ioweb-gr edited a comment on issue #1897: URL: https://github.com/apache/incubator-pagespeed-mod/issues/1897#issuecomment-968796195
I've modified my configuration file template so that all custom directives I write will go directly below the command `proxy_read_timeout` and above any other location blocks. Now the result is that I'm getting 404s for some images only e.g. `pub/media/xrackets_adults_bg_eng.png.pagespeed.ic.1hFd9psVc_.webp` My apache log doesn't mention anything with pagespeed in it ` grep -ri pagespeed ../logs/access_log ../logs/access_ssl_log` yields no result so I think apache is not used in this case. But on nginx logs I see results ``` ../logs/proxy_access_ssl_log:222.252.xx.xxx - - [15/Nov/2021:12:11:03 +0100] "GET /pub/media/wysiwyg/xespa.png.pagespeed.ic.Srrf3IOYbP.webp HTTP/2.0" 404 370 "https://subdomain.example.com/storeviewgreek/accessories/wilson-greek-flag-dampener-x-1-wr8413601.html" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36" ../logs/proxy_access_ssl_log:222.252.xx.xxx - - [15/Nov/2021:12:11:03 +0100] "GET /pub/media/xrackets_adults_bg_eng.png.pagespeed.ic.1hFd9psVc_.webp HTTP/2.0" 404 370 "https://subdomain.example.com/storeviewgreek/accessories/wilson-greek-flag-dampener-x-1-wr8413601.html" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36" ../logs/proxy_access_ssl_log:222.252.xx.xxx - - [15/Nov/2021:12:11:03 +0100] "GET /pub/static/version1636968163/frontend/Ioweb/etennis/el_GR/images/xloader-1.gif.pagespeed.ic.DaGwXwKN2x.webp HTTP/2.0" 200 40 "https://subdomain.example.com/storeviewgreek/accessories/wilson-greek-flag-dampener-x-1-wr8413601.html" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36" ../logs/proxy_access_ssl_log:222.252.xx.xxx - - [15/Nov/2021:12:11:03 +0100] "GET /pub/media/xrackets_kids_bg_eng.png.pagespeed.ic.xabPGK8I2V.webp HTTP/2.0" 404 370 "https://subdomain.example.com/storeviewgreek/accessories/wilson-greek-flag-dampener-x-1-wr8413601.html" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36" ../logs/proxy_access_ssl_log:222.252.xx.xxx - - [15/Nov/2021:12:11:03 +0100] "GET /pub/media/wysiwyg/xespa.png.pagespeed.ic.Srrf3IOYbP.webp HTTP/2.0" 404 370 "https://subdomain.example.com/storeviewgreek/accessories/wilson-greek-flag-dampener-x-1-wr8413601.html" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36" ../logs/proxy_access_ssl_log:222.252.xx.xxx - - [15/Nov/2021:12:11:15 +0100] "GET /pub/media/wysiwyg/xespa.png.pagespeed.ic.Srrf3IOYbP.webp HTTP/2.0" 404 370 "https://subdomain.example.com/storeviewgreek/checkout/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36" ../logs/proxy_access_ssl_log:222.252.xx.xxx - - [15/Nov/2021:12:11:15 +0100] "GET /pub/media/xrackets_adults_bg_eng.png.pagespeed.ic.1hFd9psVc_.webp HTTP/2.0" 404 370 "https://subdomain.example.com/storeviewgreek/checkout/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36" ../logs/proxy_access_ssl_log:222.252.xx.xxx - - [15/Nov/2021:12:11:15 +0100] "GET /pub/media/xrackets_kids_bg_eng.png.pagespeed.ic.xabPGK8I2V.webp HTTP/2.0" 404 370 "https://subdomain.example.com/storeviewgreek/checkout/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36" ``` ### nginx.conf <details> ``` #ATTENTION! # #DO NOT MODIFY THIS FILE BECAUSE IT WAS