bitnami/nginxNGINX Open Source is a web server that can be also used as a reverse proxy, load ***, and HTTP cache. Recommended for high-demanding sites due to its ability to provide faster content.
Overview of NGINX Open Source Trademarks: This software listing is packaged by Bitnami. The respective trademarks mentioned in the offering are owned by the respective companies, and use of them does not imply any affiliation or endorsement.
consoledocker run --name nginx REGISTRY_NAME/bitnami/nginx:latest
Deploying Bitnami applications as Helm Charts is the easiest way to get started with our applications on Kubernetes. Read more about the installation in the Bitnami NGINX Open Source Chart GitHub repository.
Non-root container images add an extra layer of security and are generally recommended for production environments. However, because they run as a non-root user, privileged tasks are typically off-limits. Learn more about non-root containers in our docs.
Dockerfile linksLearn more about the Bitnami tagging policy and the difference between rolling tags and immutable tags in our documentation page.
You can see the equivalence between the different tags by taking a look at the tags-info.yaml file present in the branch folder, i.e bitnami/ASSET/BRANCH/DISTRO/tags-info.yaml.
Subscribe to project updates by watching the bitnami/containers GitHub repo.
The recommended way to get the Bitnami NGINX Open Source Docker Image is to pull the prebuilt image from the Docker Hub Registry.
consoledocker pull REGISTRY_NAME/bitnami/nginx:latest
To use a specific version, you can pull a versioned tag. You can view the list of available versions in the Docker Hub Registry.
consoledocker pull REGISTRY_NAME/bitnami/nginx:[TAG]
If you wish, you can also build the image yourself by cloning the repository, changing to the directory containing the Dockerfile and executing the docker build command. Remember to replace the APP, VERSION and OPERATING-SYSTEM path placeholders in the example command below with the correct values.
consolegit clone [***] cd bitnami/APP/VERSION/OPERATING-SYSTEM docker build -t REGISTRY_NAME/bitnami/APP:latest .
This NGINX Open Source image exposes a volume at /app. Content mounted here is served by the default catch-all server block.
consoledocker run -v /path/to/app:/app REGISTRY_NAME/bitnami/nginx:latest
or by modifying the docker-compose.yml file present in this repository:
yamlservices: nginx: ... volumes: - /path/to/app:/app ...
To access your web server from your host machine you can ask Docker to map a random port on your host to ports 8080 and 8443 exposed in the container.
consoledocker run --name nginx -P REGISTRY_NAME/bitnami/nginx:latest
Run docker port to determine the random ports Docker assigned.
console$ docker port nginx 8080/tcp -> 0.0.0.0:32769
You can also manually specify the ports you want forwarded from your host to the container.
consoledocker run -p 9000:8080 REGISTRY_NAME/bitnami/nginx:latest
Access your web server in the browser by navigating to http://localhost:9000.
The default nginx.conf includes server blocks placed in /opt/bitnami/nginx/conf/server_blocks/. You can mount a my_server_block.conf file containing your custom server block at this location.
For example, in order add a server block for [***]:
my_server_block.conf file with the following contentnginxserver { listen 0.0.0.0:8080; server_name [***] root /app; index index.htm index.html; }
consoledocker run --name nginx \ -v /path/to/my_server_block.conf:/opt/REGISTRY_NAME/bitnami/nginx/conf/server_blocks/my_server_block.conf:ro \ REGISTRY_NAME/bitnami/nginx:latest
or by modifying the docker-compose.yml file present in this repository:
yamlservices: nginx: ... volumes: - /path/to/my_server_block.conf:/opt/REGISTRY_NAME/bitnami/nginx/conf/server_blocks/my_server_block.conf:ro ...
