Local Dashboard Access

I'm trying to get Traefik and Let's Encrypt running on my home server using docker. I've got my compose file set up and it seems to be authenticating correctly using the staging server. However, I cannot open the dashboard on my laptop on the local network.

I've added entries to my hosts file in order to resolve the hostname, and that fixed my original problem from my previous post. However, I still can't access the dashboard. Whenever I try to access it, my connection times out, and safari says the server isn't responding.

Hello :wave:
Would you please share Traefik config files as well as the logs from Traefik? Hopefully, we will find the answer there.
Thank you

Here are my config files and logs.

docker-compose.yml

version: "3.8"

########################### NETWORKS
networks:
  t2_proxy:
    external:
      name: t2_proxy
  default:
    driver: bridge

########################### SERVICES
services:
# Traefik 2 - Reverse Proxy
  traefik:
    container_name: traefik
    image: traefik:2.4
    restart: unless-stopped
    command: # CLI arguments
      - --global.checkNewVersion=true
      - --global.sendAnonymousUsage=true
      - --entryPoints.http.address=:80
      - --entryPoints.https.address=:443
      # Allow these IPs to set the X-Forwarded-* headers - Cloudflare IPs: https://www.cloudflare.com/ips/
      # ONLY FOR CF- --entrypoints.https.forwardedHeaders.trustedIPs=173.245.48.0/20,103.21.244.0/22,103.22.200.0/22,103.31>
      - --entryPoints.traefik.address=:8080
      # - --entryPoints.ping.address=:8081
      - --api=true
      # - --api.insecure=true
      # - --api.dashboard=true
      #- --ping=true
      #- --pilot.token=$TRAEFIK_PILOT_TOKEN
      # - --serversTransport.insecureSkipVerify=true
      - --log=true
      - --log.level=DEBUG # (Default: error) DEBUG, INFO, WARN, ERROR, FATAL, PANIC
      - --accessLog=true
      - --accessLog.filePath=/traefik.log
      - --accessLog.bufferingSize=100 # Configuring a buffer of 100 lines
      - --accessLog.filters.statusCodes=400-499
      - --providers.docker=true
      - --providers.docker.endpoint=unix:///var/run/docker.sock # Use Docker Socket Proxy instead for improved security
      # - --providers.docker.endpoint=tcp://socket-proxy:2375
      # Automatically set Host rule for services
      - --providers.docker.defaultrule=Host(`{{ index .Labels "com.docker.compose.service" }}.$DOMAINNAME`)
      - --providers.docker.exposedByDefault=false
      # - --entrypoints.https.http.middlewares=chain-oauth@file
#      - --entrypoints.https.http.tls.options=tls-opts@file
      # Add dns-cloudflare as default certresolver for all services. Also enables TLS and no need to specify on individual >
#      - --entrypoints.https.http.tls.certresolver=duck-dns
#      - --entrypoints.https.http.tls.domains[0].main=$DOMAINNAME
#      - --entrypoints.https.http.tls.domains[0].sans=*.$DOMAINNAME
      # - --entrypoints.https.http.tls.domains[1].main=$DOMAIN # Pulls main cert for second domain
      # - --entrypoints.https.http.tls.domains[1].sans=*.$DOMAIN # Pulls wildcard cert for second domain
      - --providers.docker.network=t2_proxy
      - --providers.docker.swarmMode=false
      - --providers.file.directory=/rules # Load dynamic configuration from one or more .toml or .yml files in a directory
      # - --providers.file.filename=/path/to/file # Load dynamic configuration from a file
      - --providers.file.watch=true # Only works on top level files in the rules folder
      - --certificatesResolvers.duck-dns.acme.caServer=https://acme-staging-v02.api.letsencrypt.org/directory # LetsEncrypt>
      - --certificatesResolvers.duck-dns.acme.email=$DUCKDNS_EMAIL
      - --certificatesResolvers.duck-dns.acme.storage=/acme.json
      - --certificatesResolvers.duck-dns.acme.dnsChallenge.provider=duckdns
      - --certificatesResolvers.duck-dns.acme.dnsChallenge.resolvers=1.1.1.1:53,1.0.0.1:53
#      - --certificatesResolvers.duck-dns.acme.dnsChallenge.delayBeforeCheck=90 # To delay DNS check and reduce LE hitrate
    # networks:
      # t2_proxy:
        # ipv4_address: 192.168.90.254 # You can specify a static IP
    networks:
      - t2_proxy
    security_opt:
      - no-new-privileges:true
    ports:
      - target: 80
        published: 80
        protocol: tcp
        mode: host
      - target: 443
        published: 443
        protocol: tcp
        mode: host
      - target: 8080
        published: 8080
        protocol: tcp
        mode: host
    volumes:
      - $DOCKERDIR/traefik2/rules:/rules
      - /var/run/docker.sock:/var/run/docker.sock:ro
      - $DOCKERDIR/traefik2/acme/acme.json:/acme.json
      - $DOCKERDIR/traefik2/traefik.log:/traefik.log
      - $DOCKERDIR/shared:/shared
    environment:
      - DUCKDNS_TOKEN=$DUCKDNS_TOKEN
      - DUCKDNS_EMAIL=$DUCKDNS_EMAIL
    labels:
      - "traefik.enable=true"
      # HTTP-to-HTTPS Redirect
      - "traefik.http.routers.http-catchall.entrypoints=http"
      - "traefik.http.routers.http-catchall.rule=HostRegexp(`{host:.+}`)"
      - "traefik.http.routers.http-catchall.middlewares=redirect-to-https"
      - "traefik.http.middlewares.redirect-to-https.redirectscheme.scheme=https"
      # HTTP Routers
      - "traefik.http.routers.traefik-rtr.entrypoints=https"
      - "traefik.http.routers.traefik-rtr.rule=Host(`traefik.$DOMAINNAME`)"
      - "traefik.http.routers.traefik-rtr.tls=true"
      - "traefik.http.routers.traefik-rtr.tls.certresolver=duck-dns" # Comment out this line after first run of traefik to >
      - "traefik.http.routers.traefik-rtr.tls.domains[0].main=$DOMAINNAME"
      - "traefik.http.routers.traefik-rtr.tls.domains[0].sans=*.$DOMAINNAME"
#      - "traefik.http.routers.traefik-rtr.tls.domains[1].main=$SECONDDOMAINNAME" # Pulls main cert for second domain
#      - "traefik.http.routers.traefik-rtr.tls.domains[1].sans=*.$SECONDDOMAINNAME" # Pulls wildcard cert for second domain
      ## Services - API
      - "traefik.http.routers.traefik-rtr.service=api@internal"
      ## Middlewares
      - "traefik.http.routers.traefik-rtr.middlewares=middlewares-basic-auth@file"

