웹서버 2대
lb 서버 1대해서 테스트 하고 있는데요..
80번 포트 웹페이지는 정상적으로 잘 작동하는데요
문제가 SSL 이네요
letsencrypt
사용해서 stadalone으로 받아서 ssl 설치 할려고 했더니...
443으로 접속해서 80번으로 넘어가는 과정에서 프로토콜 오류나 나네요
보통 LB 서버에만 SSL 설치 하면 되는건가요? 아니면 웹서버 2대에 SSL 설치 해야 하는건가요?
댓글 5개
@mnncloud 이렇게 했지요;;
upstream backend {
server web1 max_fails=3 fail_timeout=15s;
server web2 max_fails=3 fail_timeout=15s;
}
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-Host $host;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_pass http://backend;
}
이렇게 하니깐..https로 접속 하려 했더니 502가 뜨네요
ssl 설정은.....
listen 443 ssl http2;
server_name aaaaaa.com
client_max_body_size 100M;
server_tokens off;
ssl_certificate "/etc/letsencrypt/live/aaaaa.com/fullchain.pem";
ssl_certificate_key "/etc/letsencrypt/live/aaaaa.com/privkey.pem";
# ssl_dhparam "/etc/ssl/certs/dhparams.pem";
# Set caches, protocols, and accepted ciphers. This config will merit an A+ SSL Labs score.
ssl_session_cache shared:SSL:20m;
ssl_session_timeout 10m;
ssl_protocols TLSv1 TLSv1.1 TLSv1.2 TLSv1.3;
ssl_ecdh_curve secp384r1;
# ssl_prefer_s erver_ciphers on;
ssl_ciphers 'ECDH+AESGCM:ECDH+AES256:ECDH+AES128:!ADH:!AECDH:!MD5';
# Enable HSTS. This forces SSL on clients that respect it, most modern browsers. The includeSubDomains flag is optional
add_header Strict-Transport-Security "max-age=31536000";
ssl_trusted_certificate "/etc/letsencrypt/live/aaaaa.com/chain.pem";
upstream backend {
server web1 max_fails=3 fail_timeout=15s;
server web2 max_fails=3 fail_timeout=15s;
}
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-Host $host;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_pass http://backend;
}
이렇게 하니깐..https로 접속 하려 했더니 502가 뜨네요
ssl 설정은.....
listen 443 ssl http2;
server_name aaaaaa.com
client_max_body_size 100M;
server_tokens off;
ssl_certificate "/etc/letsencrypt/live/aaaaa.com/fullchain.pem";
ssl_certificate_key "/etc/letsencrypt/live/aaaaa.com/privkey.pem";
# ssl_dhparam "/etc/ssl/certs/dhparams.pem";
# Set caches, protocols, and accepted ciphers. This config will merit an A+ SSL Labs score.
ssl_session_cache shared:SSL:20m;
ssl_session_timeout 10m;
ssl_protocols TLSv1 TLSv1.1 TLSv1.2 TLSv1.3;
ssl_ecdh_curve secp384r1;
# ssl_prefer_s erver_ciphers on;
ssl_ciphers 'ECDH+AESGCM:ECDH+AES256:ECDH+AES128:!ADH:!AECDH:!MD5';
# Enable HSTS. This forces SSL on clients that respect it, most modern browsers. The includeSubDomains flag is optional
add_header Strict-Transport-Security "max-age=31536000";
ssl_trusted_certificate "/etc/letsencrypt/live/aaaaa.com/chain.pem";
게시글 목록
| 번호 | 제목 |
|---|---|
| 3268 | |
| 3264 | |
| 3254 | |
| 3247 | |
| 3239 | |
| 3238 | |
| 3235 | |
| 3229 | |
| 3223 | |
| 3216 | |
| 3212 | |
| 3204 | |
| 3195 | |
| 3190 | |
| 3187 | |
| 3177 | |
| 3166 | |
| 3165 | |
| 3162 | |
| 3161 | |
| 3160 | |
| 3156 | |
| 3152 | |
| 3151 | |
| 3150 | |
| 3142 | |
| 3141 | |
| 3139 | |
| 3138 | |
| 3135 |
댓글 작성
댓글을 작성하시려면 로그인이 필요합니다.
로그인하기