The default nginx.conf supports custom configuration files organized by NGINX context. You can mount configuration files into the appropriate context directories:
/opt/bitnami/nginx/conf/context.d/main/ - For main context directives (e.g., module loading, worker processes)/opt/bitnami/nginx/conf/context.d/events/ - For events context directives (e.g., worker_connections)/opt/bitnami/nginx/conf/context.d/http/ - For http context directives (equivalent to server_blocks)For example, to enable the WebDAV module, create a webdav.conf file with the following content:
nginxload_module /opt/bitnami/nginx/modules/ngx_http_dav_module.so;
Mount it to the main context directory:
consoledocker run --name nginx \ -v /path/to/webdav.conf:/opt/REGISTRY_NAME/bitnami/nginx/conf/context.d/main/webdav.conf:ro \ REGISTRY_NAME/bitnami/nginx:latest
or by modifying the docker-compose.yml file:
yamlservices: nginx: ... volumes: - /path/to/webdav.conf:/opt/REGISTRY_NAME/bitnami/nginx/conf/context.d/main/webdav.conf:ro ...
Similarly, you can add custom server blocks to the http context:
consoledocker run --name nginx \ -v /path/to/my_server_block.conf:/opt/REGISTRY_NAME/bitnami/nginx/conf/context.d/http/my_server_block.conf:ro \ REGISTRY_NAME/bitnami/nginx:latest
Similar to server blocks, you can include server blocks for the NGINX Stream Core Module mounting them at /opt/bitnami/nginx/conf/stream_server_blocks/. In order to do so, it's also necessary to set the NGINX_ENABLE_STREAM environment variable to yes.
my_stream_server_block.conf file with the following contentnginxupstream backend { hash $remote_addr consistent; server backend1.example.com:*** weight=5; server 127.0.0.1:*** max_fails=3 fail_timeout=30s; server unix:/tmp/backend3; } server { listen ***; proxy_connect_timeout 1s; proxy_timeout 3s; proxy_pass backend; }
consoledocker run --name nginx \ -e NGINX_ENABLE_STREAM=yes \ -v /path/to/my_stream_server_block.conf:/opt/REGISTRY_NAME/bitnami/nginx/conf/stream_server_blocks/my_stream_server_block.conf:ro \ REGISTRY_NAME/bitnami/nginx:latest
or by modifying the docker-compose.yml file present in this repository:
yamlservices: nginx: ... environment: - NGINX_ENABLE_STREAM=yes ... volumes: - /path/to/my_stream_server_block.conf:/opt/REGISTRY_NAME/bitnami/nginx/conf/stream_server_blocks/my_stream_server_block.conf:ro ...
NOTE: The steps below assume that you are using a custom domain name and that you have already configured the custom domain name to point to your server.
In your local computer, create a folder called certs and put your certificates files. Make sure you rename both files to tls.crt and tls.key respectively:
consolemkdir -p /path/to/nginx-persistence/certs cp /path/to/certfile.crt /path/to/nginx-persistence/certs/tls.crt cp /path/to/keyfile.key /path/to/nginx-persistence/certs/tls.key
Write your my_server_block.conf file with the SSL configuration and the relative path to the certificates:
nginxserver { listen 8443 ssl; ssl_certificate bitnami/certs/tls.crt; ssl_certificate_key bitnami/certs/tls.key; ssl_session_cache shared:SSL:1m; ssl_session_timeout 5m; ssl_ciphers HIGH:!aNULL:!MD5; ssl_prefer_server_ciphers on; location / { root html; index index.html index.htm; } }
Run the NGINX Open Source image, mounting the certificates directory from your host.
consoledocker run --name nginx \ -v /path/to/my_server_block.conf:/opt/REGISTRY_NAME/bitnami/nginx/conf/server_blocks/my_server_block.conf:ro \ -v /path/to/nginx-persistence/certs:/certs \ REGISTRY_NAME/bitnami/nginx:latest
or by modifying the docker-compose.yml file present in this repository:
yamlservices: nginx: ... volumes: - /path/to/nginx-persistence/certs:/certs - /path/to/my_server_block.conf:/opt/REGISTRY_NAME/bitnami/nginx/conf/server_blocks/my_server_block.conf:ro ...
