Enhanced Virtual Hosting Avi Networks — Technical Reference (20.1)

Total Page:16

File Type:pdf, Size:1020Kb

Enhanced Virtual Hosting Avi Networks — Technical Reference (20.1) Page 1 of 9 Enhanced Virtual Hosting Avi Networks — Technical Reference (20.1) Enhanced Virtual Hosting view online Overview This guide explains the usage of enhanced virtual hosting (EVH). This will help in enabling the virtual hosting on virtual service irrespective of SNI. Virtual service can be of two main types, namely, * Non-virtual hosting enabled virtual service * Virtual hosting enabled virtual service Non-Virtual Hosting enabled Virtual Service If you uncheck Virtual Hosting VS checkbox, in Virtual Service window, then that particular virtual service would be non- virtual hosting enabled virtual service. Virtual Hosting enabled Virtual Service SNI Virtual Hosting Virtual service have a configuration option to enable virtual hosting support. Enabling this option within a virtual service indicates the virtual service is a parent or child of another service, in a server name indication (SNI) deployment. Server Name Indication, or SNI, is a method of virtual hosting multiple domain names for an SSL enabled virtual IP. For more details on virtual hosting enabled virtual service, refer to Server Name Indication, Wildcard SNI Matching for Virtual Hosting user guides. Enhanced Virtual Hosting Virtual service have a configuration option to enable virtual hosting support. Enabling this option within a virtual service indicates the virtual service is a parent or child of another service. If the type of a virtual service is either parent or child, it is considered a virtual hosting enabled virtual service. Copyright © 2021 Avi Networks, Inc. Page 2 of 9 Enhanced Virtual Hosting Avi Networks — Technical Reference (20.1) The virtual service placement for EVH service follow the same conditions as SNI parent child. A parent can either be a host SNI or EVH children but not both at the same time. The child of the same virtual hosting type can be associated with parent virtual service, i.e. if the parent virtual service is of SNI type then the associated children should also be of SNI type. Similarly if parent virtual service is of enhanced virtual service type, then the children associated with this parent virtual service should be of same type, i.e. EVH. The EVH child can not be associated with SNI parents and vice versa. SNI verses EVH In SNI, multiple domains can be configured under a child virtual service and are owned by that virtual service. The same domain cannot be configured on other SNI children. However, in EVH same domain can be configured under multiple children but with different path match criteria. Copyright © 2021 Avi Networks, Inc. Page 3 of 9 Enhanced Virtual Hosting Avi Networks — Technical Reference (20.1) Also, the SNI can only handle HTTPS traffic where as EVH children can handle both HTTP and HTTPS traffic. Parent virtual service have the service ports configured on them and need to have SSL enabled on them. In the child virtual service, FQDN field is used to specify the domains for which the virtual service should be selected. HOST+PATH+match_criteria defines which child virtual service under a parent virtual service will process a given request. In SNI entire connection, including all its requests, the parent virtual service will be handled by one of this child virtual service, selected during TLS handshake. In EVH, connection is always handled by the parent virtual service and individual requests in that connection will be handled by the selected child virtual service based on matching host header, URI path and path match criteria configured under child virtual service. Avi Vantage supports the EVH switching of different requests (within one connection) between the child virtual service of a single parent virtual service. Unlike SNI which switches only TLS connections based on one-to-one mapping of children to FQDN, EVH maps one FQDN to many children based on resource path requested. SSL Profile and Certificate Configuration You can select Enhanced Virtual Hosting option from the Virtual Hosting Type drop-down list in Settings tab of New Virtual Service window. Unlike the normal virtual service or an SNI virtual service, where only 2 certificates each of type RSA and EC are allowed, EVH parent allows configuration of multiple domain name certificates. The TLS server name will be looked up against the configured certificates and the matching certificate will be served on the TLS connection. If no TLS server name is present or TLS server name does not match any common name/ SAN/ DNS information in any of the certificates configured, the first certificate in the list of certificates (default certificate) configured will be served for that connection. Copyright © 2021 Avi Networks, Inc. Page 4 of 9 Enhanced Virtual Hosting