Move more servers to upstreams

This commit is contained in:
Michael 2024-11-04 15:01:25 -05:00
parent 6af16b61b8
commit eb9d491cef
9 changed files with 33 additions and 14 deletions

View file

@ -14,7 +14,7 @@ server {
include snippets/proxy/common-proxy-headers.conf; include snippets/proxy/common-proxy-headers.conf;
location / { location / {
proxy_pass https://192.168.1.210:3000; proxy_pass https://dash;
} }
include snippets/global/errors/http-cat-error-pages.conf; include snippets/global/errors/http-cat-error-pages.conf;

View file

@ -14,7 +14,6 @@ server {
include snippets/proxy/common-proxy-headers.conf; include snippets/proxy/common-proxy-headers.conf;
location / { location / {
client_max_body_size 512M;
#proxy_pass http://100.64.4.102; #proxy_pass http://100.64.4.102;
return 404; return 404;
} }

View file

@ -17,7 +17,7 @@ server {
proxy_set_header Content-Security-Policy upgrade-insecure-requests; proxy_set_header Content-Security-Policy upgrade-insecure-requests;
location / { location / {
proxy_pass http://100.64.4.100:8080/; proxy_pass http://mccp-link/;
} }
include snippets/global/errors/http-cat-error-pages.conf; include snippets/global/errors/http-cat-error-pages.conf;

View file

@ -5,11 +5,11 @@ proxy_cache_path /var/www/cache levels=1:2 keys_zone=map:8m max_size=1g inactiv
server { server {
server_name auth.shad.moe www.auth.shad.moe; server_name map.gpoc.shad.moe www.map.gpoc.shad.moe;
ssl_certificate /etc/letsencrypt/live/auth.shad.moe/fullchain.pem; ssl_certificate /etc/letsencrypt/live/map.gpoc.shad.moe/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/auth.shad.moe/privkey.pem; ssl_certificate_key /etc/letsencrypt/live/map.gpoc.shad.moe/privkey.pem;
ssl_trusted_certificate /etc/letsencrypt/live/auth.shad.moe/fullchain.pem; ssl_trusted_certificate /etc/letsencrypt/live/map.gpoc.shad.moe/fullchain.pem;
include snippets/global/common-ssl.conf; include snippets/global/common-ssl.conf;
@ -24,7 +24,7 @@ server {
proxy_cache_use_stale error timeout invalid_header updating http_500 http_503 http_504; proxy_cache_use_stale error timeout invalid_header updating http_500 http_503 http_504;
proxy_connect_timeout 10; proxy_connect_timeout 10;
proxy_pass http://100.64.4.100:8123/; proxy_pass http://mccp-map/;
} }
include snippets/global/errors/http-cat-error-pages.conf; include snippets/global/errors/http-cat-error-pages.conf;

View file

@ -14,7 +14,7 @@ server {
include snippets/proxy/common-proxy-headers.conf; include snippets/proxy/common-proxy-headers.conf;
location / { location / {
proxy_pass https://192.168.1.66; proxy_pass https://nextcloud;
} }
include snippets/global/errors/http-cat-error-pages.conf; include snippets/global/errors/http-cat-error-pages.conf;

View file

@ -17,7 +17,7 @@ server {
proxy_set_header Content-Security-Policy upgrade-insecure-requests; proxy_set_header Content-Security-Policy upgrade-insecure-requests;
location / { location / {
proxy_pass http://100.64.4.102/; proxy_pass http://mcm-std/;
} }
include snippets/global/errors/http-cat-error-pages.conf; include snippets/global/errors/http-cat-error-pages.conf;

View file

@ -17,7 +17,7 @@ server {
proxy_set_header Content-Security-Policy upgrade-insecure-requests; proxy_set_header Content-Security-Policy upgrade-insecure-requests;
location / { location / {
proxy_pass http://100.64.4.100:8080/; proxy_pass http://mccp-link/;
} }
include snippets/global/errors/http-cat-error-pages.conf; include snippets/global/errors/http-cat-error-pages.conf;

View file

@ -14,7 +14,7 @@ server {
include snippets/proxy/common-proxy-headers.conf; include snippets/proxy/common-proxy-headers.conf;
location / { location / {
proxy_pass http://vaultwarden-default; proxy_pass http://vaultwarden;
} }
location /admin { location /admin {

View file

@ -13,6 +13,10 @@ upstream bsky {
server 100.64.4.102:3000; server 100.64.4.102:3000;
} }
upstream dash {
server 192.168.1.210:3000
}
upstream freshrss { upstream freshrss {
server 192.168.1.219:8080; server 192.168.1.219:8080;
keepalive 64; keepalive 64;
@ -26,8 +30,24 @@ upstream grafana {
server 192.168.1.200:3000; server 192.168.1.200:3000;
} }
upstream vaultwarden-default { upstream mccp-link {
zone vaultwarden-default 64k; server 100.64.4.100:8080;
}
upstream mccp-map {
server 100.64.4.100:8123;
}
upstream mcm-std {
server 100.64.4.102;
}
upstream nextcloud {
server 100.64.2.120;
}
upstream vaultwarden {
zone vaultwarden 64k;
server 192.168.1.209:8000; server 192.168.1.209:8000;
keepalive 2; keepalive 2;
} }