I'm not quite following what you're saying here, but in light of that I'll give you a simple example. I personally run a great number of web servers behind a single nginx proxy doing SSL termination.RockerMan wrote:Hi
Ok. No, balancer in the usual sense, is not there. Before working web server Apache work the web server Nginx.
Certificate I opened it and looked composition: CN "www.companyname.com", DNS name is the same "www.companyname.com". I was the last case - contact to support provider, where host our server. Maybe they left a clue somewhere for DNS name "www.my.companyname.com".
If I browse to http://<MYIP> I get the SSL certificate for www.mysite.com which hosts my wordpress (certificate validation fails because IP != CN)
If I browse to http://gitlab.mysite.com I get the SSL certificate signed for gitlab.mysite.com which hosts my git repositories
If I browse to http://wiki.mysite.com I get the SSL certificate signed for wiki.mysite.com which hosts my wiki
If I browse to http://www.mywifessite.com I get the SSL certificate signed for www.mywifessite which hosts my wif'e's business site
And if I browse to http://www.mysite.com I get the same SSL certificate I would have gotten in the first example of just browsing to my IP
This is all handled by my nginx reverse proxy using Server Name Identification. The long story shortened is that all of the above sites point to the same server, it just hands out different certificates based upon what the request URI is. In your case I'm suggesting that you find a URI that requests the proper certificate using a web browser (IE/Firefox/Whatever) to troubleshoot the problems you're experiencing before you bother moving into setting up a Nagios check.