middlewares.toml

[http.middlewares]
  [http.middlewares.middlewares-basic-auth]
    [http.middlewares.middlewares-basic-auth.basicAuth]
#      username=user, password=mystrongpassword (listed below after hashing)
#      users = [
#        "user:$apr1$bvj3f2o0$/01DGlduxK4AqRsTwHnvc1",
#      ]
      realm = "Traefik2 Basic Auth"
      usersFile = "/shared/.htpasswd" #be sure to mount the volume through dock>

Traefik Logs

2021-02-09T23:31:46.548931083Z time="2021-02-09T23:31:46Z" level=debug msg="Creating middleware" entryPointName=http middlewareName=traefik-internal-recovery middlewareType=Recovery
2021-02-09T23:31:46.548978634Z time="2021-02-09T23:31:46Z" level=debug msg="Added outgoing tracing middleware api@internal" middlewareType=TracingForwarder entryPointName=https routerName=traefik-rtr@docker middlewareName=tracing
2021-02-09T23:31:46.549004452Z time="2021-02-09T23:31:46Z" level=debug msg="Creating middleware" entryPointName=https routerName=traefik-rtr@docker middlewareName=middlewares-basic-auth@file middlewareType=BasicAuth
2021-02-09T23:31:46.549111545Z time="2021-02-09T23:31:46Z" level=debug msg="Adding tracing to middleware" routerName=traefik-rtr@docker middlewareName=middlewares-basic-auth@file entryPointName=https
2021-02-09T23:31:46.549126213Z time="2021-02-09T23:31:46Z" level=debug msg="Creating middleware" middlewareType=Recovery entryPointName=https middlewareName=traefik-internal-recovery
2021-02-09T23:31:46.549132601Z time="2021-02-09T23:31:46Z" level=debug msg="No default certificate, generating one"
2021-02-09T23:31:46.608896089Z time="2021-02-09T23:31:46Z" level=debug msg="No default certificate, generating one"
2021-02-09T23:31:46.733469357Z time="2021-02-09T23:31:46Z" level=debug msg="Adding route for traefik.zsamedia.duckdns.org with TLS options default" entryPointName=https
2021-02-09T23:31:46.733514369Z time="2021-02-09T23:31:46Z" level=debug msg="Looking for provided certificate(s) to validate [\"zsamedia.duckdns.org\" \"*.zsamedia.duckdns.org\"]..." providerName=duck-dns.acme
2021-02-09T23:31:46.733589478Z time="2021-02-09T23:31:46Z" level=debug msg="Domains [\"zsamedia.duckdns.org\" \"*.zsamedia.duckdns.org\"] need ACME certificates generation for domains \"zsamedia.duckdns.org,*.zsamedia.duckdns.org\"." providerName=duck-dns.acme
2021-02-09T23:31:46.733596301Z time="2021-02-09T23:31:46Z" level=debug msg="Loading ACME certificates [zsamedia.duckdns.org *.zsamedia.duckdns.org]..." providerName=duck-dns.acme
2021-02-09T23:31:47.999412503Z time="2021-02-09T23:31:47Z" level=debug msg="Building ACME client..." providerName=duck-dns.acme
2021-02-09T23:31:47.999436064Z time="2021-02-09T23:31:47Z" level=debug msg="https://acme-staging-v02.api.letsencrypt.org/directory" providerName=duck-dns.acme
2021-02-09T23:31:48.912325159Z time="2021-02-09T23:31:48Z" level=info msg=Register... providerName=duck-dns.acme
2021-02-09T23:31:48.912368211Z time="2021-02-09T23:31:48Z" level=debug msg="legolog: [INFO] acme: Registering account for zachthezman2@gmail.com"
2021-02-09T23:31:49.289608453Z time="2021-02-09T23:31:49Z" level=debug msg="Using DNS Challenge provider: duckdns" providerName=duck-dns.acme
2021-02-09T23:31:49.289654579Z time="2021-02-09T23:31:49Z" level=debug msg="legolog: [INFO] [zsamedia.duckdns.org, *.zsamedia.duckdns.org] acme: Obtaining bundled SAN certificate"
2021-02-09T23:31:50.016543557Z time="2021-02-09T23:31:50Z" level=debug msg="legolog: [INFO] [*.zsamedia.duckdns.org] AuthURL: https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/206211770"
2021-02-09T23:31:50.016592098Z time="2021-02-09T23:31:50Z" level=debug msg="legolog: [INFO] [zsamedia.duckdns.org] AuthURL: https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/206211771"
2021-02-09T23:31:50.016697888Z time="2021-02-09T23:31:50Z" level=debug msg="legolog: [INFO] [*.zsamedia.duckdns.org] acme: use dns-01 solver"
2021-02-09T23:31:50.016849748Z time="2021-02-09T23:31:50Z" level=debug msg="legolog: [INFO] [zsamedia.duckdns.org] acme: Could not find solver for: tls-alpn-01"
2021-02-09T23:31:50.016892291Z time="2021-02-09T23:31:50Z" level=debug msg="legolog: [INFO] [zsamedia.duckdns.org] acme: Could not find solver for: http-01"
2021-02-09T23:31:50.016906250Z time="2021-02-09T23:31:50Z" level=debug msg="legolog: [INFO] [zsamedia.duckdns.org] acme: use dns-01 solver"
2021-02-09T23:31:50.016916927Z time="2021-02-09T23:31:50Z" level=debug msg="legolog: [INFO] [*.zsamedia.duckdns.org] acme: Preparing to solve DNS-01"
