Alternatives to Envoyer logo

Alternatives to Envoyer

Istio, Envoy, linkerd, NGINX, and HAProxy are the most popular alternatives and competitors to Envoyer.
58
80
+ 1
3

What is Envoyer and what are its top alternatives?

Envoyer is a deployment tool that simplifies the process of deploying PHP applications to servers. It offers features such as zero downtime deployments, automated rollbacks, and easy server management through a user-friendly interface. However, Envoyer is tailored specifically for PHP applications, so it may not be suitable for projects using different programming languages.

  1. DeployBot: DeployBot is a versatile deployment tool that supports a variety of programming languages and platforms. It offers features like automated deployments, deployment pipelines, and integrations with popular tools like GitHub and Slack. Pros: Multi-language support, integrations with popular tools. Cons: Higher pricing compared to some alternatives.
  2. Buddy: Buddy is a DevOps automation platform that offers continuous integration, deployment, and delivery. It provides features like pipelines, automation actions, and support for various programming languages. Pros: Versatile CI/CD capabilities. Cons: Can be overwhelming for beginners.
  3. Capistrano: Capistrano is an open-source deployment tool primarily used for Ruby on Rails applications. It automates the process of deploying code to servers and offers features like easy rollbacks and server management. Pros: Free and open-source, great for Ruby on Rails projects. Cons: Steeper learning curve.
  4. DeployHQ: DeployHQ is a deployment tool that simplifies the process of deploying web projects. It offers features like FTP/SFTP support, automated deployments, and easy configuration. Pros: Easy to use, affordable pricing plans. Cons: Limited integrations compared to some alternatives.
  5. Codeship: Codeship is a continuous integration and delivery platform that helps automate the testing and deployment of code. It offers features like parallel testing, Docker support, and integrations with popular version control systems. Pros: Docker support, scalable infrastructure. Cons: Pricing can be high for large projects.
  6. Jenkins: Jenkins is an open-source automation server used for continuous integration and deployment. It provides a wide range of plugins for integrating with various tools and technologies. Pros: Extensive plugin ecosystem, free and open-source. Cons: Requires setup and configuration.
  7. GitLab CI/CD: GitLab CI/CD is a built-in continuous integration and deployment solution within GitLab. It offers features like pipelines, automated testing, and deployment to various environments. Pros: Integration with GitLab, all-in-one solution for development. Cons: Limited to projects hosted on GitLab.
  8. CircleCI: CircleCI is a continuous integration and delivery platform that automates the testing and deployment of code. It provides features like scheduled pipelines, advanced analytics, and support for various programming languages. Pros: Scalable infrastructure, customizable pipelines. Cons: Complex configuration for advanced use cases.
  9. Heroku: Heroku is a platform as a service (PaaS) that simplifies the deployment and management of applications. It supports various programming languages and offers features like easy scaling, add-on integrations, and automated deployments. Pros: Easy to use, scalable infrastructure. Cons: Limited control compared to traditional servers.
  10. Octopus Deploy: Octopus Deploy is an automated deployment tool for .NET applications. It offers features like release management, multi-tenancy support, and integrations with popular tools like Azure DevOps and Jenkins. Pros: Designed for .NET applications, robust release management capabilities. Cons: Limited support for non-.NET projects.

Top Alternatives to Envoyer

  • Istio
    Istio

    Istio is an open platform for providing a uniform way to integrate microservices, manage traffic flow across microservices, enforce policies and aggregate telemetry data. Istio's control plane provides an abstraction layer over the underlying cluster management platform, such as Kubernetes, Mesos, etc. ...

  • Envoy
    Envoy

    Originally built at Lyft, Envoy is a high performance C++ distributed proxy designed for single services and applications, as well as a communication bus and “universal data plane” designed for large microservice “service mesh” architectures. ...

  • linkerd
    linkerd

    linkerd is an out-of-process network stack for microservices. It functions as a transparent RPC proxy, handling everything needed to make inter-service RPC safe and sane--including load-balancing, service discovery, instrumentation, and routing. ...

  • NGINX
    NGINX

    nginx [engine x] is an HTTP and reverse proxy server, as well as a mail proxy server, written by Igor Sysoev. According to Netcraft nginx served or proxied 30.46% of the top million busiest sites in Jan 2018. ...