Avi Networks — Technical Reference (20.1) Each of the child virtual service can have their individual app profiles, WAF profiles, etc. Copyright © 2021 Avi Networks, Inc. Page 5 of 9 Enhanced Virtual Hosting Avi Networks — Technical Reference (20.1) Configuring EVH While creating the virtual service, you can select either parent or child virtual hosting virtual service option. You should also select Enhanced Virtual Hosting option from the Virtual Hosting Type drop-down list. Ensure that both parent and its child virtual service have the same Virtual Hosting type. Parent Virtual Service The parent virtual service in EVH is configured without any vh_matches configuration. The virtual service receives all traffic and performs TLS termination, if necessary, before receiving requests. Copyright © 2021 Avi Networks, Inc. Page 6 of 9 Enhanced Virtual Hosting Avi Networks — Technical Reference (20.1) The parent virtual service allows multiple certificates to be configured in this virtual hosting and for SSL connections, the parent virtual service picks the matching server certificate based on the TLS server name requested by the client and cipher used. If the server name is requested or no match is found, the first certificate configured on the virtual service is used. For TLS mutual authentication, the PKI profile must be configured only on the parent virtual service. After TLS handshake is complete, the parent receives all the requests and matches them with host names and paths configured on its children and selects the matching child virtual service and hands off the request to that virtual service. If none of the child virtual service?s config match the request, then the request is processed by parent virtual service configuration. Essentially the connection stays with the parent but request keep switching to its children for processing. Child Virtual Service: Copyright © 2021 Avi Networks, Inc. Page 7 of 9 Enhanced Virtual Hosting Avi Networks — Technical Reference (20.1) The child virtual service in EVH is configured with host and path match configuration. The parent virtual service will do the TCP and SSL termination and request processing is sent to this virtual service if the request host and URL matches the vh_matches configuration in the child virtual service. Multiple hosts, each with multiple path matches can be configured under a child virtual service. Multiple child virtual service with non-conflicting vh_matches configuration can be associated with a parent virtual service. The child virtual service cannot do TLS termination and does not accept SSL configuration such as SSL profile, SSL key and certificate, PKI profile etc. All request/response specific configuration settings from application profile, policies, datascript, caching and compression, WAF profile configured on the child virtual service apply on the request being processed by this child virtual service. EVH Child Selection Parent EVH virtual service will terminate the TCP/SSL connection and does HTTP request line processing. Based on the URI, host header, match criteria, lookup key is used to find the matching child. Copyright © 2021 Avi Networks, Inc. Page 8 of 9 Enhanced Virtual Hosting Avi Networks — Technical Reference (20.1) Path Lookup Criteria The following are the path lookup criteria supported: Equals Begins with Regex pattern matches The above search order will be executed to find the matching child virtual service. Application Metrics With the EVH, the connection will technically be received by the parent virtual service and each individual request will be processed by the matching child virtual service. Each request will map the metrics data of the matching child virtual service and request level metrics will be collected on that child. Connection level metrics, including TCP and SSL, will be collected on the parent virtual service. Note: Virtual Service Security > {SSL Certificate, SSL TLS Version, SSL Score} analytics will not be applicable and will not be shown on child virtual service. Points to be Noted The following are the points to be noted: A virtual hosting virtual service should be either SNI or EVH. If the parent virtual service have EVH defined, then: The child virtual service cannot have certs attached or SSL Profile attached to them. Multiple vh_matches configuration with same host value are not allowed under a child virtual service. A child virtual service can have multiple paths configured under a single host. Two or more child virtual service cannot share same combinations. A parent virtual service cannot be a child of another parent virtual service. HTTP/2 is not supported. OCSP stapling will not work for certificate other than the first/ default certificate. Document Revision History Date Change Summary December 23, Created Enhanced Virtual Hosting user 2020 guide Copyright © 2021 Avi Networks, Inc. Page 9 of 9.
