critical <a href="https://infosec.exchange/tags/Vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerabilities</span></a>,</p><p>➝ <a href="https://infosec.exchange/tags/Meta" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Meta</span></a> AI is now available in <a href="https://infosec.exchange/tags/WhatsApp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WhatsApp</span></a> for users in 41 European countries... and cannot be turned off</p><p>Subscribe to the <a href="https://infosec.exchange/tags/infosecMASHUP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecMASHUP</span></a> newsletter to have it piping hot in your inbox every week-end ⬇️</p><p><a href="https://infosec-mashup.santolaria.net/p/infosec-mashup-13-2025" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec-mashup.santolaria.net/</span><span class="invisible">p/infosec-mashup-13-2025</span></a></p>
Felix Palmen :freebsd: :c64:<p>Trying to come up with my own little self-hosted <a href="https://mastodon.bsd.cafe/tags/http" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>http</span></a> <a href="https://mastodon.bsd.cafe/tags/authentication" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>authentication</span></a> <a href="https://mastodon.bsd.cafe/tags/daemon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>daemon</span></a> to work with <a href="https://mastodon.bsd.cafe/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nginx</span></a>' "authentication request" facility ... first step done! 🥳</p><p>Now I have a subset of HTTP 1.x implemented in <a href="https://mastodon.bsd.cafe/tags/C" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>C</span></a>, together with a dummy handler showing nothing but a static hello-world root document.</p><p>I know it's kind of stubborn doing that in C, but hey, <a href="https://mastodon.bsd.cafe/tags/coding" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>coding</span></a> it is great fun 🙈 </p><p><a href="https://github.com/Zirias/swad" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/Zirias/swad</span><span class="invisible"></span></a></p>
Felix Palmen :freebsd: :c64:<p><span class="h-card" translate="no"><a href="https://mastodon.social/@bagder" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>bagder</span></a></span> Wow. For a few months, I was wondering why I suddenly have bandwidth issues when activating my camera in MS Teams meetings, so others can't understand me any more.</p><p>A look into my <a href="https://mastodon.bsd.cafe/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nginx</span></a> logs seems to clarify. Bots are eagerly fetching my (partially pretty large) <a href="https://mastodon.bsd.cafe/tags/poudriere" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>poudriere</span></a> build logs. 🧐 (<a href="https://mastodon.bsd.cafe/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> "watching shit scroll by"?)</p><p>I see GPTBot at least occassionally requests robots.txt, which I don't have so far. Other bots don't seem to be interested. Especially PetalBot is hammering my server. And there are others (bytedance, google, ...)</p><p>Now what? Robots.txt would actually *help* well-behaved bots here (I assume build logs aren't valuable for anything). The most pragmatic thing here would be to add some http basic auth in the reverse proxy for all poudriere stuff. It's currently only public because there's no reason to keep it private....</p><p>Have to admit I feel inclined to try one of the tarpitting/poisoning approaches, too. 😏</p>
Saustrup<p>After a lot of tinkering, we finally made it to the latest release of the <a href="https://mstdn.dk/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nginx</span></a> ingress controller on the <a href="https://mstdn.dk" translate="no" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">mstdn.dk</span><span class="invisible"></span></a> cluster. The latest release addresses no less than FOUR <a href="https://mstdn.dk/tags/CVE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE</span></a> records. Critical configuration areas had changed, the GeoIP database had to be cached to avoid rate limiting and the <a href="https://mstdn.dk/tags/LUA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LUA</span></a> engine needed some tweaks before it could handle the relative large number of TLS certificates we're using in the cluster, but we finally made it. Sorry about the hick-ups. We're trying to keep expenses from going through the roof, so we've skipped the test setup in favor of gently tweaking things in production. Usually that goes well, but there is the rare exception.</p><p>Somewhat related, the <a href="https://mstdn.dk/tags/KubeCon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KubeCon</span></a> / <a href="https://mstdn.dk/tags/KubeConEU" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KubeConEU</span></a> <a href="https://mstdn.dk/tags/Kubernetes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kubernetes</span></a> conference is next week, which means I'll be in <a href="https://mstdn.dk/tags/London" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>London</span></a> for the first time for an entire week. Any suggestions for things worth visiting for a bunch of <a href="https://mstdn.dk/tags/nerds" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nerds</span></a>? :D</p>
steve mookie kong<p>Just discovered this open source tool screeenly that takes screenshots of webpages. (Found it when I was looking at what bots were hitting my site via my nginx logs).</p><p><a href="http://screeenly.com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">http://</span><span class="">screeenly.com/</span><span class="invisible"></span></a></p><p><a href="https://chow.fan/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://chow.fan/tags/tools" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tools</span></a> <a href="https://chow.fan/tags/web" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>web</span></a> <a href="https://chow.fan/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nginx</span></a></p>
Marcus Noble<p>If you're running ingress-nginx in your Kubernetes cluster please take a look at this latest CVE details, it's a big one! Patches are out so please get updating as soon as you can!</p><p><a href="https://kubernetes.io/blog/2025/03/24/ingress-nginx-cve-2025-1974/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">kubernetes.io/blog/2025/03/24/</span><span class="invisible">ingress-nginx-cve-2025-1974/</span></a></p><p><a href="https://k8s.social/tags/Kubernetes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kubernetes</span></a> <a href="https://k8s.social/tags/Nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Nginx</span></a> <a href="https://k8s.social/tags/Ingress" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ingress</span></a> <a href="https://k8s.social/tags/CloudNative" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudNative</span></a></p>
Marianne Spiller<p>Let's assume you have messed up your log_format in <a href="https://konfigurationsmanufaktur.de/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nginx</span></a> and now want to correct the resulting access.log so that it corresponds to a “log_format combined” - how would you do that? Asking for a friend, of course.</p>