  • HAProxy
    HAProxy

    HAProxy (High Availability Proxy) is a free, very fast and reliable solution offering high availability, load balancing, and proxying for TCP and HTTP-based applications. ...

  • Forge
    Forge

    Fastest possible way to host lighting-fast static websites for small businesses, web startups, and app developers. ...

  • Jenkins
    Jenkins

    In a nutshell Jenkins CI is the leading open-source continuous integration server. Built with Java, it provides over 300 plugins to support building and testing virtually any project. ...

  • Apache HTTP Server
    Apache HTTP Server

    The Apache HTTP Server is a powerful and flexible HTTP/1.1 compliant web server. Originally designed as a replacement for the NCSA HTTP Server, it has grown to be the most popular web server on the Internet. ...

Envoyer alternatives & related posts

Istio logo

Istio

945
1.5K
54
Open platform to connect, manage, and secure microservices, by Google, IBM, and Lyft
945
1.5K
+ 1
54
PROS OF ISTIO
  • 14
    Zero code for logging and monitoring
  • 9
    Service Mesh
  • 8
    Great flexibility
  • 5
    Resiliency
  • 5
    Powerful authorization mechanisms
  • 5
    Ingress controller
  • 4
    Easy integration with Kubernetes and Docker
  • 4
    Full Security
CONS OF ISTIO
  • 17
    Performance

related Istio posts

Shared insights
on
IstioIstioDaprDapr

At my company, we are trying to move away from a monolith into microservices led architecture. We are now stuck with a problem to establish a communication mechanism between microservices. Since, we are planning to use service meshes and something like Dapr/Istio, we are not sure on how to split services between the two. Service meshes offer Traffic Routing or Splitting whereas, Dapr can offer state management and service-service invocation. At the same time both of them provide mLTS, Metrics, Resiliency and tracing. How to choose who should offer what?

See more
Anas MOKDAD
Shared insights
on
KongKongIstioIstio

As for the new support of service mesh pattern by Kong, I wonder how does it compare to Istio?

See more
Envoy logo

Envoy

295
544
9
C++ front/service proxy
295
544
+ 1
9
PROS OF ENVOY
  • 9
    GRPC-Web
CONS OF ENVOY
    Be the first to leave a con

    related Envoy posts

    Noah Zoschke
    Engineering Manager at Segment · | 30 upvotes · 299.7K views

    We just launched the Segment Config API (try it out for yourself here) — a set of public REST APIs that enable you to manage your Segment configuration. Behind the scenes the Config API is built with Go , GRPC and Envoy.

    At Segment, we build new services in Go by default. The language is simple so new team members quickly ramp up on a codebase. The tool chain is fast so developers get immediate feedback when they break code, tests or integrations with other systems. The runtime is fast so it performs great at scale.

    For the newest round of APIs we adopted the GRPC service #framework.

    The Protocol Buffer service definition language makes it easy to design type-safe and consistent APIs, thanks to ecosystem tools like the Google API Design Guide for API standards, uber/prototool for formatting and linting .protos and lyft/protoc-gen-validate for defining field validations, and grpc-gateway for defining REST mapping.

    With a well designed .proto, its easy to generate a Go server interface and a TypeScript client, providing type-safe RPC between languages.

    For the API gateway and RPC we adopted the Envoy service proxy.

    The internet-facing segmentapis.com endpoint is an Envoy front proxy that rate-limits and authenticates every request. It then transcodes a #REST / #JSON request to an upstream GRPC request. The upstream GRPC servers are running an Envoy sidecar configured for Datadog stats.

    The result is API #security , #reliability and consistent #observability through Envoy configuration, not code.

    We experimented with Swagger service definitions, but the spec is sprawling and the generated clients and server stubs leave a lot to be desired. GRPC and .proto and the Go implementation feels better designed and implemented. Thanks to the GRPC tooling and ecosystem you can generate Swagger from .protos, but it’s effectively impossible to go the other way.

    See more
    Joseph Irving
    DevOps Engineer at uSwitch · | 7 upvotes · 541K views
    Shared insights
    on
    KubernetesKubernetesEnvoyEnvoyGolangGolang
    at

    At uSwitch we wanted a way to load balance between our multiple Kubernetes clusters in AWS to give us added redundancy. We already had ingresses defined for all our applications so we wanted to build on top of that, instead of creating a new system that would require our various teams to change code/config etc.