Recommended publications
  • Resin 3.2 Reference
    Contents 1 Overview 3 1.1 Features - Resin and Resin Professional . .3 2 Installation 11 2.1 Resin Installation Quick Start . 11 2.2 Resin Installation . 16 2.3 Resin Web Server . 16 2.4 Resin with Apache . 22 2.5 Resin with IIS . 34 2.6 How the Plugins Dispatch to Resin . 44 3 Command-Line 47 3.1 Command-Line Configuration . 47 4 Admin Guide 51 4.1 User Guide: Administration . 51 5 Watchdog 63 5.1 Resin Watchdog . 63 6 Virtual Hosts 73 6.1 Virtual Hosting . 73 7 Clustering 89 7.1 Resin Clustering . 89 8 Web Applications 109 8.1 An Overview of Web Applications . 109 9 Logging 137 9.1 Log . 137 10 Administration 163 10.1 Resin Administration . 163 1 CONTENTS 11 Deployment 177 11.1 Packaging/Deployment . 177 12 Proxy Caching 181 12.1 Server Caching . 181 13 Quercus 193 13.1 Quercus: PHP in Java . 193 14 Security 217 14.1 Resin Security . 217 15 Inversion of Control 271 15.1 Resin IoC . 271 15.2 Scheduled Task . 308 16 Amber 327 16.1 Amber . 327 17 Embedding Resin 355 17.1 Embedding Resin . 355 18 Filters 367 18.1 Filters . 367 19 BAM 379 19.1 BAM . 379 20 Comet 405 20.1 Comet/Server-Push Servlet . 405 21 Remoting 411 21.1 Resin Remoting . 411 21.2 Hessian . 417 22 Messaging 423 22.1 Resin Messaging . 423 23 JSF - Java Server Faces 435 23.1 JSF - Java Server Faces . 435 24 Configuration Tags 445 24.1 cluster: Cluster tag configuration .
    [Show full text]
  • TRANSPORT LAYER SECURITY (TLS) Lokesh Phani Bodavula
    TRANSPORT LAYER SECURITY (TLS) Lokesh Phani Bodavula October 2015 Abstract 1 Introduction The security of Electronic commerce is completely in the hands of Cryptogra- phy. Most of the transactions through e-commerce sites, auction sites, on-line banking, stock trading and many more are exchanged over the network. SSL or TLS are the additional layers that are required in order to obtain authen- tication, privacy and integrity for all kinds of communication going through network. This paper focuses on the additional layer (TLS) which is responsi- ble for the whole communication. Transport Layer Security is a protocol that is responsible for offering privacy between the communicating applications and their users on Internet. TLS is inserted between the application layer and the network layer-where the session layer is in the OSI model TLS, however, requires a reliable transport channel-typically TCP. 2 History Instead of the end-to-end argument and the S-HTTP proposal the developers at Netscape Communications introduced an interesting secured connection concept of low-layer and high-layer security. For achieving this type of security there em- ployed a new intermediate layer between the transport layer and the application layer which is called as Secure Sockets Layer (SSL). SSL is the starting stage for the evolution of different transport layer security protocols. Technically SSL protocol is assigned to the transport layer because of its functionality is deeply inter-winded with the one of a transport layer protocol like TCP. Coming to history of Transport layer protocols as soon as the National Center for Super- computing Application (NCSA) released the first popular Web browser called Mosaic 1.0 in 1993, Netscape Communications started working on SSL protocol.
    [Show full text]
  • SSL EVERYWHERE Application and Web Security, Many Websites Still Have Weak Best Practices for Improving Enterprise Security Implementations of SSL/TLS
    SOLUTION BRIEF CHALLENGES • Even with recent focus on SSL EVERYWHERE application and web security, many websites still have weak Best Practices for improving enterprise security implementations of SSL/TLS. without impacting performance • Main reasons for weak SSL Although increased attention has been focused on application and web security implementations include lack recently, many websites still have weak implementations of Secure Socket Layer of infrastructure and browser (SSL) / Transport Layer Security (TLS). Lack of infrastructure and browser support, support, performance penalty, and performance penalty, and implementation complexity have been the primary implementation complexity. reasons for the dearth of stronger SSL implementations. However, with recent • Legacy hardware load balancers advances in the SSL protocol, as well as significant performance improvements of cannot scale elastically, and are SSL on commodity x86 platforms, stronger SSL can be – and should be – everywhere. capped at speeds that are punitively Avi Networks Application Delivery Controller (ADC) natively supports these new tied to acquisition costs. capabilities to maximize application security without sacrificing performance. SOLUTION • The Avi Vantage Platform natively NEW ACRONYMS IN THE WORLD OF SSL implements server name indication Server Name Indication (SNI) (SNI) infrastructure, HTTP Strict Virtual hosting with SSL is a chicken-and-egg problem. The client sends an SSL Transport Security (HSTS), RSA and Hello, and the server must send back the SSL public key. If there are multiple Elliptic Curve Cryptography (ECC) domain names attached to the same IP address, a client that supports Server Name certificates, and Perfect Forward Indication (SNI) sends the hello along with the requested domain name. The server Secrecy (PFS) with point-and-click can now send back the proper SSL response.