By default redirections issued by NGINX Open Source image will be relative. If you need to activate absolute redirections you can set NGINX_ENABLE_ABSOLUTE_REDIRECT to yes. You should pay attention to the port where the container is listening, because it won't appear in redirections unless you set also NGINX_ENABLE_PORT_IN_REDIRECT to yes.
In the following lines you can see different examples what explain how redirections work. All of them will assume that we have the following content in the server block my_redirect_server_block.conf:
nginxserver { listen 0.0.0.0:8080; server_name [***] root /app; index index.htm index.html; location /test/ { return 301 /index.html; } }
consoledocker run --name nginx --rm -p 9000:8080 \ -v /path/to/my_redirect_server_block.conf:/opt/REGISTRY_NAME/bitnami/nginx/conf/server_blocks/my_redirect.conf:ro \ REGISTRY_NAME/bitnami/nginx:latest
As mentioned, default redirections issued by NGINX Open Source image will be relative. The client should build the final URL
console$ curl -kI http://localhost:9000/test/ HTTP/1.1 301 Moved Permanently ... Location: /index.html ... $ curl -w %{redirect_url}\\n -o /dev/null http://localhost:9000/test/ http://localhost:9000/index.html
Please keep in mind that some old clients could be not compatible with relative redirections.
consoledocker run --name nginx --rm -p 9000:8080 \ -v /path/to/my_redirect_server_block.conf:/opt/REGISTRY_NAME/bitnami/nginx/conf/server_blocks/my_redirect.conf:ro \ -e NGINX_ENABLE_ABSOLUTE_REDIRECT=yes \ REGISTRY_NAME/bitnami/nginx:latest
As result, the container will reply with a full URL in the Location header but it doesn't have the port. This is useful if you are exposing the container in standard ports (80 or 443)
console$ curl -kI http://localhost:9000/test/ HTTP/1.1 301 Moved Permanently ... Location: http://localhost/index.html ...
consoledocker run --name nginx --rm -p 9000:8080 \ -v /path/to/my_redirect_server_block.conf:/opt/REGISTRY_NAME/bitnami/nginx/conf/server_blocks/my_redirect.conf:ro \ -e NGINX_ENABLE_ABSOLUTE_REDIRECT=yes \ -e NGINX_ENABLE_PORT_IN_REDIRECT=yes \ REGISTRY_NAME/bitnami/nginx:latest
In this case the container will include the port where it is listening to in redirections, not the port where it is exposed (in the example 8080 vs 9000)
console$ curl -kI http://localhost:9000/test/ HTTP/1.1 301 Moved Permanently ... Location: http://localhost:8080/index.html ...
To amend this situation and build reachable URLs, you have to run the container listening in the same port that you are exposing
consoledocker run --name nginx --rm -p 9000:9000 \ -v /path/to/my_redirect_server_block.conf:/opt/REGISTRY_NAME/bitnami/nginx/conf/server_blocks/my_redirect.conf:ro \ -e NGINX_ENABLE_ABSOLUTE_REDIRECT=yes \ -e NGINX_ENABLE_PORT_IN_REDIRECT=yes \ -e NGINX_HTTP_PORT_NUMBER=9000 REGISTRY_NAME/bitnami/nginx:latest
The image looks for configurations in /opt/bitnami/nginx/conf/nginx.conf. You can overwrite the nginx.conf file using your own custom configuration file.
consoledocker run --name nginx \ -v /path/to/your_nginx.conf:/opt/REGISTRY_NAME/bitnami/nginx/conf/nginx.conf:ro \ REGISTRY_NAME/bitnami/nginx:latest
or by modifying the docker-compose.yml file present in this repository:
yamlservices: nginx: ... volumes: - /path/to/your_nginx.conf:/opt/REGISTRY_NAME/bitnami/nginx/conf/nginx.conf:ro ...
