Created
April 9, 2018 15:21
-
-
Save kerin/a887fff5826e4eb6638d1905c1d9e7d3 to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| daemon off; | |
| worker_processes 4; | |
| pid /run/nginx.pid; | |
| worker_rlimit_nofile 261120; | |
| worker_shutdown_timeout 10s ; | |
| events { | |
| multi_accept on; | |
| worker_connections 16384; | |
| use epoll; | |
| } | |
| http { | |
| real_ip_header proxy_protocol; | |
| real_ip_recursive on; | |
| set_real_ip_from 0.0.0.0/0; | |
| geoip_country /etc/nginx/GeoIP.dat; | |
| geoip_city /etc/nginx/GeoLiteCity.dat; | |
| geoip_proxy_recursive on; | |
| sendfile on; | |
| aio threads; | |
| aio_write on; | |
| tcp_nopush on; | |
| tcp_nodelay on; | |
| log_subrequest on; | |
| reset_timedout_connection on; | |
| keepalive_timeout 75s; | |
| keepalive_requests 100; | |
| client_header_buffer_size 1k; | |
| client_header_timeout 60s; | |
| large_client_header_buffers 4 8k; | |
| client_body_buffer_size 8k; | |
| client_body_timeout 60s; | |
| http2_max_field_size 4k; | |
| http2_max_header_size 16k; | |
| types_hash_max_size 2048; | |
| server_names_hash_max_size 2048; | |
| server_names_hash_bucket_size 128; | |
| map_hash_bucket_size 64; | |
| proxy_headers_hash_max_size 512; | |
| proxy_headers_hash_bucket_size 64; | |
| variables_hash_bucket_size 128; | |
| variables_hash_max_size 2048; | |
| underscores_in_headers off; | |
| ignore_invalid_headers on; | |
| include /etc/nginx/mime.types; | |
| default_type text/html; | |
| brotli on; | |
| brotli_comp_level 4; | |
| brotli_types application/xml+rss application/atom+xml application/javascript application/x-javascript application/json application/rss+xml application/vnd.ms-fontobject application/x-font-ttf application/x-web-app-manifest+json application/xhtml+xml application/xml font/opentype image/svg+xml image/x-icon text/css text/plain text/x-component; | |
| gzip on; | |
| gzip_comp_level 5; | |
| gzip_http_version 1.1; | |
| gzip_min_length 256; | |
| gzip_types application/atom+xml application/javascript application/x-javascript application/json application/rss+xml application/vnd.ms-fontobject application/x-font-ttf application/x-web-app-manifest+json application/xhtml+xml application/xml font/opentype image/svg+xml image/x-icon text/css text/plain text/x-component; | |
| gzip_proxied any; | |
| gzip_vary on; | |
| # Custom headers for response | |
| server_tokens on; | |
| # disable warnings | |
| uninitialized_variable_warn off; | |
| # Additional available variables: | |
| # $namespace | |
| # $ingress_name | |
| # $service_name | |
| log_format upstreaminfo '$the_real_ip - [$the_real_ip] - $remote_user [$time_local] "$request" $status $body_bytes_sent "$http_referer" "$http_user_agent" $request_length $request_time [$proxy_upstream_name] $upstream_addr $upstream_response_length $upstream_response_time $upstream_status'; | |
| map $request_uri $loggable { | |
| default 1; | |
| } | |
| access_log /var/log/nginx/access.log upstreaminfo if=$loggable; | |
| error_log /var/log/nginx/error.log notice; | |
| resolver 100.64.0.10 valid=30s; | |
| # Retain the default nginx handling of requests without a "Connection" header | |
| map $http_upgrade $connection_upgrade { | |
| default upgrade; | |
| '' close; | |
| } | |
| map $http_x_forwarded_for $the_real_ip { | |
| # Get IP address from Proxy Protocol | |
| default $proxy_protocol_addr; | |
| } | |
| # trust http_x_forwarded_proto headers correctly indicate ssl offloading | |
| map $http_x_forwarded_proto $pass_access_scheme { | |
| default $http_x_forwarded_proto; | |
| '' $scheme; | |
| } | |
| map $http_x_forwarded_port $pass_server_port { | |
| default $http_x_forwarded_port; | |
| '' $server_port; | |
| } | |
| map $http_x_forwarded_host $best_http_host { | |
| default $http_x_forwarded_host; | |
| '' $this_host; | |
| } | |
| map $pass_server_port $pass_port { | |
| 443 443; | |
| default $pass_server_port; | |
| } | |
| # Obtain best http host | |
| map $http_host $this_host { | |
| default $http_host; | |
| '' $host; | |
| } | |
| server_name_in_redirect off; | |
| port_in_redirect off; | |
| ssl_protocols TLSv1.2; | |
| # turn on session caching to drastically improve performance | |
| ssl_session_cache builtin:1000 shared:SSL:10m; | |
| ssl_session_timeout 10m; | |
| # allow configuring ssl session tickets | |
| ssl_session_tickets on; | |
| # slightly reduce the time-to-first-byte | |
| ssl_buffer_size 4k; | |
| # allow configuring custom ssl ciphers | |
| ssl_ciphers 'ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256'; | |
| ssl_prefer_server_ciphers on; | |
| ssl_ecdh_curve auto; | |
| proxy_ssl_session_reuse on; | |
| upstream kube-system-cluster-monitoring-grafana-80 { | |
| # Load balance algorithm; empty for round robin, which is the default | |
| least_conn; | |
| keepalive 32; | |
| server 100.96.114.152:3000 max_fails=0 fail_timeout=0; | |
| } | |
| upstream default-cpfrontend-master-cpfron-80 { | |
| # Load balance algorithm; empty for round robin, which is the default | |
| least_conn; | |
| keepalive 32; | |
| server 100.123.52.182:3000 max_fails=0 fail_timeout=0; | |
| server 100.103.167.111:3000 max_fails=0 fail_timeout=0; | |
| server 100.112.47.10:3000 max_fails=0 fail_timeout=0; | |
| } | |
| upstream kube-system-cluster-logviewer-kibana-auth-proxy-80 { | |
| # Load balance algorithm; empty for round robin, which is the default | |
| least_conn; | |
| keepalive 32; | |
| server 100.103.167.66:3000 max_fails=0 fail_timeout=0; | |
| } | |
| upstream monitoring-kube-prometheus-alertmanager-9093 { | |
| # Load balance algorithm; empty for round robin, which is the default | |
| least_conn; | |
| keepalive 32; | |
| server 100.112.47.32:9093 max_fails=0 fail_timeout=0; | |
| } | |
| upstream upstream-default-backend { | |
| # Load balance algorithm; empty for round robin, which is the default | |
| least_conn; | |
| keepalive 32; | |
| server 100.126.42.197:8080 max_fails=0 fail_timeout=0; | |
| } | |
| upstream default-cpanel-master-cpanel-80 { | |
| # Load balance algorithm; empty for round robin, which is the default | |
| least_conn; | |
| keepalive 32; | |
| server 100.103.167.83:8000 max_fails=0 fail_timeout=0; | |
| server 100.123.52.178:8000 max_fails=0 fail_timeout=0; | |
| server 100.112.47.4:8000 max_fails=0 fail_timeout=0; | |
| } | |
| upstream kube-system-kubernetes-dashboard-443 { | |
| # Load balance algorithm; empty for round robin, which is the default | |
| least_conn; | |
| keepalive 32; | |
| server 100.112.47.18:8443 max_fails=0 fail_timeout=0; | |
| } | |
| upstream default-concourse-web-8080 { | |
| # Load balance algorithm; empty for round robin, which is the default | |
| least_conn; | |
| keepalive 32; | |
| server 100.112.47.49:8080 max_fails=0 fail_timeout=0; | |
| } | |
| upstream sticky-apps-prod-andy-test-webapp-80 { | |
| sticky hash=md5 name=INGRESSCOOKIE httponly; | |
| keepalive 32; | |
| server 100.103.167.99:3000 max_fails=0 fail_timeout=0; | |
| server 100.112.47.2:3000 max_fails=0 fail_timeout=0; | |
| server 100.123.52.171:3000 max_fails=0 fail_timeout=0; | |
| } | |
| upstream apps-prod-andy-test-webapp-80 { | |
| # Load balance algorithm; empty for round robin, which is the default | |
| least_conn; | |
| keepalive 32; | |
| server 100.103.167.99:3000 max_fails=0 fail_timeout=0; | |
| server 100.112.47.2:3000 max_fails=0 fail_timeout=0; | |
| server 100.123.52.171:3000 max_fails=0 fail_timeout=0; | |
| } | |
| upstream user-djsd123-jupyter-lab-djsd123-jupy-80 { | |
| # Load balance algorithm; empty for round robin, which is the default | |
| least_conn; | |
| keepalive 32; | |
| server 100.123.52.179:3000 max_fails=0 fail_timeout=0; | |
| } | |
| upstream default-jenkins-jenkins-8080 { | |
| # Load balance algorithm; empty for round robin, which is the default | |
| least_conn; | |
| keepalive 32; | |
| server 100.96.114.140:8080 max_fails=0 fail_timeout=0; | |
| } | |
| upstream monitoring-kube-prometheus-prometheus-9090 { | |
| # Load balance algorithm; empty for round robin, which is the default | |
| least_conn; | |
| keepalive 32; | |
| server 100.123.52.146:9090 max_fails=0 fail_timeout=0; | |
| } | |
| upstream default-clank-hubot-80 { | |
| # Load balance algorithm; empty for round robin, which is the default | |
| least_conn; | |
| keepalive 32; | |
| server 100.103.167.67:8080 max_fails=0 fail_timeout=0; | |
| } | |
| upstream default-unidler-80 { | |
| # Load balance algorithm; empty for round robin, which is the default | |
| least_conn; | |
| keepalive 32; | |
| server 100.103.167.118:8080 max_fails=0 fail_timeout=0; | |
| } | |
| server { | |
| listen 8000 proxy_protocol; | |
| server_tokens off; | |
| return 301 https://$host$request_uri; | |
| } | |
| ## start server _ | |
| server { | |
| server_name _ ; | |
| listen 80 proxy_protocol default_server reuseport backlog=511; | |
| listen [::]:80 proxy_protocol default_server reuseport backlog=511; | |
| set $proxy_upstream_name "-"; | |
| listen 443 proxy_protocol default_server reuseport backlog=511 ssl http2; | |
| listen [::]:443 proxy_protocol default_server reuseport backlog=511 ssl http2; | |
| # PEM sha: d069386f8b63f9f3708a4c51db4c3f253c196498 | |
| ssl_certificate /ingress-controller/ssl/default-fake-certificate.pem; | |
| ssl_certificate_key /ingress-controller/ssl/default-fake-certificate.pem; | |
| more_set_headers "Strict-Transport-Security: max-age=15724800; includeSubDomains;"; | |
| location / { | |
| set $proxy_upstream_name "upstream-default-backend"; | |
| set $namespace ""; | |
| set $ingress_name ""; | |
| set $service_name ""; | |
| port_in_redirect off; | |
| client_max_body_size "100m"; | |
| proxy_set_header Host $best_http_host; | |
| # Pass the extracted client certificate to the backend | |
| proxy_set_header ssl-client-cert ""; | |
| proxy_set_header ssl-client-verify ""; | |
| proxy_set_header ssl-client-dn ""; | |
| # Allow websocket connections | |
| proxy_set_header Upgrade $http_upgrade; | |
| proxy_set_header Connection $connection_upgrade; | |
| proxy_set_header X-Real-IP $the_real_ip; | |
| proxy_set_header X-Forwarded-For $the_real_ip; | |
| proxy_set_header X-Forwarded-Host $best_http_host; | |
| proxy_set_header X-Forwarded-Port $pass_port; | |
| proxy_set_header X-Forwarded-Proto $pass_access_scheme; | |
| proxy_set_header X-Original-URI $request_uri; | |
| proxy_set_header X-Scheme $pass_access_scheme; | |
| # Pass the original X-Forwarded-For | |
| proxy_set_header X-Original-Forwarded-For $http_x_forwarded_for; | |
| # mitigate HTTPoxy Vulnerability | |
| # https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/ | |
| proxy_set_header Proxy ""; | |
| # Custom headers to proxied server | |
| proxy_connect_timeout 5s; | |
| proxy_send_timeout 3600s; | |
| proxy_read_timeout 3600s; | |
| proxy_redirect off; | |
| proxy_buffering off; | |
| proxy_buffer_size "4k"; | |
| proxy_buffers 4 "4k"; | |
| proxy_request_buffering "on"; | |
| proxy_http_version 1.1; | |
| proxy_cookie_domain off; | |
| proxy_cookie_path off; | |
| # In case of errors try the next upstream server before returning an error | |
| proxy_next_upstream error timeout invalid_header http_502 http_503 http_504; | |
| proxy_pass http://upstream-default-backend; | |
| } | |
| # health checks in cloud providers require the use of port 80 | |
| location /healthz { | |
| access_log off; | |
| return 200; | |
| } | |
| # this is required to avoid error if nginx is being monitored | |
| # with an external software (like sysdig) | |
| location /nginx_status { | |
| allow 127.0.0.1; | |
| allow ::1; | |
| deny all; | |
| access_log off; | |
| stub_status on; | |
| } | |
| } | |
| ## end server _ | |
| ## start server acthomas21-rstudio.tools.dev.mojanalytics.xyz | |
| server { | |
| server_name acthomas21-rstudio.tools.dev.mojanalytics.xyz ; | |
| listen 80 proxy_protocol; | |
| listen [::]:80 proxy_protocol; | |
| set $proxy_upstream_name "-"; | |
| location / { | |
| set $proxy_upstream_name "default-unidler-80"; | |
| set $namespace "default"; | |
| set $ingress_name "unidler"; | |
| set $service_name "unidler"; | |
| port_in_redirect off; | |
| client_max_body_size "100m"; | |