    [Show full text]
  • Hypertext Transfer Protocol Is Used Between the Browser and a Web Server
    HHTTTTPP BByy BBaarrddiiaa ,, PPaattiitt,, aanndd RRoozzhheehh HTTP - Introduction - Hyper Text Transfer Protocol -uses the TCP/IP technology -has had the most impact on the World Wide Web (WWW) - specs in RFC 2616 (RFC2616) HTTP - Importance of The Web • - before HTTP , FTP data transfers accounted for approximately 1/3 of the Internet traffic • - HTTP inception in 1990s and by 2000 Web traffic completely overshadowed other applications HTTP - Importance of The Web (continued) • - companies have web sites, online catalogs • - Internet and Web are indistinguishable for most users • - Uses of the Web include Graphical Design of Information, Dissemination of Research http://info. cern.ch/ (world’s first-ever web server) European organization for Nuclear Research, browsing and ordering of products, client and customer support, display of create arts HTTP - Architectural Components • - Web consists of large set of documents called Web Pages • - web pages considered hypermedia document • - media suffix used to indicate that document contains items other then text , such as graphics • - hyper prefix used to indicate document can contain selectable links • - Hyper Text Markup Language (HTML) used to present mixture of text and images HTTP - Sample HTML Page • <HTML> • <HEAD> • <TITLE>MyPage.html - My Home Page</TITLE> • <SCRIPT></SCRIPT> • </HEAD> • <BODY> • Welcome to My Home Page • </BODY> </HTML> HTTP - Sample HTML Page HTTP - Uniform Resource Locator (URL) • - each page assigned a unique URL name that is used to identify it http://hostname[:port]/path[;parameters][[?query]
    [Show full text]
  • Apache Virtual Hosts Same Document Root
    Apache Virtual Hosts Same Document Root Bryce is satisfyingly exsert after catalectic Bartholomeo sworn his treaty unproperly. Cucumiform Shannan foreknow his wapinschaws hares ontogenetically. Thriving Alonzo dramatizes his kestrels emotionalizes accommodatingly. Create a HTML file called indexhtml in the sand of the scheme we. For more info about the coronavirus, we need to change for a basic virtual host file is the location of the document root for this domain. Conf file configure the server name server alias DocumentRoot and others unique to examplecom domain Repeat the pity for other. If the document root is incorrect or absent you will not be able to set up the virtual host. When the file opens, this configuration would work without changes whenever your IP address changes. The only your left shoulder do grace to go hit a web browser and bend your websites. Virtual hosts created in this manner will not be accessible from other systems, we will need to disable the default file. For this how to, Ubuntu, a virtual host configuration file may refer to more than one URL or DNS result as a single file tree. Above are we have. According to the Apache Virtual Hosts Documentation Virtual Host refers to the. DNS server to map each hostname to carve same IP address and then configure the Apache HTTP Server to tool the different hostnames. Dns name and dictate how many domain! This feature is especially useful in development scenarios, and stuff defined here. We hope this tutorial is useful. In this tutorial we will disclose you on setting up Apache Virtual Hosts on.
