Challenge - 5 Problems
Stub Status Master
Get all challenges correct to earn this badge!
Test your skills under time pressure!
💻 Command Output
intermediate1:30remaining
Nginx stub_status basic output
You have enabled the stub_status module in Nginx and accessed the status URL. What is the typical output format you will see?
Attempts:
2 left
💡 Hint
Look for the exact format with 'Active connections' and the three numbers line.
✗ Incorrect
The stub_status module outputs a fixed format showing active connections, accepts, handled, requests, and the states Reading, Writing, Waiting.
❓ Configuration
intermediate2:00remaining
Enable stub_status in Nginx config
Which configuration snippet correctly enables the stub_status module on the /nginx_status URL in Nginx?
Attempts:
2 left
💡 Hint
The directive to enable stub_status is exactly 'stub_status;' inside the location block.
✗ Incorrect
The stub_status module is enabled by the directive 'stub_status;' without 'on' or other keywords.
❓ Troubleshoot
advanced2:00remaining
Stub_status returns 404 error
You configured stub_status on /status but when accessing http://localhost/status you get a 404 error. What is the most likely cause?
Attempts:
2 left
💡 Hint
Stub_status must be compiled into Nginx or it won't recognize the directive.
✗ Incorrect
If stub_status is not compiled in, Nginx will not recognize the location and return 404.
🔀 Workflow
advanced2:00remaining
Secure stub_status access workflow
You want to allow stub_status access only from your local machine and deny all others. Which workflow correctly achieves this?
Attempts:
2 left
💡 Hint
Allow only localhost IP and deny all others is the secure approach.
✗ Incorrect
Allow 127.0.0.1; deny all; restricts access to local machine only.
✅ Best Practice
expert2:30remaining
Best practice for monitoring with stub_status
Which practice is best when using stub_status for production monitoring?
Attempts:
2 left
💡 Hint
Consider security and controlled access for production environments.
✗ Incorrect
Limiting stub_status to localhost and accessing it securely via proxy prevents unauthorized access.