| proxy_set_header Host $best_http_host; | |
| # Pass the extracted client certificate to the backend | |
| proxy_set_header ssl-client-cert ""; | |
| proxy_set_header ssl-client-verify ""; | |
| proxy_set_header ssl-client-dn ""; | |
| # Allow websocket connections | |
| proxy_set_header Upgrade $http_upgrade; | |
| proxy_set_header Connection $connection_upgrade; | |
| proxy_set_header X-Real-IP $the_real_ip; | |
| proxy_set_header X-Forwarded-For $the_real_ip; | |
| proxy_set_header X-Forwarded-Host $best_http_host; | |
| proxy_set_header X-Forwarded-Port $pass_port; | |
| proxy_set_header X-Forwarded-Proto $pass_access_scheme; | |
| proxy_set_header X-Original-URI $request_uri; | |
| proxy_set_header X-Scheme $pass_access_scheme; | |
| # Pass the original X-Forwarded-For | |
| proxy_set_header X-Original-Forwarded-For $http_x_forwarded_for; | |
| # mitigate HTTPoxy Vulnerability | |
| # https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/ | |
| proxy_set_header Proxy ""; | |
| # Custom headers to proxied server | |
| proxy_connect_timeout 5s; | |
| proxy_send_timeout 3600s; | |
| proxy_read_timeout 3600s; | |
| proxy_redirect off; | |
| proxy_buffering off; | |
| proxy_buffer_size "4k"; | |
| proxy_buffers 4 "4k"; | |
| proxy_request_buffering "on"; | |
| proxy_http_version 1.1; | |
| proxy_cookie_domain off; | |
| proxy_cookie_path off; | |
| # In case of errors try the next upstream server before returning an error | |
| proxy_next_upstream error timeout invalid_header http_502 http_503 http_504; | |
| proxy_pass http://default-unidler-80; | |
| } | |
| } | |
| ## end server acthomas21-rstudio.tools.dev.mojanalytics.xyz | |
| ## start server alertmanager.services.dev.mojanalytics.xyz | |
| server { | |
| server_name alertmanager.services.dev.mojanalytics.xyz ; | |
| listen 80 proxy_protocol; | |
| listen [::]:80 proxy_protocol; | |
| set $proxy_upstream_name "-"; | |
| location / { | |
| set $proxy_upstream_name "monitoring-kube-prometheus-alertmanager-9093"; | |
| set $namespace "monitoring"; | |
| set $ingress_name "kube-prometheus-alertmanager"; | |
| set $service_name ""; | |
| port_in_redirect off; | |
| client_max_body_size "100m"; | |
| proxy_set_header Host $best_http_host; | |
| # Pass the extracted client certificate to the backend | |
| proxy_set_header ssl-client-cert ""; | |
| proxy_set_header ssl-client-verify ""; | |
| proxy_set_header ssl-client-dn ""; | |
| # Allow websocket connections | |
| proxy_set_header Upgrade $http_upgrade; | |
| proxy_set_header Connection $connection_upgrade; | |
| proxy_set_header X-Real-IP $the_real_ip; | |
| proxy_set_header X-Forwarded-For $the_real_ip; | |
| proxy_set_header X-Forwarded-Host $best_http_host; | |
| proxy_set_header X-Forwarded-Port $pass_port; | |
| proxy_set_header X-Forwarded-Proto $pass_access_scheme; | |
| proxy_set_header X-Original-URI $request_uri; | |
| proxy_set_header X-Scheme $pass_access_scheme; | |
| # Pass the original X-Forwarded-For | |
| proxy_set_header X-Original-Forwarded-For $http_x_forwarded_for; | |
| # mitigate HTTPoxy Vulnerability | |
| # https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/ | |
| proxy_set_header Proxy ""; | |
| # Custom headers to proxied server | |
| proxy_connect_timeout 5s; | |
| proxy_send_timeout 3600s; | |
| proxy_read_timeout 3600s; | |
| proxy_redirect off; | |
| proxy_buffering off; | |
| proxy_buffer_size "4k"; | |
| proxy_buffers 4 "4k"; | |
| proxy_request_buffering "on"; | |
| proxy_http_version 1.1; | |
| proxy_cookie_domain off; | |
| proxy_cookie_path off; | |
| # In case of errors try the next upstream server before returning an error | |
| proxy_next_upstream error timeout invalid_header http_502 http_503 http_504; | |
| proxy_pass http://monitoring-kube-prometheus-alertmanager-9093; | |
| } | |
| } | |
| ## end server alertmanager.services.dev.mojanalytics.xyz | |
| ## start server andrewpoulton-rstudio.tools.dev.mojanalytics.xyz | |
| server { | |
| server_name andrewpoulton-rstudio.tools.dev.mojanalytics.xyz ; | |
| listen 80 proxy_protocol; | |
| listen [::]:80 proxy_protocol; | |
| set $proxy_upstream_name "-"; | |
| location / { | |
| set $proxy_upstream_name "default-unidler-80"; | |
| set $namespace "default"; | |
| set $ingress_name "unidler"; | |
| set $service_name "unidler"; | |
| port_in_redirect off; | |
| client_max_body_size "100m"; | |
| proxy_set_header Host $best_http_host; | |
| # Pass the extracted client certificate to the backend | |
| proxy_set_header ssl-client-cert ""; | |
| proxy_set_header ssl-client-verify ""; | |
| proxy_set_header ssl-client-dn ""; | |
| # Allow websocket connections | |
| proxy_set_header Upgrade $http_upgrade; | |
| proxy_set_header Connection $connection_upgrade; | |
| proxy_set_header X-Real-IP $the_real_ip; | |
| proxy_set_header X-Forwarded-For $the_real_ip; | |
| proxy_set_header X-Forwarded-Host $best_http_host; | |
| proxy_set_header X-Forwarded-Port $pass_port; | |
| proxy_set_header X-Forwarded-Proto $pass_access_scheme; | |
| proxy_set_header X-Original-URI $request_uri; | |
| proxy_set_header X-Scheme $pass_access_scheme; | |
| # Pass the original X-Forwarded-For | |
| proxy_set_header X-Original-Forwarded-For $http_x_forwarded_for; | |
| # mitigate HTTPoxy Vulnerability | |
| # https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/ | |
| proxy_set_header Proxy ""; | |
| # Custom headers to proxied server | |
| proxy_connect_timeout 5s; | |
| proxy_send_timeout 3600s; | |
| proxy_read_timeout 3600s; | |
| proxy_redirect off; | |
| proxy_buffering off; | |
| proxy_buffer_size "4k"; | |
| proxy_buffers 4 "4k"; | |
| proxy_request_buffering "on"; | |
| proxy_http_version 1.1; | |
| proxy_cookie_domain off; | |
| proxy_cookie_path off; | |
| # In case of errors try the next upstream server before returning an error | |
| proxy_next_upstream error timeout invalid_header http_502 http_503 http_504; | |
| proxy_pass http://default-unidler-80; | |
| } | |
| } | |
| ## end server andrewpoulton-rstudio.tools.dev.mojanalytics.xyz | |
| ## start server andy-test.apps.dev.mojanalytics.xyz | |
| server { | |
| server_name andy-test.apps.dev.mojanalytics.xyz ; | |
| listen 80 proxy_protocol; | |
| listen [::]:80 proxy_protocol; | |
| set $proxy_upstream_name "-"; | |
| location / { | |
| set $proxy_upstream_name "sticky-apps-prod-andy-test-webapp-80"; | |
| set $namespace "apps-prod"; | |
| set $ingress_name "andy-test-webapp"; | |
| set $service_name "andy-test-webapp"; | |
| port_in_redirect off; | |
| client_max_body_size "100m"; | |
| proxy_set_header Host $best_http_host; | |
| # Pass the extracted client certificate to the backend | |
| proxy_set_header ssl-client-cert ""; | |
| proxy_set_header ssl-client-verify ""; | |
| proxy_set_header ssl-client-dn ""; | |
| # Allow websocket connections | |
| proxy_set_header Upgrade $http_upgrade; | |
| proxy_set_header Connection $connection_upgrade; | |
| proxy_set_header X-Real-IP $the_real_ip; | |
| proxy_set_header X-Forwarded-For $the_real_ip; | |
| proxy_set_header X-Forwarded-Host $best_http_host; | |
| proxy_set_header X-Forwarded-Port $pass_port; | |
| proxy_set_header X-Forwarded-Proto $pass_access_scheme; | |
| proxy_set_header X-Original-URI $request_uri; | |
| proxy_set_header X-Scheme $pass_access_scheme; | |
| # Pass the original X-Forwarded-For | |
| proxy_set_header X-Original-Forwarded-For $http_x_forwarded_for; | |
| # mitigate HTTPoxy Vulnerability | |
| # https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/ | |
| proxy_set_header Proxy ""; | |
| # Custom headers to proxied server | |
| proxy_connect_timeout 5s; | |
| proxy_send_timeout 3600s; | |
| proxy_read_timeout 3600s; | |
| proxy_redirect off; | |
| proxy_buffering off; | |
| proxy_buffer_size "4k"; | |
| proxy_buffers 4 "4k"; | |
| proxy_request_buffering "on"; | |
| proxy_http_version 1.1; | |
| proxy_cookie_domain off; | |
| proxy_cookie_path off; | |
| # In case of errors try the next upstream server before returning an error | |
| proxy_next_upstream error timeout invalid_header http_502 http_503 http_504; | |
| proxy_pass http://sticky-apps-prod-andy-test-webapp-80; | |
| } | |
| } | |
| ## end server andy-test.apps.dev.mojanalytics.xyz | |
| ## start server andyhd-rstudio.tools.dev.mojanalytics.xyz | |
| server { | |
| server_name andyhd-rstudio.tools.dev.mojanalytics.xyz ; | |
| listen 80 proxy_protocol; | |
| listen [::]:80 proxy_protocol; | |
| set $proxy_upstream_name "-"; | |
| location / { | |
| set $proxy_upstream_name ""; | |
| set $namespace "user-andyhd"; | |
| set $ingress_name "andyhd-rstudio-rstudio"; | |
| set $service_name "andyhd-rstudio-rstudio"; | |
| port_in_redirect off; | |
| client_max_body_size "100m"; | |
| proxy_set_header Host $best_http_host; | |
| # Pass the extracted client certificate to the backend | |
| proxy_set_header ssl-client-cert ""; | |
| proxy_set_header ssl-client-verify ""; | |
| proxy_set_header ssl-client-dn ""; | |
| # Allow websocket connections | |
| proxy_set_header Upgrade $http_upgrade; | |
| proxy_set_header Connection $connection_upgrade; | |
| proxy_set_header X-Real-IP $the_real_ip; | |
| proxy_set_header X-Forwarded-For $the_real_ip; | |
| proxy_set_header X-Forwarded-Host $best_http_host; | |
| proxy_set_header X-Forwarded-Port $pass_port; | |
| proxy_set_header X-Forwarded-Proto $pass_access_scheme; | |
| proxy_set_header X-Original-URI $request_uri; | |
| proxy_set_header X-Scheme $pass_access_scheme; | |
| # Pass the original X-Forwarded-For | |
| proxy_set_header X-Original-Forwarded-For $http_x_forwarded_for; | |
| # mitigate HTTPoxy Vulnerability | |
| # https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/ | |
| proxy_set_header Proxy ""; | |
| # Custom headers to proxied server | |
| proxy_connect_timeout 5s; | |
| proxy_send_timeout 3600s; | |
| proxy_read_timeout 3600s; | |
| proxy_redirect off; | |
| proxy_buffering off; | |
| proxy_buffer_size "4k"; | |
| proxy_buffers 4 "4k"; | |
| proxy_request_buffering "on"; | |
| proxy_http_version 1.1; | |
| proxy_cookie_domain off; | |
| proxy_cookie_path off; | |
| # In case of errors try the next upstream server before returning an error | |
| proxy_next_upstream error timeout invalid_header http_502 http_503 http_504; | |
| # No endpoints available for the request | |
| return 503; | |
| } | |
| } | |
| ## end server andyhd-rstudio.tools.dev.mojanalytics.xyz | |
| ## start server axemonkey-rstudio.tools.dev.mojanalytics.xyz | |
| server { | |
| server_name axemonkey-rstudio.tools.dev.mojanalytics.xyz ; | |
| listen 80 proxy_protocol; | |
| listen [::]:80 proxy_protocol; | |
| set $proxy_upstream_name "-"; | |
| location / { | |
| set $proxy_upstream_name "default-unidler-80"; | |
| set $namespace "default"; | |
| set $ingress_name "unidler"; | |
| set $service_name "unidler"; | |
| port_in_redirect off; | |
| client_max_body_size "100m"; | |
| proxy_set_header Host $best_http_host; | |
| # Pass the extracted client certificate to the backend | |
| proxy_set_header ssl-client-cert ""; | |
| proxy_set_header ssl-client-verify ""; | |
| proxy_set_header ssl-client-dn ""; | |
| # Allow websocket connections | |
| proxy_set_header Upgrade $http_upgrade; | |
| proxy_set_header Connection $connection_upgrade; | |
| proxy_set_header X-Real-IP $the_real_ip; | |
| proxy_set_header X-Forwarded-For $the_real_ip; | |
| proxy_set_header X-Forwarded-Host $best_http_host; | |
| proxy_set_header X-Forwarded-Port $pass_port; | |
| proxy_set_header X-Forwarded-Proto $pass_access_scheme; | |
| proxy_set_header X-Original-URI $request_uri; | |
| proxy_set_header X-Scheme $pass_access_scheme; | |
| # Pass the original X-Forwarded-For | |
| proxy_set_header X-Original-Forwarded-For $http_x_forwarded_for; | |
| # mitigate HTTPoxy Vulnerability | |
| # https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/ | |
| proxy_set_header Proxy ""; | |
| # Custom headers to proxied server | |
| proxy_connect_timeout 5s; | |
| proxy_send_timeout 3600s; | |
| proxy_read_timeout 3600s; | |
| proxy_redirect off; | |
| proxy_buffering off; | |
| proxy_buffer_size "4k"; | |
| proxy_buffers 4 "4k"; | |
| proxy_request_buffering "on"; | |
| proxy_http_version 1.1; | |