GENERATED AUTOMATICALLY, #SO ALL YOUR CHANGES WILL BE LOST THE NEXT TIME THE FILE IS GENERATED. server { listen 135.181.xxx.xxx:443 ssl http2; server_name subdomain.example.com; server_name www.subdomain.example.com; server_name ipv4.subdomain.example.com; ssl_certificate /opt/psa/var/certificates/scfzuSka7; ssl_certificate_key /opt/psa/var/certificates/scfzuSka7; client_max_body_size 128m; proxy_read_timeout 3600; include "/var/www/vhosts/system/subdomain.example.com/conf/vhost_nginx.conf"; # mailconfig location ~* ^/autodiscover/autodiscover\.xml$ { try_files $uri @mad; } location ~* ^(/\.well-known/autoconfig)?/mail/config\-v1\.1\.xml$ { try_files $uri @mad; } location ~* ^/email\.mobileconfig$ { try_files $uri @mad; } location @mad { rewrite ^(.*)$ /mailconfig/ break; proxy_pass http://127.0.0.1:8880; proxy_set_header X-Host $host; proxy_set_header X-Request-URI $request_uri; } # mailconfig root "/var/www/vhosts/subdomain.example.com/httpdocs"; access_log "/var/www/vhosts/system/subdomain.example.com/logs/proxy_access_ssl_log"; error_log "/var/www/vhosts/system/subdomain.example.com/logs/proxy_error_log"; #extension letsencrypt begin location ^~ /.well-known/acme-challenge/ { root /var/www/vhosts/default/htdocs; types { } default_type text/plain; satisfy any; auth_basic off; allow all; location ~ ^/\.well-known/acme-challenge.*/\. { deny all; } } #extension letsencrypt end #extension sslit begin add_header Strict-Transport-Security "max-age=15768000; includeSubDomains" always; #OCSP Stapling ssl_stapling on; ssl_stapling_verify on; #extension sslit end error_page 400 "/error_docs/bad_request.html"; error_page 401 "/error_docs/unauthorized.html"; error_page 403 "/error_docs/forbidden.html"; error_page 404 "/error_docs/not_found.html"; error_page 500 "/error_docs/internal_server_error.html"; error_page 405 "/error_docs/method_not_allowed.html"; error_page 406 "/error_docs/not_acceptable.html"; error_page 407 "/error_docs/proxy_authentication_required.html"; error_page 412 "/error_docs/precondition_failed.html"; error_page 414 "/error_docs/request_uri_too_long.html"; error_page 415 "/error_docs/unsupported_media_type.html"; error_page 501 "/error_docs/not_implemented.html"; error_page 502 "/error_docs/bad_gateway.html"; error_page 503 "/error_docs/maintenance.html"; location ^~ /error_docs { root "/var/www/vhosts/subdomain.example.com"; } location / { proxy_pass https://135.181.xxx.xxx:7081; proxy_hide_header upgrade; proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; access_log off; } location ~ ^/(plesk-stat|awstats-icon|webstat|webstat-ssl|ftpstat|anon_ftpstat) { proxy_pass https://135.181.xxx.xxx:7081; proxy_hide_header upgrade; proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; access_log off; } location @fallback { proxy_pass https://135.181.xxx.xxx:7081; proxy_hide_header upgrade; proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; access_log off; } location ~ ^/(.*\.(ac3|avi|bmp|bz2|css|cue|dat|doc|docx|dts|eot|exe|flv|gif|gz|htm|html|ico|img|iso|jpeg|jpg|js|mkv|mp3|mp4|mpeg|mpg|ogg|pdf|png|ppt|pptx|qt|rar|rm|svg|swf|tar|tgz|ttf|txt|wav|woff|woff2|xls|xlsx|zip|webp))$ { try_files $uri @fallback; } location ~ ^/~(.+?)(/.*?\.php)(/.*)?