The Bitnami NGINX Open Source Docker image from the Bitnami Secure Images catalog includes extra features and settings to configure the container with FIPS capabilities. You can configure the next environment variables:
OPENSSL_FIPS: whether OpenSSL runs in FIPS mode or not. yes (default), no.NGINX can be used to reverse proxy to other containers using Docker's linking system. This is particularly useful if you want to serve dynamic content through an NGINX frontend. To do so, add a server block like the following in the /opt/bitnami/nginx/conf/server_blocks/ folder:
nginxserver { listen 0.0.0.0:8080; server_name yourapp.com; access_log /opt/bitnami/nginx/logs/yourapp_access.log; error_log /opt/bitnami/nginx/logs/yourapp_error.log; location / { proxy_set_header X-Real-IP $remote_addr; proxy_set_header HOST $http_host; proxy_set_header X-NginX-Proxy true; proxy_pass http://[your_container_alias]:[your_container_port]; proxy_redirect off; } }
Further Reading:
The Bitnami NGINX Open Source Docker image sends the container logs to the stdout. To view the logs:
consoledocker logs nginx
or using Docker Compose:
consoledocker-compose logs nginx
You can configure the containers logging driver using the --log-driver option if you wish to consume the container logs differently. In the default configuration docker uses the json-file driver.
The Bitnami NGINX Open Source Docker image is designed to be extended so it can be used as the base image for your custom web applications.
Before extending this image, please note there are certain configuration settings you can modify using the original image:
NGINX_HTTP_PORT_NUMBER.If your desired customizations cannot be covered using the methods mentioned above, extend the image. To do so, create your own image using a Dockerfile with the format below:
DockerfileFROM bitnami/nginx ### Put your customizations below ...
Here is an example of extending the image with the following modifications:
vim editorDockerfileFROM bitnami/nginx ### Change user to perform privileged actions USER 0 ### Install 'vim' RUN install_packages vim ### Revert to the original non-root user USER 1001 ### Modify 'worker_connections' on NGINX config file to '512' RUN sed -i -r "s#(\s+worker_connections\s+)[0-9]+;#\1512;#" /opt/bitnami/nginx/conf/nginx.conf ### Modify the ports used by NGINX by default ENV NGINX_HTTP_PORT_NUMBER=8181 # It is also possible to change this environment variable at runtime EXPOSE 8181 8143 ### Modify the default container user USER 1002
Based on the extended image, you can use a Docker Compose file like the one below to add other features:
yamlversion: '2' services: nginx: build: . ports: - 80:8181 - 443:8443 depends_on: - cloner volumes: - ./config/my_server_block.conf:/opt/REGISTRY_NAME/bitnami/nginx/conf/conf.d/server_blocks/my_server_block.conf:ro - ./certs:/certs - data:/app cloner: image: REGISTRY_NAME/bitnami/git:latest command: - clone - [***] - /app volumes: - data:/app volumes: data: driver: local
The module ngx_http_dav_module is intended for file management automation via the WebDAV protocol. In current Bitnami images, this module is built as a dynamic module located under the /opt/bitnami/nginx/modules directory. You will need to load it in your NGINX configuration for you to be able to use its directives.
textload_module /opt/bitnami/nginx/modules/ngx_http_dav_module.so;
To add a custom NGINX module, it is necessary to compile NGINX with that module and copy over the appropriate files to the Bitnami image.