    Envoy seemed to tick a lot of boxes:

    • Loadbalancing capabilities right out of the box: health checks, circuit breaking, retries etc.
    • Tracing and prometheus metrics support
    • Lightweight
    • Good community support

    This was all good but what really sold us was the api that supported dynamic configuration. This would allow us to dynamically configure envoy to route to ingresses and clusters as they were created or destroyed.

    To do this we built a tool called Yggdrasil using their Go sdk. Yggdrasil effectively just creates envoy configuration from Kubernetes ingress objects, so you point Yggdrasil at your kube clusters, it generates config from the ingresses and then envoy can loadbalance between your clusters for you. This is all done dynamically so as soon as new ingress is created the envoy nodes get updated with the new config. Importantly this all worked with what we already had, no need to create new config for every application, we just put this on top of it.

    See more
    linkerd logo

    linkerd

    129
    312
    7
    Twitter-Style Operability for Microservices
    129
    312
    + 1
    7
    PROS OF LINKERD
    • 3
      CNCF Project
    • 1
      Service Mesh
    • 1
      Fast Integration
    • 1
      Pre-check permissions
    • 1
      Light Weight
    CONS OF LINKERD
      Be the first to leave a con

      related linkerd posts

      NGINX logo

      NGINX

      113.1K
      60.8K
      5.5K
      A high performance free open source web server powering busiest sites on the Internet.
      113.1K
      60.8K
      + 1
      5.5K
      PROS OF NGINX
      • 1.4K
        High-performance http server
      • 894
        Performance
      • 730
        Easy to configure
      • 607
        Open source
      • 530
        Load balancer
      • 289
        Free
      • 288
        Scalability
      • 226
        Web server
      • 175
        Simplicity
      • 136
        Easy setup
      • 30
        Content caching
      • 21
        Web Accelerator
      • 15
        Capability
      • 14
        Fast
      • 12
        High-latency
      • 12
        Predictability
      • 8
        Reverse Proxy
      • 7
        The best of them
      • 7
        Supports http/2
      • 5
        Great Community
      • 5
        Lots of Modules
      • 5
        Enterprise version
      • 4
        High perfomance proxy server
      • 3
        Embedded Lua scripting
      • 3
        Streaming media delivery
      • 3
        Streaming media
      • 3
        Reversy Proxy
      • 2
        Blash
      • 2
        GRPC-Web
      • 2
        Lightweight
      • 2
        Fast and easy to set up
      • 2
        Slim
      • 2
        saltstack
      • 1
        Virtual hosting
      • 1
        Narrow focus. Easy to configure. Fast
      • 1
        Along with Redis Cache its the Most superior
      • 1
        Ingress controller
      CONS OF NGINX
      • 10
        Advanced features require subscription

      related NGINX posts

      Simon Reymann
      Senior Fullstack Developer at QUANTUSflow Software GmbH · | 30 upvotes · 10.7M views

      Our whole DevOps stack consists of the following tools:

      • GitHub (incl. GitHub Pages/Markdown for Documentation, GettingStarted and HowTo's) for collaborative review and code management tool
      • Respectively Git as revision control system
      • SourceTree as Git GUI
      • Visual Studio Code as IDE
      • CircleCI for continuous integration (automatize development process)
      • Prettier / TSLint / ESLint as code linter
      • SonarQube as quality gate
      • Docker as container management (incl. Docker Compose for multi-container application management)
      • VirtualBox for operating system simulation tests
      • Kubernetes as cluster management for docker containers
      • Heroku for deploying in test environments
      • nginx as web server (preferably used as facade server in production environment)
      • SSLMate (using OpenSSL) for certificate management
      • Amazon EC2 (incl. Amazon S3) for deploying in stage (production-like) and production environments
      • PostgreSQL as preferred database system
      • Redis as preferred in-memory database/store (great for caching)

      The main reason we have chosen Kubernetes over Docker Swarm is related to the following artifacts:

      • Key features: Easy and flexible installation, Clear dashboard, Great scaling operations, Monitoring is an integral part, Great load balancing concepts, Monitors the condition and ensures compensation in the event of failure.
      • Applications: An application can be deployed using a combination of pods, deployments, and services (or micro-services).
      • Functionality: Kubernetes as a complex installation and setup process, but it not as limited as Docker Swarm.
      • Monitoring: It supports multiple versions of logging and monitoring when the services are deployed within the cluster (Elasticsearch/Kibana (ELK), Heapster/Grafana, Sysdig cloud integration).
      • Scalability: All-in-one framework for distributed systems.
      • Other Benefits: Kubernetes is backed by the Cloud Native Computing Foundation (CNCF), huge community among container orchestration tools, it is an open source and modular tool that works with any OS.
      See more
      John-Daniel Trask
      Co-founder & CEO at Raygun · | 19 upvotes · 276.6K views

      We chose AWS because, at the time, it was really the only cloud provider to choose from.

      We tend to use their basic building blocks (EC2, ELB, Amazon S3, Amazon RDS) rather than vendor specific components like databases and queuing. We deliberately decided to do this to ensure we could provide multi-cloud support or potentially move to another cloud provider if the offering was better for our customers.

      We’ve utilized c3.large nodes for both the Node.js deployment and then for the .NET Core deployment. Both sit as backends behind an nginx instance and are managed using scaling groups in Amazon EC2 sitting behind a standard AWS Elastic Load Balancing (ELB).

      While we’re satisfied with AWS, we do review our decision each year and have looked at Azure and Google Cloud offerings.

      #CloudHosting #WebServers #CloudStorage #LoadBalancerReverseProxy

      See more
      HAProxy logo

      HAProxy

      2.4K
      2.1K
      562
      The Reliable, High Performance TCP/HTTP Load Balancer
      2.4K
      2.1K
      + 1
      562
      PROS OF HAPROXY
      • 132
        Load balancer
      • 102
        High performance
      • 69
        Very fast
      • 58
        Proxying for tcp and http
      • 55
        SSL termination
      • 31
        Open source
      • 27
        Reliable
      • 20
        Free
      • 18
        Well-Documented
      • 12
        Very popular
      • 7
        Runs health checks on backends
      • 7
        Suited for very high traffic web sites
      • 6
        Scalable
      • 5
        Ready to Docker
      • 4
        Powers many world's most visited sites
      • 3
        Simple
      • 2
        Ssl offloading
      • 2
        Work with NTLM
      • 1
        Available as a plugin for OPNsense
      • 1
        Redis
      CONS OF HAPROXY
      • 6
        Becomes your single point of failure

      related HAProxy posts

      Around the time of their Series A, Pinterest’s stack included Python and Django, with Tornado and Node.js as web servers. Memcached / Membase and Redis handled caching, with RabbitMQ handling queueing. Nginx, HAproxy and Varnish managed static-delivery and load-balancing, with persistent data storage handled by MySQL.

      See more
      Tom Klein

      We're using Git through GitHub for public repositories and GitLab for our private repositories due to its easy to use features. Docker and Kubernetes are a must have for our highly scalable infrastructure complimented by HAProxy with Varnish in front of it. We are using a lot of npm and Visual Studio Code in our development sessions.

      See more
      Forge logo

      Forge

      9
      24
      1
      Static web hosting made simple
      9
      24
      + 1
      1
      PROS OF FORGE
      • 1
        Fgfgf
      CONS OF FORGE
        Be the first to leave a con

        related Forge posts

        Jenkins logo

        Jenkins

        58.2K
        49.7K
        2.2K
        An extendable open source continuous integration server
        58.2K
        49.7K
        + 1
        2.2K
        PROS OF JENKINS
        • 523
          Hosted internally
        • 469
          Free open source
        • 318
          Great to build, deploy or launch anything async
        • 243
          Tons of integrations
        • 211
          Rich set of plugins with good documentation
        • 111
          Has support for build pipelines
        • 68
          Easy setup
        • 66
          It is open-source
        • 53
          Workflow plugin
        • 13
          Configuration as code
        • 12
          Very powerful tool
        • 11
          Many Plugins
        • 10
          Continuous Integration
        • 10
          Great flexibility
        • 9
          Git and Maven integration is better
        • 8
          100% free and open source
        • 7
          Github integration
        • 7
          Slack Integration (plugin)
        • 6
          Easy customisation
        • 6
          Self-hosted GitLab Integration (plugin)
        • 5
          Docker support
        • 5
          Pipeline API
        • 4
          Fast builds
        • 4
          Platform idnependency
        • 4
          Hosted Externally
        • 4
          Excellent docker integration
        • 3
          It`w worked
        • 3
          Customizable
        • 3
          Can be run as a Docker container
        • 3
          It's Everywhere
        • 3
          JOBDSL
        • 3
          AWS Integration
        • 2
          Easily extendable with seamless integration
        • 2
          PHP Support
        • 2
          Build PR Branch Only
        • 2
          NodeJS Support
        • 2
          Ruby/Rails Support
        • 2
          Universal controller
        • 2
          Loose Coupling
        CONS OF JENKINS
        • 13
          Workarounds needed for basic requirements
        • 10
          Groovy with cumbersome syntax
        • 8
          Plugins compatibility issues
        • 7
          Lack of support
        • 7
          Limited abilities with declarative pipelines
        • 5
          No YAML syntax
        • 4
          Too tied to plugins versions