2021-02-09T23:31:50.451671418Z time="2021-02-09T23:31:50Z" level=debug msg="legolog: [INFO] [*.zsamedia.duckdns.org] acme: Trying to solve DNS-01"
2021-02-09T23:31:50.451712568Z time="2021-02-09T23:31:50Z" level=debug msg="legolog: [INFO] [*.zsamedia.duckdns.org] acme: Checking DNS record propagation using [1.1.1.1:53 1.0.0.1:53]"
2021-02-09T23:31:52.452081614Z time="2021-02-09T23:31:52Z" level=debug msg="legolog: [INFO] Wait for propagation [timeout: 1m0s, interval: 2s]"
2021-02-09T23:31:59.553637831Z time="2021-02-09T23:31:59Z" level=debug msg="legolog: [INFO] [*.zsamedia.duckdns.org] The server validated our request"
2021-02-09T23:31:59.553691891Z time="2021-02-09T23:31:59Z" level=debug msg="legolog: [INFO] [*.zsamedia.duckdns.org] acme: Cleaning DNS-01 challenge"
2021-02-09T23:31:59.861772980Z time="2021-02-09T23:31:59Z" level=debug msg="legolog: [INFO] sequence: wait for 1m0s"
2021-02-09T23:32:59.862098849Z time="2021-02-09T23:32:59Z" level=debug msg="legolog: [INFO] [zsamedia.duckdns.org] acme: Preparing to solve DNS-01"
2021-02-09T23:33:00.379166920Z time="2021-02-09T23:33:00Z" level=debug msg="legolog: [INFO] [zsamedia.duckdns.org] acme: Trying to solve DNS-01"
2021-02-09T23:33:00.379214233Z time="2021-02-09T23:33:00Z" level=debug msg="legolog: [INFO] [zsamedia.duckdns.org] acme: Checking DNS record propagation using [1.1.1.1:53 1.0.0.1:53]"
2021-02-09T23:33:02.379577409Z time="2021-02-09T23:33:02Z" level=debug msg="legolog: [INFO] Wait for propagation [timeout: 1m0s, interval: 2s]"
2021-02-09T23:33:08.366582763Z time="2021-02-09T23:33:08Z" level=debug msg="legolog: [INFO] [zsamedia.duckdns.org] The server validated our request"
2021-02-09T23:33:08.366640531Z time="2021-02-09T23:33:08Z" level=debug msg="legolog: [INFO] [zsamedia.duckdns.org] acme: Cleaning DNS-01 challenge"
2021-02-09T23:33:08.574149831Z time="2021-02-09T23:33:08Z" level=debug msg="legolog: [INFO] [zsamedia.duckdns.org, *.zsamedia.duckdns.org] acme: Validations succeeded; requesting certificates"
2021-02-09T23:33:12.258028377Z time="2021-02-09T23:33:12Z" level=debug msg="legolog: [INFO] [zsamedia.duckdns.org] Server responded with a certificate."
2021-02-09T23:33:12.258107568Z time="2021-02-09T23:33:12Z" level=debug msg="Certificates obtained for domains [zsamedia.duckdns.org *.zsamedia.duckdns.org]" providerName=duck-dns.acme
2021-02-09T23:33:12.258143264Z time="2021-02-09T23:33:12Z" level=debug msg="Configuration received from provider duck-dns.acme: {\"http\":{},\"tls\":{}}" providerName=duck-dns.acme
2021-02-09T23:33:12.259921146Z time="2021-02-09T23:33:12Z" level=debug msg="Adding certificate for domain(s) zsamedia.duckdns.org,*.zsamedia.duckdns.org"
2021-02-09T23:33:12.259981616Z time="2021-02-09T23:33:12Z" level=debug msg="No default certificate, generating one"
2021-02-09T23:33:12.317377144Z time="2021-02-09T23:33:12Z" level=debug msg="Creating middleware" entryPointName=http routerName=http-catchall@docker serviceName=traefik-docker middlewareName=pipelining middlewareType=Pipelining
2021-02-09T23:33:12.317416891Z time="2021-02-09T23:33:12Z" level=debug msg="Creating load-balancer" serviceName=traefik-docker entryPointName=http routerName=http-catchall@docker
2021-02-09T23:33:12.317420438Z time="2021-02-09T23:33:12Z" level=debug msg="Creating server 0 http://172.18.0.2:80" serviceName=traefik-docker entryPointName=http routerName=http-catchall@docker serverName=0
2021-02-09T23:33:12.317423033Z time="2021-02-09T23:33:12Z" level=debug msg="Added outgoing tracing middleware traefik-docker" routerName=http-catchall@docker entryPointName=http middlewareName=tracing middlewareType=TracingForwarder
2021-02-09T23:33:12.317425426Z time="2021-02-09T23:33:12Z" level=debug msg="Creating middleware" routerName=http-catchall@docker middlewareName=redirect-to-https@docker middlewareType=RedirectScheme entryPointName=http
2021-02-09T23:33:12.317427768Z time="2021-02-09T23:33:12Z" level=debug msg="Setting up redirection to https " middlewareName=redirect-to-https@docker middlewareType=RedirectScheme entryPointName=http routerName=http-catchall@docker
2021-02-09T23:33:12.317436400Z time="2021-02-09T23:33:12Z" level=debug msg="Adding tracing to middleware" entryPointName=http routerName=http-catchall@docker middlewareName=redirect-to-https@docker
2021-02-09T23:33:12.317452597Z time="2021-02-09T23:33:12Z" level=debug msg="Creating middleware" entryPointName=http middlewareName=traefik-internal-recovery middlewareType=Recovery
