Skip to content

This ISPConfig 3 plugin implements Varnish as reverse proxy, NGINX as SSL Termination and Apache as backend.

License

Notifications You must be signed in to change notification settings

bluevisiontec/ispconfig3-varnish

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

README

This ISPConfig plugin is built for those who wants setup Varnish Cache in ISPConfig. We use Varnish for cache, Apache for the backend, and we added NGINX for SSL termination.

So, we can have two scenario :

  • Without SSL: Visitor > Varnish > Apache
  • With SSL: Visitor > NGINX > Varnish > Apache

I've done test with the following configuration:

  • Debian 9 x64
  • Apache 2.4.25
  • NGINX 1.14.2
  • Varnish 6.0.2

This should work fine with Ubuntu, and may requires small adjustments to work well on CentOS & RHEL-based distributions.

Installation steps:

Install some required software for Varnish and NGINX repos: apt-get install debian-archive-keyring curl gnupg apt-transport-https gnupg2 ca-certificates lsb-release

Install Varnish repo

curl -L https://packagecloud.io/varnishcache/varnish60lts/gpgkey | apt-key add -

Create a text file called /etc/apt/sources.list.d/varnishcache_varnish60lts.list:

nano /etc/apt/sources.list.d/varnishcache_varnish60lts.list

Put this on:

deb https://packagecloud.io/varnishcache/varnish60lts/debian/ stretch main
deb-src https://packagecloud.io/varnishcache/varnish60lts/debian/ stretch main

Save and exit nano (Ctrl+X, Y, Enter).

Install NGINX repo

echo "deb http://nginx.org/packages/debian `lsb_release -cs` nginx" \
| tee /etc/apt/sources.list.d/nginx.list
curl -fsSL https://nginx.org/keys/nginx_signing.key | apt-key add -

Install Varnish and NGINX

apt-get update
apt-get install nginx varnish

Clone the repo:

git clone https://github.com/manoaratefy/ispconfig3-varnish.git

Move all files to its place:

cd ispconfig3-varnish
mv etc/* /etc/
mv usr/* /usr/
mv lib/* /lib/

Reload daemon:

systemctl daemon-reload

Then, rebuild all vHost BEFORE RESTARTING SERVICES (in other case, Apache may not start then you'll not be able to open ISPConfig control panel).

ISPConfig > Tools > Sync Tools > Resync > Check "Websites" > Start

After that, you can restart all services:

systemctl restart apache
systemctl restart varnish
systemctl restart nginx

Notes

Apache ports: 6080 (non SSL) / 6443 (pseudo-SSL) Varnish ports: 80 (non SSL) / 7443 (pseudo SSL) NGINX ports: N/A (non SSL) / 443 (SSL)

The pseudo-SSL is a particular port used by Apache & Varnish to be a back-end for the NGINX SSL. The traffic itself is not SSL but the environment is configured to say to PHP scripts that we are on SSL connection (X-Forwarded-Proto & HTTPS environment variable).

What needed to be improved?

I'm not a ISPConfig developer. I don't know if the way I do thing is good enough to have long-term compatibility with ISPConfig. I'm just making things working. So, I'm calling other developers to review my code and to adjust things that I do wrong.

Here is a short list of things I think I'm not doing great:

  • The SSL certificate file I'm just thinking that SSL certificates will be /var/www/yourwebsite.com/ssl/yourwebsite.com.crt or /var/www/yourwebsite.com/ssl/yourwebsite.com-le.crt (Let's Encrypt version). I'm not sure how ISPConfig is really storing SSL certificates. Concerned file: usr/local/ispconfig/server/plugins-available/varnish_plugin.inc.php

  • Port changing Currently, the embedded configurations files change the service's port (Apache, NGINX and Varnish). I wish to create a script to adjust ports on existing configurations if available. Also, the used ports may be already used. I suggest to check random ports and use them if free. Concerned files: etc/apache2/ports.conf etc/varnish/default.vcl lib/systemd/system/varnish.service

  • Full caching management interface on ISPConfig Admins and users may requires an interface to use Varnish correctly (advanced caching rules, flushing the cache, caching rules template, ...) It is relatively easy to implement it with an external software (means outside ISPConfig control panel) as the proposed Varnish configuration doesn't depend on any ISPConfig functionnality. Theorically, we can use any Varnish Control Panel without interference. But it would be great if someones found a way to integrate in under the ISPConfig interface itself.

There may be other improvements. Just open an issue/request a feature.

Installation services

Do you need a sysadmin to install this module into your ISPConfig? I'm available for you. Contact me.

Donations

If my work was useful for your business, buy me a coffee:

  • BTC: 32NriafwyTELpL7GgH8XoimsnA8Hh8U9FU
  • XMR: 833wfJerqTVb9fLhSgBNSQLQBSqsR4Tvr3sCE721JtD3bVpybqUWfHQUexcDYxJkX63rAZyPdqWDMP6BZULsL71yJN8xvTL
  • Other ways: Contact me

Credits & Sponsors

I've found very useful information in the following URL:

Of course, my code is proudly used on professional web hosting that I would highly recommend.

About

This ISPConfig 3 plugin implements Varnish as reverse proxy, NGINX as SSL Termination and Apache as backend.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • PHP 91.2%
  • VCL 8.8%