    [Show full text]
  • Web Hosting Comprehensive, Scalable Solutions for Hosting Dynamic Websites, Secure Web Services, and Enterprise Applications
    Web Hosting Comprehensive, scalable solutions for hosting dynamic websites, secure web services, and enterprise applications. Features Mac OS X Server combines the latest open source and standards-based Internet services in a complete, easy-to-use web hosting solution. At the core is Apache, the world’s High-performance Apache web server most popular web server. Performance optimized for Mac OS X Server, Apache provides • Apache 1.3 and 2.01 with HTTP 1.1 support fast, reliable web hosting and an extensible architecture for deploying enterprise Java • Support for virtual hosting, including multiple IP addresses and virtual domains applications and delivering dynamic content and sophisticated web services. Apple’s • Encrypted data transport with support for innovative administrative tools make it possible for organizations of any size to host SSL and TLS protocols websites and deploy powerful web applications quickly, easily, and affordably. • WebDAV support for collaborative content publishing Mac OS X Server takes the complexity out of configuring, hosting, and managing websites. An intuitive administrative interface makes it easy to get started with a static Dynamic content deployment website, while providing advanced capabilities for professional webmasters responsible • Extensible Apache module architecture for deploying sophisticated services. Tools for serving dynamic content, CGI scripting, • In-line HTML scripting using server-side enterprise applications, database integration, and blog publishing and syndication are includes (SSIs) and PHP already built in, as is OpenSSL for encrypted data transport. Mac OS X Server combines • Support for the UNIX CGI 1.1 standard and all of these web technologies with innovative management tools for superior ease of scripting using Perl, Ruby, and Python use.
    [Show full text]
  • Deploying and Monitoring Ruby on Rails a Practical Guide
    Mit hotfixes von Carsten Bormann 2011-03-05 + 2013-02-28 Deploying and Monitoring Ruby on Rails A practical guide Mathias Meyer and Jonathan Weiss, 25.05.2009 Danke! Peritor GmbH Mashed up with... 2011-03-05 Deployment/Scaling/ Caching/Debugging jan krutisch mindmatters gmbh&co. kg [email protected] http://mindmatters.de Deployment Real artists ship! Komponenten client (Browser) rails database client Heute: (Browser) ➔ railsthin mongrel (∨database unicorn) mongrel ist schnell apache ist schneller client webserver rails Dateisystem public/ database rails ist nicht threadsafe client rails webserver rails database Dateisystem rails public/ webserver rails webserver rails oldschool: CGI / SCGI / FastCGI newschool: http mongrel versus... mod_proxy_balancer (in Apache/nginx/lighttpd) oder ein richtiger proxy oder ein richtiger balancer Varnish HAProxy, Squid, etc. true school: passenger Apache-Modul client rails webserver rails database rails Dateisystem public/ mod_passenger automagisch. it just works. http://modrails.com Infrastructure Infrastructure 5 Simple Rails Setup One Rails instance handles all requests Rails is single-threaded: There is only one concurrent request 6 Rails Setup 7 Rails Setup 8 Typical Rails Setup •! A load-balancer distributes the incoming requests •! Some load-balancers will deliver static requests themselves •! Several Rails instances handle all requests •! Number of concurrent requests equals number of Rails instances 9 Rails Setup Options 10 Deployment Questions Apache? Pound? mod_proxy_balancer? FastCGI? Mongrel? Proxy? Load-balancer? Nginx? mod_rails? Ebb? HA-Proxy? Reverse Proxy? Swiftiply? Phusion Passenger? Thin? Pen? Rails Application Server? Lighttpd? 11 What we are going to cover today Rails Application Server Proxy/Web Server •! FastCGI •! Apache2 •! Mongrel •! Nginx •! mod_rails / Phussion Passenger •! Lighttpd •! JRuby + Glassfish & Co.
