Skip to content

Commit f0009c2

Browse files
authored
Merge branch 'main' into patch-2
2 parents b05a7d2 + 169c88e commit f0009c2

File tree

2 files changed

+11
-11
lines changed

2 files changed

+11
-11
lines changed

content/ngf/overview/resource-validation.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -62,8 +62,8 @@ More information on CEL in Kubernetes can be found [here](https://kubernetes.io/
6262
This step catches the following cases of invalid values:
6363

6464
- Valid values from the Gateway API perspective but not supported by NGINX Gateway Fabric yet. For example, a feature in an HTTPRoute routing rule. For the list of supported features see [Gateway API Compatibility]({{< relref "./gateway-api-compatibility.md" >}}) doc.
65-
- Valid values from the Gateway API perspective, but invalid for NGINX, because NGINX has stricter validation requirements for certain fields. These values will cause NGINX to fail to reload or operate erroneously.
66-
- Invalid values (both from the Gateway API and NGINX perspectives) that were not rejected because Step 1 was bypassed. Similar to the previous case, these values will cause NGINX to fail to reload or operate erroneously.
65+
- Valid values from the Gateway API perspective, but invalid for NGINX. NGINX has stricter validation requirements for certain fields. These values will cause NGINX to fail to reload or operate erroneously.
66+
- Invalid values (both from the Gateway API and NGINX perspectives) that were not rejected because Step 1 was bypassed. These values will cause NGINX to fail to reload or operate incorrectly.
6767
- Malicious values that inject unrestricted NGINX config into the NGINX configuration (similar to an SQL injection attack).
6868

6969
Below is an example of how NGINX Gateway Fabric rejects an invalid resource. The validation error is reported via the status:

content/nginx/admin-guide/web-server/serving-static-content.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
description: Configure NGINX and F5 NGINX Plus to serve static content, with type-specific
33
root directories, checks for file existence, and performance optimizations.
44
docs: DOCS-442
5-
title: Serving Static Content
5+
title: Serve Static Content
66
toc: true
77
weight: 200
88
type:
@@ -108,11 +108,11 @@ location @backend {
108108
For more information, watch the [Content Caching](https://www.nginx.com/resources/webinars/content-caching-nginx-plus/) webinar on‑demand to learn how to dramatically improve the performance of a website, and get a deep‑dive into NGINX’s caching capabilities.
109109

110110
<span id="optimize"></span>
111-
## Optimizing Performance for Serving Content
111+
## Optimize Performance for Serving Content
112112

113113
Loading speed is a crucial factor of serving any content. Making minor optimizations to your NGINX configuration may boost the productivity and help reach optimal performance.
114114

115-
### Enabling `sendfile`
115+
### Enable `sendfile`
116116

117117
By default, NGINX handles file transmission itself and copies the file into the buffer before sending it. Enabling the [sendfile](https://nginx.org/en/docs/http/ngx_http_core_module.html#sendfile) directive eliminates the step of copying the data into the buffer and enables direct copying data from one file descriptor to another. Alternatively, to prevent one fast connection from entirely occupying the worker process, you can use the [sendfile_max_chunk](https://nginx.org/en/docs/http/ngx_http_core_module.html#sendfile_max_chunk) directive to limit the amount of data transferred in a single `sendfile()` call (in this example, to `1` MB):
118118

@@ -124,7 +124,7 @@ location /mp3 {
124124
}
125125
```
126126

127-
### Enabling `tcp_nopush`
127+
### Enable `tcp_nopush`
128128

129129
Use the [tcp_nopush](https://nginx.org/en/docs/http/ngx_http_core_module.html#tcp_nopush) directive together with the [sendfile](https://nginx.org/en/docs/http/ngx_http_core_module.html#sendfile) `on;`directive. This enables NGINX to send HTTP response headers in one packet right after the chunk of data has been obtained by `sendfile()`.
130130

@@ -136,7 +136,7 @@ location /mp3 {
136136
}
137137
```
138138

139-
### Enabling `tcp_nodelay`
139+
### Enable `tcp_nodelay`
140140

141141
The [tcp_nodelay](https://nginx.org/en/docs/http/ngx_http_core_module.html#tcp_nodelay) directive allows override of [Nagle’s algorithm](https://en.wikipedia.org/wiki/Nagle's_algorithm), originally designed to solve problems with small packets in slow networks. The algorithm consolidates a number of small packets into a larger one and sends the packet with a `200` ms delay. Nowadays, when serving large static files, the data can be sent immediately regardless of the packet size. The delay also affects online applications (ssh, online games, online trading, and so on). By default, the [tcp_nodelay](https://nginx.org/en/docs/http/ngx_http_core_module.html#tcp_nodelay) directive is set to `on` which means that the Nagle’s algorithm is disabled. Use this directive only for keepalive connections:
142142

@@ -150,11 +150,11 @@ location /mp3 {
150150
```
151151

152152

153-
### Optimizing the Backlog Queue
153+
### Optimize the Backlog Queue
154154

155155
One of the important factors is how fast NGINX can handle incoming connections. The general rule is when a connection is established, it is put into the “listen” queue of a listen socket. Under normal load, either the queue is small or there is no queue at all. But under high load, the queue can grow dramatically, resulting in uneven performance, dropped connections, and increased latency.
156156

157-
#### Displaying the Listen Queue
157+
#### Display the Listen Queue
158158

159159
To display the current listen queue, run this command:
160160

@@ -182,7 +182,7 @@ Listen Local Address
182182
0/0/128 *.8080
183183
```
184184

185-
#### Tuning the Operating System
185+
#### Tune the Operating System
186186

187187
Increase the value of the `net.core.somaxconn` kernel parameter from its default value (`128`) to a value high enough for a large burst of traffic. In this example, it's increased to `4096`.
188188

@@ -205,7 +205,7 @@ Increase the value of the `net.core.somaxconn` kernel parameter from its default
205205
net.core.somaxconn = 4096
206206
```
207207
208-
#### Tuning NGINX
208+
#### Tune NGINX
209209
210210
If you set the `somaxconn` kernel parameter to a value greater than `512`, change the `backlog` parameter to the NGINX [listen](https://nginx.org/en/docs/http/ngx_http_core_module.html#listen) directive to match:
211211

0 commit comments

Comments
 (0)