2021-02-09T23:33:12.317535867Z time="2021-02-09T23:33:12Z" level=debug msg="Added outgoing tracing middleware api@internal" middlewareType=TracingForwarder middlewareName=tracing entryPointName=https routerName=traefik-rtr@docker
2021-02-09T23:33:12.317546530Z time="2021-02-09T23:33:12Z" level=debug msg="Creating middleware" middlewareName=middlewares-basic-auth@file middlewareType=BasicAuth entryPointName=https routerName=traefik-rtr@docker
2021-02-09T23:33:12.317550534Z time="2021-02-09T23:33:12Z" level=debug msg="Adding tracing to middleware" middlewareName=middlewares-basic-auth@file entryPointName=https routerName=traefik-rtr@docker
2021-02-09T23:33:12.317553665Z time="2021-02-09T23:33:12Z" level=debug msg="Creating middleware" entryPointName=https middlewareType=Recovery middlewareName=traefik-internal-recovery
2021-02-09T23:33:12.317581125Z time="2021-02-09T23:33:12Z" level=debug msg="No default certificate, generating one"
2021-02-09T23:33:12.381330221Z time="2021-02-09T23:33:12Z" level=debug msg="Adding route for traefik.zsamedia.duckdns.org with TLS options default" entryPointName=https
2021-02-09T23:33:12.381356162Z time="2021-02-09T23:33:12Z" level=debug msg="Looking for provided certificate(s) to validate [\"zsamedia.duckdns.org\" \"*.zsamedia.duckdns.org\"]..." providerName=duck-dns.acme
2021-02-09T23:33:12.381503281Z time="2021-02-09T23:33:12Z" level=debug msg="No ACME certificate generation required for domains [\"zsamedia.duckdns.org\" \"*.zsamedia.duckdns.org\"]." providerName=duck-dns.acme
2021-02-09T23:41:45.523908230Z time="2021-02-09T23:41:45Z" level=info msg="Anonymous stats sent to https://collect.traefik.io/9vxmmkcdmalbdi635d4jgc5p5rx0h7h8: {\"global\":{\"checkNewVersion\":true,\"sendAnonymousUsage\":true},\"serversTransport\":{\"maxIdleConnsPerHost\":200},\"entryPoints\":{\"http\":{\"address\":\"xxxx\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":10000000000},\"respondingTimeouts\":{\"idleTimeout\":180000000000}},\"forwardedHeaders\":{},\"http\":{}},\"https\":{\"address\":\"xxxx\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":10000000000},\"respondingTimeouts\":{\"idleTimeout\":180000000000}},\"forwardedHeaders\":{},\"http\":{}},\"traefik\":{\"address\":\"xxxx\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":10000000000},\"respondingTimeouts\":{\"idleTimeout\":180000000000}},\"forwardedHeaders\":{},\"http\":{}}},\"providers\":{\"providersThrottleDuration\":2000000000,\"docker\":{\"watch\":true,\"endpoint\":\"xxxx\",\"defaultRule\":\"xxxx\",\"network\":\"t2_proxy\",\"swarmModeRefreshSeconds\":15000000000},\"file\":{\"directory\":\"/rules\",\"watch\":true}},\"api\":{\"dashboard\":true},\"log\":{\"level\":\"DEBUG\",\"format\":\"common\"},\"accessLog\":{\"filePath\":\"xxxx\",\"format\":\"common\",\"filters\":{\"statusCodes\":[\"400-499\"]},\"fields\":{\"defaultMode\":\"keep\",\"headers\":{\"defaultMode\":\"drop\"}},\"bufferingSize\":100},\"certificatesResolvers\":{\"duck-dns\":{\"acme\":{\"email\":\"xxxx\",\"caServer\":\"xxxx\",\"storage\":\"/acme.json\",\"keyType\":\"RSA4096\",\"dnsChallenge\":{\"provider\":\"duckdns\",\"resolvers\":[\"xxxx\",\"xxxx\"]}}}}}"
2021-02-09T23:41:45.524071010Z time="2021-02-09T23:41:45Z" level=debug msg="unknown kind to hash: func"
2021-02-09T23:41:46.321344931Z time="2021-02-09T23:41:46Z" level=warning msg="A new release has been found: 2.4.2. Please consider updating."
2021-02-10T23:31:45.512309817Z time="2021-02-10T23:31:45Z" level=info msg="Testing certificate renew..." providerName=duck-dns.acme
2021-02-10T23:31:45.523391687Z time="2021-02-10T23:31:45Z" level=info msg="Anonymous stats sent to https://collect.traefik.io/9vxmmkcdmalbdi635d4jgc5p5rx0h7h8: {\"global\":{\"checkNewVersion\":true,\"sendAnonymousUsage\":true},\"serversTransport\":{\"maxIdleConnsPerHost\":200},\"entryPoints\":{\"http\":{\"address\":\"xxxx\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":10000000000},\"respondingTimeouts\":{\"idleTimeout\":180000000000}},\"forwardedHeaders\":{},\"http\":{}},\"https\":{\"address\":\"xxxx\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":10000000000},\"respondingTimeouts\":{\"idleTimeout\":180000000000}},\"forwardedHeaders\":{},\"http\":{}},\"traefik\":{\"address\":\"xxxx\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":10000000000},\"respondingTimeouts\":{\"idleTimeout\":180000000000}},\"forwardedHeaders\":{},\"http\":{}}},\"providers\":{\"