    [Show full text]
  • Virtual Hosting Q Apache Applications
    Outline q Introduction to Apache httpd web server q Basic Compilation, Installation and Configuration q Apache File system q Apache Logging & Status q Security & Performance Features q Virtual Hosting q Apache Applications 2 About Apache A PAtCHy server: developed by the Apache group formed 2/95 around by a number of people who provided patch files for NCSA httpd 1.3 by Rob McCool. Apache HTTP server project http://httpd.apache.org History-http://httpd.apache.org/ABOUT_APACHE.html Apache foundation started to support the web server project, but now extends to a multitude of other projects First official public release (0.6.2) in April 1995 Added adaptive pre-fork child processes (very important!). Modular structure and API for extensibility (Bob Thau) Port to multiple platforms. Apache 1.0 was released on 1/12/95. Pass NCSA httpd to be #1 server in Internet. Reference: http://httpd.apache.org/docs/current/ Taxonomy of Internet Services 4 Stats of Web Server types Web Server Installation Statistics • See survey statistics in à W3Techs.com & 6 Apache Installation • The current stable release is Apache 2.4.25 • Can be installed via package manager • Or custom installation from source if one requires a more recent version • In our training machines we will install Apache 2.4.7 • Linux Package Manager: • Ubuntu/Debian : apt-get install apache2 • CentOS/Redhat/Fedora : yum install httpd • For win32 version, you can download from any of mirror servers. Win32 Binary including OpenSSL 0.x.x (MSI Installer). http://httpd.apache.org/download.cgi
    [Show full text]
  • Web Server Configuration
    SAN DIEGO COMMUNITY COLLEGE DISTRICT CONTINUING EDUCATION COURSE OUTLINE SECTION I SUBJECT AREA AND COURSE NUMBER COMP 633 COURSE TITLE WEB SERVER CONFIGURATION TYPE COURSE NON-FEE VOCATIONAL CATALOG COURSE DESCRIPTION In this course students will learn about installing Web server software, building upon the basic configuration, and virtual hosting. They will also learn how to determine clients’ needs and improve the Web servers performance. Students will learn about logs, statistics and server information to monitor the Web server. (FT) LECTURE/LABORATORY HOURS 300 ADVISORY NONE RECOMMENDED SKILL LEVEL Possess a 10th grade reading level; ability to communicate effectively in the English language; knowledge of math concepts at the 8th grade level; ability to use a mouse, menus, open and close windows and save files within the Macintosh or Windows operating system; and ability to use an internet browser. INSTITUTIONAL STUDENT LEARNING OUTCOMES 1. Social Responsibility SDCE students demonstrate interpersonal skills by learning and working cooperatively in a diverse environment. 2. Effective Communication SDCE students demonstrate effective communication skills. CEISO 02/07; Revised 12/18/13 WEB SERVER CONFIGURATION PAGE 2 INSTITUTIONAL STUDENT LEARNING OUTCOMES (CONTINUED) 3. Critical Thinking SDCE students critically process information, make decisions, and solve problems independently or cooperatively. 4. Personal and Professional Development SDCE students pursue short term and life-long learning goals, mastering necessary skills and using resource management and self advocacy skills to cope with changing situations in their lives. COURSE GOALS To provide instruction in the compilation and basic configurations of Web servers. Students will learn the technical aspects of Web servers including security and maintenance.
    [Show full text]
  • HTTP – Hypertext Transfer Protocol the Web: the Http Protocol Http: Hypertext Transfer
    HTTP – HyperText Transfer Protocol The Web: the http protocol http: hypertext transfer protocol htt p r equ PC running es Web’s application layer htt t p r protocol Explorer esp onse client/server model client: browser that st ue eq requests, receives, r se Server ttp on displays Web objects h sp running “ ” re tp NCSA Web ht server: Web server sends server objects in response to requests Mac running http1.0: RFC 1945 Navigator http1.1: RFC 2068 Universal Resource Locator protocol://host:port/path#anchor?parametersprotocolprotocol://protocol://host:port/protocol://host:port/pathprotocol://host:port/path#anchor?://host:port/path#anchor?parametershost:port/path#anchor?parameterspath#anchor?parameters#anchor?parametersparameters http://www.google.com/search?hl=en&g=blabla There are other types of URL’s mailto:<account@site> news:<newsgroup-name> The http protocol: more http: TCP transport service: http is “stateless” server maintains no client initiates TCP connection (creates socket) information about to server, port 80 past client requests server accepts TCP aside connection from client Protocols that maintain “state” are complex! http messages (application- layer protocol messages) past history (state) must be maintained exchanged between browser (http client) and if server/client crashes, their views of “state” may be Web server (http server) inconsistent, must be TCP connection closed reconciled Persistent vs. Non-Persistent Connection A page that we see on the browser can include more than one resource The resources are sent from the server to the client one after the other Sending the resources to the browser can be by using a persistent connection or by using a non-persistent connection Non-Persistent Connection 1.
