# configuration file /etc/nginx/nginx.conf: user www-data; worker_processes auto; pid /run/nginx.pid; include /etc/nginx/modules-enabled/*.conf; events { worker_connections 768; # multi_accept on; } http { client_max_body_size 50M; ## # Basic Settings ## sendfile on; tcp_nopush on; tcp_nodelay on; keepalive_timeout 65; types_hash_max_size 2048; # server_tokens off; # server_names_hash_bucket_size 64; # server_name_in_redirect off; include /etc/nginx/mime.types; default_type application/octet-stream; ## # SSL Settings ## ssl_protocols TLSv1 TLSv1.1 TLSv1.2 TLSv1.3; # Dropping SSLv3, ref: POODLE ssl_prefer_server_ciphers on; ## # Logging Settings ## access_log /var/log/nginx/access.log; error_log /var/log/nginx/error.log; ## # Gzip Settings ## gzip on; gunzip on; gzip_vary on; gzip_min_length 1024; gzip_proxied expired no-cache no-store private auth; gzip_types text/plain text/css text/xml text/javascript application/x-javascript application/xml; gzip_disable "MSIE [1-6]\."; gzip_proxied any; # gzip_comp_level 6; # gzip_buffers 16 8k; # gzip_http_version 1.1; # gzip_types text/plain text/css application/json application/javascript text/xml application/xml application/xml+rss text/javascript; proxy_cache_path /cache/nginx levels=1:2 keys_zone=nginx:10m loader_threshold=300 loader_files=200 max_size=500m; #proxy_cache_path /tmp/nginx/two levels=1:2 keys_zone=two:10m loader_threshold=300 loader_files=200; ## # Virtual Host Configs ## include /etc/nginx/conf.d/*.conf; include /etc/nginx/sites-enabled/*; } #mail { # # See sample authentication script at: # # http://wiki.nginx.org/ImapAuthenticateWithApachePhpScript # # # auth_http localhost/auth.php; # # pop3_capabilities "TOP" "USER"; # # imap_capabilities "IMAP4rev1" "UIDPLUS"; # # server { # listen localhost:110; # protocol pop3; # proxy on; # } # # server { # listen localhost:143; # protocol imap; # proxy on; # } #} # configuration file /etc/nginx/modules-enabled/10-mod-http-ndk.conf: load_module modules/ndk_http_module.so; # configuration file /etc/nginx/modules-enabled/50-mod-http-auth-pam.conf: load_module modules/ngx_http_auth_pam_module.so; # configuration file /etc/nginx/modules-enabled/50-mod-http-cache-purge.conf: load_module modules/ngx_http_cache_purge_module.so; # configuration file /etc/nginx/modules-enabled/50-mod-http-dav-ext.conf: load_module modules/ngx_http_dav_ext_module.so; # configuration file /etc/nginx/modules-enabled/50-mod-http-echo.conf: load_module modules/ngx_http_echo_module.so; # configuration file /etc/nginx/modules-enabled/50-mod-http-fancyindex.conf: load_module modules/ngx_http_fancyindex_module.so; # configuration file /etc/nginx/modules-enabled/50-mod-http-geoip.conf: load_module modules/ngx_http_geoip_module.so; # configuration file /etc/nginx/modules-enabled/50-mod-http-geoip2.conf: load_module modules/ngx_http_geoip2_module.so; # configuration file /etc/nginx/modules-enabled/50-mod-http-headers-more-filter.conf: load_module modules/ngx_http_headers_more_filter_module.so; # configuration file /etc/nginx/modules-enabled/50-mod-http-image-filter.conf: load_module modules/ngx_http_image_filter_module.so; # configuration file /etc/nginx/modules-enabled/50-mod-http-lua.conf: load_module modules/ngx_http_lua_module.so; # configuration file /etc/nginx/modules-enabled/50-mod-http-perl.conf: load_module modules/ngx_http_perl_module.so; # configuration file /etc/nginx/modules-enabled/50-mod-http-subs-filter.conf: load_module modules/ngx_http_subs_filter_module.so; # configuration file /etc/nginx/modules-enabled/50-mod-http-uploadprogress.conf: load_module modules/ngx_http_uploadprogress_module.so; # configuration file /etc/nginx/modules-enabled/50-mod-http-upstream-fair.conf: load_module modules/ngx_http_upstream_fair_module.so; # configuration file /etc/nginx/modules-enabled/50-mod-http-xslt-filter.conf: load_module modules/ngx_http_xslt_filter_module.so; # configuration file /etc/nginx/modules-enabled/50-mod-mail.conf: load_module modules/ngx_mail_module.so; # configuration file /etc/nginx/modules-enabled/50-mod-nchan.conf: load_module modules/ngx_nchan_module.so; # configuration file /etc/nginx/modules-enabled/50-mod-stream.conf: load_module modules/ngx_stream_module.so; # configuration file /etc/nginx/mime.types: types { text/html html htm shtml; text/css css; text/xml xml; image/gif gif; image/jpeg jpeg jpg; application/javascript js; application/atom+xml atom; application/rss+xml rss; text/mathml mml; text/plain txt; text/vnd.sun.j2me.app-descriptor jad; text/vnd.wap.wml wml; text/x-component htc; image/png png; image/tiff tif tiff; image/vnd.wap.wbmp wbmp; image/x-icon ico; image/x-jng jng; image/x-ms-bmp bmp; image/svg+xml svg svgz; image/webp webp; application/font-woff woff; application/java-archive jar war ear; application/json json; application/mac-binhex40 hqx; application/msword doc; application/pdf pdf; application/postscript ps eps ai; application/rtf rtf; application/vnd.apple.mpegurl m3u8; application/vnd.ms-excel xls; application/vnd.ms-fontobject eot; application/vnd.ms-powerpoint ppt; application/vnd.wap.wmlc wmlc; application/vnd.google-earth.kml+xml kml; application/vnd.google-earth.kmz kmz; application/x-7z-compressed 7z; application/x-cocoa cco; application/x-java-archive-diff jardiff; application/x-java-jnlp-file jnlp; application/x-makeself run; application/x-perl pl pm; application/x-pilot prc pdb; application/x-rar-compressed rar; application/x-redhat-package-manager rpm; application/x-sea sea; application/x-shockwave-flash swf; application/x-stuffit sit; application/x-tcl tcl tk; application/x-x509-ca-cert der pem crt; application/x-xpinstall xpi; application/xhtml+xml xhtml; application/xspf+xml xspf; application/zip zip; application/octet-stream bin exe dll; application/octet-stream deb; application/octet-stream dmg; application/octet-stream iso img; application/octet-stream msi msp msm; application/vnd.openxmlformats-officedocument.wordprocessingml.document docx; application/vnd.openxmlformats-officedocument.spreadsheetml.sheet xlsx; application/vnd.openxmlformats-officedocument.presentationml.presentation pptx; audio/midi mid midi kar; audio/mpeg mp3; audio/ogg ogg; audio/x-m4a m4a; audio/x-realaudio ra; video/3gpp 3gpp 3gp; video/mp2t ts; video/mp4 mp4; video/mpeg mpeg mpg; video/quicktime mov; video/webm webm; video/x-flv flv; video/x-m4v m4v; video/x-mng mng; video/x-ms-asf asx asf; video/x-ms-wmv wmv; video/x-msvideo avi; } # configuration file /etc/nginx/sites-enabled/default: ## # You should look at the following URL's in order to grasp a solid understanding # of Nginx configuration files in order to fully unleash the power of Nginx. # https://www.nginx.com/resources/wiki/start/ # https://www.nginx.com/resources/wiki/start/topics/tutorials/config_pitfalls/ # https://wiki.debian.org/Nginx/DirectoryStructure # # In most cases, administrators will remove this file from sites-enabled/ and # leave it as reference inside of sites-available where it will continue to be # updated by the nginx packaging team. # # This file will automatically load configuration files provided by other # applications, such as Drupal or Wordpress. These applications will be made # available underneath a path with that package name, such as /drupal8. # # Please see /usr/share/doc/nginx-doc/examples/ for more detailed examples. ## # Default server configuration # server { listen 80 default_server; listen [::]:80 default_server; # SSL configuration # # listen 443 ssl default_server; # listen [::]:443 ssl default_server; # # Note: You should disable gzip for SSL traffic. # See: https://bugs.debian.org/773332 # # Read up on ssl_ciphers to ensure a secure configuration. # See: https://bugs.debian.org/765782 # # Self signed certs generated by the ssl-cert package # Don't use them in a production server! # # include snippets/snakeoil.conf; root /var/www/html; # Add index.php to the list if you are using PHP index index.html index.htm index.nginx-debian.html; server_name _; location / { # First attempt to serve request as file, then # as directory, then fall back to displaying a 404. try_files $uri $uri/ =404; } # pass PHP scripts to FastCGI server # #location ~ \.php$ { # include snippets/fastcgi-php.conf; # # # With php-fpm (or other unix sockets): # fastcgi_pass unix:/var/run/php/php7.4-fpm.sock; # # With php-cgi (or other tcp sockets): # fastcgi_pass 127.0.0.1:9000; #} # deny access to .htaccess files, if Apache's document root # concurs with nginx's one # #location ~ /\.ht { # deny all; #} } # Virtual Host configuration for example.com # # You can move that to a different file under sites-available/ and symlink that # to sites-enabled/ to enable it. # #server { # listen 80; # listen [::]:80; # # server_name example.com; # # root /var/www/example.com; # index index.html; # # location / { # try_files $uri $uri/ =404; # } #} # configuration file /etc/nginx/sites-enabled/files.kaiser.fyi: server { server_name files.kaiser.fyi; root /var/www/files; index index.html; location / { try_files $uri $uri/ =404; } location .well-known/ { try_files $uri =404; } listen [::]:443 ssl; # managed by Certbot listen 443 ssl; # managed by Certbot ssl_certificate /etc/letsencrypt/live/files.kaiser.fyi/fullchain.pem; # managed by Certbot ssl_certificate_key /etc/letsencrypt/live/files.kaiser.fyi/privkey.pem; # managed by Certbot include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot } server { if ($host = files.kaiser.fyi) { return 301 https://$host$request_uri; } # managed by Certbot listen 80; listen [::]:80; server_name files.kaiser.fyi; return 404; # managed by Certbot } # configuration file /etc/letsencrypt/options-ssl-nginx.conf: # This file contains important security parameters. If you modify this file # manually, Certbot will be unable to automatically provide future security # updates. Instead, Certbot will print and log an error message with a path to # the up-to-date file that you will need to refer to when manually updating # this file. Contents are based on https://ssl-config.mozilla.org ssl_session_cache shared:le_nginx_SSL:10m; ssl_session_timeout 1440m; ssl_session_tickets off; ssl_protocols TLSv1.2 TLSv1.3; ssl_prefer_server_ciphers off; ssl_ciphers "ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384"; # configuration file /etc/nginx/sites-enabled/fonts.kaiser.fyi: server { server_name fonts.kaiser.fyi; root /var/www/fonts; expires 1y; add_header Cache-Control "public, no-transform"; add_header Access-Control-Allow-Origin *; location / { try_files $uri $uri/ =404; } listen [::]:443 ssl ipv6only=on; # managed by Certbot listen 443 ssl; # managed by Certbot ssl_certificate /etc/letsencrypt/live/fonts.kaiser.fyi/fullchain.pem; # managed by Certbot ssl_certificate_key /etc/letsencrypt/live/fonts.kaiser.fyi/privkey.pem; # managed by Certbot include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot } server { if ($host = fonts.kaiser.fyi) { return 301 https://$host$request_uri; } # managed by Certbot server_name fonts.kaiser.fyi; listen 80; listen [::]:80; return 404; # managed by Certbot } # configuration file /etc/nginx/sites-enabled/ima.kaiser.fyi: server { server_name ima.api.kaiser.fyi www.ima.api.kaiser.fyi; location /.well-known/ { try_files $uri =404; } location / { proxy_set_header X-Forwarded-For $remote_addr; proxy_set_header Host $http_host; proxy_pass http://167.172.173.57:3000; } listen [::]:443 ssl; # managed by Certbot