| proxy_cookie_domain off; | |
| proxy_cookie_path off; | |
| # In case of errors try the next upstream server before returning an error | |
| proxy_next_upstream error timeout invalid_header http_502 http_503 http_504; | |
| proxy_pass http://default-unidler-80; | |
| } | |
| } | |
| ## end server axemonkey-rstudio.tools.dev.mojanalytics.xyz | |
| ## start server bfortescue-rstudio.tools.dev.mojanalytics.xyz | |
| server { | |
| server_name bfortescue-rstudio.tools.dev.mojanalytics.xyz ; | |
| listen 80 proxy_protocol; | |
| listen [::]:80 proxy_protocol; | |
| set $proxy_upstream_name "-"; | |
| location / { | |
| set $proxy_upstream_name "default-unidler-80"; | |
| set $namespace "default"; | |
| set $ingress_name "unidler"; | |
| set $service_name "unidler"; | |
| port_in_redirect off; | |
| client_max_body_size "100m"; | |
| proxy_set_header Host $best_http_host; | |
| # Pass the extracted client certificate to the backend | |
| proxy_set_header ssl-client-cert ""; | |
| proxy_set_header ssl-client-verify ""; | |
| proxy_set_header ssl-client-dn ""; | |
| # Allow websocket connections | |
| proxy_set_header Upgrade $http_upgrade; | |
| proxy_set_header Connection $connection_upgrade; | |
| proxy_set_header X-Real-IP $the_real_ip; | |
| proxy_set_header X-Forwarded-For $the_real_ip; | |
| proxy_set_header X-Forwarded-Host $best_http_host; | |
| proxy_set_header X-Forwarded-Port $pass_port; | |
| proxy_set_header X-Forwarded-Proto $pass_access_scheme; | |
| proxy_set_header X-Original-URI $request_uri; | |
| proxy_set_header X-Scheme $pass_access_scheme; | |
| # Pass the original X-Forwarded-For | |
| proxy_set_header X-Original-Forwarded-For $http_x_forwarded_for; | |
| # mitigate HTTPoxy Vulnerability | |
| # https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/ | |
| proxy_set_header Proxy ""; | |
| # Custom headers to proxied server | |
| proxy_connect_timeout 5s; | |
| proxy_send_timeout 3600s; | |
| proxy_read_timeout 3600s; | |
| proxy_redirect off; | |
| proxy_buffering off; | |
| proxy_buffer_size "4k"; | |
| proxy_buffers 4 "4k"; | |
| proxy_request_buffering "on"; | |
| proxy_http_version 1.1; | |
| proxy_cookie_domain off; | |
| proxy_cookie_path off; | |
| # In case of errors try the next upstream server before returning an error | |
| proxy_next_upstream error timeout invalid_header http_502 http_503 http_504; | |
| proxy_pass http://default-unidler-80; | |
| } | |
| } | |
| ## end server bfortescue-rstudio.tools.dev.mojanalytics.xyz | |
| ## start server clank.apps.dev.mojanalytics.xyz | |
| server { | |
| server_name clank.apps.dev.mojanalytics.xyz ; | |
| listen 80 proxy_protocol; | |
| listen [::]:80 proxy_protocol; | |
| set $proxy_upstream_name "-"; | |
| location / { | |
| set $proxy_upstream_name "default-clank-hubot-80"; | |
| set $namespace "default"; | |
| set $ingress_name "clank-hubot"; | |
| set $service_name "clank-hubot"; | |
| port_in_redirect off; | |
| client_max_body_size "100m"; | |
| proxy_set_header Host $best_http_host; | |
| # Pass the extracted client certificate to the backend | |
| proxy_set_header ssl-client-cert ""; | |
| proxy_set_header ssl-client-verify ""; | |
| proxy_set_header ssl-client-dn ""; | |
| # Allow websocket connections | |
| proxy_set_header Upgrade $http_upgrade; | |
| proxy_set_header Connection $connection_upgrade; | |
| proxy_set_header X-Real-IP $the_real_ip; | |
| proxy_set_header X-Forwarded-For $the_real_ip; | |
| proxy_set_header X-Forwarded-Host $best_http_host; | |
| proxy_set_header X-Forwarded-Port $pass_port; | |
| proxy_set_header X-Forwarded-Proto $pass_access_scheme; | |
| proxy_set_header X-Original-URI $request_uri; | |
| proxy_set_header X-Scheme $pass_access_scheme; | |
| # Pass the original X-Forwarded-For | |
| proxy_set_header X-Original-Forwarded-For $http_x_forwarded_for; | |
| # mitigate HTTPoxy Vulnerability | |
| # https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/ | |
| proxy_set_header Proxy ""; | |
| # Custom headers to proxied server | |
| proxy_connect_timeout 5s; | |
| proxy_send_timeout 3600s; | |
| proxy_read_timeout 3600s; | |
| proxy_redirect off; | |
| proxy_buffering off; | |
| proxy_buffer_size "4k"; | |
| proxy_buffers 4 "4k"; | |
| proxy_request_buffering "on"; | |
| proxy_http_version 1.1; | |
| proxy_cookie_domain off; | |
| proxy_cookie_path off; | |
| # In case of errors try the next upstream server before returning an error | |
| proxy_next_upstream error timeout invalid_header http_502 http_503 http_504; | |
| proxy_pass http://default-clank-hubot-80; | |
| } | |
| } | |
| ## end server clank.apps.dev.mojanalytics.xyz | |
| ## start server concourse.services.dev.mojanalytics.xyz | |
| server { | |
| server_name concourse.services.dev.mojanalytics.xyz ; | |
| listen 80 proxy_protocol; | |
| listen [::]:80 proxy_protocol; | |
| set $proxy_upstream_name "-"; | |
| location / { | |
| set $proxy_upstream_name "default-concourse-web-8080"; | |
| set $namespace "default"; | |
| set $ingress_name "concourse-web"; | |
| set $service_name ""; | |
| port_in_redirect off; | |
| client_max_body_size "100m"; | |
| proxy_set_header Host $best_http_host; | |
| # Pass the extracted client certificate to the backend | |
| proxy_set_header ssl-client-cert ""; | |
| proxy_set_header ssl-client-verify ""; | |
| proxy_set_header ssl-client-dn ""; | |
| # Allow websocket connections | |
| proxy_set_header Upgrade $http_upgrade; | |
| proxy_set_header Connection $connection_upgrade; | |
| proxy_set_header X-Real-IP $the_real_ip; | |
| proxy_set_header X-Forwarded-For $the_real_ip; | |
| proxy_set_header X-Forwarded-Host $best_http_host; | |
| proxy_set_header X-Forwarded-Port $pass_port; | |
| proxy_set_header X-Forwarded-Proto $pass_access_scheme; | |
| proxy_set_header X-Original-URI $request_uri; | |
| proxy_set_header X-Scheme $pass_access_scheme; | |
| # Pass the original X-Forwarded-For | |
| proxy_set_header X-Original-Forwarded-For $http_x_forwarded_for; | |
| # mitigate HTTPoxy Vulnerability | |
| # https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/ | |
| proxy_set_header Proxy ""; | |
| # Custom headers to proxied server | |
| proxy_connect_timeout 5s; | |
| proxy_send_timeout 3600s; | |
| proxy_read_timeout 3600s; | |
| proxy_redirect off; | |
| proxy_buffering off; | |
| proxy_buffer_size "4k"; | |
| proxy_buffers 4 "4k"; | |
| proxy_request_buffering "on"; | |
| proxy_http_version 1.1; | |
| proxy_cookie_domain off; | |
| proxy_cookie_path off; | |
| # In case of errors try the next upstream server before returning an error | |
| proxy_next_upstream error timeout invalid_header http_502 http_503 http_504; | |
| proxy_pass http://default-concourse-web-8080; | |
| } | |
| } | |
| ## end server concourse.services.dev.mojanalytics.xyz | |
| ## start server costmodeldeploytest.apps.dev.mojanalytics.xyz | |
| server { | |
| server_name costmodeldeploytest.apps.dev.mojanalytics.xyz ; | |
| listen 80 proxy_protocol; | |
| listen [::]:80 proxy_protocol; | |
| set $proxy_upstream_name "-"; | |
| location / { | |
| set $proxy_upstream_name ""; | |
| set $namespace "apps-prod"; | |
| set $ingress_name "costmodeldeploytest-shiny-app"; | |
| set $service_name "costmodeldeploytest-shiny-app"; | |
| port_in_redirect off; | |
| client_max_body_size "100m"; | |
| proxy_set_header Host $best_http_host; | |
| # Pass the extracted client certificate to the backend | |
| proxy_set_header ssl-client-cert ""; | |
| proxy_set_header ssl-client-verify ""; | |
| proxy_set_header ssl-client-dn ""; | |
| # Allow websocket connections | |
| proxy_set_header Upgrade $http_upgrade; | |
| proxy_set_header Connection $connection_upgrade; | |
| proxy_set_header X-Real-IP $the_real_ip; | |
| proxy_set_header X-Forwarded-For $the_real_ip; | |
| proxy_set_header X-Forwarded-Host $best_http_host; | |
| proxy_set_header X-Forwarded-Port $pass_port; | |
| proxy_set_header X-Forwarded-Proto $pass_access_scheme; | |
| proxy_set_header X-Original-URI $request_uri; | |
| proxy_set_header X-Scheme $pass_access_scheme; | |
| # Pass the original X-Forwarded-For | |
| proxy_set_header X-Original-Forwarded-For $http_x_forwarded_for; | |
| # mitigate HTTPoxy Vulnerability | |
| # https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/ | |
| proxy_set_header Proxy ""; | |
| # Custom headers to proxied server | |
| proxy_connect_timeout 5s; | |
| proxy_send_timeout 3600s; | |
| proxy_read_timeout 3600s; | |
| proxy_redirect off; | |
| proxy_buffering off; | |
| proxy_buffer_size "4k"; | |
| proxy_buffers 4 "4k"; | |
| proxy_request_buffering "on"; | |
| proxy_http_version 1.1; | |
| proxy_cookie_domain off; | |
| proxy_cookie_path off; | |
| # In case of errors try the next upstream server before returning an error | |
| proxy_next_upstream error timeout invalid_header http_502 http_503 http_504; | |
| # No endpoints available for the request | |
| return 503; | |
| } | |
| } | |
| ## end server costmodeldeploytest.apps.dev.mojanalytics.xyz | |
| ## start server court-travel-time-tool.apps.dev.mojanalytics.xyz | |
| server { | |
| server_name court-travel-time-tool.apps.dev.mojanalytics.xyz ; | |
| listen 80 proxy_protocol; | |
| listen [::]:80 proxy_protocol; | |
| set $proxy_upstream_name "-"; | |
| location / { | |
| set $proxy_upstream_name ""; | |
| set $namespace "apps-prod"; | |
| set $ingress_name "court-travel-time-tool-webapp"; | |
| set $service_name "court-travel-time-tool-webapp"; | |
| port_in_redirect off; | |
| client_max_body_size "100m"; | |
| proxy_set_header Host $best_http_host; | |
| # Pass the extracted client certificate to the backend | |
| proxy_set_header ssl-client-cert ""; | |
| proxy_set_header ssl-client-verify ""; | |
| proxy_set_header ssl-client-dn ""; | |
| # Allow websocket connections | |
| proxy_set_header Upgrade $http_upgrade; | |
| proxy_set_header Connection $connection_upgrade; | |
| proxy_set_header X-Real-IP $the_real_ip; | |
| proxy_set_header X-Forwarded-For $the_real_ip; | |
| proxy_set_header X-Forwarded-Host $best_http_host; | |
| proxy_set_header X-Forwarded-Port $pass_port; | |
| proxy_set_header X-Forwarded-Proto $pass_access_scheme; | |
| proxy_set_header X-Original-URI $request_uri; | |
| proxy_set_header X-Scheme $pass_access_scheme; | |
| # Pass the original X-Forwarded-For | |
| proxy_set_header X-Original-Forwarded-For $http_x_forwarded_for; | |
| # mitigate HTTPoxy Vulnerability | |
| # https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/ | |
| proxy_set_header Proxy ""; | |
| # Custom headers to proxied server | |
| proxy_connect_timeout 5s; | |
| proxy_send_timeout 3600s; | |
| proxy_read_timeout 3600s; | |
| proxy_redirect off; | |
| proxy_buffering off; | |
| proxy_buffer_size "4k"; | |
| proxy_buffers 4 "4k"; | |
| proxy_request_buffering "on"; | |
| proxy_http_version 1.1; | |
| proxy_cookie_domain off; | |
| proxy_cookie_path off; | |
| # In case of errors try the next upstream server before returning an error | |
| proxy_next_upstream error timeout invalid_header http_502 http_503 http_504; | |
| # No endpoints available for the request | |
| return 503; | |
| } | |
| } | |
| ## end server court-travel-time-tool.apps.dev.mojanalytics.xyz | |
| ## start server cpanel-master.services.dev.mojanalytics.xyz | |
| server { | |
| server_name cpanel-master.services.dev.mojanalytics.xyz ; | |
| listen 80 proxy_protocol; | |
| listen [::]:80 proxy_protocol; | |
| set $proxy_upstream_name "-"; | |
| location / { | |
| set $proxy_upstream_name "default-cpfrontend-master-cpfron-80"; | |
| set $namespace "default"; | |
| set $ingress_name "cpfrontend-master-cpfron"; | |
| set $service_name "cpfrontend-master-cpfron"; | |
| port_in_redirect off; | |
| client_max_body_size "100m"; | |
| proxy_set_header Host $best_http_host; | |
| # Pass the extracted client certificate to the backend | |
| proxy_set_header ssl-client-cert ""; | |
| proxy_set_header ssl-client-verify ""; | |
| proxy_set_header ssl-client-dn ""; | |
| # Allow websocket connections | |
| proxy_set_header Upgrade $http_upgrade; | |
| proxy_set_header Connection $connection_upgrade; | |
| proxy_set_header X-Real-IP $the_real_ip; | |
