Hi,
I have the following traefik.yml file:
---
providers:
file:
filename: /etc/traefik/traefik.yml
log:
level: debug
api:
dashboard: True
entryPoints:
web:
address: ":80"
web-secure:
address: ":443"
metrics:
address: "127.0.0.1:8082"
metrics:
prometheus:
entryPoint: metrics
accessLog: {}
http:
routers:
prometheus-router:
rule: "PathPrefix(`/prometheus`)"
service: prometheus
entryPoints:
- web
- web-secure
middlewares:
- https-redirect
tls: {}
grafana-router:
rule: "PathPrefix(`/grafana`)"
service: grafana
entryPoints:
- web
- web-secure
middlewares:
- https-redirect
tls: {}
api:
rule: "PathPrefix(`/api`) || PathPrefix(`/dashboard`)"
service: api@internal
entryPoints:
- web
- web-secure
middlewares:
- https-redirect
tls: {}
middlewares:
https-redirect:
redirectScheme:
scheme: https
permanent: true
port: 443
services:
prometheus:
loadBalancer:
servers:
- url: "http://127.0.0.1:9090/"
grafana:
loadBalancer:
servers:
- url: "http://127.0.0.1:3000/"
tls:
certificates:
- certFile: /etc/traefik/censored.cert
keyFile: /etc/traefik/censored.key
The HTTPS redirect doesn't work. Anyone an idea?
When I do curl -vL censored
* Trying xxx.xxx.xxx.xxx:80...
* TCP_NODELAY set
* Connected to censored (xxx.xxx.xxx.xxx) port 80 (#0)
> GET / HTTP/1.1
> Host: censored
> User-Agent: curl/7.66.0
> Accept: */*
>
* Mark bundle as not supporting multiuse
< HTTP/1.1 404 Not Found
< Content-Type: text/plain; charset=utf-8
< X-Content-Type-Options: nosniff
< Date: Mon, 04 Nov 2019 15:08:25 GMT
< Content-Length: 19
<
404 page not found
* Connection #0 to host censored left intact
When I visit the page with HTTPS directly on port 443 everything works as expected.
Ok looks like the solution is to add two routers: One for the HTTP traffic as entrypoint and one for the HTTPS traffic to serve the actual application.
For example for prometheus:
http:
routers:
prometheus-router:
rule: "PathPrefix(`/prometheus`)"
service: prometheus
entryPoints:
- web
middlewares:
- https-redirect
prometheus-router-secure:
rule: "PathPrefix(`/prometheus`)"
service: prometheus
entryPoints:
- web-secure
tls: {}
My follow-up question is: Is there a more simple way to write this? It looks pretty bloated for me, why do I need to have 2 routers just for a god damn redirect? It would be so much cooler if we could just write it like this:
http:
routers:
prometheus-router:
rule: "PathPrefix(`/prometheus`)"
service: prometheus
entryPoints:
- web
- web-secure
middlewares:
- https-redirect
tls: {}
So I came to the following solution now:
http:
routers:
common:
rule: "Host(`censored`)"
entryPoints:
- web
middlewares:
- https-redirect
prometheus-router:
rule: "PathPrefix(`/prometheus`)"
service: prometheus
entryPoints:
- web-secure
tls: {}
grafana-router:
rule: "PathPrefix(`/grafana`)"
service: grafana
entryPoints:
- web-secure
tls: {}
api:
rule: "PathPrefix(`/api`) || PathPrefix(`/dashboard`)"
service: api@internal
entryPoints:
- web-secure
tls: {}
But now I have the problem that no redirect will happen for the api
router.. grafana
and prometheus
are working fine, the api
router just works when I go to https:///dashboard/ directly..
1 Like
Also, if I try to connect to http://<censored>/grafana/?orgId=1
directly it will not work due to the ?orgId=1
in the Path, I guess. Shouldn't that part just be passed on to the router? or do I need to use Regex in my PathPrefix Rule?
Ok, interesting.
Looks like one issue has been the missing service in the common
router. When I attach any service to it, it works as expected for grafana
and prometheus
. It also seems to work for the dashboard
. The only thing what is missing now is a working dashboard
redirect to /dashboard/
Here is my full traefik.yml now:
---
providers:
file:
filename: /etc/traefik/traefik.yml
log:
level: debug
api:
dashboard: True
entryPoints:
web:
address: ":80"
web-secure:
address: ":443"
metrics:
address: "127.0.0.1:8082"
metrics:
prometheus:
entryPoint: metrics
accessLog: {}
http:
routers:
common:
rule: "Host(`censored`)"
service: prometheus
entryPoints:
- web
middlewares:
- https-redirect
prometheus-router:
rule: "PathPrefix(`/prometheus`)"
service: prometheus
entryPoints:
- web-secure
tls: {}
grafana-router:
rule: "PathPrefix(`/grafana`)"
service: grafana
entryPoints:
- web-secure
tls: {}
api-router:
rule: "PathPrefix(`/api`) || PathPrefix(`/dashboard`)"
service: api@internal
entryPoints:
- web-secure
tls: {}
middlewares:
https-redirect:
redirectScheme:
scheme: https
permanent: true
port: 443
services:
prometheus:
loadBalancer:
servers:
- url: "http://127.0.0.1:9090/"
grafana:
loadBalancer:
servers:
- url: "http://127.0.0.1:3000/"
tls:
certificates:
- certFile: /etc/traefik/censored.cert
keyFile: /etc/traefik/censored.key
What I strongly dislike is the need for a service in the common
-router and that the dashboard will only appear on /dashboard/
. Would be cool if I could get forwarded to /dashboard/
. But the latter is just nut picking.. I think I will open a Bug report for the needed service.. I think it's unnecessary and it should be possible to define a router without a service just for redirecting or routing to another router..