$ { fastcgi_read_timeout 3600; alias /var/www/vhosts/subdomain.example.com/web_users/$1/$2; fastcgi_split_path_info ^((?U).+\.php)(/?.+)$; try_files $uri $fastcgi_script_name =404; fastcgi_param PATH_INFO $fastcgi_path_info; fastcgi_pass "unix:/var/www/vhosts/system/subdomain.example.com/php-fpm.sock"; include /etc/nginx/fastcgi.conf; } location ~ ^/~(.+?)(/.*)?$ { proxy_pass https://135.181.xxx.xxx:7081; proxy_hide_header upgrade; proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; access_log off; } location ~ \.php(/.*)?$ { fastcgi_read_timeout 3600; fastcgi_split_path_info ^((?U).+\.php)(/?.+)$; try_files $uri $fastcgi_script_name =404; fastcgi_param PATH_INFO $fastcgi_path_info; fastcgi_pass "unix:/var/www/vhosts/system/subdomain.example.com/php-fpm.sock"; include /etc/nginx/fastcgi.conf; } add_header X-Powered-By PleskLin; } server { listen [2a01:4f9:xx:xxxx::2]:443 ssl http2; server_name subdomain.example.com; server_name www.subdomain.example.com; server_name ipv6.subdomain.example.com; ssl_certificate /opt/psa/var/certificates/scfzuSka7; ssl_certificate_key /opt/psa/var/certificates/scfzuSka7; client_max_body_size 128m; proxy_read_timeout 3600; include "/var/www/vhosts/system/subdomain.example.com/conf/vhost_nginx.conf"; # mailconfig location ~* ^/autodiscover/autodiscover\.xml$ { try_files $uri @mad; } location ~* ^(/\.well-known/autoconfig)?/mail/config\-v1\.1\.xml$ { try_files $uri @mad; } location ~* ^/email\.mobileconfig$ { try_files $uri @mad; } location @mad { rewrite ^(.*)$ /mailconfig/ break; proxy_pass http://127.0.0.1:8880; proxy_set_header X-Host $host; proxy_set_header X-Request-URI $request_uri; } # mailconfig root "/var/www/vhosts/subdomain.example.com/httpdocs"; access_log "/var/www/vhosts/system/subdomain.example.com/logs/proxy_access_ssl_log"; error_log "/var/www/vhosts/system/subdomain.example.com/logs/proxy_error_log"; #extension letsencrypt begin location ^~ /.well-known/acme-challenge/ { root /var/www/vhosts/default/htdocs; types { } default_type text/plain; satisfy any; auth_basic off; allow all; location ~ ^/\.well-known/acme-challenge.*/\. { deny all; } } #extension letsencrypt end #extension sslit begin add_header Strict-Transport-Security "max-age=15768000; includeSubDomains" always; #OCSP Stapling ssl_stapling on; ssl_stapling_verify on; #extension sslit end error_page 400 "/error_docs/bad_request.html"; error_page 401 "/error_docs/unauthorized.html"; error_page 403 "/error_docs/forbidden.html"; error_page 404 "/error_docs/not_found.html"; error_page 500 "/error_docs/internal_server_error.html"; error_page 405 "/error_docs/method_not_allowed.html"; error_page 406 "/error_docs/not_acceptable.html"; error_page 407 "/error_docs/proxy_authentication_required.html"; error_page 412 "/error_docs/precondition_failed.html"; error_page 414 "/error_docs/request_uri_too_long.html"; error_page 415 "/error_docs/unsupported_media_type.html"; error_page 501 "/error_docs/not_implemented.html"; error_page 502 "/error_docs/bad_gateway.html"; error_page 503 "/error_docs/maintenance.html"; location ^~ /error_docs { root "/var/www/vhosts/subdomain.example.com"; } location / { proxy_pass https://[2a01:4f9:xx:xxxx::2]:7081; proxy_hide_header upgrade; proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; access_log off; } location ~ ^/(plesk-stat|awstats-icon|webstat|webstat-ssl|ftpstat|anon_ftpstat) { proxy_pass https://[2a01:4f9:xx:xxxx::2]:7081; proxy_hide_header upgrade; proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; access_log off; } location @fallback { proxy_pass https://[2a01:4f9:xx:xxxx::2]:7081; proxy_hide_header upgrade; proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; access_log off; } location ~ ^/(.