diff options
-rw-r--r-- | nginx/grafana_kyriasis_com.sls | 36 |
1 files changed, 36 insertions, 0 deletions
diff --git a/nginx/grafana_kyriasis_com.sls b/nginx/grafana_kyriasis_com.sls index ca1f13d..a2cdb0a 100644 --- a/nginx/grafana_kyriasis_com.sls +++ b/nginx/grafana_kyriasis_com.sls @@ -16,4 +16,40 @@ nginx: - location /: - return: '301 https://$server_name$request_uri' + + - server: + - server_name: grafana.kyriasis.com + - listen: 443 ssl http2 + - listen: '[::]:443 ssl http2' + + - ssl: 'on' + - ssl_certificate: /etc/letsencrypt/live/grafana.kyriasis.com/fullchain.pem + - ssl_certificate_key: /etc/letsencrypt/live/grafana.kyriasis.com/privkey.pem + - ssl_dhparam: /etc/nginx/dhparam.pem + + - ssl_stapling: 'on' + - ssl_stapling_verify: 'on' + - ssl_trusted_certificate: /etc/letsencrypt/live/grafana.kyriasis.com/fullchain.pem + + # https://developer.mozilla.org/en-US/docs/Security/HTTP_Strict_Transport_Security + - add_header: 'Strict-Transport-Security "max-age=31536000"' + + # Tell browsers not to render the page inside a frame, and avoid clickjacking. + - add_header: X-Frame-Options SAMEORIGIN + + # Tell browsers to not try to auto-detect the Content-Type. + - add_header: X-Content-Type-Options nosniff + + # Enable the Cross-site scripting filter in most recent browsers. + # Normally enabled by default, but enable it anyway if user has disabled it. + - add_header: 'X-XSS-Protection "1; mode=block"' + + # http://www.gnuterrypratchett.com/ + - add_header: 'X-Clacks-Overhead "GNU Terry Pratchett"' + + - error_log: /var/log/nginx/grafana.kyriasis.com.error.log + + - location /: + - proxy_pass: http://localhost:3000/ + # vim: ft=yaml et: |