| proxy_set_header X-Forwarded-For $the_real_ip; | |
| proxy_set_header X-Forwarded-Host $best_http_host; | |
| proxy_set_header X-Forwarded-Port $pass_port; | |
| proxy_set_header X-Forwarded-Proto $pass_access_scheme; | |
| proxy_set_header X-Original-URI $request_uri; | |
| proxy_set_header X-Scheme $pass_access_scheme; | |
| # Pass the original X-Forwarded-For | |
| proxy_set_header X-Original-Forwarded-For $http_x_forwarded_for; | |
| # mitigate HTTPoxy Vulnerability | |
| # https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/ | |
| proxy_set_header Proxy ""; | |
| # Custom headers to proxied server | |
| proxy_connect_timeout 5s; | |
| proxy_send_timeout 3600s; | |
| proxy_read_timeout 3600s; | |
| proxy_redirect off; | |
| proxy_buffering off; | |
| proxy_buffer_size "4k"; | |
| proxy_buffers 4 "4k"; | |
| proxy_request_buffering "on"; | |
| proxy_http_version 1.1; | |
| proxy_cookie_domain off; | |
| proxy_cookie_path off; | |
| # In case of errors try the next upstream server before returning an error | |
| proxy_next_upstream error timeout invalid_header http_502 http_503 http_504; | |
| proxy_pass http://default-cpfrontend-master-cpfron-80; | |
| } | |
| } | |
| ## end server cpanel-master.services.dev.mojanalytics.xyz | |
| ## start server cpanelapi-master.services.dev.mojanalytics.xyz | |
| server { | |
| server_name cpanelapi-master.services.dev.mojanalytics.xyz ; | |
| listen 80 proxy_protocol; | |
| listen [::]:80 proxy_protocol; | |
| set $proxy_upstream_name "-"; | |
| location / { | |
| set $proxy_upstream_name "default-cpanel-master-cpanel-80"; | |
| set $namespace "default"; | |
| set $ingress_name "cpanel-master-cpanel"; | |
| set $service_name "cpanel-master-cpanel"; | |
| port_in_redirect off; | |
| client_max_body_size "100m"; | |
| proxy_set_header Host $best_http_host; | |
| # Pass the extracted client certificate to the backend | |
| proxy_set_header ssl-client-cert ""; | |
| proxy_set_header ssl-client-verify ""; | |
| proxy_set_header ssl-client-dn ""; | |
| # Allow websocket connections | |
| proxy_set_header Upgrade $http_upgrade; | |
| proxy_set_header Connection $connection_upgrade; | |
| proxy_set_header X-Real-IP $the_real_ip; | |
| proxy_set_header X-Forwarded-For $the_real_ip; | |
| proxy_set_header X-Forwarded-Host $best_http_host; | |
| proxy_set_header X-Forwarded-Port $pass_port; | |
| proxy_set_header X-Forwarded-Proto $pass_access_scheme; | |
| proxy_set_header X-Original-URI $request_uri; | |
| proxy_set_header X-Scheme $pass_access_scheme; | |
| # Pass the original X-Forwarded-For | |
| proxy_set_header X-Original-Forwarded-For $http_x_forwarded_for; | |
| # mitigate HTTPoxy Vulnerability | |
| # https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/ | |
| proxy_set_header Proxy ""; | |
| # Custom headers to proxied server | |
| proxy_connect_timeout 5s; | |
| proxy_send_timeout 3600s; | |
| proxy_read_timeout 3600s; | |
| proxy_redirect off; | |
| proxy_buffering off; | |
| proxy_buffer_size "4k"; | |
| proxy_buffers 4 "4k"; | |
| proxy_request_buffering "on"; | |
| proxy_http_version 1.1; | |
| proxy_cookie_domain off; | |
| proxy_cookie_path off; | |
| # In case of errors try the next upstream server before returning an error | |
| proxy_next_upstream error timeout invalid_header http_502 http_503 http_504; | |
| proxy_pass http://default-cpanel-master-cpanel-80; | |
| } | |
| } | |
| ## end server cpanelapi-master.services.dev.mojanalytics.xyz | |
| ## start server danielhills-rstudio.tools.dev.mojanalytics.xyz | |
| server { | |
| server_name danielhills-rstudio.tools.dev.mojanalytics.xyz ; | |
| listen 80 proxy_protocol; | |
| listen [::]:80 proxy_protocol; | |
| set $proxy_upstream_name "-"; | |
| location / { | |
| set $proxy_upstream_name "default-unidler-80"; | |
| set $namespace "default"; | |
| set $ingress_name "unidler"; | |
| set $service_name "unidler"; | |
| port_in_redirect off; | |
| client_max_body_size "100m"; | |
| proxy_set_header Host $best_http_host; | |
| # Pass the extracted client certificate to the backend | |
| proxy_set_header ssl-client-cert ""; | |
| proxy_set_header ssl-client-verify ""; | |
| proxy_set_header ssl-client-dn ""; | |
| # Allow websocket connections | |
| proxy_set_header Upgrade $http_upgrade; | |
| proxy_set_header Connection $connection_upgrade; | |
| proxy_set_header X-Real-IP $the_real_ip; | |
| proxy_set_header X-Forwarded-For $the_real_ip; | |
| proxy_set_header X-Forwarded-Host $best_http_host; | |
| proxy_set_header X-Forwarded-Port $pass_port; | |
| proxy_set_header X-Forwarded-Proto $pass_access_scheme; | |
| proxy_set_header X-Original-URI $request_uri; | |
| proxy_set_header X-Scheme $pass_access_scheme; | |
| # Pass the original X-Forwarded-For | |
| proxy_set_header X-Original-Forwarded-For $http_x_forwarded_for; | |
| # mitigate HTTPoxy Vulnerability | |
| # https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/ | |
| proxy_set_header Proxy ""; | |
| # Custom headers to proxied server | |
| proxy_connect_timeout 5s; | |
| proxy_send_timeout 3600s; | |
| proxy_read_timeout 3600s; | |
| proxy_redirect off; | |
| proxy_buffering off; | |
| proxy_buffer_size "4k"; | |
| proxy_buffers 4 "4k"; | |
| proxy_request_buffering "on"; | |
| proxy_http_version 1.1; | |
| proxy_cookie_domain off; | |
| proxy_cookie_path off; | |
| # In case of errors try the next upstream server before returning an error | |
| proxy_next_upstream error timeout invalid_header http_502 http_503 http_504; | |
| proxy_pass http://default-unidler-80; | |
| } | |
| } | |
| ## end server danielhills-rstudio.tools.dev.mojanalytics.xyz | |
| ## start server dashboard.services.dev.mojanalytics.xyz | |
| server { | |
| server_name dashboard.services.dev.mojanalytics.xyz ; | |
| listen 80 proxy_protocol; | |
| listen [::]:80 proxy_protocol; | |
| set $proxy_upstream_name "-"; | |
| location / { | |
| set $proxy_upstream_name "kube-system-kubernetes-dashboard-443"; | |
| set $namespace "kube-system"; | |
| set $ingress_name "kubernetes-dashboard"; | |
| set $service_name "kubernetes-dashboard"; | |
| port_in_redirect off; | |
| client_max_body_size "100m"; | |
| proxy_set_header Host $best_http_host; | |
| # Pass the extracted client certificate to the backend | |
| proxy_set_header ssl-client-cert ""; | |
| proxy_set_header ssl-client-verify ""; | |
| proxy_set_header ssl-client-dn ""; | |
| # Allow websocket connections | |
| proxy_set_header Upgrade $http_upgrade; | |
| proxy_set_header Connection $connection_upgrade; | |
| proxy_set_header X-Real-IP $the_real_ip; | |
| proxy_set_header X-Forwarded-For $the_real_ip; | |
| proxy_set_header X-Forwarded-Host $best_http_host; | |
| proxy_set_header X-Forwarded-Port $pass_port; | |
| proxy_set_header X-Forwarded-Proto $pass_access_scheme; | |
| proxy_set_header X-Original-URI $request_uri; | |
| proxy_set_header X-Scheme $pass_access_scheme; | |
| # Pass the original X-Forwarded-For | |
| proxy_set_header X-Original-Forwarded-For $http_x_forwarded_for; | |
| # mitigate HTTPoxy Vulnerability | |
| # https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/ | |
| proxy_set_header Proxy ""; | |
| # Custom headers to proxied server | |
| proxy_connect_timeout 5s; | |
| proxy_send_timeout 3600s; | |
| proxy_read_timeout 3600s; | |
| proxy_redirect off; | |
| proxy_buffering off; | |
| proxy_buffer_size "4k"; | |
| proxy_buffers 4 "4k"; | |
| proxy_request_buffering "on"; | |
| proxy_http_version 1.1; | |
| proxy_cookie_domain off; | |
| proxy_cookie_path off; | |
| # In case of errors try the next upstream server before returning an error | |
| proxy_next_upstream error timeout invalid_header http_502 http_503 http_504; | |
| proxy_pass https://kube-system-kubernetes-dashboard-443; | |
| } | |
| } | |
| ## end server dashboard.services.dev.mojanalytics.xyz | |
| ## start server djsd123-jupyter-lab.tools.dev.mojanalytics.xyz | |
| server { | |
| server_name djsd123-jupyter-lab.tools.dev.mojanalytics.xyz ; | |
| listen 80 proxy_protocol; | |
| listen [::]:80 proxy_protocol; | |
| set $proxy_upstream_name "-"; | |
| location / { | |
| set $proxy_upstream_name "user-djsd123-jupyter-lab-djsd123-jupy-80"; | |
| set $namespace "user-djsd123"; | |
| set $ingress_name "jupyter-lab-djsd123-jupy"; | |
| set $service_name "jupyter-lab-djsd123-jupy"; | |
| port_in_redirect off; | |
| client_max_body_size "100m"; | |
| proxy_set_header Host $best_http_host; | |
| # Pass the extracted client certificate to the backend | |
| proxy_set_header ssl-client-cert ""; | |
| proxy_set_header ssl-client-verify ""; | |
| proxy_set_header ssl-client-dn ""; | |
| # Allow websocket connections | |
| proxy_set_header Upgrade $http_upgrade; | |
| proxy_set_header Connection $connection_upgrade; | |
| proxy_set_header X-Real-IP $the_real_ip; | |
| proxy_set_header X-Forwarded-For $the_real_ip; | |
| proxy_set_header X-Forwarded-Host $best_http_host; | |
| proxy_set_header X-Forwarded-Port $pass_port; | |
| proxy_set_header X-Forwarded-Proto $pass_access_scheme; | |
| proxy_set_header X-Original-URI $request_uri; | |
| proxy_set_header X-Scheme $pass_access_scheme; | |
| # Pass the original X-Forwarded-For | |
| proxy_set_header X-Original-Forwarded-For $http_x_forwarded_for; | |
| # mitigate HTTPoxy Vulnerability | |
| # https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/ | |
| proxy_set_header Proxy ""; | |
| # Custom headers to proxied server | |
| proxy_connect_timeout 5s; | |
| proxy_send_timeout 3600s; | |
| proxy_read_timeout 3600s; | |
| proxy_redirect off; | |
| proxy_buffering off; | |
| proxy_buffer_size "4k"; | |
| proxy_buffers 4 "4k"; | |
| proxy_request_buffering "on"; | |
| proxy_http_version 1.1; | |
| proxy_cookie_domain off; | |
| proxy_cookie_path off; | |
| # In case of errors try the next upstream server before returning an error | |
| proxy_next_upstream error timeout invalid_header http_502 http_503 http_504; | |
| proxy_pass http://user-djsd123-jupyter-lab-djsd123-jupy-80; | |
| } | |
| } | |
| ## end server djsd123-jupyter-lab.tools.dev.mojanalytics.xyz | |
| ## start server dobbythefreeelf-rstudio.tools.dev.mojanalytics.xyz | |
| server { | |
| server_name dobbythefreeelf-rstudio.tools.dev.mojanalytics.xyz ; | |
| listen 80 proxy_protocol; | |
| listen [::]:80 proxy_protocol; | |
| set $proxy_upstream_name "-"; | |
| location / { | |
| set $proxy_upstream_name "default-unidler-80"; | |
| set $namespace "default"; | |
| set $ingress_name "unidler"; | |
| set $service_name "unidler"; | |
| port_in_redirect off; | |
| client_max_body_size "100m"; | |
| proxy_set_header Host $best_http_host; | |
| # Pass the extracted client certificate to the backend | |
| proxy_set_header ssl-client-cert ""; | |
| proxy_set_header ssl-client-verify ""; | |
| proxy_set_header ssl-client-dn ""; | |
| # Allow websocket connections | |
| proxy_set_header Upgrade $http_upgrade; | |
| proxy_set_header Connection $connection_upgrade; | |
| proxy_set_header X-Real-IP $the_real_ip; | |
| proxy_set_header X-Forwarded-For $the_real_ip; | |
| proxy_set_header X-Forwarded-Host $best_http_host; | |
| proxy_set_header X-Forwarded-Port $pass_port; | |
| proxy_set_header X-Forwarded-Proto $pass_access_scheme; | |
| proxy_set_header X-Original-URI $request_uri; | |
| proxy_set_header X-Scheme $pass_access_scheme; | |
| # Pass the original X-Forwarded-For | |
| proxy_set_header X-Original-Forwarded-For $http_x_forwarded_for; | |
| # mitigate HTTPoxy Vulnerability | |
| # https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/ | |
| proxy_set_header Proxy ""; | |
| # Custom headers to proxied server | |
| proxy_connect_timeout 5s; | |
| proxy_send_timeout 3600s; | |
| proxy_read_timeout 3600s; | |
| proxy_redirect off; | |
| proxy_buffering off; | |
| proxy_buffer_size "4k"; | |
| proxy_buffers 4 "4k"; | |
| proxy_request_buffering "on"; | |
| proxy_http_version 1.1; | |
| proxy_cookie_domain off; | |
| proxy_cookie_path off; | |
| # In case of errors try the next upstream server before returning an error | |
| proxy_next_upstream error timeout invalid_header http_502 http_503 http_504; | |
| proxy_pass http://default-unidler-80; | |
| } | |
| } | |