Example
Below is an example Dockerfile to build and install the NGINX Perl module (ngx_http_perl_module) over to the Bitnami image:
DockerfileARG NGINX_VERSION=1.25.0 ARG BITNAMI_NGINX_REVISION=r0 ARG BITNAMI_NGINX_TAG=${NGINX_VERSION}-debian-12-${BITNAMI_NGINX_REVISION} FROM REGISTRY_NAME/bitnami/nginx:${BITNAMI_NGINX_TAG} AS builder USER root ## Redeclare NGINX_VERSION so it can be used as a parameter inside this build stage ARG NGINX_VERSION ## Install required packages and build dependencies RUN install_packages dirmngr gpg gpg-agent curl build-essential libpcre3-dev zlib1g-dev libperl-dev ## Add trusted NGINX PGP key for tarball integrity verification RUN gpg --keyserver pgp.mit.edu --recv-key 520A9993A1C052F8 ## Download NGINX, verify integrity and extract RUN cd /tmp && \ curl -O [***]{NGINX_VERSION}.tar.gz && \ curl -O [***]{NGINX_VERSION}.tar.gz.asc && \ gpg --verify nginx-${NGINX_VERSION}.tar.gz.asc nginx-${NGINX_VERSION}.tar.gz && \ tar xzf nginx-${NGINX_VERSION}.tar.gz ## Compile NGINX with desired module RUN cd /tmp/nginx-${NGINX_VERSION} && \ rm -rf /opt/bitnami/nginx && \ ./configure --prefix=/opt/bitnami/nginx --with-compat --with-http_perl_module=dynamic && \ make && \ make install FROM REGISTRY_NAME/bitnami/nginx:${BITNAMI_NGINX_TAG} USER root ## Install ngx_http_perl_module system package dependencies RUN install_packages libperl-dev ## Install ngx_http_perl_module files COPY --from=builder /usr/local/lib/x86_64-linux-gnu/perl /usr/local/lib/x86_64-linux-gnu/perl COPY --from=builder /opt/bitnami/nginx/modules/ngx_http_perl_module.so /opt/bitnami/nginx/modules/ngx_http_perl_module.so ## Enable module RUN echo "load_module modules/ngx_http_perl_module.so;" | cat - /opt/bitnami/nginx/conf/nginx.conf > /tmp/nginx.conf && \ cp /tmp/nginx.conf /opt/bitnami/nginx/conf/nginx.conf ## Set the container to be run as a non-root user by default USER 1001
Bitnami provides up-to-date versions of NGINX Open Source, including security patches, soon after they are made upstream. We recommend that you follow these steps to upgrade your container.
consoledocker pull REGISTRY_NAME/bitnami/nginx:latest
or if you're using Docker Compose, update the value of the image property to
REGISTRY_NAME/bitnami/nginx:latest.
Stop the currently running container using the command
consoledocker stop nginx
or using Docker Compose:
consoledocker-compose stop nginx
consoledocker rm -v nginx
or using Docker Compose:
consoledocker-compose rm -v nginx
Re-create your container from the new image.
consoledocker run --name nginx REGISTRY_NAME/bitnami/nginx:latest
or using Docker Compose:
consoledocker-compose up nginx
tls.crt/tls.key (from server.crt/server.key), and the certificate signing request is now tls.csr (from server.csr). This change aligns better with the kubernetes.io/tls secret type, enhancing consistency.1.16.1-centos-7-r173 is ***ed the latest image based on CentOS./opt/bitnami/nginx/conf/vhosts to /opt/bitnami/nginx/conf/server_blocks. Remember to update your Docker Compose files to user the new mount point.docker-compose.yamlPlease be aware this file has not undergone internal testing. Consequently, we advise its use exclusively for development or testing purposes. For production-ready deployments, we highly recommend utilizing its associated Bitnami Helm chart.
If you detect any issue in the docker-compose.yaml file, feel free to report it or contribute with a fix by following our Contributing Guidelines.
We'd love for you to contribute to this container. You can request new features by creating an issue or submitting a pull request with your contribution.
If you encountered a problem running this container, you can file an issue. For us to provide better support, be sure to fill the issue template.
Copyright © 2026 Broadcom. The term "Broadcom" refers to Broadcom Inc. and/or its subsidiaries.
Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at
_Note: the README for this container is longer than the DockerHub length limit of 25000, so it has been trimmed. The full README can be found at [***]



manifest unknown 错误
TLS 证书验证失败
DNS 解析超时
410 错误:版本过低
402 错误:流量耗尽
身份认证失败错误
429 限流错误
凭证保存错误
来自真实用户的反馈,见证轩辕镜像的优质服务