providersThrottleDuration\":2000000000,\"docker\":{\"watch\":true,\"endpoint\":\"xxxx\",\"defaultRule\":\"xxxx\",\"network\":\"t2_proxy\",\"swarmModeRefreshSeconds\":15000000000},\"file\":{\"directory\":\"/rules\",\"watch\":true}},\"api\":{\"dashboard\":true},\"log\":{\"level\":\"DEBUG\",\"format\":\"common\"},\"accessLog\":{\"filePath\":\"xxxx\",\"format\":\"common\",\"filters\":{\"statusCodes\":[\"400-499\"]},\"fields\":{\"defaultMode\":\"keep\",\"headers\":{\"defaultMode\":\"drop\"}},\"bufferingSize\":100},\"certificatesResolvers\":{\"duck-dns\":{\"acme\":{\"email\":\"xxxx\",\"caServer\":\"xxxx\",\"storage\":\"/acme.json\",\"keyType\":\"RSA4096\",\"dnsChallenge\":{\"provider\":\"duckdns\",\"resolvers\":[\"xxxx\",\"xxxx\"]}}}}}"
2021-02-10T23:31:45.523486902Z time="2021-02-10T23:31:45Z" level=debug msg="unknown kind to hash: func"
2021-02-10T23:31:47.074470903Z time="2021-02-10T23:31:47Z" level=warning msg="A new release has been found: 2.4.2. Please consider updating."
2021-02-11T23:31:45.512299736Z time="2021-02-11T23:31:45Z" level=info msg="Testing certificate renew..." providerName=duck-dns.acme
2021-02-11T23:31:45.523942466Z time="2021-02-11T23:31:45Z" level=info msg="Anonymous stats sent to https://collect.traefik.io/9vxmmkcdmalbdi635d4jgc5p5rx0h7h8: {\"global\":{\"checkNewVersion\":true,\"sendAnonymousUsage\":true},\"serversTransport\":{\"maxIdleConnsPerHost\":200},\"entryPoints\":{\"http\":{\"address\":\"xxxx\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":10000000000},\"respondingTimeouts\":{\"idleTimeout\":180000000000}},\"forwardedHeaders\":{},\"http\":{}},\"https\":{\"address\":\"xxxx\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":10000000000},\"respondingTimeouts\":{\"idleTimeout\":180000000000}},\"forwardedHeaders\":{},\"http\":{}},\"traefik\":{\"address\":\"xxxx\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":10000000000},\"respondingTimeouts\":{\"idleTimeout\":180000000000}},\"forwardedHeaders\":{},\"http\":{}}},\"providers\":{\"providersThrottleDuration\":2000000000,\"docker\":{\"watch\":true,\"endpoint\":\"xxxx\",\"defaultRule\":\"xxxx\",\"network\":\"t2_proxy\",\"swarmModeRefreshSeconds\":15000000000},\"file\":{\"directory\":\"/rules\",\"watch\":true}},\"api\":{\"dashboard\":true},\"log\":{\"level\":\"DEBUG\",\"format\":\"common\"},\"accessLog\":{\"filePath\":\"xxxx\",\"format\":\"common\",\"filters\":{\"statusCodes\":[\"400-499\"]},\"fields\":{\"defaultMode\":\"keep\",\"headers\":{\"defaultMode\":\"drop\"}},\"bufferingSize\":100},\"certificatesResolvers\":{\"duck-dns\":{\"acme\":{\"email\":\"xxxx\",\"caServer\":\"xxxx\",\"storage\":\"/acme.json\",\"keyType\":\"RSA4096\",\"dnsChallenge\":{\"provider\":\"duckdns\",\"resolvers\":[\"xxxx\",\"xxxx\"]}}}}}"
2021-02-11T23:31:45.524076039Z time="2021-02-11T23:31:45Z" level=debug msg="unknown kind to hash: func"
2021-02-11T23:31:46.430172454Z time="2021-02-11T23:31:46Z" level=warning msg="A new release has been found: 2.4.2. Please consider updating."
2021-02-12T23:31:45.512217530Z time="2021-02-12T23:31:45Z" level=info msg="Testing certificate renew..." providerName=duck-dns.acme
2021-02-12T23:31:45.523298139Z time="2021-02-12T23:31:45Z" level=info msg="Anonymous stats sent to https://collect.traefik.io/9vxmmkcdmalbdi635d4jgc5p5rx0h7h8: {\"global\":{\"checkNewVersion\":true,\"sendAnonymousUsage\":true},\"serversTransport\":{\"maxIdleConnsPerHost\":200},\"entryPoints\":{\"http\":{\"address\":\"xxxx\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":10000000000},\"respondingTimeouts\":{\"idleTimeout\":180000000000}},\"forwardedHeaders\":{},\"http\":{}},\"https\":{\"address\":\"xxxx\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":10000000000},\"respondingTimeouts\":{\"idleTimeout\":180000000000}},\"forwardedHeaders\":{},\"http\":{}},\"traefik\":{\"address\":\"xxxx\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":10000000000},\"respondingTimeouts\":{\"idleTimeout\":180000000000}},\"forwardedHeaders\":{},\"http\":{}}},\"providers\":{\"providersThrottleDuration\":2000000000,\"docker\":{\"watch\":true,\"endpoint\":\"xxxx\",\"defaultRule\":\"xxxx\",\"network\":\"t2_proxy\",\"swarmModeRefreshSeconds\":15000000000},\"file\":{\"directory\":\"/rules\",\"watch\":true}},\"api\":{\"dashboard\":true},\"log\":{\"level\":\"DEBUG\",\"format\":\"common\"},\"accessLog\":{\"filePath\":\"xxxx\",\"format\":\"common\",\"filters\":{\"statusCodes\":[\"400-499\"]},\"fields\":{\"defaultMode\":\"keep\",\"headers\":{\"defaultMode\":\"drop\"}},\"bufferingSize\":100},\"certificatesResolvers\":{\"duck-dns\":{\"acme\":{\"email\":\"xxxx\",\"caServer\":\"xxxx\",\"storage\":\"/acme.json\",\"keyType\":\"RSA4096\",\"dnsChallenge\":{\"provider\":\"duckdns\",\"resolvers\":[\"xxxx\",\"xxxx\"]}}}}}"