listen 443 ssl; # managed by Certbot ssl_certificate /etc/letsencrypt/live/www.api.admin.kaiser.fyi/fullchain.pem; # managed by Certbot ssl_certificate_key /etc/letsencrypt/live/www.api.admin.kaiser.fyi/privkey.pem; # managed by Certbot include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot } server { if ($host = www.ima.api.kaiser.fyi) { return 301 https://$host$request_uri; } # managed by Certbot if ($host = ima.api.kaiser.fyi) { return 301 https://$host$request_uri; } # managed by Certbot server_name ima.api.kaiser.fyi www.ima.api.kaiser.fyi; listen 80; listen [::]:80; return 404; # managed by Certbot } # configuration file /etc/nginx/sites-enabled/kaiser.fyi: server { server_name kaiser.fyi www.kaiser.fyi; location /.well-known/ { try_files $uri =404; } location / { proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr; proxy_pass http://127.0.0.1:4000; } listen [::]:443 ssl; # managed by Certbot listen 443 ssl; # managed by Certbot ssl_certificate /etc/letsencrypt/live/kaiser.fyi-0001/fullchain.pem; # managed by Certbot ssl_certificate_key /etc/letsencrypt/live/kaiser.fyi-0001/privkey.pem; # managed by Certbot include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot } server { server_name log.kaiser.fyi; location /.well-known/ { try_files $uri =404; } location / { proxy_set_header X-Forwarded-For $remote_addr; proxy_set_header Host $http_host; proxy_pass http://167.172.173.57:666; } listen [::]:443 ssl; # managed by Certbot listen 443 ssl; # managed by Certbot ssl_certificate /etc/letsencrypt/live/api.admin.kaiser.fyi/fullchain.pem; # managed by Certbot ssl_certificate_key /etc/letsencrypt/live/api.admin.kaiser.fyi/privkey.pem; # managed by Certbot include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot } server { server_name api.admin.kaiser.fyi www.api.admin.kaiser.fyi; location /.well-known/ { try_files $uri =404; } location / { proxy_set_header X-Forwarded-For $remote_addr; proxy_set_header Host $http_host; proxy_pass http://localhost:6001; } listen [::]:443 ssl; # managed by Certbot listen 443 ssl; # managed by Certbot ssl_certificate /etc/letsencrypt/live/www.api.admin.kaiser.fyi/fullchain.pem; # managed by Certbot ssl_certificate_key /etc/letsencrypt/live/www.api.admin.kaiser.fyi/privkey.pem; # managed by Certbot include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot } server { if ($host = www.api.admin.kaiser.fyi) { return 301 https://$host$request_uri; } # managed by Certbot if ($host = api.admin.kaiser.fyi) { return 301 https://$host$request_uri; } # managed by Certbot server_name api.admin.kaiser.fyi www.api.admin.kaiser.fyi; listen 80; listen [::]:80; return 404; # managed by Certbot } server { if ($host = log.kaiser.fyi) { return 301 https://$host$request_uri; } # managed by Certbot listen 80; listen [::]:80; server_name log.kaiser.fyi; return 404; # managed by Certbot } server { if ($host = www.kaiser.fyi) { return 301 https://$host$request_uri; } # managed by Certbot if ($host = kaiser.fyi) { return 301 https://$host$request_uri; } # managed by Certbot listen 80; listen [::]:80; server_name kaiser.fyi www.kaiser.fyi; return 404; # managed by Certbot } # configuration file /etc/nginx/sites-enabled/kultnow.com: server { server_name api.kultnow.com; location / { proxy_set_header X-Forwarded-For $remote_addr; proxy_set_header Host $http_host; proxy_pass http://localhost:3005; } listen [::]:443 ssl; # managed by Certbot listen 443 ssl; # managed by Certbot ssl_certificate /etc/letsencrypt/live/api.kultnow.com/fullchain.pem; # managed by Certbot ssl_certificate_key /etc/letsencrypt/live/api.kultnow.com/privkey.pem; # managed by Certbot include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot } server { if ($host = api.kultnow.com) { return 301 https://$host$request_uri; } # managed by Certbot