To get the real client IP directly from NGINX, you can use the ngx_http_realip_module
module. This module allows NGINX to replace the client IP address in the request headers with the address sent in the X-Forwarded-For
or X-Real-IP
headers.
Follow these steps to configure NGINX to obtain the real client IP:
- Open the NGINX configuration file typically located at /etc/nginx/nginx.conf or /etc/nginx/conf.d/default.conf.
- Inside the http block, add the following line to load the ngx_http_realip_module module: load_module /usr/lib/nginx/modules/ngx_http_realip_module.so;
- Within the http block, add the following lines to set the real_ip_header variable to the appropriate header value: set_real_ip_from 10.0.0.0/8; real_ip_header X-Forwarded-For; Replace 10.0.0.0/8 with the appropriate CIDR notation for your trusted proxy IP address or subnet range.
- Below the previous lines, add the following line to restore the original client IP address: real_ip_recursive on;
- Save the configuration file and exit the text editor.
- Test the NGINX configuration for syntax errors: nginx -t
- If the test is successful, reload NGINX to apply the changes: systemctl reload nginx
Once NGINX is configured, it will use the value from the X-Forwarded-For
or X-Real-IP
header as the client IP address instead of the default value obtained by NGINX. This allows you to accurately trace the client IP in your NGINX logs or use it for any other purposes within your NGINX configuration.
How to configure NGINX to obtain the client IP address?
To configure NGINX to obtain the client IP address, you can follow these steps:
- Open your NGINX configuration file. Depending on the operating system and NGINX installation method, the file could be located at /etc/nginx/nginx.conf or /etc/nginx/conf.d/default.conf or /etc/nginx/sites-available/default.
- Inside the main http block, add or modify the http or server block to include the following line: set_real_ip_from 0.0.0.0/0; # Set the IP range from which NGINX should trust proxy requests real_ip_header X-Forwarded-For; # The header that contains the real IP address Alternatively, if you're behind a load balancer or reverse proxy, you can use the X-Real-IP header instead of X-Forwarded-For: real_ip_header X-Real-IP;
- Save the configuration file and exit the editor.
- Test the configuration syntax for any errors by running the command: nginx -t
- If there are no syntax errors, reload the NGINX configuration to apply the changes by running the command: nginx -s reload
After configuring NGINX to obtain the client IP address, you can access it in your application or web server logs using the REMOTE_ADDR
environment variable.
How to check if NGINX is running on a server?
You can use the following command to check if NGINX is running on a server:
1
|
sudo systemctl status nginx
|
This command will display the status of the NGINX service. If NGINX is running, you will see output similar to:
1 2 3 4 5 6 7 8 9 10 11 |
● nginx.service - The NGINX HTTP Server Loaded: loaded (/lib/systemd/system/nginx.service; enabled; vendor preset: enabled) Active: active (running) since Tue 2021-04-13 10:00:00 PDT; 1h ago Docs: http://nginx.org/en/docs/ Main PID: 12345 (nginx) Tasks: 2 (limit: 4915) Memory: 4.0M CPU: 1.000s CGroup: /system.slice/nginx.service ├─12345 nginx: master process /usr/sbin/nginx -g daemon on; master_process on; └─12346 nginx: worker process |
If NGINX is not running, you will see output indicating that the service is inactive or not found.
Note: The exact command may vary depending on the operating system and how NGINX is installed on the server.
What is an NGINX rewrite rule?
An NGINX rewrite rule is a configuration setting that allows rewriting or modifying URL paths or query strings sent by clients before processing the request. It enables the server to redirect or serve content from different locations based on certain conditions defined by regular expressions. NGINX rewrite rules are commonly used for URL redirection, modifying query strings, masking internal file paths, and implementing SEO-friendly URLs.
How to block specific IP addresses using NGINX?
To block specific IP addresses using NGINX, you can follow these steps:
- Open the NGINX configuration file. This file is typically located in the /etc/nginx/ directory and is named nginx.conf.
- Inside the http block, add a new server block to define the configurations for blocking the IP addresses: http { ... server { ... } }
- Inside the server block, add a new location block to specify the path or URL where you want to block the IP addresses: http { ... server { ... location /block/path { ... } } }
- Inside the location block, use the deny directive to specify the IP addresses you want to block: http { ... server { ... location /block/path { deny 192.168.1.1; deny 10.0.0.0/24; ... } } } You can use either the IP address or IP range format (CIDR notation) to specify the IP addresses you want to block.
- Save the configuration file and exit the text editor.
- Test the NGINX configuration to ensure it is valid: $ nginx -t
- If the configuration test is successful, reload or restart NGINX for the changes to take effect: $ systemctl reload nginx or $ service nginx restart
With these steps, NGINX will deny access to the specified IP addresses for the specified path or URL. If any requests come from these IP addresses, NGINX will return a forbidden (403) error.