Please fill out the fields below so we can help you better. Note: you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. crt.sh | example.com), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.
It produced this output: "Your connection is not private
Attackers might be trying to steal your information from www.goeasyshuttle.com (for example, passwords, messages, or credit cards). Learn more
NET::ERR_CERT_COMMON_NAME_INVALID" Plus when I checked 'SSL Server Test', I got this outcomes "Common names: goeasyshuttle.com Alternative names: goeasyshuttle.com
My web server is (include version): nginx
The operating system my web server runs on is (include version): ubuntu 22
My hosting provider, if applicable, is: AWS ec2
I can login to a root shell on my machine (yes or no, or I don't know): yes
I'm using a control panel to manage my site (no, or provide the name and version of the control panel):
The version of my client is (e.g. output of certbot --version or certbot-auto --version if you're using Certbot):
No. If you explain how you got your first cert we can give more specific advice. Are you using Certbot for this cert the same as your certs from earlier threads?
That is a good step but I don't think you did it right. Requests to goeasyshuttle.com and the www domain do not return the same results. One gives a 301 redirect and the other a 404 page not found to requests for your home page.
You can do it like Rudy suggests with just the one return 301 and remove the other return 404 too. But, Certbot may have already changed it since you got the second name in the cert now. Had you given Certbot both names to start with it would have made your port 80 server block like this: