Nginx反向代理多域名的HTTP和HTTPS服务
2020-06-28 21:22
525 查看
当前Nginx已经反向代理了两个网站,分别是基于Windows的IIS和Linux的Apach服务器,提供网页服务。
现在有新项目的网页需要对外提供服务,需要在代理服务器上增加另外一个网站,使用HTTPS访问以及HTTP自动跳转HTTPS。由于新网页是静态页面,所以使用Docker部署在Nginx代理服务器上。相关的certificates是通过let's encrypt来获取的,都是单独的证书,没有申请通配符形式的证书。
在Nginx代理端部署SSL证书即可,后端不需要部署SSL也可以实现HTTPS访问。
Nginx代理服务器配置:
worker_processes auto; error_log /var/log/nginx/error.log warn; pid /var/run/nginx.pid; events { worker_connections 1024; } http { include /usr/local/nginx/conf/mime.types; default_type application/octet-stream; log_format main '$remote_addr - $remote_user [$time_local] "$request" ' '$status $body_bytes_sent "$http_referer" ' '"$http_user_agent" "$http_x_forwarded_for"'; access_log /var/log/nginx/access.log main; sendfile on; tcp_nopush on; tcp_nodelay on; upstream dx.exzel.co.nz { server 127.0.0.1:8080; } upstream mybusiness.exzel.co.nz { server 192.168.1.252:443; } server { listen 80; server_name dx.exzel.co.nz; rewrite ^(.*) https://dx.exzel.co.nz permanent; } server { listen 443; server_name dx.exzel.co.nz; ssl on; ssl_certificate /etc/letsencrypt/live/dx.exzel.co.nz/fullchain.pem; ssl_certificate_key /etc/letsencrypt/live/dx.exzel.co.nz/privkey.pem; ssl_session_timeout 5m; ssl_ciphers ECDHE-RSA-AES128-GCM-SHA256:ECDHE:ECDH:AES:HIGH:!NULL:!aNULL:!MD5:!ADH:!RC4; ssl_protocols TLSv1 TLSv1.1 TLSv1.2; ssl_prefer_server_ciphers on; access_log /var/log/nginx/ccieerror.log ; location / { proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_pass http://dx.exzel.co.nz; } } server { listen 80; server_name mybusiness.exzel.co.nz; rewrite ^(.*) https://mybusiness.exzel.co.nz permanent; } server { listen 443; server_name mybusiness.exzel.co.nz; ssl on; ssl_certificate /etc/letsencrypt/live/mybusiness.exzel.co.nz/fullchain.pem; ssl_certificate_key /etc/letsencrypt/live/mybusiness.exzel.co.nz/privkey.pem; ssl_session_timeout 5m; ssl_ciphers ECDHE-RSA-AES128-GCM-SHA256:ECDHE:ECDH:AES:HIGH:!NULL:!aNULL:!MD5:!ADH:!RC4; ssl_protocols TLSv1 TLSv1.1 TLSv1.2; ssl_prefer_server_ciphers on; access_log /var/log/nginx/mybusiness.log ; location / { proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_pass https://mybusiness.exzel.co.nz; } } server { listen 80; server_name www.empnz.co.nz empnz.co.nz; location / { proxy_pass http://192.168.1.15 ; } } }
相关文章推荐
- 域名 证书 NGINX代理配置 HTTP——>HTTPS一条龙服务
- [net]ftp ssh http telnet https服务及端口
- nodeJS 启动 的 http 和 https 服务
- 配置Linux的Tomcat的https证书(将服务的IP访问转换成域名地址访问)
- 后端tomcat不开启https,用nginx反向代理使网站同时支持http和https协议总结
- nginx同一端口监听多个域名和同时监听http,https
- Http-005-负责域名解析的 DNS 服务
- linux shell判断整个网段ftp,http,https服务状态
- HTTPD 服务 http与https的实现
- linux下httpd服务名词解释和http及https服务器搭建
- 使用 gSOAP 通过 HTTP 和 HTTPS 调用由 WSAD 创建的 J2EE Web 服务
- Nginx实现根据域名http、https分发配置示例
- Nginx 域名SSL证书配置(网站 http 升级为 https)
- nginx根据域名做http,https分发
- 网站是HTTP?10分钟变成HTTPS!域名免费添加配置SSL证书,变成https//环境
- 三步实现通过域名访问tomcat的http和https服务器
- http转https 和 微信小程序设置了合法请求域名,小程序一直提示不在合法域名列别中
- 怎样在apache服务上配置https安全 域名请求
- https服务,但是Spring MVC总是重定向到http,怎么才能使其重定向到https上