2021-02-12T23:31:45.523502045Z time="2021-02-12T23:31:45Z" level=debug msg="unknown kind to hash: func"
2021-02-12T23:31:47.066167230Z time="2021-02-12T23:31:47Z" level=warning msg="A new release has been found: 2.4.2. Please consider updating."
2021-02-13T23:31:45.512274684Z time="2021-02-13T23:31:45Z" level=info msg="Testing certificate renew..." providerName=duck-dns.acme
2021-02-13T23:31:45.523410180Z time="2021-02-13T23:31:45Z" level=info msg="Anonymous stats sent to https://collect.traefik.io/9vxmmkcdmalbdi635d4jgc5p5rx0h7h8: {\"global\":{\"checkNewVersion\":true,\"sendAnonymousUsage\":true},\"serversTransport\":{\"maxIdleConnsPerHost\":200},\"entryPoints\":{\"http\":{\"address\":\"xxxx\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":10000000000},\"respondingTimeouts\":{\"idleTimeout\":180000000000}},\"forwardedHeaders\":{},\"http\":{}},\"https\":{\"address\":\"xxxx\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":10000000000},\"respondingTimeouts\":{\"idleTimeout\":180000000000}},\"forwardedHeaders\":{},\"http\":{}},\"traefik\":{\"address\":\"xxxx\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":10000000000},\"respondingTimeouts\":{\"idleTimeout\":180000000000}},\"forwardedHeaders\":{},\"http\":{}}},\"providers\":{\"providersThrottleDuration\":2000000000,\"docker\":{\"watch\":true,\"endpoint\":\"xxxx\",\"defaultRule\":\"xxxx\",\"network\":\"t2_proxy\",\"swarmModeRefreshSeconds\":15000000000},\"file\":{\"directory\":\"/rules\",\"watch\":true}},\"api\":{\"dashboard\":true},\"log\":{\"level\":\"DEBUG\",\"format\":\"common\"},\"accessLog\":{\"filePath\":\"xxxx\",\"format\":\"common\",\"filters\":{\"statusCodes\":[\"400-499\"]},\"fields\":{\"defaultMode\":\"keep\",\"headers\":{\"defaultMode\":\"drop\"}},\"bufferingSize\":100},\"certificatesResolvers\":{\"duck-dns\":{\"acme\":{\"email\":\"xxxx\",\"caServer\":\"xxxx\",\"storage\":\"/acme.json\",\"keyType\":\"RSA4096\",\"dnsChallenge\":{\"provider\":\"duckdns\",\"resolvers\":[\"xxxx\",\"xxxx\"]}}}}}"
2021-02-13T23:31:45.523530616Z time="2021-02-13T23:31:45Z" level=debug msg="unknown kind to hash: func"
2021-02-13T23:31:46.408588677Z time="2021-02-13T23:31:46Z" level=warning msg="A new release has been found: 2.4.2. Please consider updating."
2021-02-14T23:31:45.512569062Z time="2021-02-14T23:31:45Z" level=info msg="Testing certificate renew..." providerName=duck-dns.acme
2021-02-14T23:31:45.523728518Z time="2021-02-14T23:31:45Z" level=info msg="Anonymous stats sent to https://collect.traefik.io/9vxmmkcdmalbdi635d4jgc5p5rx0h7h8: {\"global\":{\"checkNewVersion\":true,\"sendAnonymousUsage\":true},\"serversTransport\":{\"maxIdleConnsPerHost\":200},\"entryPoints\":{\"http\":{\"address\":\"xxxx\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":10000000000},\"respondingTimeouts\":{\"idleTimeout\":180000000000}},\"forwardedHeaders\":{},\"http\":{}},\"https\":{\"address\":\"xxxx\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":10000000000},\"respondingTimeouts\":{\"idleTimeout\":180000000000}},\"forwardedHeaders\":{},\"http\":{}},\"traefik\":{\"address\":\"xxxx\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":10000000000},\"respondingTimeouts\":{\"idleTimeout\":180000000000}},\"forwardedHeaders\":{},\"http\":{}}},\"providers\":{\"providersThrottleDuration\":2000000000,\"docker\":{\"watch\":true,\"endpoint\":\"xxxx\",\"defaultRule\":\"xxxx\",\"network\":\"t2_proxy\",\"swarmModeRefreshSeconds\":15000000000},\"file\":{\"directory\":\"/rules\",\"watch\":true}},\"api\":{\"dashboard\":true},\"log\":{\"level\":\"DEBUG\",\"format\":\"common\"},\"accessLog\":{\"filePath\":\"xxxx\",\"format\":\"common\",\"filters\":{\"statusCodes\":[\"400-499\"]},\"fields\":{\"defaultMode\":\"keep\",\"headers\":{\"defaultMode\":\"drop\"}},\"bufferingSize\":100},\"certificatesResolvers\":{\"duck-dns\":{\"acme\":{\"email\":\"xxxx\",\"caServer\":\"xxxx\",\"storage\":\"/acme.json\",\"keyType\":\"RSA4096\",\"dnsChallenge\":{\"provider\":\"duckdns\",\"resolvers\":[\"xxxx\",\"xxxx\"]}}}}}"
2021-02-14T23:31:45.523905010Z time="2021-02-14T23:31:45Z" level=debug msg="unknown kind to hash: func"