        related Jenkins posts

        Tymoteusz Paul
        Devops guy at X20X Development LTD · | 23 upvotes · 9.6M views

        Often enough I have to explain my way of going about setting up a CI/CD pipeline with multiple deployment platforms. Since I am a bit tired of yapping the same every single time, I've decided to write it up and share with the world this way, and send people to read it instead ;). I will explain it on "live-example" of how the Rome got built, basing that current methodology exists only of readme.md and wishes of good luck (as it usually is ;)).

        It always starts with an app, whatever it may be and reading the readmes available while Vagrant and VirtualBox is installing and updating. Following that is the first hurdle to go over - convert all the instruction/scripts into Ansible playbook(s), and only stopping when doing a clear vagrant up or vagrant reload we will have a fully working environment. As our Vagrant environment is now functional, it's time to break it! This is the moment to look for how things can be done better (too rigid/too lose versioning? Sloppy environment setup?) and replace them with the right way to do stuff, one that won't bite us in the backside. This is the point, and the best opportunity, to upcycle the existing way of doing dev environment to produce a proper, production-grade product.

        I should probably digress here for a moment and explain why. I firmly believe that the way you deploy production is the same way you should deploy develop, shy of few debugging-friendly setting. This way you avoid the discrepancy between how production work vs how development works, which almost always causes major pains in the back of the neck, and with use of proper tools should mean no more work for the developers. That's why we start with Vagrant as developer boxes should be as easy as vagrant up, but the meat of our product lies in Ansible which will do meat of the work and can be applied to almost anything: AWS, bare metal, docker, LXC, in open net, behind vpn - you name it.

        We must also give proper consideration to monitoring and logging hoovering at this point. My generic answer here is to grab Elasticsearch, Kibana, and Logstash. While for different use cases there may be better solutions, this one is well battle-tested, performs reasonably and is very easy to scale both vertically (within some limits) and horizontally. Logstash rules are easy to write and are well supported in maintenance through Ansible, which as I've mentioned earlier, are at the very core of things, and creating triggers/reports and alerts based on Elastic and Kibana is generally a breeze, including some quite complex aggregations.

        If we are happy with the state of the Ansible it's time to move on and put all those roles and playbooks to work. Namely, we need something to manage our CI/CD pipelines. For me, the choice is obvious: TeamCity. It's modern, robust and unlike most of the light-weight alternatives, it's transparent. What I mean by that is that it doesn't tell you how to do things, doesn't limit your ways to deploy, or test, or package for that matter. Instead, it provides a developer-friendly and rich playground for your pipelines. You can do most the same with Jenkins, but it has a quite dated look and feel to it, while also missing some key functionality that must be brought in via plugins (like quality REST API which comes built-in with TeamCity). It also comes with all the common-handy plugins like Slack or Apache Maven integration.

        The exact flow between CI and CD varies too greatly from one application to another to describe, so I will outline a few rules that guide me in it: 1. Make build steps as small as possible. This way when something breaks, we know exactly where, without needing to dig and root around. 2. All security credentials besides development environment must be sources from individual Vault instances. Keys to those containers should exist only on the CI/CD box and accessible by a few people (the less the better). This is pretty self-explanatory, as anything besides dev may contain sensitive data and, at times, be public-facing. Because of that appropriate security must be present. TeamCity shines in this department with excellent secrets-management. 3. Every part of the build chain shall consume and produce artifacts. If it creates nothing, it likely shouldn't be its own build. This way if any issue shows up with any environment or version, all developer has to do it is grab appropriate artifacts to reproduce the issue locally. 4. Deployment builds should be directly tied to specific Git branches/tags. This enables much easier tracking of what caused an issue, including automated identifying and tagging the author (nothing like automated regression testing!).