*\.(ac3|avi|bmp|bz2|css|cue|dat|doc|docx|dts|eot|exe|flv|gif|gz|htm|html|ico|img|iso|jpeg|jpg|js|mkv|mp3|mp4|mpeg|mpg|ogg|pdf|png|ppt|pptx|qt|rar|rm|svg|swf|tar|tgz|ttf|txt|wav|woff|woff2|xls|xlsx|zip|webp))$ { try_files $uri @fallback; } location ~ ^/~(.+?)(/.*?\.php)(/.*)?$ { fastcgi_read_timeout 3600; alias /var/www/vhosts/subdomain.example.com/web_users/$1/$2; fastcgi_split_path_info ^((?U).+\.php)(/?.+)$; try_files $uri $fastcgi_script_name =404; fastcgi_param PATH_INFO $fastcgi_path_info; fastcgi_pass "unix:/var/www/vhosts/system/subdomain.example.com/php-fpm.sock"; include /etc/nginx/fastcgi.conf; } location ~ ^/~(.+?)(/.*)?$ { proxy_pass https://[2a01:4f9:xx:xxxx::2]:7081; proxy_hide_header upgrade; proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; access_log off; } location ~ \.php(/.*)?$ { fastcgi_read_timeout 3600; fastcgi_split_path_info ^((?U).+\.php)(/?.+)$; try_files $uri $fastcgi_script_name =404; fastcgi_param PATH_INFO $fastcgi_path_info; fastcgi_pass "unix:/var/www/vhosts/system/subdomain.example.com/php-fpm.sock"; include /etc/nginx/fastcgi.conf; } add_header X-Powered-By PleskLin; } server { listen 135.181.xxx.xxx:80; server_name subdomain.example.com; server_name www.subdomain.example.com; server_name ipv4.subdomain.example.com; client_max_body_size 128m; proxy_read_timeout 3600; include "/var/www/vhosts/system/subdomain.example.com/conf/vhost_nginx.conf"; # mailconfig location ~* ^/autodiscover/autodiscover\.xml$ { try_files $uri @mad; } location ~* ^(/\.well-known/autoconfig)?/mail/config\-v1\.1\.xml$ { try_files $uri @mad; } location ~* ^/email\.mobileconfig$ { try_files $uri @mad; } location @mad { rewrite ^(.*)$ /mailconfig/ break; proxy_pass http://127.0.0.1:8880; proxy_set_header X-Host $host; proxy_set_header X-Request-URI $request_uri; } # mailconfig location / { return 301 https://$host$request_uri; } } server { listen [2a01:4f9:xx:xxxx::2]:80; server_name subdomain.example.com; server_name www.subdomain.example.com; server_name ipv6.subdomain.example.com; client_max_body_size 128m; proxy_read_timeout 3600; include "/var/www/vhosts/system/subdomain.example.com/conf/vhost_nginx.conf"; # mailconfig location ~* ^/autodiscover/autodiscover\.xml$ { try_files $uri @mad; } location ~* ^(/\.well-known/autoconfig)?/mail/config\-v1\.1\.xml$ { try_files $uri @mad; } location ~* ^/email\.mobileconfig$ { try_files $uri @mad; } location @mad { rewrite ^(.*)$ /mailconfig/ break; proxy_pass http://127.0.0.1:8880; proxy_set_header X-Host $host; proxy_set_header X-Request-URI $request_uri; } # mailconfig location / { return 301 https://$host$request_uri; } } ``` </details> -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: dev-unsubscr...@pagespeed.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org