| ## end server dobbythefreeelf-rstudio.tools.dev.mojanalytics.xyz | |
| ## start server drdanjones-rstudio.tools.dev.mojanalytics.xyz | |
| server { | |
| server_name drdanjones-rstudio.tools.dev.mojanalytics.xyz ; | |
| listen 80 proxy_protocol; | |
| listen [::]:80 proxy_protocol; | |
| set $proxy_upstream_name "-"; | |
| location / { | |
| set $proxy_upstream_name "default-unidler-80"; | |
| set $namespace "default"; | |
| set $ingress_name "unidler"; | |
| set $service_name "unidler"; | |
| port_in_redirect off; | |
| client_max_body_size "100m"; | |
| proxy_set_header Host $best_http_host; | |
| # Pass the extracted client certificate to the backend | |
| proxy_set_header ssl-client-cert ""; | |
| proxy_set_header ssl-client-verify ""; | |
| proxy_set_header ssl-client-dn ""; | |
| # Allow websocket connections | |
| proxy_set_header Upgrade $http_upgrade; | |
| proxy_set_header Connection $connection_upgrade; | |
| proxy_set_header X-Real-IP $the_real_ip; | |
| proxy_set_header X-Forwarded-For $the_real_ip; | |
| proxy_set_header X-Forwarded-Host $best_http_host; | |
| proxy_set_header X-Forwarded-Port $pass_port; | |
| proxy_set_header X-Forwarded-Proto $pass_access_scheme; | |
| proxy_set_header X-Original-URI $request_uri; | |
| proxy_set_header X-Scheme $pass_access_scheme; | |
| # Pass the original X-Forwarded-For | |
| proxy_set_header X-Original-Forwarded-For $http_x_forwarded_for; | |
| # mitigate HTTPoxy Vulnerability | |
| # https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/ | |
| proxy_set_header Proxy ""; | |
| # Custom headers to proxied server | |
| proxy_connect_timeout 5s; | |
| proxy_send_timeout 3600s; | |
| proxy_read_timeout 3600s; | |
| proxy_redirect off; | |
| proxy_buffering off; | |
| proxy_buffer_size "4k"; | |
| proxy_buffers 4 "4k"; | |
| proxy_request_buffering "on"; | |
| proxy_http_version 1.1; | |
| proxy_cookie_domain off; | |
| proxy_cookie_path off; | |
| # In case of errors try the next upstream server before returning an error | |
| proxy_next_upstream error timeout invalid_header http_502 http_503 http_504; | |
| proxy_pass http://default-unidler-80; | |
| } | |
| } | |
| ## end server drdanjones-rstudio.tools.dev.mojanalytics.xyz | |
| ## start server gkelly900-rstudio.tools.dev.mojanalytics.xyz | |
| server { | |
| server_name gkelly900-rstudio.tools.dev.mojanalytics.xyz ; | |
| listen 80 proxy_protocol; | |
| listen [::]:80 proxy_protocol; | |
| set $proxy_upstream_name "-"; | |
| location / { | |
| set $proxy_upstream_name "default-unidler-80"; | |
| set $namespace "default"; | |
| set $ingress_name "unidler"; | |
| set $service_name "unidler"; | |
| port_in_redirect off; | |
| client_max_body_size "100m"; | |
| proxy_set_header Host $best_http_host; | |
| # Pass the extracted client certificate to the backend | |
| proxy_set_header ssl-client-cert ""; | |
| proxy_set_header ssl-client-verify ""; | |
| proxy_set_header ssl-client-dn ""; | |
| # Allow websocket connections | |
| proxy_set_header Upgrade $http_upgrade; | |
| proxy_set_header Connection $connection_upgrade; | |
| proxy_set_header X-Real-IP $the_real_ip; | |
| proxy_set_header X-Forwarded-For $the_real_ip; | |
| proxy_set_header X-Forwarded-Host $best_http_host; | |
| proxy_set_header X-Forwarded-Port $pass_port; | |
| proxy_set_header X-Forwarded-Proto $pass_access_scheme; | |
| proxy_set_header X-Original-URI $request_uri; | |
| proxy_set_header X-Scheme $pass_access_scheme; | |
| # Pass the original X-Forwarded-For | |
| proxy_set_header X-Original-Forwarded-For $http_x_forwarded_for; | |
| # mitigate HTTPoxy Vulnerability | |
| # https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/ | |
| proxy_set_header Proxy ""; | |
| # Custom headers to proxied server | |
| proxy_connect_timeout 5s; | |
| proxy_send_timeout 3600s; | |
| proxy_read_timeout 3600s; | |
| proxy_redirect off; | |
| proxy_buffering off; | |
| proxy_buffer_size "4k"; | |
| proxy_buffers 4 "4k"; | |
| proxy_request_buffering "on"; | |
| proxy_http_version 1.1; | |
| proxy_cookie_domain off; | |
| proxy_cookie_path off; | |
| # In case of errors try the next upstream server before returning an error | |
| proxy_next_upstream error timeout invalid_header http_502 http_503 http_504; | |
| proxy_pass http://default-unidler-80; | |
| } | |
| } | |
| ## end server gkelly900-rstudio.tools.dev.mojanalytics.xyz | |
| ## start server grafana.services.dev.mojanalytics.xyz | |
| server { | |
| server_name grafana.services.dev.mojanalytics.xyz ; | |
| listen 80 proxy_protocol; | |
| listen [::]:80 proxy_protocol; | |
| set $proxy_upstream_name "-"; | |
| location / { | |
| set $proxy_upstream_name "kube-system-cluster-monitoring-grafana-80"; | |
| set $namespace "kube-system"; | |
| set $ingress_name "cluster-monitoring-grafana"; | |
| set $service_name ""; | |
| port_in_redirect off; | |
| client_max_body_size "100m"; | |
| proxy_set_header Host $best_http_host; | |
| # Pass the extracted client certificate to the backend | |
| proxy_set_header ssl-client-cert ""; | |
| proxy_set_header ssl-client-verify ""; | |
| proxy_set_header ssl-client-dn ""; | |
| # Allow websocket connections | |
| proxy_set_header Upgrade $http_upgrade; | |
| proxy_set_header Connection $connection_upgrade; | |
| proxy_set_header X-Real-IP $the_real_ip; | |
| proxy_set_header X-Forwarded-For $the_real_ip; | |
| proxy_set_header X-Forwarded-Host $best_http_host; | |
| proxy_set_header X-Forwarded-Port $pass_port; | |
| proxy_set_header X-Forwarded-Proto $pass_access_scheme; | |
| proxy_set_header X-Original-URI $request_uri; | |
| proxy_set_header X-Scheme $pass_access_scheme; | |
| # Pass the original X-Forwarded-For | |
| proxy_set_header X-Original-Forwarded-For $http_x_forwarded_for; | |
| # mitigate HTTPoxy Vulnerability | |
| # https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/ | |
| proxy_set_header Proxy ""; | |
| # Custom headers to proxied server | |
| proxy_connect_timeout 5s; | |
| proxy_send_timeout 3600s; | |
| proxy_read_timeout 3600s; | |
| proxy_redirect off; | |
| proxy_buffering off; | |
| proxy_buffer_size "4k"; | |
| proxy_buffers 4 "4k"; | |
| proxy_request_buffering "on"; | |
| proxy_http_version 1.1; | |
| proxy_cookie_domain off; | |
| proxy_cookie_path off; | |
| # In case of errors try the next upstream server before returning an error | |
| proxy_next_upstream error timeout invalid_header http_502 http_503 http_504; | |
| proxy_pass http://kube-system-cluster-monitoring-grafana-80; | |
| } | |
| } | |
| ## end server grafana.services.dev.mojanalytics.xyz | |
| ## start server haydensansum-rstudio.tools.dev.mojanalytics.xyz | |
| server { | |
| server_name haydensansum-rstudio.tools.dev.mojanalytics.xyz ; | |
| listen 80 proxy_protocol; | |
| listen [::]:80 proxy_protocol; | |
| set $proxy_upstream_name "-"; | |
| location / { | |
| set $proxy_upstream_name "default-unidler-80"; | |
| set $namespace "default"; | |
| set $ingress_name "unidler"; | |
| set $service_name "unidler"; | |
| port_in_redirect off; | |
| client_max_body_size "100m"; | |
| proxy_set_header Host $best_http_host; | |
| # Pass the extracted client certificate to the backend | |
| proxy_set_header ssl-client-cert ""; | |
| proxy_set_header ssl-client-verify ""; | |
| proxy_set_header ssl-client-dn ""; | |
| # Allow websocket connections | |
| proxy_set_header Upgrade $http_upgrade; | |
| proxy_set_header Connection $connection_upgrade; | |
| proxy_set_header X-Real-IP $the_real_ip; | |
| proxy_set_header X-Forwarded-For $the_real_ip; | |
| proxy_set_header X-Forwarded-Host $best_http_host; | |
| proxy_set_header X-Forwarded-Port $pass_port; | |
| proxy_set_header X-Forwarded-Proto $pass_access_scheme; | |
| proxy_set_header X-Original-URI $request_uri; | |
| proxy_set_header X-Scheme $pass_access_scheme; | |
| # Pass the original X-Forwarded-For | |
| proxy_set_header X-Original-Forwarded-For $http_x_forwarded_for; | |
| # mitigate HTTPoxy Vulnerability | |
| # https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/ | |
| proxy_set_header Proxy ""; | |
| # Custom headers to proxied server | |
| proxy_connect_timeout 5s; | |
| proxy_send_timeout 3600s; | |
| proxy_read_timeout 3600s; | |
| proxy_redirect off; | |
| proxy_buffering off; | |
| proxy_buffer_size "4k"; | |
| proxy_buffers 4 "4k"; | |
| proxy_request_buffering "on"; | |
| proxy_http_version 1.1; | |
| proxy_cookie_domain off; | |
| proxy_cookie_path off; | |
| # In case of errors try the next upstream server before returning an error | |
| proxy_next_upstream error timeout invalid_header http_502 http_503 http_504; | |
| proxy_pass http://default-unidler-80; | |
| } | |
| } | |
| ## end server haydensansum-rstudio.tools.dev.mojanalytics.xyz | |
| ## start server isichei-rstudio.tools.dev.mojanalytics.xyz | |
| server { | |
| server_name isichei-rstudio.tools.dev.mojanalytics.xyz ; | |
| listen 80 proxy_protocol; | |
| listen [::]:80 proxy_protocol; | |
| set $proxy_upstream_name "-"; | |
| location / { | |
| set $proxy_upstream_name "default-unidler-80"; | |
| set $namespace "default"; | |
| set $ingress_name "unidler"; | |
| set $service_name "unidler"; | |
| port_in_redirect off; | |
| client_max_body_size "100m"; | |
| proxy_set_header Host $best_http_host; | |
| # Pass the extracted client certificate to the backend | |
| proxy_set_header ssl-client-cert ""; | |
| proxy_set_header ssl-client-verify ""; | |
| proxy_set_header ssl-client-dn ""; | |
| # Allow websocket connections | |
| proxy_set_header Upgrade $http_upgrade; | |
| proxy_set_header Connection $connection_upgrade; | |
| proxy_set_header X-Real-IP $the_real_ip; | |
| proxy_set_header X-Forwarded-For $the_real_ip; | |
| proxy_set_header X-Forwarded-Host $best_http_host; | |
| proxy_set_header X-Forwarded-Port $pass_port; | |
| proxy_set_header X-Forwarded-Proto $pass_access_scheme; | |
| proxy_set_header X-Original-URI $request_uri; | |
| proxy_set_header X-Scheme $pass_access_scheme; | |
| # Pass the original X-Forwarded-For | |
| proxy_set_header X-Original-Forwarded-For $http_x_forwarded_for; | |
| # mitigate HTTPoxy Vulnerability | |
| # https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/ | |
| proxy_set_header Proxy ""; | |
| # Custom headers to proxied server | |
| proxy_connect_timeout 5s; | |
| proxy_send_timeout 3600s; | |
| proxy_read_timeout 3600s; | |
| proxy_redirect off; | |
| proxy_buffering off; | |
| proxy_buffer_size "4k"; | |
| proxy_buffers 4 "4k"; | |
| proxy_request_buffering "on"; | |
| proxy_http_version 1.1; | |
| proxy_cookie_domain off; | |
| proxy_cookie_path off; | |
| # In case of errors try the next upstream server before returning an error | |
| proxy_next_upstream error timeout invalid_header http_502 http_503 http_504; | |
| proxy_pass http://default-unidler-80; | |
| } | |
| } | |
| ## end server isichei-rstudio.tools.dev.mojanalytics.xyz | |
| ## start server jenkins.services.dev.mojanalytics.xyz | |
| server { | |
| server_name jenkins.services.dev.mojanalytics.xyz ; | |
| listen 80 proxy_protocol; | |
| listen [::]:80 proxy_protocol; | |
| set $proxy_upstream_name "-"; | |
| location / { | |
| set $proxy_upstream_name "default-jenkins-jenkins-8080"; | |
| set $namespace "default"; | |
| set $ingress_name "jenkins-jenkins"; | |
| set $service_name ""; | |
| port_in_redirect off; | |
| client_max_body_size "100m"; | |
| proxy_set_header Host $best_http_host; | |
| # Pass the extracted client certificate to the backend | |
| proxy_set_header ssl-client-cert ""; | |
| proxy_set_header ssl-client-verify ""; | |
| proxy_set_header ssl-client-dn ""; | |
| # Allow websocket connections | |
| proxy_set_header Upgrade $http_upgrade; | |
| proxy_set_header Connection $connection_upgrade; | |
| proxy_set_header X-Real-IP $the_real_ip; | |
| proxy_set_header X-Forwarded-For $the_real_ip; | |
| proxy_set_header X-Forwarded-Host $best_http_host; | |
| proxy_set_header X-Forwarded-Port $pass_port; | |
| proxy_set_header X-Forwarded-Proto $pass_access_scheme; | |
| proxy_set_header X-Original-URI $request_uri; | |
| proxy_set_header X-Scheme $pass_access_scheme; | |
| # Pass the original X-Forwarded-For | |
| proxy_set_header X-Original-Forwarded-For $http_x_forwarded_for; | |
