**Contents** [[!toc]] ## Prelude How to deploy a high performance webserver using NetBSD and Lighttpd. ## Installation We will install it from pkgsrc because we need some fetures which are not enabled in the binary. First of all, let's use gamin as the default file alteration monitor instead of fam: # FAM_DEFAULT=gamin Of course you can stick with fam if you'd like. After that we will enable fam support in lighty: # echo PKG_OPTIONS.lighttpd=fam >> /etc/mk.conf Now the good old magic words: # cd /usr/pkgsrc/www/lighttpd/ # make install clean clean-depends Install the rc.d files if you dont do that automaticaly: # cp /usr/pkg/share/examples/rc.d/lighttpd /etc/rc.d/ ## The lighttpd user By default there is no user created for lighttpd, thus you will have to create one: # groupadd lighttpd # useradd -s /sbin/nologin -g lighttpd lighttpd ## Configuration Set the docroot whereever you want: server.document-root = "/srv/lighttpd/htdocs" Set the default location for logs: server.errorlog = "/var/log/lighttpd/error.log" accesslog.filename = "/var/log/lighttpd/access.log" You need to create the directory /var/log/lighttpd with proper permissions: # install -d -o lighttpd -g lighttpd /var/log/lighttpd Let's use the user we have created for lighttpd: server.username = "lighttpd" server.groupname = "lighttpd" Enable kqueue: server.event-handler = "kqueue" Enable fam: server.stat-cache-engine = "fam" ## Testing the setup You can start the webserver with: /etc/rc.d/lighttpd start Check your logs if you encounter any problem. ## Setting up authentication ### Directory server We will use OpenLdap. First of all deploy a working ldap server, and populate it with the the users. For more information on this, read [OpenLDAP Authentication on NetBSD][10]. [10]: /OpenLDAP_Authentication_on_NetBSD (OpenLDAP Authentication on NetBSD) Be sure to load mod_auth and include the following in your lighttpd.conf file: # ldap authentication auth.backend = "ldap" auth.backend.ldap.hostname = "grimnismal.local" auth.backend.ldap.base-dn = "dc=grimnismal,dc=local" auth.backend.ldap.filter = "(uid=$)" auth.backend.ldap.bind-dn = "cn=Manager,dc=grimnismal,dc=local" # passwd for bind-dn, separated for security reasons # contains: auth.backend.ldap.bind-pw = "your-password" # It must NOT be word readable! # include "ldapsecret" auth.require = ( "/server-status" => ( "method" => "basic", "realm" => "Admin only page", "require" => "user=replaced" ), "/server-config" => ( "method" => "basic", "realm" => "Staff only page", "require" => "valid-user" ) )