        Speaking of deployments, I generally try to keep it simple but also with a close eye on the wallet. Because of that, I am more than happy with AWS or another cloud provider, but also constantly peeking at the loads and do we get the value of what we are paying for. Often enough the pattern of use is not constantly erratic, but rather has a firm baseline which could be migrated away from the cloud and into bare metal boxes. That is another part where this approach strongly triumphs over the common Docker and CircleCI setup, where you are very much tied in to use cloud providers and getting out is expensive. Here to embrace bare-metal hosting all you need is a help of some container-based self-hosting software, my personal preference is with Proxmox and LXC. Following that all you must write are ansible scripts to manage hardware of Proxmox, similar way as you do for Amazon EC2 (ansible supports both greatly) and you are good to go. One does not exclude another, quite the opposite, as they can live in great synergy and cut your costs dramatically (the heavier your base load, the bigger the savings) while providing production-grade resiliency.

        See more
        Thierry Schellenbach

        Releasing new versions of our services is done by Travis CI. Travis first runs our test suite. Once it passes, it publishes a new release binary to GitHub.

        Common tasks such as installing dependencies for the Go project, or building a binary are automated using plain old Makefiles. (We know, crazy old school, right?) Our binaries are compressed using UPX.

        Travis has come a long way over the past years. I used to prefer Jenkins in some cases since it was easier to debug broken builds. With the addition of the aptly named “debug build” button, Travis is now the clear winner. It’s easy to use and free for open source, with no need to maintain anything.

        #ContinuousIntegration #CodeCollaborationVersionControl

        See more
        Apache HTTP Server logo

        Apache HTTP Server

        64.4K
        22.5K
        1.4K
        Open-source HTTP server for modern operating systems including UNIX and Windows
        64.4K
        22.5K
        + 1
        1.4K
        PROS OF APACHE HTTP SERVER
        • 479
          Web server
        • 305
          Most widely-used web server
        • 217
          Virtual hosting
        • 148
          Fast
        • 138
          Ssl support
        • 44
          Since 1996
        • 28
          Asynchronous
        • 5
          Robust
        • 4
          Proven over many years
        • 2
          Mature
        • 2
          Perfomance
        • 1
          Perfect Support
        • 0
          Many available modules
        • 0
          Many available modules
        CONS OF APACHE HTTP SERVER
        • 4
          Hard to set up

        related Apache HTTP Server posts

        Nick Rockwell
        SVP, Engineering at Fastly · | 46 upvotes · 3.9M views

        When I joined NYT there was already broad dissatisfaction with the LAMP (Linux Apache HTTP Server MySQL PHP) Stack and the front end framework, in particular. So, I wasn't passing judgment on it. I mean, LAMP's fine, you can do good work in LAMP. It's a little dated at this point, but it's not ... I didn't want to rip it out for its own sake, but everyone else was like, "We don't like this, it's really inflexible." And I remember from being outside the company when that was called MIT FIVE when it had launched. And been observing it from the outside, and I was like, you guys took so long to do that and you did it so carefully, and yet you're not happy with your decisions. Why is that? That was more the impetus. If we're going to do this again, how are we going to do it in a way that we're gonna get a better result?

        So we're moving quickly away from LAMP, I would say. So, right now, the new front end is React based and using Apollo. And we've been in a long, protracted, gradual rollout of the core experiences.

        React is now talking to GraphQL as a primary API. There's a Node.js back end, to the front end, which is mainly for server-side rendering, as well.

        Behind there, the main repository for the GraphQL server is a big table repository, that we call Bodega because it's a convenience store. And that reads off of a Kafka pipeline.

        See more
        Tim Abbott
        Shared insights
        on
        NGINXNGINXApache HTTP ServerApache HTTP Server
        at

        We've been happy with nginx as part of our stack. As an open source web application that folks install on-premise, the configuration system for the webserver is pretty important to us. I have a few complaints (e.g. the configuration syntax for conditionals is a pain), but overall we've found it pretty easy to build a configurable set of options (see link) for how to run Zulip on nginx, both directly and with a remote reverse proxy in front of it, with a minimum of code duplication.

        Certainly I've been a lot happier with it than I was working with Apache HTTP Server in past projects.

        See more