大佬教程收集整理的这篇文章主要介绍了nginx 服务器和 ssh 停止响应,大佬教程大佬觉得挺不错的,现在分享给大家,也给大家做个参考。
我在 RaspBerry pi 零上的 Nginx 下的 gunicorn 上有一个正在运行的 Flash 服务器。 我的问题是覆盆子有时会睡几分钟,无法访问服务器并且 ssh 不再工作。
所以我用这个来禁用pi省电:sudo iw dev wlan0 set power_save off
。
它更好,但因为 413 request Entity Too Large
有问题,我将 clIEnt_max_body_size
设置为我的 Nginx 配置文件。
但现在更糟,“睡眠”发生得更频繁,有时我不得不重新启动。
这是我的reverse-proxy.conf
:
server {
Listen 80;
Listen [::]:80;
server_name localhost;
return 301 https://$server_name$request_uri;
}
server {
Listen 443 ssl;
Listen [::]:443 ssl;
ssl_certificate /etc/ssl/certs/selfsigned.crt;
ssl_certificate_key /etc/ssl/private/selfsigned.key;
error_log /var/www/flask/Nginx.log deBUG;
ssl_dhparam /etc/Nginx/dhparam.pem;
LOCATIOn / {
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header HOST $http_host;
proxy_pass http://127.0.0.1:8080;
proxy_redirect off;
}
LOCATIOn /upload {
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header HOST $http_host;
proxy_pass http://127.0.0.1:8080;
proxy_redirect off;
clIEnt_max_body_size 200M; # file needed to upload is just a big image around 1m
}
# increase timeout,300s,1d,default: 60s
fastcgi_read_timeout 1d;
proxy_read_timeout 1d;
}
这是我的 Nginx 日志文件中“睡眠”后的最后几行。
2021/03/13 21:44:18 [deBUG] 8220#8220: *445 reusable connection: 1
2021/03/13 21:44:18 [deBUG] 8220#8220: *445 event timer add: 3: 65000:7060228
2021/03/13 21:44:38 [deBUG] 8220#8220: *445 http keepalive handler
2021/03/13 21:44:38 [deBUG] 8220#8220: *445 malloc: 018D46F0:1024
2021/03/13 21:44:38 [deBUG] 8220#8220: *445 SSL_read: -1
2021/03/13 21:44:38 [deBUG] 8220#8220: *445 SSL_get_error: 5
2021/03/13 21:44:38 [deBUG] 8220#8220: *445 peer shutdown SSL cleanly
2021/03/13 21:44:38 [info] 8220#8220: *445 clIEnt 192.168.1.72 closed keepalive connection (104: Connection reset by peer)
2021/03/13 21:44:38 [deBUG] 8220#8220: *445 close http connection: 3
2021/03/13 21:44:38 [deBUG] 8220#8220: *445 SSL_shutdown: 1
2021/03/13 21:44:38 [deBUG] 8220#8220: *445 event timer del: 3: 7060228
2021/03/13 21:44:38 [deBUG] 8220#8220: *445 reusable connection: 0
2021/03/13 21:44:38 [deBUG] 8220#8220: *445 free: 018D46F0
2021/03/13 21:44:38 [deBUG] 8220#8220: *445 free: 00000000
2021/03/13 21:44:38 [deBUG] 8220#8220: *445 free: 018F56F0,unused: 8
2021/03/13 21:44:38 [deBUG] 8220#8220: *445 free: 01933360,unused: 120
内核日志(/var/log/syslog):
@H_120_5@mar 13 22:48:09 raspBerrypi rngd[270]: stats: Time spent starving for entropy: (min=0; avg=0.000; max=0)us Mar 13 22:58:08 raspBerrypi systemd[1]: session-10.scope: Succeeded. Mar 13 23:17:01 raspBerrypi CRON[25098]: (root) CMD ( cd / && run-parts --report /etc/cron.hourly) Mar 13 23:44:19 raspBerrypi dhcpcd[385]: wlan0: harDWare address 00:00:00:00:00:00 claims 192.168.1.64 Mar 13 23:44:21 raspBerrypi dhcpcd[385]: wlan0: harDWare address 00:00:00:00:00:00 claims 192.168.1.64 Mar 13 23:44:21 raspBerrypi dhcpcd[385]: wlan0: 10 second defence Failed for 192.168.1.64 Mar 13 23:44:21 raspBerrypi avahi-daemon[260]: Withdrawing address record for 192.168.1.64 on wlan0. Mar 13 23:44:21 raspBerrypi avahi-daemon[260]: Leaving mDNS multicast group on interface wlan0.IPv4 with address 192.168.1.64. Mar 13 23:44:21 raspBerrypi dhcpcd[385]: wlan0: deleting route to 192.168.1.0/24 Mar 13 23:44:21 raspBerrypi dhcpcd[385]: wlan0: deleting default route via 192.168.1.254 Mar 13 23:44:21 raspBerrypi avahi-daemon[260]: Interface wlan0.IPv4 no longer relevant for mDNs. Mar 13 23:44:21 raspBerrypi dhcpcd[385]: wlan0: rebinding lease of 192.168.1.64 Mar 13 23:44:21 raspBerrypi dhcpcd[385]: wlan0: probing address 192.168.1.64/24 Mar 13 23:44:26 raspBerrypi dhcpcd[385]: wlan0: leased 192.168.1.64 for 86400 seconds Mar 13 23:44:26 raspBerrypi avahi-daemon[260]: Joining mDNS multicast group on interface wlan0.IPv4 with address 192.168.1.64. Mar 13 23:44:26 raspBerrypi avahi-daemon[260]: New relevant interface wlan0.IPv4 for mDNs. Mar 13 23:44:26 raspBerrypi avahi-daemon[260]: Registering new address record for 192.168.1.64 on wlan0.IPv4. Mar 13 23:44:26 raspBerrypi dhcpcd[385]: wlan0: adding route to 192.168.1.0/24 Mar 13 23:44:26 raspBerrypi dhcpcd[385]: wlan0: adding default route via 192.168.1.254 Mar 13 23:48:09 raspBerrypi rngd[270]: stats: bits received from HRNG source: 180064 Mar 13 23:48:09 raspBerrypi rngd[270]: stats: bits sent to kernel pool: 123584 Mar 13 23:48:09 raspBerrypi rngd[270]: stats: entropy added to kernel pool: 123584 Mar 13 23:48:09 raspBerrypi rngd[270]: stats: FIPS 140-2 successes: 9 Mar 13 23:48:09 raspBerrypi rngd[270]: stats: FIPS 140-2 @R_749_4895@: 0 Mar 13 23:48:09 raspBerrypi rngd[270]: stats: FIPS 140-2(2001-10-10) Monobit: 0 Mar 13 23:48:09 raspBerrypi rngd[270]: stats: FIPS 140-2(2001-10-10) Poker: 0 Mar 13 23:48:09 raspBerrypi rngd[270]: stats: FIPS 140-2(2001-10-10) Runs: 0 Mar 13 23:48:09 raspBerrypi rngd[270]: stats: FIPS 140-2(2001-10-10) Long run: 0 Mar 13 23:48:09 raspBerrypi rngd[270]: stats: FIPS 140-2(2001-10-10) ConTinuous run: 0 Mar 13 23:48:09 raspBerrypi rngd[270]: stats: HRNG source speed: (min=101.599; avg=254.741; max=920.244)Kibits/s Mar 13 23:48:09 raspBerrypi rngd[270]: stats: FIPS tests speed: (min=924.206; avg=3071.971; max=9096.996)Kibits/s Mar 13 23:48:09 raspBerrypi rngd[270]: stats: LoWest ready-buffers level: 2 Mar 13 23:48:09 raspBerrypi rngd[270]: stats: Entropy starvations: 0 Mar 13 23:48:09 raspBerrypi rngd[270]: stats: Time spent starving for entropy: (min=0; avg=0.000; max=0)us Mar 13 23:57:38 raspBerrypi dhcpcd[385]: wlan0: part of Router Advertisement expired
编辑: 问题可能来自我的电脑或过滤我的电脑 ip 的 pi,因为有时我可以从我的 AndroID 手机 ssh 或访问同一网络中的 http 服务器,但我的电脑没有互联网或防火墙(ESET 防病毒软件)问题.
暂无找到可以解决该程序问题的有效方法,小编努力寻找整理中!
如果你已经找到好的解决方法,欢迎将解决方案带上本链接一起发送给小编。
小编邮箱:dio#foxmail.com (将#修改为@)
以上是大佬教程为你收集整理的nginx 服务器和 ssh 停止响应全部内容,希望文章能够帮你解决nginx 服务器和 ssh 停止响应所遇到的程序开发问题。
如果觉得大佬教程网站内容还不错,欢迎将大佬教程推荐给程序员好友。
本图文内容来源于网友网络收集整理提供,作为学习参考使用,版权属于原作者。
如您有任何意见或建议可联系处理。小编QQ:384754419,请注明来意。