2021-02-14T23:31:47.698882589Z time="2021-02-14T23:31:47Z" level=warning msg="A new release has been found: 2.4.2. Please consider updating."
2021-02-15T23:31:45.512247555Z time="2021-02-15T23:31:45Z" level=info msg="Testing certificate renew..." providerName=duck-dns.acme
2021-02-15T23:31:45.523396558Z time="2021-02-15T23:31:45Z" level=info msg="Anonymous stats sent to https://collect.traefik.io/9vxmmkcdmalbdi635d4jgc5p5rx0h7h8: {\"global\":{\"checkNewVersion\":true,\"sendAnonymousUsage\":true},\"serversTransport\":{\"maxIdleConnsPerHost\":200},\"entryPoints\":{\"http\":{\"address\":\"xxxx\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":10000000000},\"respondingTimeouts\":{\"idleTimeout\":180000000000}},\"forwardedHeaders\":{},\"http\":{}},\"https\":{\"address\":\"xxxx\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":10000000000},\"respondingTimeouts\":{\"idleTimeout\":180000000000}},\"forwardedHeaders\":{},\"http\":{}},\"traefik\":{\"address\":\"xxxx\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":10000000000},\"respondingTimeouts\":{\"idleTimeout\":180000000000}},\"forwardedHeaders\":{},\"http\":{}}},\"providers\":{\"providersThrottleDuration\":2000000000,\"docker\":{\"watch\":true,\"endpoint\":\"xxxx\",\"defaultRule\":\"xxxx\",\"network\":\"t2_proxy\",\"swarmModeRefreshSeconds\":15000000000},\"file\":{\"directory\":\"/rules\",\"watch\":true}},\"api\":{\"dashboard\":true},\"log\":{\"level\":\"DEBUG\",\"format\":\"common\"},\"accessLog\":{\"filePath\":\"xxxx\",\"format\":\"common\",\"filters\":{\"statusCodes\":[\"400-499\"]},\"fields\":{\"defaultMode\":\"keep\",\"headers\":{\"defaultMode\":\"drop\"}},\"bufferingSize\":100},\"certificatesResolvers\":{\"duck-dns\":{\"acme\":{\"email\":\"xxxx\",\"caServer\":\"xxxx\",\"storage\":\"/acme.json\",\"keyType\":\"RSA4096\",\"dnsChallenge\":{\"provider\":\"duckdns\",\"resolvers\":[\"xxxx\",\"xxxx\"]}}}}}"
2021-02-15T23:31:45.523576749Z time="2021-02-15T23:31:45Z" level=debug msg="unknown kind to hash: func"
2021-02-15T23:31:46.669241762Z time="2021-02-15T23:31:46Z" level=warning msg="A new release has been found: 2.4.3. Please consider updating."
2021-02-16T23:31:45.512326240Z time="2021-02-16T23:31:45Z" level=info msg="Testing certificate renew..." providerName=duck-dns.acme
2021-02-16T23:31:45.523791707Z time="2021-02-16T23:31:45Z" level=info msg="Anonymous stats sent to https://collect.traefik.io/9vxmmkcdmalbdi635d4jgc5p5rx0h7h8: {\"global\":{\"checkNewVersion\":true,\"sendAnonymousUsage\":true},\"serversTransport\":{\"maxIdleConnsPerHost\":200},\"entryPoints\":{\"http\":{\"address\":\"xxxx\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":10000000000},\"respondingTimeouts\":{\"idleTimeout\":180000000000}},\"forwardedHeaders\":{},\"http\":{}},\"https\":{\"address\":\"xxxx\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":10000000000},\"respondingTimeouts\":{\"idleTimeout\":180000000000}},\"forwardedHeaders\":{},\"http\":{}},\"traefik\":{\"address\":\"xxxx\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":10000000000},\"respondingTimeouts\":{\"idleTimeout\":180000000000}},\"forwardedHeaders\":{},\"http\":{}}},\"providers\":{\"providersThrottleDuration\":2000000000,\"docker\":{\"watch\":true,\"endpoint\":\"xxxx\",\"defaultRule\":\"xxxx\",\"network\":\"t2_proxy\",\"swarmModeRefreshSeconds\":15000000000},\"file\":{\"directory\":\"/rules\",\"watch\":true}},\"api\":{\"dashboard\":true},\"log\":{\"level\":\"DEBUG\",\"format\":\"common\"},\"accessLog\":{\"filePath\":\"xxxx\",\"format\":\"common\",\"filters\":{\"statusCodes\":[\"400-499\"]},\"fields\":{\"defaultMode\":\"keep\",\"headers\":{\"defaultMode\":\"drop\"}},\"bufferingSize\":100},\"certificatesResolvers\":{\"duck-dns\":{\"acme\":{\"email\":\"xxxx\",\"caServer\":\"xxxx\",\"storage\":\"/acme.json\",\"keyType\":\"RSA4096\",\"dnsChallenge\":{\"provider\":\"duckdns\",\"resolvers\":[\"xxxx\",\"xxxx\"]}}}}}"
2021-02-16T23:31:45.523964917Z time="2021-02-16T23:31:45Z" level=debug msg="unknown kind to hash: func"
2021-02-16T23:31:46.791157677Z time="2021-02-16T23:31:46Z" level=warning msg="A new release has been found: 2.4.3. Please consider updating."
2021-02-17T23:31:45.512214792Z time="2021-02-17T23:31:45Z" level=info msg="Testing certificate renew..." providerName=duck-dns.acme