| # mitigate HTTPoxy Vulnerability | |
| # https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/ | |
| proxy_set_header Proxy ""; | |
| # Custom headers to proxied server | |
| proxy_connect_timeout 5s; | |
| proxy_send_timeout 3600s; | |
| proxy_read_timeout 3600s; | |
| proxy_redirect off; | |
| proxy_buffering off; | |
| proxy_buffer_size "4k"; | |
| proxy_buffers 4 "4k"; | |
| proxy_request_buffering "on"; | |
| proxy_http_version 1.1; | |
| proxy_cookie_domain off; | |
| proxy_cookie_path off; | |
| # In case of errors try the next upstream server before returning an error | |
| proxy_next_upstream error timeout invalid_header http_502 http_503 http_504; | |
| proxy_pass http://default-jenkins-jenkins-8080; | |
| } | |
| } | |
| ## end server jenkins.services.dev.mojanalytics.xyz | |
| ## start server jhljarvis-rstudio.tools.dev.mojanalytics.xyz | |
| server { | |
| server_name jhljarvis-rstudio.tools.dev.mojanalytics.xyz ; | |
| listen 80 proxy_protocol; | |
| listen [::]:80 proxy_protocol; | |
| set $proxy_upstream_name "-"; | |
| location / { | |
| set $proxy_upstream_name "default-unidler-80"; | |
| set $namespace "default"; | |
| set $ingress_name "unidler"; | |
| set $service_name "unidler"; | |
| port_in_redirect off; | |
| client_max_body_size "100m"; | |
| proxy_set_header Host $best_http_host; | |
| # Pass the extracted client certificate to the backend | |
| proxy_set_header ssl-client-cert ""; | |
| proxy_set_header ssl-client-verify ""; | |
| proxy_set_header ssl-client-dn ""; | |
| # Allow websocket connections | |
| proxy_set_header Upgrade $http_upgrade; | |
| proxy_set_header Connection $connection_upgrade; | |
| proxy_set_header X-Real-IP $the_real_ip; | |
| proxy_set_header X-Forwarded-For $the_real_ip; | |
| proxy_set_header X-Forwarded-Host $best_http_host; | |
| proxy_set_header X-Forwarded-Port $pass_port; | |
| proxy_set_header X-Forwarded-Proto $pass_access_scheme; | |
| proxy_set_header X-Original-URI $request_uri; | |
| proxy_set_header X-Scheme $pass_access_scheme; | |
| # Pass the original X-Forwarded-For | |
| proxy_set_header X-Original-Forwarded-For $http_x_forwarded_for; | |
| # mitigate HTTPoxy Vulnerability | |
| # https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/ | |
| proxy_set_header Proxy ""; | |
| # Custom headers to proxied server | |
| proxy_connect_timeout 5s; | |
| proxy_send_timeout 3600s; | |
| proxy_read_timeout 3600s; | |
| proxy_redirect off; | |
| proxy_buffering off; | |
| proxy_buffer_size "4k"; | |
| proxy_buffers 4 "4k"; | |
| proxy_request_buffering "on"; | |
| proxy_http_version 1.1; | |
| proxy_cookie_domain off; | |
| proxy_cookie_path off; | |
| # In case of errors try the next upstream server before returning an error | |
| proxy_next_upstream error timeout invalid_header http_502 http_503 http_504; | |
| proxy_pass http://default-unidler-80; | |
| } | |
| } | |
| ## end server jhljarvis-rstudio.tools.dev.mojanalytics.xyz | |
| ## start server jonr10-rstudio.tools.dev.mojanalytics.xyz | |
| server { | |
| server_name jonr10-rstudio.tools.dev.mojanalytics.xyz ; | |
| listen 80 proxy_protocol; | |
| listen [::]:80 proxy_protocol; | |
| set $proxy_upstream_name "-"; | |
| location / { | |
| set $proxy_upstream_name "default-unidler-80"; | |
| set $namespace "default"; | |
| set $ingress_name "unidler"; | |
| set $service_name "unidler"; | |
| port_in_redirect off; | |
| client_max_body_size "100m"; | |
| proxy_set_header Host $best_http_host; | |
| # Pass the extracted client certificate to the backend | |
| proxy_set_header ssl-client-cert ""; | |
| proxy_set_header ssl-client-verify ""; | |
| proxy_set_header ssl-client-dn ""; | |
| # Allow websocket connections | |
| proxy_set_header Upgrade $http_upgrade; | |
| proxy_set_header Connection $connection_upgrade; | |
| proxy_set_header X-Real-IP $the_real_ip; | |
| proxy_set_header X-Forwarded-For $the_real_ip; | |
| proxy_set_header X-Forwarded-Host $best_http_host; | |
| proxy_set_header X-Forwarded-Port $pass_port; | |
| proxy_set_header X-Forwarded-Proto $pass_access_scheme; | |
| proxy_set_header X-Original-URI $request_uri; | |
| proxy_set_header X-Scheme $pass_access_scheme; | |
| # Pass the original X-Forwarded-For | |
| proxy_set_header X-Original-Forwarded-For $http_x_forwarded_for; | |
| # mitigate HTTPoxy Vulnerability | |
| # https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/ | |
| proxy_set_header Proxy ""; | |
| # Custom headers to proxied server | |
| proxy_connect_timeout 5s; | |
| proxy_send_timeout 3600s; | |
| proxy_read_timeout 3600s; | |
| proxy_redirect off; | |
| proxy_buffering off; | |
| proxy_buffer_size "4k"; | |
| proxy_buffers 4 "4k"; | |
| proxy_request_buffering "on"; | |
| proxy_http_version 1.1; | |
| proxy_cookie_domain off; | |
| proxy_cookie_path off; | |
| # In case of errors try the next upstream server before returning an error | |
| proxy_next_upstream error timeout invalid_header http_502 http_503 http_504; | |
| proxy_pass http://default-unidler-80; | |
| } | |
| } | |
| ## end server jonr10-rstudio.tools.dev.mojanalytics.xyz | |
| ## start server kenmaher-rstudio.tools.dev.mojanalytics.xyz | |
| server { | |
| server_name kenmaher-rstudio.tools.dev.mojanalytics.xyz ; | |
| listen 80 proxy_protocol; | |
| listen [::]:80 proxy_protocol; | |
| set $proxy_upstream_name "-"; | |
| location / { | |
| set $proxy_upstream_name "default-unidler-80"; | |
| set $namespace "default"; | |
| set $ingress_name "unidler"; | |
| set $service_name "unidler"; | |
| port_in_redirect off; | |
| client_max_body_size "100m"; | |
| proxy_set_header Host $best_http_host; | |
| # Pass the extracted client certificate to the backend | |
| proxy_set_header ssl-client-cert ""; | |
| proxy_set_header ssl-client-verify ""; | |
| proxy_set_header ssl-client-dn ""; | |
| # Allow websocket connections | |
| proxy_set_header Upgrade $http_upgrade; | |
| proxy_set_header Connection $connection_upgrade; | |
| proxy_set_header X-Real-IP $the_real_ip; | |
| proxy_set_header X-Forwarded-For $the_real_ip; | |
| proxy_set_header X-Forwarded-Host $best_http_host; | |
| proxy_set_header X-Forwarded-Port $pass_port; | |
| proxy_set_header X-Forwarded-Proto $pass_access_scheme; | |
| proxy_set_header X-Original-URI $request_uri; | |
| proxy_set_header X-Scheme $pass_access_scheme; | |
| # Pass the original X-Forwarded-For | |
| proxy_set_header X-Original-Forwarded-For $http_x_forwarded_for; | |
| # mitigate HTTPoxy Vulnerability | |
| # https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/ | |
| proxy_set_header Proxy ""; | |
| # Custom headers to proxied server | |
| proxy_connect_timeout 5s; | |
| proxy_send_timeout 3600s; | |
| proxy_read_timeout 3600s; | |
| proxy_redirect off; | |
| proxy_buffering off; | |
| proxy_buffer_size "4k"; | |
| proxy_buffers 4 "4k"; | |
| proxy_request_buffering "on"; | |
| proxy_http_version 1.1; | |
| proxy_cookie_domain off; | |
| proxy_cookie_path off; | |
| # In case of errors try the next upstream server before returning an error | |
| proxy_next_upstream error timeout invalid_header http_502 http_503 http_504; | |
| proxy_pass http://default-unidler-80; | |
| } | |
| } | |
| ## end server kenmaher-rstudio.tools.dev.mojanalytics.xyz | |
| ## start server kerin-rstudio.tools.dev.mojanalytics.xyz | |
| server { | |
| server_name kerin-rstudio.tools.dev.mojanalytics.xyz ; | |
| listen 80 proxy_protocol; | |
| listen [::]:80 proxy_protocol; | |
| set $proxy_upstream_name "-"; | |
| location / { | |
| set $proxy_upstream_name "default-unidler-80"; | |
| set $namespace "default"; | |
| set $ingress_name "unidler"; | |
| set $service_name "unidler"; | |
| port_in_redirect off; | |
| client_max_body_size "100m"; | |
| proxy_set_header Host $best_http_host; | |
| # Pass the extracted client certificate to the backend | |
| proxy_set_header ssl-client-cert ""; | |
| proxy_set_header ssl-client-verify ""; | |
| proxy_set_header ssl-client-dn ""; | |
| # Allow websocket connections | |
| proxy_set_header Upgrade $http_upgrade; | |
| proxy_set_header Connection $connection_upgrade; | |
| proxy_set_header X-Real-IP $the_real_ip; | |
| proxy_set_header X-Forwarded-For $the_real_ip; | |
| proxy_set_header X-Forwarded-Host $best_http_host; | |
| proxy_set_header X-Forwarded-Port $pass_port; | |
| proxy_set_header X-Forwarded-Proto $pass_access_scheme; | |
| proxy_set_header X-Original-URI $request_uri; | |
| proxy_set_header X-Scheme $pass_access_scheme; | |
| # Pass the original X-Forwarded-For | |
| proxy_set_header X-Original-Forwarded-For $http_x_forwarded_for; | |
| # mitigate HTTPoxy Vulnerability | |
| # https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/ | |
| proxy_set_header Proxy ""; | |
| # Custom headers to proxied server | |
| proxy_connect_timeout 5s; | |
| proxy_send_timeout 3600s; | |
| proxy_read_timeout 3600s; | |
| proxy_redirect off; | |
| proxy_buffering off; | |
| proxy_buffer_size "4k"; | |
| proxy_buffers 4 "4k"; | |
| proxy_request_buffering "on"; | |
| proxy_http_version 1.1; | |
| proxy_cookie_domain off; | |
| proxy_cookie_path off; | |
| # In case of errors try the next upstream server before returning an error | |
| proxy_next_upstream error timeout invalid_header http_502 http_503 http_504; | |
| proxy_pass http://default-unidler-80; | |
| } | |
| } | |
| ## end server kerin-rstudio.tools.dev.mojanalytics.xyz | |
| ## start server kibana.services.dev.mojanalytics.xyz | |
| server { | |
| server_name kibana.services.dev.mojanalytics.xyz ; | |
| listen 80 proxy_protocol; | |
| listen [::]:80 proxy_protocol; | |
| set $proxy_upstream_name "-"; | |
| location / { | |
| set $proxy_upstream_name "kube-system-cluster-logviewer-kibana-auth-proxy-80"; | |
| set $namespace "kube-system"; | |
| set $ingress_name "cluster-logviewer-kibana-auth-proxy"; | |
| set $service_name "cluster-logviewer-kibana-auth-proxy"; | |
| port_in_redirect off; | |
| client_max_body_size "100m"; | |
| proxy_set_header Host $best_http_host; | |
| # Pass the extracted client certificate to the backend | |
| proxy_set_header ssl-client-cert ""; | |
| proxy_set_header ssl-client-verify ""; | |
| proxy_set_header ssl-client-dn ""; | |
| # Allow websocket connections | |
| proxy_set_header Upgrade $http_upgrade; | |
| proxy_set_header Connection $connection_upgrade; | |
| proxy_set_header X-Real-IP $the_real_ip; | |
| proxy_set_header X-Forwarded-For $the_real_ip; | |
| proxy_set_header X-Forwarded-Host $best_http_host; | |
| proxy_set_header X-Forwarded-Port $pass_port; | |
| proxy_set_header X-Forwarded-Proto $pass_access_scheme; | |
| proxy_set_header X-Original-URI $request_uri; | |
| proxy_set_header X-Scheme $pass_access_scheme; | |
| # Pass the original X-Forwarded-For | |
| proxy_set_header X-Original-Forwarded-For $http_x_forwarded_for; | |
| # mitigate HTTPoxy Vulnerability | |
| # https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/ | |
| proxy_set_header Proxy ""; | |
| # Custom headers to proxied server | |
| proxy_connect_timeout 5s; | |
| proxy_send_timeout 3600s; | |
| proxy_read_timeout 3600s; | |
| proxy_redirect off; | |
| proxy_buffering off; | |
| proxy_buffer_size "4k"; | |
| proxy_buffers 4 "4k"; | |
| proxy_request_buffering "on"; | |
| proxy_http_version 1.1; | |
| proxy_cookie_domain off; | |
| proxy_cookie_path off; | |
| # In case of errors try the next upstream server before returning an error | |
| proxy_next_upstream error timeout invalid_header http_502 http_503 http_504; | |
| proxy_pass http://kube-system-cluster-logviewer-kibana-auth-proxy-80; | |
| } | |
| } | |
| ## end server kibana.services.dev.mojanalytics.xyz | |
| ## start server laa-cwa-dashboard.apps.dev.mojanalytics.xyz | |
| server { | |
| server_name laa-cwa-dashboard.apps.dev.mojanalytics.xyz ; | |
| listen 80 proxy_protocol; | |
| listen [::]:80 proxy_protocol; | |
| set $proxy_upstream_name "-"; | |
| location / { | |
| set $proxy_upstream_name ""; | |
| set $namespace "apps-prod"; | |
| set $ingress_name "laa-cwa-dashboard-webapp"; | |
| set $service_name "laa-cwa-dashboard-webapp"; | |
| port_in_redirect off; | |
| client_max_body_size "100m"; | |
| proxy_set_header Host $best_http_host; | |