server_name api.kultnow.com; listen 80; listen [::]:80; return 404; # managed by Certbot } server { root /var/www/kultnow; index index.html index.htm; server_name kultnow.com www.kultnow.com; location / { try_files $uri $uri/ /index.html; } listen [::]:443 ssl; # managed by Certbot listen 443 ssl; # managed by Certbot ssl_certificate /etc/letsencrypt/live/kultnow.com/fullchain.pem; # managed by Certbot ssl_certificate_key /etc/letsencrypt/live/kultnow.com/privkey.pem; # managed by Certbot include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot } server { if ($host = kultnow.com) { return 301 https://$host$request_uri; } # managed by Certbot listen 80; listen [::]:80; server_name kultnow.com www.kultnow.com; return 404; # managed by Certbot } server { listen 80; listen [::]:80; server_name log.kultnow.com; location / { proxy_set_header X-Forwarded-For $remote_addr; proxy_set_header Host $http_host; proxy_pass http://localhost:668; } listen [::]:443 ssl; # managed by Certbot listen 443 ssl; # managed by Certbot ssl_certificate /etc/letsencrypt/live/log.kultnow.com/fullchain.pem; # managed by Certbot ssl_certificate_key /etc/letsencrypt/live/log.kultnow.com/privkey.pem; # managed by Certbot include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot } # configuration file /etc/nginx/sites-enabled/media.kaiser.fyi: server { # Internal image resizing server. server_name localhost; listen 8888; location ~ "/mindsupport/(?\d+)/(?.+)$" { alias /var/www/files/mindsupport/$image; image_filter resize $width -; image_filter_jpeg_quality 90; image_filter_buffer 50M; } location ~ "/kultnow/(?\d+)/(?.+)$" { alias /var/www/files/kultnow/$image; image_filter resize $width -; image_filter_jpeg_quality 90; image_filter_buffer 50M; } } # Moved to main config #proxy_cache_path /tmp/nginx/ levels=1:2 keys_zone=images:10m max_size=100m; server { # Public-facing cache server. server_name media.kaiser.fyi; location = /favicon.ico { return 204; access_log off; log_not_found off; } location ~ "/mindsupport/(?)/(?.+)$" { # Proxy to internal image resizing server. proxy_pass http://localhost:8888/mindsupport/$width/$image; proxy_cache nginx; proxy_ignore_headers Cache-Control; proxy_cache_valid any 30d; expires 30d; add_header Pragma public; add_header Cache-Control "public"; } location ~ "/kultnow/(?)/(?.+)$" { # Proxy to internal image resizing server. proxy_pass http://localhost:8888/kultnow/$width/$image; proxy_cache nginx; proxy_ignore_headers Cache-Control; proxy_cache_valid any 30d; expires 30d; add_header Pragma public; add_header Cache-Control "public"; } location / { # Nginx needs you to manually define DNS resolution when using # variables in proxy_pass. Creating this dummy location avoids that. # The error is: "no resolver defined to resolve localhost". proxy_pass http://localhost:8888/; proxy_cache nginx; proxy_ignore_headers Cache-Control; proxy_cache_valid any 30d; expires 30d; add_header Pragma public; add_header Cache-Control "public"; } location .well-known/ { try_files $uri =404; } listen [::]:443 ssl http2; # managed by Certbot listen 443 ssl http2; # managed by Certbot ssl_certificate /etc/letsencrypt/live/media.kaiser.fyi/fullchain.pem; # managed by Certbot ssl_certificate_key /etc/letsencrypt/live/media.kaiser.fyi/privkey.pem; # managed by Certbot include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot } server { if ($host = media.kaiser.fyi) { return 301 https://$host$request_uri; } # managed by Certbot server_name media.kaiser.fyi; listen 80; listen [::]:80; return 404; # managed by Certbot } # configuration file /etc/nginx/sites-enabled/meistersingerakademie.com: server { root /var/www/ima/public_html; index index.php index.html index.htm; server_name meistersingerakademie.com www.meistersingerakademie.com; location / { try_files $uri $uri/ /index.html; } listen [::]:443 ssl http2; # managed by Certbot listen 443 ssl http2; # managed by Certbot ssl_certificate /etc/letsencrypt/live/meistersingerakademie.com/fullchain.pem; # managed by Certbot ssl_certificate_key /etc/letsencrypt/live/meistersingerakademie.com/privkey.pem; # managed by Certbot include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot } server { root /var/www/ima/public_html/cms; index index.php index.html index.htm; server_name cms.meistersingerakademie.com www.cms.meistersingerakademie.com; location / { try_files $uri $uri/ /index.html; } listen [::]:443 ssl http2; # managed by Certbot listen 443 ssl http2; # managed by Certbot ssl_certificate /etc/letsencrypt/live/cms.meistersingerakademie.com/fullchain.pem; # managed by Certbot ssl_certificate_key /etc/letsencrypt/live/cms.meistersingerakademie.com/privkey.pem; # managed by Certbot include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot } server { if ($host = meistersingerakademie.com) { return 301 https://$host$request_uri; } # managed by Certbot listen 80; listen [::]:80; server_name meistersingerakademie.com www.meistersingerakademie.com; return 404; # managed by Certbot } server { if ($host = cms.meistersingerakademie.com) { return 301 https://$host$request_uri; } # managed by Certbot listen 80; listen [::]:80; server_name cms.meistersingerakademie.com www.cms.meistersingerakademie.com; return 404; # managed by Certbot } # configuration file /etc/nginx/sites-enabled/mindsupport.eu: server { server_name api.mindsupport.eu; location / { proxy_set_header X-Forwarded-For $remote_addr; proxy_set_header Host $http_host; proxy_pass http://$server_addr:3002; } listen [::]:443 ssl; # managed by Certbot listen 443 ssl; # managed by Certbot ssl_certificate /etc/letsencrypt/live/api.mindsupport.eu/fullchain.pem; # managed by Certbot ssl_certificate_key /etc/letsencrypt/live/api.mindsupport.eu/privkey.pem; # managed by Certbot include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot } server { if ($host = api.mindsupport.eu) { return 301 https://$host$request_uri; } # managed by Certbot server_name api.mindsupport.eu; listen 80; listen [::]:80; return 404; # managed by Certbot } server { server_name log.mindsupport.eu; location / { proxy_set_header X-Forwarded-For $remote_addr; proxy_set_header Host $http_host; proxy_pass http://$server_addr:667; } listen [::]:443 ssl; # managed by Certbot listen 443 ssl; # managed by Certbot ssl_certificate /etc/letsencrypt/live/log.mindsupport.eu/fullchain.pem; # managed by Certbot ssl_certificate_key /etc/letsencrypt/live/log.mindsupport.eu/privkey.pem; # managed by Certbot include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot } server { if ($host = log.mindsupport.eu) { return 301 https://$host$request_uri; } # managed by Certbot listen 80; listen [::]:80; server_name log.mindsupport.eu; return 404; # managed by Certbot } # configuration file /etc/nginx/sites-enabled/wildwaid: server { server_name wildwaid.com www.wildwaid.com; location /.well-known/ { try_files $uri =404; } location / { proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr; proxy_pass http://localhost:4001; } listen [::]:443 ssl http2; # managed by Certbot listen 443 ssl http2; # managed by Certbot ssl_certificate /etc/letsencrypt/live/wildwaid.com/fullchain.pem; # managed by Certbot ssl_certificate_key /etc/letsencrypt/live/wildwaid.com/privkey.pem; # managed by Certbot include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot } server { if ($host = www.wildwaid.com) { return 301 https://$host$request_uri; } # managed by Certbot if ($host = wildwaid.com) { return 301 https://$host$request_uri; } # managed by Certbot listen [::]:80; listen 80; server_name wildwaid.com www.wildwaid.com; return 404; # managed by Certbot }