    [Show full text]
  • Simply Rails 2 Is a Comprehensive, Step-By-Step Guide to Building Powerful Web Applications Using Ruby on Rails
    'REYSCALE #-9+ 0ANTONE ALL SOURCE CODE AVAILABLE FOR DOWNLOAD Black 50% CMYK O, 53, 100, 0 PANTONE Orange 021 0ANTONE C THE SIMPLE AND EASY WAY TO BUILDBlack 100% CMYK 100, 45, 0, 37 PANTONE 2955 C #-9+ BULLETPROOF WEB APPLICATIONS 'REYSCALE RAILS Updated to take advantage of all the new Rails 2 features, Simply Rails 2 is a comprehensive, step-by-step guide to building powerful web applications using Ruby On Rails. Perfect for the programming novice or someone looking to move into SIMPLY the agile Rails framework, this book will teach you how to build bulletproof Web 2.0 PANTONE Orange 021 C PANTONE 2955 C CMYK O, 53, 100, 0 CMYK 100, 45, 0, 37 applications from scratch, with more features using less code. Black 50% Black 100% Build and deploy your own Rails web application. “If you’re looking for RAILS your first Rails book, 2 Reap the benefits of using best-practice MVC architecture. this is a good choice” BY PATRICK LENZ Use Rails’s Ajax features to create slick interfaces. www.ibm.com Interact with databases easily using ActiveRecord. GARY POLLICE Add the magic of REST to your apps with Rails Resources. “The way this book is Use plugins to enhance your applications easily. laid out is first class” www.rubyinside.com SIMPLY RAILS SIMPLY PETER COOPER ABOUT PATRICK LENZ Patrick Lenz has been developing web applications for “Definitely a good more than ten years. Founder and lead developer of the introduction, especially freshmeat.net software portal, he and his Rails consultancy if you are new to Ruby.” and web application development company, limited weblog.jamisbuck.org overload, are responsible for numerous community driven JAMIS BUCK Patrick web applications developed using Ruby on Rails.
    [Show full text]
  • Installation and Configuration
    3 Aug 2007 Drupal Handbook Table of Contents Installation and configuration . 1 System requirements . 2 Client System Requirements . 3 Javascript . 3 CSS . 4 RSS . 4 Browser Specifics . 4 Browser Popularity . 4 Known Problems . 4 Validation . 4 Caveats . 4 HOWTO: Server requirement recommendations for your consulting clients .. 5 Message to the Client . 5 Benchmark . 6 What Drupal.org runs on . 6 Requirements - older versions . 6 Installing Drupal, modules and themes . 8 Installing Drupal . 8 Formatted Drupal 5.x Installation instructions for better readability .. 13 Installation . 13 Changes . 14 Requirements . 14 Optional Requirements . 14 Installation . 14 Drupal Administration . 16 Customizing your theme(s) . 16 Multi-site configuration . 16 More Information . 17 Formatted Drupal 4.7.x Installation instructions for better readability .. 17 Installation . 17 REQUIREMENTS . 18 SERVER CONFIGURATION . 18 OPTIONAL COMPONENTS . 18 INSTALLATION . 19 1. DOWNLOAD DRUPAL . 19 2. CREATE THE DRUPAL DATABASE . 19 3. LOAD THE DRUPAL DATABASE SCHEME . 20 4. CONNECTING DRUPAL . 20 5. CONFIGURE DRUPAL . 21 6. CRON TASKS . 22 DRUPAL ADMINISTRATION . 22 CUSTOMIZING YOUR THEME(S) . 22 UPGRADING . 23 MORE INFORMATION . 23 i Drupal Handbook 3 Aug 2007 10 minute install using PuTTY SSH/Telnet client .. 23. How I installed Drupal: The Eightfold Way . 24. Installing virtual hosts for Drupal sites and subsites .. 25. Mac OS X-specific guidelines . 26. Important notes for MySQL install: . 27. HOWTO: Create a local server environment for drupal using MAMP .. 28. HOWTO: Installing PostgreSQL and MySQL on the same Mac OS X machine .. 29. Installing Drupal on Mac OS X 10.4 Tiger . 30. Installing and Configuring MySQL . 30. Sending mail . 32.
    [Show full text]