2021-02-17T23:31:45.523650131Z time="2021-02-17T23:31:45Z" level=info msg="Anonymous stats sent to https://collect.traefik.io/9vxmmkcdmalbdi635d4jgc5p5rx0h7h8: {\"global\":{\"checkNewVersion\":true,\"sendAnonymousUsage\":true},\"serversTransport\":{\"maxIdleConnsPerHost\":200},\"entryPoints\":{\"http\":{\"address\":\"xxxx\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":10000000000},\"respondingTimeouts\":{\"idleTimeout\":180000000000}},\"forwardedHeaders\":{},\"http\":{}},\"https\":{\"address\":\"xxxx\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":10000000000},\"respondingTimeouts\":{\"idleTimeout\":180000000000}},\"forwardedHeaders\":{},\"http\":{}},\"traefik\":{\"address\":\"xxxx\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":10000000000},\"respondingTimeouts\":{\"idleTimeout\":180000000000}},\"forwardedHeaders\":{},\"http\":{}}},\"providers\":{\"providersThrottleDuration\":2000000000,\"docker\":{\"watch\":true,\"endpoint\":\"xxxx\",\"defaultRule\":\"xxxx\",\"network\":\"t2_proxy\",\"swarmModeRefreshSeconds\":15000000000},\"file\":{\"directory\":\"/rules\",\"watch\":true}},\"api\":{\"dashboard\":true},\"log\":{\"level\":\"DEBUG\",\"format\":\"common\"},\"accessLog\":{\"filePath\":\"xxxx\",\"format\":\"common\",\"filters\":{\"statusCodes\":[\"400-499\"]},\"fields\":{\"defaultMode\":\"keep\",\"headers\":{\"defaultMode\":\"drop\"}},\"bufferingSize\":100},\"certificatesResolvers\":{\"duck-dns\":{\"acme\":{\"email\":\"xxxx\",\"caServer\":\"xxxx\",\"storage\":\"/acme.json\",\"keyType\":\"RSA4096\",\"dnsChallenge\":{\"provider\":\"duckdns\",\"resolvers\":[\"xxxx\",\"xxxx\"]}}}}}"
2021-02-17T23:31:45.523818089Z time="2021-02-17T23:31:45Z" level=debug msg="unknown kind to hash: func"
2021-02-17T23:31:46.926251520Z time="2021-02-17T23:31:46Z" level=warning msg="A new release has been found: 2.4.3. Please consider updating."
2021-02-18T00:25:40.617323185Z time="2021-02-18T00:25:40Z" level=debug msg="http: TLS handshake error from 172.18.0.1:34292: local error: tls: bad record MAC"
2021-02-18T00:27:33.164695320Z time="2021-02-18T00:27:33Z" level=debug msg="http: TLS handshake error from 172.18.0.1:34296: local error: tls: bad record MAC"
2021-02-18T00:27:36.629150257Z time="2021-02-18T00:27:36Z" level=debug msg="http: TLS handshake error from 172.18.0.1:34298: local error: tls: bad record MAC"
2021-02-18T23:31:45.512223407Z time="2021-02-18T23:31:45Z" level=info msg="Testing certificate renew..." providerName=duck-dns.acme
2021-02-18T23:31:45.523722935Z time="2021-02-18T23:31:45Z" level=info msg="Anonymous stats sent to https://collect.traefik.io/9vxmmkcdmalbdi635d4jgc5p5rx0h7h8: {\"global\":{\"checkNewVersion\":true,\"sendAnonymousUsage\":true},\"serversTransport\":{\"maxIdleConnsPerHost\":200},\"entryPoints\":{\"http\":{\"address\":\"xxxx\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":10000000000},\"respondingTimeouts\":{\"idleTimeout\":180000000000}},\"forwardedHeaders\":{},\"http\":{}},\"https\":{\"address\":\"xxxx\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":10000000000},\"respondingTimeouts\":{\"idleTimeout\":180000000000}},\"forwardedHeaders\":{},\"http\":{}},\"traefik\":{\"address\":\"xxxx\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":10000000000},\"respondingTimeouts\":{\"idleTimeout\":180000000000}},\"forwardedHeaders\":{},\"http\":{}}},\"providers\":{\"providersThrottleDuration\":2000000000,\"docker\":{\"watch\":true,\"endpoint\":\"xxxx\",\"defaultRule\":\"xxxx\",\"network\":\"t2_proxy\",\"swarmModeRefreshSeconds\":15000000000},\"file\":{\"directory\":\"/rules\",\"watch\":true}},\"api\":{\"dashboard\":true},\"log\":{\"level\":\"DEBUG\",\"format\":\"common\"},\"accessLog\":{\"filePath\":\"xxxx\",\"format\":\"common\",\"filters\":{\"statusCodes\":[\"400-499\"]},\"fields\":{\"defaultMode\":\"keep\",\"headers\":{\"defaultMode\":\"drop\"}},\"bufferingSize\":100},\"certificatesResolvers\":{\"duck-dns\":{\"acme\":{\"email\":\"xxxx\",\"caServer\":\"xxxx\",\"storage\":\"/acme.json\",\"keyType\":\"RSA4096\",\"dnsChallenge\":{\"provider\":\"duckdns\",\"resolvers\":[\"xxxx\",\"xxxx\"]}}}}}"
2021-02-18T23:31:45.523854325Z time="2021-02-18T23:31:45Z" level=debug msg="unknown kind to hash: func"
2021-02-18T23:31:46.305436667Z time="2021-02-18T23:31:46Z" level=warning msg="A new release has been found: 2.4.5. Please consider updating."

Does anyone know what might be causing this?

@jaydrogers

--api.dashboard=true is the default value

--api=true is the right way to enable the API and the dashboard

1 Like

Is the connection timeout likely a router or firewall issue? With UFW, I have ports 80, 443, and 8080 allowed, and I also have port forwarding for ports 80 and 443 enabled through my router.