[TOC]php
pkill -9 apache2 # 關閉apache sudo apt install nginx # 安裝nginx,使用Ubuntu的包管理工具apt-get
sudo vim /etc/apache2/ports.conf # 講端口修改81,防止和nginx 重複,致使重啓失敗 sudo service apache2 start # 啓動apache 服務器,代理目標服務器
cd /etc/nginx/conf.d/ # 進入配置文件目錄 vim host.conf # 建立自定義配置文件
在conf.d目錄下新安裝的nginx不存在任何文件,新建host.conf文件。在nginx目錄下的nginx.conf中導入了conf.d下全部的文件.以下圖:html
因此直接在conf.d下簡歷host配置文件nginx
server { listen 80; server_name live.triste.com; index index.html index.htm index.php root /var/www/html; location / { proxy_pass http://localhost:81; proxy_redirect off; proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_next_upstream error timeout invalid_header http_500 http_502 http_503 http_504; proxy_max_temp_file_size 0; proxy_connect_timeout 90; proxy_send_timeout 90; proxy_read_timeout 90; proxy_buffer_size 4k; proxy_buffers 4 32k; proxy_busy_buffers_size 64k; proxy_temp_file_write_size 64k; } } server { listen 80; server_name info.triste.com; index index.html index.htm index.php root /var/www/html; location / { proxy_pass http://localhost:81; proxy_redirect off; proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_next_upstream error timeout invalid_header http_500 http_502 http_503 http_504; proxy_max_temp_file_size 0; proxy_connect_timeout 90; proxy_send_timeout 90; proxy_read_timeout 90; proxy_buffer_size 4k; proxy_buffers 4 32k; proxy_busy_buffers_size 64k; proxy_temp_file_write_size 64k; } }
sudo service nginx reload
nginx 訪問apache
反向代理到apachevim
反向代理到apachebash
假設在擁有了ssl證書的狀況下:服務器
直接上代碼以下:session
server { listen 443; server_name www.domain.com; #填寫綁定證書的域名 ssl on; ssl_certificate 1_www.domain.com_bundle.crt; ssl_certificate_key 2_www.domain.com.key; ssl_session_timeout 5m; ssl_protocols TLSv1 TLSv1.1 TLSv1.2; #按照這個協議配置 ssl_ciphers ECDHE-RSA-AES128-GCM-SHA256:HIGH:!aNULL:!MD5:!RC4:!DHE;#按照這個套件配置 ssl_prefer_server_ciphers on; location / { root html; #站點目錄 index index.html index.htm; } }
上面代碼就配置了www.domain.com
, 如今你就能夠經過https://www.domain.com
來訪問了.dom
配置反向代理:工具
server { listen 443; server_name blog.domain.com; #填寫綁定證書的域名 ssl on; ssl_certificate blog.domain.com_bundle.crt; ssl_certificate_key blog.domain.com.key; ssl_session_timeout 5m; ssl_protocols TLSv1 TLSv1.1 TLSv1.2; #按照這個協議配置 ssl_ciphers ECDHE-RSA-AES128-GCM-SHA256:HIGH:!aNULL:!MD5:!RC4:!DHE;#按照這個套件配置 ssl_prefer_server_ciphers on; location / { proxy_pass http://localhost:81; proxy_redirect off; proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_next_upstream error timeout invalid_header http_500 http_502 http_503 http_504; proxy_max_temp_file_size 0; proxy_connect_timeout 90; proxy_send_timeout 90; proxy_read_timeout 90; proxy_buffer_size 4k; proxy_buffers 4 32k; proxy_busy_buffers_size 64k; proxy_temp_file_write_size 64k; } }
如上就配置了https 反向代理。
因爲國內免費的ssl證書都是單域名證書所以每次配置時候都是須要從新制定證書。
編輯nginx.conf 文件,在Ubuntu上的位置在於: /etc/nginx/nginx.conf
http { # 沈略部分 server { rewrite ^(.*) https://$host$1 permanent; } }
上面代碼便可進行從http 自動跳轉到https 上,從而實現全站加密。