Skip to content
GitLab
Explorer
Connexion
Navigation principale
Rechercher ou aller à…
Projet
S
Server Rtmp
Gestion
Activité
Membres
Labels
Programmation
Tickets
0
Tableaux des tickets
Jalons
Wiki
Jira
Code
Requêtes de fusion
0
Dépôt
Branches
Validations
Étiquettes
Graphe du dépôt
Comparer les révisions
Extraits de code
Compilation
Pipelines
Jobs
Planifications de pipeline
Artéfacts
Déploiement
Releases
Registre de paquets
Opération
Environnements
Modules Terraform
Surveillance
Incidents
Service d'assistance
Analyse
Données d'analyse des chaînes de valeur
Contributor analytics
Données d'analyse CI/CD
Données d'analyse du dépôt
Expériences du modèle
Aide
Aide
Support
Documentation de GitLab
Comparer les forfaits GitLab
Forum de la communauté
Contribuer à GitLab
Donner votre avis
Raccourcis clavier
?
Extraits de code
Groupes
Projets
marketing confort
Server Rtmp
Validations
92fe1847
Valider
92fe1847
rédigé
il y a 9 mois
par
aftys
Parcourir les fichiers
Options
Téléchargements
Correctifs
Plain Diff
update setup.sh file
parent
fc696f4d
Branches
Branches contenant la validation
Aucune requête de fusion associée trouvée
Modifications
1
Masquer les modifications d'espaces
En ligne
Côte à côte
Affichage de
1 fichier modifié
setup.sh
+5
-137
5 ajouts, 137 suppressions
setup.sh
avec
5 ajouts
et
137 suppressions
setup.sh
+
5
−
137
Voir le fichier @
92fe1847
...
...
@@ -35,143 +35,11 @@ sudo mkdir -p /tmp/dash
# SSL Setup: Copy SSL certificates to nginx SSL directory (replace with your actual certificate path)
sudo cp
./PositiveSSL_Wildcard_mydressin-server.com.pem /usr/local/nginx/conf/ssl/
# Configure optimized nginx.conf
sudo
bash
-c
"cat > /usr/local/nginx/conf/nginx.conf"
<<
'
EOF
'
daemon off;
error_log /dev/stdout info;
events {
worker_connections 8192;
use epoll;
multi_accept on;
}
rtmp {
server {
listen 1935;
chunk_size 4096;
application live {
live on;
record off;
# HLS settings
hls on;
hls_path /tmp/hls;
hls_fragment 3s;
hls_playlist_length 18s;
hls_fragment_naming system;
hls_fragment_naming_granularity 2;
hls_fragment_slicing aligned;
# HLS bitrate variants
hls_variant _low BANDWIDTH=800000;
hls_variant _mid BANDWIDTH=1200000;
hls_variant _high BANDWIDTH=2400000;
# DASH settings
dash on;
dash_path /tmp/dash;
dash_fragment 3s;
dash_playlist_length 18s;
# Reduce CPU usage
meta copy;
}
}
}
http {
include mime.types;
default_type application/octet-stream;
sendfile on;
tcp_nopush on;
tcp_nodelay on;
keepalive_timeout 65;
types_hash_max_size 2048;
open_file_cache max=1000 inactive=20s;
open_file_cache_valid 30s;
open_file_cache_min_uses 2;
open_file_cache_errors on;
gzip on;
gzip_comp_level 5;
gzip_min_length 256;
gzip_proxied any;
gzip_vary on;
gzip_types
application/atom+xml
application/javascript
application/json
application/ld+json
application/manifest+json
application/rss+xml
application/vnd.geo+json
application/vnd.ms-fontobject
application/x-font-ttf
application/x-web-app-manifest+json
application/xhtml+xml
application/xml
font/opentype
image/bmp
image/svg+xml
image/x-icon
text/cache-manifest
text/css
text/plain
text/vcard
text/vnd.rim.location.xloc
text/vtt
text/x-component
text/x-cross-domain-policy;
server {
listen 443 ssl;
server_name hls.mydressin-server.com;
ssl_certificate /usr/local/nginx/conf/ssl/PositiveSSL_Wildcard_mydressin-server.com.pem;
ssl_certificate_key /usr/local/nginx/conf/ssl/PositiveSSL_Wildcard_mydressin-server.com.pem;
location /hls {
types {
application/vnd.apple.mpegurl m3u8;
}
root /tmp;
add_header Cache-Control no-cache;
add_header Access-Control-Allow-Origin *;
expires -1;
}
location /stat {
rtmp_stat all;
rtmp_stat_stylesheet stat.xsl;
}
location /stat.xsl {
root /usr/local/nginx/html;
}
location /control {
rtmp_control all;
add_header Access-Control-Allow-Origin * always;
}
location / {
root html;
index index.html index.htm;
}
}
server {
listen 80;
server_name hls.mydressin-server.com;
return 301 https://
$server_name$request_uri
;
}
}
EOF
# Create nginx config directory if it doesn't exist
sudo mkdir
-p
/usr/local/nginx/conf
# Copy nginx configuration file
sudo cp
./nginx.conf /usr/local/nginx/conf/nginx.conf
# Expose necessary ports (80 for HTTP, 443 for HTTPS, and 1935 for RTMP)
sudo
ufw allow 80
...
...
This diff is collapsed.
Click to expand it.
Aperçu
0%
Veuillez réessayer
ou
joindre un nouveau fichier
.
Annuler
You are about to add
0
people
to the discussion. Proceed with caution.
Terminez d'abord l'édition de ce message.
Enregistrer le commentaire
Annuler
Veuillez vous
inscrire
ou vous
se connecter
pour commenter