| # Pass the extracted client certificate to the backend | |
| proxy_set_header ssl-client-cert ""; | |
| proxy_set_header ssl-client-verify ""; | |
| proxy_set_header ssl-client-dn ""; | |
| # Allow websocket connections | |
| proxy_set_header Upgrade $http_upgrade; | |
| proxy_set_header Connection $connection_upgrade; | |
| proxy_set_header X-Real-IP $the_real_ip; | |
| proxy_set_header X-Forwarded-For $the_real_ip; | |
| proxy_set_header X-Forwarded-Host $best_http_host; | |
| proxy_set_header X-Forwarded-Port $pass_port; | |
| proxy_set_header X-Forwarded-Proto $pass_access_scheme; | |
| proxy_set_header X-Original-URI $request_uri; | |
| proxy_set_header X-Scheme $pass_access_scheme; | |
| # Pass the original X-Forwarded-For | |
| proxy_set_header X-Original-Forwarded-For $http_x_forwarded_for; | |
| # mitigate HTTPoxy Vulnerability | |
| # https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/ | |
| proxy_set_header Proxy ""; | |
| # Custom headers to proxied server | |
| proxy_connect_timeout 5s; | |
| proxy_send_timeout 3600s; | |
| proxy_read_timeout 3600s; | |
| proxy_redirect off; | |
| proxy_buffering off; | |
| proxy_buffer_size "4k"; | |
| proxy_buffers 4 "4k"; | |
| proxy_request_buffering "on"; | |
| proxy_http_version 1.1; | |
| proxy_cookie_domain off; | |
| proxy_cookie_path off; | |
| # In case of errors try the next upstream server before returning an error | |
| proxy_next_upstream error timeout invalid_header http_502 http_503 http_504; | |
| # No endpoints available for the request | |
| return 503; | |
| } | |
| } | |
| ## end server laa-cwa-dashboard.apps.dev.mojanalytics.xyz | |
| ## start server markpurver-rstudio.tools.dev.mojanalytics.xyz | |
| server { | |
| server_name markpurver-rstudio.tools.dev.mojanalytics.xyz ; | |
| listen 80 proxy_protocol; | |
| listen [::]:80 proxy_protocol; | |
| set $proxy_upstream_name "-"; | |
| location / { | |
| set $proxy_upstream_name "default-unidler-80"; | |
| set $namespace "default"; | |
| set $ingress_name "unidler"; | |
| set $service_name "unidler"; | |
| port_in_redirect off; | |
| client_max_body_size "100m"; | |
| proxy_set_header Host $best_http_host; | |
| # Pass the extracted client certificate to the backend | |
| proxy_set_header ssl-client-cert ""; | |
| proxy_set_header ssl-client-verify ""; | |
| proxy_set_header ssl-client-dn ""; | |
| # Allow websocket connections | |
| proxy_set_header Upgrade $http_upgrade; | |
| proxy_set_header Connection $connection_upgrade; | |
| proxy_set_header X-Real-IP $the_real_ip; | |
| proxy_set_header X-Forwarded-For $the_real_ip; | |
| proxy_set_header X-Forwarded-Host $best_http_host; | |
| proxy_set_header X-Forwarded-Port $pass_port; | |
| proxy_set_header X-Forwarded-Proto $pass_access_scheme; | |
| proxy_set_header X-Original-URI $request_uri; | |
| proxy_set_header X-Scheme $pass_access_scheme; | |
| # Pass the original X-Forwarded-For | |
| proxy_set_header X-Original-Forwarded-For $http_x_forwarded_for; | |
| # mitigate HTTPoxy Vulnerability | |
| # https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/ | |
| proxy_set_header Proxy ""; | |
| # Custom headers to proxied server | |
| proxy_connect_timeout 5s; | |
| proxy_send_timeout 3600s; | |
| proxy_read_timeout 3600s; | |
| proxy_redirect off; | |
| proxy_buffering off; | |
| proxy_buffer_size "4k"; | |
| proxy_buffers 4 "4k"; | |
| proxy_request_buffering "on"; | |
| proxy_http_version 1.1; | |
| proxy_cookie_domain off; | |
| proxy_cookie_path off; | |
| # In case of errors try the next upstream server before returning an error | |
| proxy_next_upstream error timeout invalid_header http_502 http_503 http_504; | |
| proxy_pass http://default-unidler-80; | |
| } | |
| } | |
| ## end server markpurver-rstudio.tools.dev.mojanalytics.xyz | |
| ## start server paulhkelly-rstudio.tools.dev.mojanalytics.xyz | |
| server { | |
| server_name paulhkelly-rstudio.tools.dev.mojanalytics.xyz ; | |
| listen 80 proxy_protocol; | |
| listen [::]:80 proxy_protocol; | |
| set $proxy_upstream_name "-"; | |
| location / { | |
| set $proxy_upstream_name "default-unidler-80"; | |
| set $namespace "default"; | |
| set $ingress_name "unidler"; | |
| set $service_name "unidler"; | |
| port_in_redirect off; | |
| client_max_body_size "100m"; | |
| proxy_set_header Host $best_http_host; | |
| # Pass the extracted client certificate to the backend | |
| proxy_set_header ssl-client-cert ""; | |
| proxy_set_header ssl-client-verify ""; | |
| proxy_set_header ssl-client-dn ""; | |
| # Allow websocket connections | |
| proxy_set_header Upgrade $http_upgrade; | |
| proxy_set_header Connection $connection_upgrade; | |
| proxy_set_header X-Real-IP $the_real_ip; | |
| proxy_set_header X-Forwarded-For $the_real_ip; | |
| proxy_set_header X-Forwarded-Host $best_http_host; | |
| proxy_set_header X-Forwarded-Port $pass_port; | |
| proxy_set_header X-Forwarded-Proto $pass_access_scheme; | |
| proxy_set_header X-Original-URI $request_uri; | |
| proxy_set_header X-Scheme $pass_access_scheme; | |
| # Pass the original X-Forwarded-For | |
| proxy_set_header X-Original-Forwarded-For $http_x_forwarded_for; | |
| # mitigate HTTPoxy Vulnerability | |
| # https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/ | |
| proxy_set_header Proxy ""; | |
| # Custom headers to proxied server | |
| proxy_connect_timeout 5s; | |
| proxy_send_timeout 3600s; | |
| proxy_read_timeout 3600s; | |
| proxy_redirect off; | |
| proxy_buffering off; | |
| proxy_buffer_size "4k"; | |
| proxy_buffers 4 "4k"; | |
| proxy_request_buffering "on"; | |
| proxy_http_version 1.1; | |
| proxy_cookie_domain off; | |
| proxy_cookie_path off; | |
| # In case of errors try the next upstream server before returning an error | |
| proxy_next_upstream error timeout invalid_header http_502 http_503 http_504; | |
| proxy_pass http://default-unidler-80; | |
| } | |
| } | |
| ## end server paulhkelly-rstudio.tools.dev.mojanalytics.xyz | |
| ## start server pq-tool.apps.dev.mojanalytics.xyz | |
| server { | |
| server_name pq-tool.apps.dev.mojanalytics.xyz ; | |
| listen 80 proxy_protocol; | |
| listen [::]:80 proxy_protocol; | |
| set $proxy_upstream_name "-"; | |
| location / { | |
| set $proxy_upstream_name ""; | |
| set $namespace "apps-prod"; | |
| set $ingress_name "pqtool-test-webapp"; | |
| set $service_name "pqtool-test-webapp"; | |
| port_in_redirect off; | |
| client_max_body_size "100m"; | |
| proxy_set_header Host $best_http_host; | |
| # Pass the extracted client certificate to the backend | |
| proxy_set_header ssl-client-cert ""; | |
| proxy_set_header ssl-client-verify ""; | |
| proxy_set_header ssl-client-dn ""; | |
| # Allow websocket connections | |
| proxy_set_header Upgrade $http_upgrade; | |
| proxy_set_header Connection $connection_upgrade; | |
| proxy_set_header X-Real-IP $the_real_ip; | |
| proxy_set_header X-Forwarded-For $the_real_ip; | |
| proxy_set_header X-Forwarded-Host $best_http_host; | |
| proxy_set_header X-Forwarded-Port $pass_port; | |
| proxy_set_header X-Forwarded-Proto $pass_access_scheme; | |
| proxy_set_header X-Original-URI $request_uri; | |
| proxy_set_header X-Scheme $pass_access_scheme; | |
| # Pass the original X-Forwarded-For | |
| proxy_set_header X-Original-Forwarded-For $http_x_forwarded_for; | |
| # mitigate HTTPoxy Vulnerability | |
| # https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/ | |
| proxy_set_header Proxy ""; | |
| # Custom headers to proxied server | |
| proxy_connect_timeout 5s; | |
| proxy_send_timeout 3600s; | |
| proxy_read_timeout 3600s; | |
| proxy_redirect off; | |
| proxy_buffering off; | |
| proxy_buffer_size "4k"; | |
| proxy_buffers 4 "4k"; | |
| proxy_request_buffering "on"; | |
| proxy_http_version 1.1; | |
| proxy_cookie_domain off; | |
| proxy_cookie_path off; | |
| # In case of errors try the next upstream server before returning an error | |
| proxy_next_upstream error timeout invalid_header http_502 http_503 http_504; | |
| # No endpoints available for the request | |
| return 503; | |
| } | |
| } | |
| ## end server pq-tool.apps.dev.mojanalytics.xyz | |
| ## start server prometheus.services.dev.mojanalytics.xyz | |
| server { | |
| server_name prometheus.services.dev.mojanalytics.xyz ; | |
| listen 80 proxy_protocol; | |
| listen [::]:80 proxy_protocol; | |
| set $proxy_upstream_name "-"; | |
| location / { | |
| set $proxy_upstream_name "monitoring-kube-prometheus-prometheus-9090"; | |
| set $namespace "monitoring"; | |
| set $ingress_name "kube-prometheus-prometheus"; | |
| set $service_name "kube-prometheus-prometheus"; | |
| port_in_redirect off; | |
| client_max_body_size "100m"; | |
| proxy_set_header Host $best_http_host; | |
| # Pass the extracted client certificate to the backend | |
| proxy_set_header ssl-client-cert ""; | |
| proxy_set_header ssl-client-verify ""; | |
| proxy_set_header ssl-client-dn ""; | |
| # Allow websocket connections | |
| proxy_set_header Upgrade $http_upgrade; | |
| proxy_set_header Connection $connection_upgrade; | |
| proxy_set_header X-Real-IP $the_real_ip; | |
| proxy_set_header X-Forwarded-For $the_real_ip; | |
| proxy_set_header X-Forwarded-Host $best_http_host; | |
| proxy_set_header X-Forwarded-Port $pass_port; | |
| proxy_set_header X-Forwarded-Proto $pass_access_scheme; | |
| proxy_set_header X-Original-URI $request_uri; | |
| proxy_set_header X-Scheme $pass_access_scheme; | |
| # Pass the original X-Forwarded-For | |
| proxy_set_header X-Original-Forwarded-For $http_x_forwarded_for; | |
| # mitigate HTTPoxy Vulnerability | |
| # https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/ | |
| proxy_set_header Proxy ""; | |
| # Custom headers to proxied server | |
| proxy_connect_timeout 5s; | |
| proxy_send_timeout 3600s; | |
| proxy_read_timeout 3600s; | |
| proxy_redirect off; | |
| proxy_buffering off; | |
| proxy_buffer_size "4k"; | |
| proxy_buffers 4 "4k"; | |
| proxy_request_buffering "on"; | |
| proxy_http_version 1.1; | |
| proxy_cookie_domain off; | |
| proxy_cookie_path off; | |
| # In case of errors try the next upstream server before returning an error | |
| proxy_next_upstream error timeout invalid_header http_502 http_503 http_504; | |
| proxy_pass http://monitoring-kube-prometheus-prometheus-9090; | |
| } | |
| } | |
| ## end server prometheus.services.dev.mojanalytics.xyz | |
| ## start server robinl-rstudio.tools.dev.mojanalytics.xyz | |
| server { | |
| server_name robinl-rstudio.tools.dev.mojanalytics.xyz ; | |
| listen 80 proxy_protocol; | |
| listen [::]:80 proxy_protocol; | |
| set $proxy_upstream_name "-"; | |
| location / { | |
| set $proxy_upstream_name "default-unidler-80"; | |
| set $namespace "default"; | |
| set $ingress_name "unidler"; | |
| set $service_name "unidler"; | |
| port_in_redirect off; | |
| client_max_body_size "100m"; | |
| proxy_set_header Host $best_http_host; | |
| # Pass the extracted client certificate to the backend | |
| proxy_set_header ssl-client-cert ""; | |
| proxy_set_header ssl-client-verify ""; | |
| proxy_set_header ssl-client-dn ""; | |
| # Allow websocket connections | |
| proxy_set_header Upgrade $http_upgrade; | |
| proxy_set_header Connection $connection_upgrade; | |
| proxy_set_header X-Real-IP $the_real_ip; | |
| proxy_set_header X-Forwarded-For $the_real_ip; | |
| proxy_set_header X-Forwarded-Host $best_http_host; | |
| proxy_set_header X-Forwarded-Port $pass_port; | |
| proxy_set_header X-Forwarded-Proto $pass_access_scheme; | |
| proxy_set_header X-Original-URI $request_uri; | |
| proxy_set_header X-Scheme $pass_access_scheme; | |
| # Pass the original X-Forwarded-For | |
| proxy_set_header X-Original-Forwarded-For $http_x_forwarded_for; | |
| # mitigate HTTPoxy Vulnerability | |
| # https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/ | |
| proxy_set_header Proxy ""; | |
| # Custom headers to proxied server | |
| proxy_connect_timeout 5s; | |
| proxy_send_timeout 3600s; | |
| proxy_read_timeout 3600s; | |
| proxy_redirect off; | |
| proxy_buffering off; | |
| proxy_buffer_size "4k"; | |
| proxy_buffers 4 "4k"; | |
| proxy_request_buffering "on"; | |
| proxy_http_version 1.1; | |
| proxy_cookie_domain off; | |
| proxy_cookie_path off; | |
| # In case of errors try the next upstream server before returning an error | |
| proxy_next_upstream error timeout invalid_header http_502 http_503 http_504; | |
| proxy_pass http://default-unidler-80; | |
| } | |
| } | |
| ## end server robinl-rstudio.tools.dev.mojanalytics.xyz | |
| ## start server secure-geezer.apps.dev.mojanalytics.xyz | |
| server { | |
| server_name secure-geezer.apps.dev.mojanalytics.xyz ; | |
| listen 80 proxy_protocol; | |
| listen [::]:80 proxy_protocol; | |
| set $proxy_upstream_name "-"; | |
| location / { | |
| set $proxy_upstream_name ""; | |
| set $namespace "apps-prod"; | |
| set $ingress_name "secure-geezer-webapp"; | |
| set $service_name "secure-geezer-webapp"; | |
| port_in_redirect off; | |
| client_max_body_size "100m"; | |
| proxy_set_header Host $best_http_host; | |
| # Pass the extracted client certificate to the backend | |
| proxy_set_header ssl-client-cert ""; | |
| proxy_set_header ssl-client-verify ""; | |
| proxy_set_header ssl-client-dn ""; | |
| # Allow websocket connections | |
| proxy_set_header Upgrade $http_upgrade; | |
| proxy_set_header Connection $connection_upgrade; | |
| proxy_set_header X-Real-IP $the_real_ip; | |
| proxy_set_header X-Forwarded-For $the_real_ip; | |
| proxy_set_header X-Forwarded-Host $best_http_host; | |
| proxy_set_header X-Forwarded-Port $pass_port; | |
| proxy_set_header X-Forwarded-Proto $pass_access_scheme; | |
| proxy_set_header X-Original-URI $request_uri; | |
| proxy_set_header X-Scheme $pass_access_scheme; | |
| # Pass the original X-Forwarded-For | |
| proxy_set_header X-Original-Forwarded-For $http_x_forwarded_for; | |
| # mitigate HTTPoxy Vulnerability | |
| # https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/ | |
| proxy_set_header Proxy ""; | |
| # Custom headers to proxied server | |
| proxy_connect_timeout 5s; | |
| proxy_send_timeout 3600s; | |
| proxy_read_timeout 3600s; | |
| proxy_redirect off; | |
| proxy_buffering off; | |
| proxy_buffer_size "4k"; | |
| proxy_buffers 4 "4k"; | |
| proxy_request_buffering "on"; | |
| proxy_http_version 1.1; | |
| proxy_cookie_domain off; | |
| proxy_cookie_path off; | |
| # In case of errors try the next upstream server before returning an error | |
| proxy_next_upstream error timeout invalid_header http_502 http_503 http_504; | |
| # No endpoints available for the request | |
| return 503; | |
| } | |
| } | |
| ## end server secure-geezer.apps.dev.mojanalytics.xyz | |
| ## start server unidler.services.dev.mojanalytics.xyz | |
| server { | |
| server_name unidler.services.dev.mojanalytics.xyz ; | |
| listen 80 proxy_protocol; | |
| listen [::]:80 proxy_protocol; | |
| set $proxy_upstream_name "-"; | |
| location / { | |
| set $proxy_upstream_name "default-unidler-80"; | |
| set $namespace "default"; | |
| set $ingress_name "unidler"; | |
| set $service_name "unidler"; | |
| port_in_redirect off; | |
| client_max_body_size "100m"; | |
| proxy_set_header Host $best_http_host; | |
| # Pass the extracted client certificate to the backend | |
| proxy_set_header ssl-client-cert ""; | |
| proxy_set_header ssl-client-verify ""; | |
| proxy_set_header ssl-client-dn ""; | |
| # Allow websocket connections | |
| proxy_set_header Upgrade $http_upgrade; | |
| proxy_set_header Connection $connection_upgrade; | |
| proxy_set_header X-Real-IP $the_real_ip; | |
| proxy_set_header X-Forwarded-For $the_real_ip; | |
| proxy_set_header X-Forwarded-Host $best_http_host; | |
| proxy_set_header X-Forwarded-Port $pass_port; | |
| proxy_set_header X-Forwarded-Proto $pass_access_scheme; | |
| proxy_set_header X-Original-URI $request_uri; | |
| proxy_set_header X-Scheme $pass_access_scheme; | |
| # Pass the original X-Forwarded-For | |
| proxy_set_header X-Original-Forwarded-For $http_x_forwarded_for; | |
| # mitigate HTTPoxy Vulnerability | |
| # https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/ | |
| proxy_set_header Proxy ""; | |
| # Custom headers to proxied server | |
| proxy_connect_timeout 5s; | |
| proxy_send_timeout 3600s; | |
| proxy_read_timeout 3600s; | |
| proxy_redirect off; | |
| proxy_buffering off; | |
| proxy_buffer_size "4k"; | |
| proxy_buffers 4 "4k"; | |
| proxy_request_buffering "on"; | |
| proxy_http_version 1.1; | |
| proxy_cookie_domain off; | |
| proxy_cookie_path off; | |
| # In case of errors try the next upstream server before returning an error | |
| proxy_next_upstream error timeout invalid_header http_502 http_503 http_504; | |
| proxy_pass http://default-unidler-80; | |
| } | |
| } | |
| ## end server unidler.services.dev.mojanalytics.xyz | |
| ## start server vickyhughes-rstudio.tools.dev.mojanalytics.xyz | |
| server { | |
| server_name vickyhughes-rstudio.tools.dev.mojanalytics.xyz ; | |
| listen 80 proxy_protocol; | |
| listen [::]:80 proxy_protocol; | |
| set $proxy_upstream_name "-"; | |
| location / { | |
| set $proxy_upstream_name "default-unidler-80"; | |
| set $namespace "default"; | |
| set $ingress_name "unidler"; | |
| set $service_name "unidler"; | |
| port_in_redirect off; | |
| client_max_body_size "100m"; | |
| proxy_set_header Host $best_http_host; | |
| # Pass the extracted client certificate to the backend | |
| proxy_set_header ssl-client-cert ""; | |
| proxy_set_header ssl-client-verify ""; | |
| proxy_set_header ssl-client-dn ""; | |
| # Allow websocket connections | |
| proxy_set_header Upgrade $http_upgrade; | |
| proxy_set_header Connection $connection_upgrade; | |
| proxy_set_header X-Real-IP $the_real_ip; | |
| proxy_set_header X-Forwarded-For $the_real_ip; | |
| proxy_set_header X-Forwarded-Host $best_http_host; | |
| proxy_set_header X-Forwarded-Port $pass_port; | |
| proxy_set_header X-Forwarded-Proto $pass_access_scheme; | |
| proxy_set_header X-Original-URI $request_uri; | |
| proxy_set_header X-Scheme $pass_access_scheme; | |
| # Pass the original X-Forwarded-For | |
| proxy_set_header X-Original-Forwarded-For $http_x_forwarded_for; | |
| # mitigate HTTPoxy Vulnerability | |
| # https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/ | |
| proxy_set_header Proxy ""; | |
| # Custom headers to proxied server | |
| proxy_connect_timeout 5s; | |
| proxy_send_timeout 3600s; | |
| proxy_read_timeout 3600s; | |
| proxy_redirect off; | |
| proxy_buffering off; | |
| proxy_buffer_size "4k"; | |
| proxy_buffers 4 "4k"; | |
| proxy_request_buffering "on"; | |
| proxy_http_version 1.1; | |
| proxy_cookie_domain off; | |
| proxy_cookie_path off; | |
| # In case of errors try the next upstream server before returning an error | |
| proxy_next_upstream error timeout invalid_header http_502 http_503 http_504; | |
| proxy_pass http://default-unidler-80; | |
| } | |
| } | |
| ## end server vickyhughes-rstudio.tools.dev.mojanalytics.xyz | |
| ## start server w4nd3r3r-rstudio.tools.dev.mojanalytics.xyz | |
| server { | |
| server_name w4nd3r3r-rstudio.tools.dev.mojanalytics.xyz ; | |
| listen 80 proxy_protocol; | |
| listen [::]:80 proxy_protocol; | |
| set $proxy_upstream_name "-"; | |
| location / { | |
| set $proxy_upstream_name "default-unidler-80"; | |
| set $namespace "default"; | |
| set $ingress_name "unidler"; | |
| set $service_name "unidler"; | |
| port_in_redirect off; | |
| client_max_body_size "100m"; | |
| proxy_set_header Host $best_http_host; | |
| # Pass the extracted client certificate to the backend | |
| proxy_set_header ssl-client-cert ""; | |
| proxy_set_header ssl-client-verify ""; | |
| proxy_set_header ssl-client-dn ""; | |
| # Allow websocket connections | |
| proxy_set_header Upgrade $http_upgrade; | |
| proxy_set_header Connection $connection_upgrade; | |
| proxy_set_header X-Real-IP $the_real_ip; | |
| proxy_set_header X-Forwarded-For $the_real_ip; | |
| proxy_set_header X-Forwarded-Host $best_http_host; | |
| proxy_set_header X-Forwarded-Port $pass_port; | |
| proxy_set_header X-Forwarded-Proto $pass_access_scheme; | |
| proxy_set_header X-Original-URI $request_uri; | |
| proxy_set_header X-Scheme $pass_access_scheme; | |
| # Pass the original X-Forwarded-For | |
| proxy_set_header X-Original-Forwarded-For $http_x_forwarded_for; | |
| # mitigate HTTPoxy Vulnerability | |
| # https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/ | |
| proxy_set_header Proxy ""; | |
| # Custom headers to proxied server | |
| proxy_connect_timeout 5s; | |
| proxy_send_timeout 3600s; | |
| proxy_read_timeout 3600s; | |
| proxy_redirect off; | |
| proxy_buffering off; | |
| proxy_buffer_size "4k"; | |
| proxy_buffers 4 "4k"; | |
| proxy_request_buffering "on"; | |
| proxy_http_version 1.1; | |
| proxy_cookie_domain off; | |
| proxy_cookie_path off; | |
| # In case of errors try the next upstream server before returning an error | |
| proxy_next_upstream error timeout invalid_header http_502 http_503 http_504; | |
| proxy_pass http://default-unidler-80; | |
| } | |
| } | |
| ## end server w4nd3r3r-rstudio.tools.dev.mojanalytics.xyz | |
| ## start server xoen-rstudio.tools.dev.mojanalytics.xyz | |
| server { | |
| server_name xoen-rstudio.tools.dev.mojanalytics.xyz ; | |
| listen 80 proxy_protocol; | |
| listen [::]:80 proxy_protocol; | |
| set $proxy_upstream_name "-"; | |
| location / { | |
| set $proxy_upstream_name "default-unidler-80"; | |
| set $namespace "default"; | |
| set $ingress_name "unidler"; | |
| set $service_name "unidler"; | |
| port_in_redirect off; | |
| client_max_body_size "100m"; | |
| proxy_set_header Host $best_http_host; | |
| # Pass the extracted client certificate to the backend | |
| proxy_set_header ssl-client-cert ""; | |
| proxy_set_header ssl-client-verify ""; | |
| proxy_set_header ssl-client-dn ""; | |
| # Allow websocket connections | |
| proxy_set_header Upgrade $http_upgrade; | |
| proxy_set_header Connection $connection_upgrade; | |
| proxy_set_header X-Real-IP $the_real_ip; | |
| proxy_set_header X-Forwarded-For $the_real_ip; | |
| proxy_set_header X-Forwarded-Host $best_http_host; | |
| proxy_set_header X-Forwarded-Port $pass_port; | |
| proxy_set_header X-Forwarded-Proto $pass_access_scheme; | |
| proxy_set_header X-Original-URI $request_uri; | |
| proxy_set_header X-Scheme $pass_access_scheme; | |
| # Pass the original X-Forwarded-For | |
| proxy_set_header X-Original-Forwarded-For $http_x_forwarded_for; | |
| # mitigate HTTPoxy Vulnerability | |
| # https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/ | |
| proxy_set_header Proxy ""; | |
| # Custom headers to proxied server | |
| proxy_connect_timeout 5s; | |
| proxy_send_timeout 3600s; | |
| proxy_read_timeout 3600s; | |
| proxy_redirect off; | |
| proxy_buffering off; | |
| proxy_buffer_size "4k"; | |
| proxy_buffers 4 "4k"; | |
| proxy_request_buffering "on"; | |
| proxy_http_version 1.1; | |
| proxy_cookie_domain off; | |
| proxy_cookie_path off; | |
| # In case of errors try the next upstream server before returning an error | |
| proxy_next_upstream error timeout invalid_header http_502 http_503 http_504; | |
| proxy_pass http://default-unidler-80; | |
| } | |
| } | |
| ## end server xoen-rstudio.tools.dev.mojanalytics.xyz | |
| # default server, used for NGINX healthcheck and access to nginx stats | |
| server { | |
| # Use the port 18080 (random value just to avoid known ports) as default port for nginx. | |
| # Changing this value requires a change in: | |
| # https://github.com/kubernetes/ingress-nginx/blob/master/controllers/nginx/pkg/cmd/controller/nginx.go | |
| listen 18080 default_server reuseport backlog=511; | |
| listen [::]:18080 default_server reuseport backlog=511; | |
| set $proxy_upstream_name "-"; | |
| location /healthz { | |
| access_log off; | |
| return 200; | |
| } | |
| location /nginx_status { | |
| set $proxy_upstream_name "internal"; | |
| access_log off; | |
| stub_status on; | |
| } | |
| location / { | |
| set $proxy_upstream_name "upstream-default-backend"; | |
| proxy_pass http://upstream-default-backend; | |
| } | |
| } | |
| } | |
| stream { | |
| log_format log_stream [$time_local] $protocol $status $bytes_sent $bytes_received $session_time; | |
| access_log /var/log/nginx/access.log log_stream; | |
| error_log /var/log/nginx/error.log; | |
| # TCP services | |
| # UDP services | |
| } |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment