← Knowledge base

Cloudflare: DNS and redirect loops

Avoid ERR_TOO_MANY_REDIRECTS.

Web2026-02-10

In this guide: Cloudflare: DNS and redirect loops. Avoid ERR_TOO_MANY_REDIRECTS.

If your site sits behind Cloudflare/a reverse proxy, pay attention to `X-Forwarded-*` headers and scheme (http/https) to avoid redirect loops. Prefer binding apps to `127.0.0.1` and exposing only nginx publicly.

If something goes wrong: check the service is running, listening on the expected port, and that your firewall allows the connection. For web services, `nginx -t` and `journalctl -u nginx` are good starting points. If you hit a redirect loop, check SSL mode (Flexible/Full) and who issues the redirect (Cloudflare vs origin).

After completing the steps below, verify the result: service status, logs, and network reachability. This saves hours when an issue shows up later.

Below you’ll find a quick checklist, verification commands, and common pitfalls. This helps you not only “do it”, but also confirm what a correct outcome looks like.

Quick checklist

  • Bind apps to `127.0.0.1` and expose nginx publicly.
  • Validate `X-Forwarded-Proto`/HTTPS scheme behind Cloudflare/proxies.
  • Always run `nginx -t` before reloading nginx.
  • Make one small change at a time and verify the result immediately.
  • Keep notes of what you changed (file/command/time).

Verify the result

# Verify / sanity checks
sudo nginx -t || true
sudo systemctl status nginx --no-pager || true
curl -fsS -I http://127.0.0.1/ | head -n 20 || true
sudo tail -n 80 /var/log/nginx/error.log 2>/dev/null || true

Common pitfalls

  • Redirect loops due to wrong http/https scheme behind a proxy.
  • Proxying to an upstream that listens on the wrong address/port.
  • Flexible SSL + origin https redirects often create a loop.
  • Use Full/Full (strict) and handle X-Forwarded-Proto correctly.

Need a VPS now?

Rent a WHITEWHALE VDS and launch in minutes.

European locations, transparent pricing, quick self-serve ordering.

Order VPS