$ pacman -S python-pip nginx uwsgi-plugin-python uwsgi
$ /etc/nginx/ (nginx directory)
$ /etc/uwsgi/ (uwsgi directory)
$ /usr/share/nginx/uswgi_test/ (app directory)
sshfs -o allow_other {user}@{ip}:{remote_dir} {local_dir}
allow_other => Allow other users than the mounter (i.e. root) to access the share.
sudo mkdir /mnt/chicago_vps
sudo sshfs -o allow_other [email protected]:/ /mnt/chicago_vps
In this exemple of configuration, if the first server fail (proxy_connect_timeout) one time (max_fails), the second server will be used for 60s (fail_timeout).
The SSL certificate need to be configure on the ReverseProxy server AND the proxyied servers. You can use the same certificate and configurations on all servers.
To test the configuration you can change your host file to simulate the correct domain name.
Use the following tool to configure SSL with optimal configuration.
Install package with specific version
Install-Package EntityFramework -version 6.1.3
Run migration for specific connection string name
Update-Database -ConnectionStringName applicationDB2
Add migration with name "AddStateToUser" and compare database structure from specific connection string name
Use openssl to extract private key. After executing the following line. you will need to enter the password used when the pfx file was created.
openssl pkcs12 -in file_name.pfx -out certificate.cer -nodes
When converting a PFX file to PEM format, OpenSSL will put all the certificates and the private key into a single file. You will need to open the file in a text editor and copy each certificate and private key (including the BEGIN/END statments) to its own individual text file and save them as certificate.cer, CACert.cer, and privateKey.key respectively.
Create file the following file /etc/nginx/site-available/redirect_http_to_https
server {
listen 80 default_server;
listen [::]:80 default_server;
server_name _;
return 301 https://$host$request_uri;
}
Create symbolic link in the /etc/nginx/site-enabled/ folder
$ sudo openssl dhparam -out /etc/ssl/dhparam.pem 2048
Point to a trusted certificate chain file. This must contain the intermediate & root certificates (in that order from top to bottom). See exemple_full_chain.pem
Get the root and intermediate certificates from where you buyed the certificates. For me it was: