My configuration :
on qnap server:
cloudflare
traefik 2.2
home assistant
long story short - my server was under attack ,
had to ask ISP to get new IP .
I re deploy the docker-compose and update new IP to cloudflare.
none of my subdomain is accessible (getting error 522) now - and it really really frustrating ...
On my router :
I delete all port forwarding rules and now i open only port 443 for treafik (not sure if its enough)
docker-compose.yml
version: '3.7'
services:
traefik:
image: traefik:v2.2.0
container_name: traefik
restart: always
command:
- --log.level=debug
- --log.filePath=etc/traefik/log/traefik.log
- --accessLog.filePath=etc/traefik/log/access.log
- --accessLog.bufferingSize=100
- --providers.docker=true
- --providers.docker.exposedbydefault=false
- --api
#allow access on 8888
- --api.insecure=true
- --entrypoints.traefik.address=:8888
- --entrypoints.web.address=:80
- --entrypoints.web.http.redirections.entrypoint.to=websecure
- --entrypoints.web.http.redirections.entrypoint.scheme=https
- --entrypoints.websecure.address=:443
- --entrypoints.websecure.http.tls.certresolver=myresolver
- --certificatesresolvers.myresolver.acme.dnschallenge=true
- --certificatesresolvers.myresolver.acme.email=${CF_API_EMAIL}
# TEST MODE
# - --certificatesresolvers.myresolver.acme.caserver=https://acme-staging-v02.api.letsencrypt.org/directory
- --certificatesresolvers.myresolver.acme.storage=acme.json
- --certificatesresolvers.myresolver.acme.dnschallenge.provider=cloudflare
# specify dynamic configuration file:
- --providers.file.filename=/dynamic.yaml
- --providers.file.watch=true
ports:
- 80:80
- 443:443
- 8888:8888
environment:
- CF_API_EMAIL=${CF_API_EMAIL}
- CF_API_KEY=${CF_API_KEY}
volumes:
- /etc/localtime:/etc/localtime:ro
- /var/run/docker.sock:/var/run/docker.sock
- ./traefik/acme.json:/acme.json
- ./traefik/:/etc/traefik/log/
#for accessing non docker application (qnap)
- ./traefik/dynamic.yaml:/dynamic.yaml
labels:
traefik.enable: true
# Dashboard
traefik.http.routers.traefik.rule: Host(`traefik.${DOMAINNAME}`)
traefik.http.routers.traefik.entrypoints: websecure
traefik.http.routers.traefik.service: api@internal
traefik.http.routers.traefik.middlewares: auth
traefik.http.middlewares.auth.basicauth.users: ${TRAEFIK_USER}:${TRAEFIK_PASS}
homeassistant:
container_name: homeassistant
image: homeassistant/home-assistant:latest
volumes:
- /share/Avi/HA/:/config
- /etc/localtime:/etc/localtime:ro
restart: always
#network_mode: host
ports:
- 8123:8123
labels:
traefik.enable: true
traefik.http.routers.hasss.rule: Host(`ha.${DOMAINNAME}`)
traefik.http.routers.hasss.entrypoints: websecure
traefik.http.services.hasss.loadbalancer.server.port: 8123
COMPOSE_PATH: ${PWD}
I couldn't find any error in traefik ,
I set debug mode:
time="2020-07-19T20:50:36+03:00" level=info msg="Traefik version 2.2.0 built on 2020-03-25T17:32:57Z"
time="2020-07-19T20:50:36+03:00" level=debug msg="Static configuration loaded {\"global\":{\"checkNewVersion\":true},\"serversTransport\":{\"maxIdleConnsPerHost\":200},\"entryPoints\":{\"traefik\":{\"address\":\":8888\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":10000000000},\"respondingTimeouts\":{\"idleTimeout\":180000000000}},\"forwardedHeaders\":{},\"http\":{}},\"web\":{\"address\":\":80\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":10000000000},\"respondingTimeouts\":{\"idleTimeout\":180000000000}},\"forwardedHeaders\":{},\"http\":{\"redirections\":{\"entryPoint\":{\"to\":\"websecure\",\"https\":\"https\",\"permanent\":true,\"priority\":1}}}},\"websecure\":{\"address\":\":443\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":10000000000},\"respondingTimeouts\":{\"idleTimeout\":180000000000}},\"forwardedHeaders\":{},\"http\":{\"tls\":{\"certResolver\":\"myresolver\"}}}},\"providers\":{\"providersThrottleDuration\":2000000000,\"docker\":{\"watch\":true,\"endpoint\":\"unix:///var/run/docker.sock\",\"defaultRule\":\"Host(`{{ normalize .Name }}`)\",\"swarmModeRefreshSeconds\":15000000000},\"file\":{\"watch\":true,\"filename\":\"/dynamic.yaml\"}},\"api\":{\"insecure\":true,\"dashboard\":true},\"log\":{\"level\":\"debug\",\"filePath\":\"etc/traefik/log/traefik.log\",\"format\":\"common\"},\"accessLog\":{\"filePath\":\"etc/traefik/log/access.log\",\"format\":\"common\",\"filters\":{},\"fields\":{\"defaultMode\":\"keep\",\"headers\":{\"defaultMode\":\"drop\"}},\"bufferingSize\":100},\"certificatesResolvers\":{\"myresolver\":{\"acme\":{\"email\":\"MEEE@gmail.com\",\"caServer\":\"https://acme-v02.api.letsencrypt.org/directory\",\"storage\":\"acme.json\",\"keyType\":\"RSA4096\",\"dnsChallenge\":{\"provider\":\"cloudflare\"}}}}}"
time="2020-07-19T20:50:36+03:00" level=info msg="\nStats collection is disabled.\nHelp us improve Traefik by turning this feature on :)\nMore details on: https://docs.traefik.io/contributing/data-collection/\n"
time="2020-07-19T20:50:36+03:00" level=info msg="Account URI does not match the current CAServer. The account will be reset." providerName=myresolver.acme
time="2020-07-19T20:50:36+03:00" level=info msg="Starting provider aggregator.ProviderAggregator {}"
time="2020-07-19T20:50:36+03:00" level=debug msg="Start TCP Server" entryPointName=traefik
time="2020-07-19T20:50:36+03:00" level=debug msg="Start TCP Server" entryPointName=web
time="2020-07-19T20:50:36+03:00" level=debug msg="Start TCP Server" entryPointName=websecure
time="2020-07-19T20:50:36+03:00" level=info msg="Starting provider *file.Provider {\"watch\":true,\"filename\":\"/dynamic.yaml\"}"
time="2020-07-19T20:50:36+03:00" level=info msg="Starting provider *acme.Provider {\"email\":\"MEEE@gmail.com\",\"caServer\":\"https://acme-v02.api.letsencrypt.org/directory\",\"storage\":\"acme.json\",\"keyType\":\"RSA4096\",\"dnsChallenge\":{\"provider\":\"cloudflare\"},\"ResolverName\":\"myresolver\",\"store\":{},\"ChallengeStore\":{}}"
time="2020-07-19T20:50:36+03:00" level=info msg="Testing certificate renew..." providerName=myresolver.acme
time="2020-07-19T20:50:36+03:00" level=info msg="Starting provider *docker.Provider {\"watch\":true,\"endpoint\":\"unix:///var/run/docker.sock\",\"defaultRule\":\"Host(`{{ normalize .Name }}`)\",\"swarmModeRefreshSeconds\":15000000000}"
time="2020-07-19T20:50:36+03:00" level=debug msg="Configuration received from provider file: {\"http\":{\"routers\":{\"service-router\":{\"entryPoints\":[\"websecure\"],\"service\":\"service-qnap\",\"rule\":\"Host(`qnap.MEEE.com`)\",\"tls\":{\"certResolver\":\"myresolver\"}}},\"services\":{\"service-qnap\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.1.112:8089\"}],\"passHostHeader\":null}}}},\"tcp\":{},\"udp\":{},\"tls\":{}}" providerName=file
time="2020-07-19T20:50:36+03:00" level=debug msg="Configuration received from provider myresolver.acme: {\"http\":{},\"tls\":{}}" providerName=myresolver.acme
time="2020-07-19T20:50:36+03:00" level=info msg="Starting provider *traefik.Provider {}"
time="2020-07-19T20:50:36+03:00" level=debug msg="Configuration received from provider internal: {\"http\":{\"routers\":{\"api\":{\"entryPoints\":[\"traefik\"],\"service\":\"api@internal\",\"rule\":\"PathPrefix(`/api`)\",\"priority\":2147483646},\"dashboard\":{\"entryPoints\":[\"traefik\"],\"middlewares\":[\"dashboard_redirect@internal\",\"dashboard_stripprefix@internal\"],\"service\":\"dashboard@internal\",\"rule\":\"PathPrefix(`/`)\",\"priority\":2147483645},\"web-to-websecure\":{\"entryPoints\":[\"web\"],\"middlewares\":[\"redirect-web-to-websecure\"],\"service\":\"noop@internal\",\"rule\":\"HostRegexp(`{host:.+}`)\",\"priority\":1}},\"services\":{\"api\":{},\"dashboard\":{},\"noop\":{}},\"middlewares\":{\"dashboard_redirect\":{\"redirectRegex\":{\"regex\":\"^(http:\\\\/\\\\/[^:\\\\/]+(:\\\\d+)?)\\\\/$\",\"replacement\":\"${1}/dashboard/\",\"permanent\":true}},\"dashboard_stripprefix\":{\"stripPrefix\":{\"prefixes\":[\"/dashboard/\",\"/dashboard\"]}},\"redirect-web-to-websecure\":{\"redirectScheme\":{\"scheme\":\"https\",\"port\":\"443\",\"permanent\":true}}},\"models\":{\"websecure\":{\"tls\":{\"certResolver\":\"myresolver\"}}}},\"tcp\":{},\"tls\":{}}" providerName=internal
time="2020-07-19T20:50:36+03:00" level=debug msg="Provider connection established with docker 17.09.1-ce (API 1.32)" providerName=docker
time="2020-07-19T20:50:36+03:00" level=debug msg="Creating middleware" routerName=service-router@file serviceName=service-qnap middlewareName=pipelining middlewareType=Pipelining entryPointName=websecure
time="2020-07-19T20:50:36+03:00" level=debug msg="Creating load-balancer" entryPointName=websecure routerName=service-router@file serviceName=service-qnap
time="2020-07-19T20:50:36+03:00" level=debug msg="Creating server 0 http://192.168.1.112:8089" entryPointName=websecure routerName=service-router@file serviceName=service-qnap serverName=0
time="2020-07-19T20:50:36+03:00" level=debug msg="Added outgoing tracing middleware service-qnap" middlewareName=tracing middlewareType=TracingForwarder entryPointName=websecure routerName=service-router@file
time="2020-07-19T20:50:36+03:00" level=debug msg="Creating middleware" middlewareName=traefik-internal-recovery entryPointName=websecure middlewareType=Recovery
time="2020-07-19T20:50:36+03:00" level=debug msg="No default certificate, generating one"
time="2020-07-19T20:50:36+03:00" level=debug msg="Filtering disabled container" providerName=docker container=unify-29a66af4b209343b345e6197338f3c4aabc1423566d161b0052ee49762902f52
time="2020-07-19T20:50:36+03:00" level=debug msg="Configuration received from provider docker: {\"http\":{},\"tcp\":{},\"udp\":{}}" providerName=docker
time="2020-07-19T20:50:36+03:00" level=debug msg="Provider event received {Status:start ID:75ca63f3cb258fe10d8830fa90480aaded0bd43519e4d5a457cb294dc096c217 From:traefik:v2.2.0 Type:container Action:start Actor:{ID:75ca63f3cb258fe10d8830fa90480aaded0bd43519e4d5a457cb294dc096c217 Attributes:map[com.docker.compose.config-hash:3e61882f28b444d487e44f0cff5a8c8705297b7620a25f87b0677e2432b11ddd com.docker.compose.container-number:1 com.docker.compose.oneoff:False com.docker.compose.project:dockers com.docker.compose.service:traefik com.docker.compose.version:1.22.0 image:traefik:v2.2.0 name:traefik org.opencontainers.image.description:A modern reverse-proxy org.opencontainers.image.documentation:https://docs.traefik.io org.opencontainers.image.title:Traefik org.opencontainers.image.url:https://traefik.io org.opencontainers.image.vendor:Containous org.opencontainers.image.version:v2.2.0 traefik.enable:True traefik.http.middlewares.auth.basicauth.users:avic:$apr1$gnc3F4mv$VNr.mLwolbwUF6vYVzPVs0 traefik.http.routers.traefik.entrypoints:websecure traefik.http.routers.traefik.middlewares:auth traefik.http.routers.traefik.rule:Host(`traefik.MEEE.com`) traefik.http.routers.traefik.service:api@internal]} Scope:local Time:1595181036 TimeNano:1595181036785447795}" providerName=docker
time="2020-07-19T20:50:36+03:00" level=debug msg="Filtering disabled container" providerName=docker container=unify-29a66af4b209343b345e6197338f3c4aabc1423566d161b0052ee49762902f52
time="2020-07-19T20:50:36+03:00" level=debug msg="Configuration received from provider docker: {\"http\":{\"routers\":{\"hasss\":{\"entryPoints\":[\"websecure\"],\"service\":\"hasss\",\"rule\":\"Host(`ha.MEEE.com`)\"},\"traefik\":{\"entryPoints\":[\"websecure\"],\"middlewares\":[\"auth\"],\"service\":\"api@internal\",\"rule\":\"Host(`traefik.MEEE.com`)\"}},\"services\":{\"hasss\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://172.29.0.3:8123\"}],\"passHostHeader\":true}},\"traefik-dockers\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://172.29.0.2:80\"}],\"passHostHeader\":true}}},\"middlewares\":{\"auth\":{\"basicAuth\":{\"users\":[\"avic:$apr1$gnc3F4mv$VNr.mLwolbwUF6vYVzPVs0\"]}}}},\"tcp\":{},\"udp\":{}}" providerName=docker
time="2020-07-19T20:50:38+03:00" level=debug msg="Try to challenge certificate for domain [qnap.MEEE.com] found in HostSNI rule" providerName=myresolver.acme routerName=service-router@file rule="Host(`qnap.MEEE.com`)"
time="2020-07-19T20:50:38+03:00" level=debug msg="Looking for provided certificate(s) to validate [\"qnap.MEEE.com\"]..." providerName=myresolver.acme routerName=service-router@file rule="Host(`qnap.MEEE.com`)"
time="2020-07-19T20:50:38+03:00" level=debug msg="Adding certificate for domain(s) ha.MEEE.com"
time="2020-07-19T20:50:38+03:00" level=debug msg="Adding certificate for domain(s) qnap.MEEE.com"
time="2020-07-19T20:50:38+03:00" level=debug msg="Adding certificate for domain(s) traefik.MEEE.com"
time="2020-07-19T20:50:38+03:00" level=debug msg="No default certificate, generating one"
time="2020-07-19T20:50:39+03:00" level=debug msg="No ACME certificate generation required for domains [\"qnap.MEEE.com\"]." routerName=service-router@file rule="Host(`qnap.MEEE.com`)" providerName=myresolver.acme
time="2020-07-19T20:50:39+03:00" level=debug msg="Creating middleware" serviceName=service-qnap middlewareName=pipelining middlewareType=Pipelining entryPointName=websecure routerName=service-router@file
time="2020-07-19T20:50:39+03:00" level=debug msg="Creating load-balancer" entryPointName=websecure routerName=service-router@file serviceName=service-qnap
time="2020-07-19T20:50:39+03:00" level=debug msg="Creating server 0 http://192.168.1.112:8089" serviceName=service-qnap serverName=0 entryPointName=websecure routerName=service-router@file
time="2020-07-19T20:50:39+03:00" level=debug msg="Added outgoing tracing middleware service-qnap" entryPointName=websecure routerName=service-router@file middlewareName=tracing middlewareType=TracingForwarder
time="2020-07-19T20:50:39+03:00" level=debug msg="Creating middleware" middlewareName=traefik-internal-recovery middlewareType=Recovery entryPointName=websecure
time="2020-07-19T20:50:39+03:00" level=debug msg="Try to challenge certificate for domain [qnap.MEEE.com] found in HostSNI rule" providerName=myresolver.acme routerName=service-router@file rule="Host(`qnap.MEEE.com`)"
time="2020-07-19T20:50:39+03:00" level=debug msg="Looking for provided certificate(s) to validate [\"qnap.MEEE.com\"]..." rule="Host(`qnap.MEEE.com`)" providerName=myresolver.acme routerName=service-router@file
time="2020-07-19T20:50:39+03:00" level=debug msg="No ACME certificate generation required for domains [\"qnap.MEEE.com\"]." providerName=myresolver.acme routerName=service-router@file rule="Host(`qnap.MEEE.com`)"
time="2020-07-19T20:50:39+03:00" level=debug msg="Adding certificate for domain(s) ha.MEEE.com"
time="2020-07-19T20:50:39+03:00" level=debug msg="Adding certificate for domain(s) qnap.MEEE.com"
time="2020-07-19T20:50:39+03:00" level=debug msg="Adding certificate for domain(s) traefik.MEEE.com"
time="2020-07-19T20:50:39+03:00" level=debug msg="No default certificate, generating one"
time="2020-07-19T20:50:40+03:00" level=debug msg="Added outgoing tracing middleware noop@internal" middlewareType=TracingForwarder entryPointName=web routerName=web-to-websecure@internal middlewareName=tracing
time="2020-07-19T20:50:40+03:00" level=debug msg="Creating middleware" middlewareType=RedirectScheme routerName=web-to-websecure@internal entryPointName=web middlewareName=redirect-web-to-websecure@internal
time="2020-07-19T20:50:40+03:00" level=debug msg="Setting up redirection to https 443" routerName=web-to-websecure@internal entryPointName=web middlewareName=redirect-web-to-websecure@internal middlewareType=RedirectScheme
time="2020-07-19T20:50:40+03:00" level=debug msg="Adding tracing to middleware" entryPointName=web routerName=web-to-websecure@internal middlewareName=redirect-web-to-websecure@internal
time="2020-07-19T20:50:40+03:00" level=debug msg="Creating middleware" middlewareType=Recovery entryPointName=web middlewareName=traefik-internal-recovery
time="2020-07-19T20:50:40+03:00" level=debug msg="Added outgoing tracing middleware dashboard@internal" entryPointName=traefik routerName=dashboard@internal middlewareName=tracing middlewareType=TracingForwarder
time="2020-07-19T20:50:40+03:00" level=debug msg="Creating middleware" middlewareType=StripPrefix middlewareName=dashboard_stripprefix@internal entryPointName=traefik routerName=dashboard@internal
time="2020-07-19T20:50:40+03:00" level=debug msg="Adding tracing to middleware" middlewareName=dashboard_stripprefix@internal routerName=dashboard@internal entryPointName=traefik
time="2020-07-19T20:50:40+03:00" level=debug msg="Creating middleware" entryPointName=traefik middlewareName=dashboard_redirect@internal middlewareType=RedirectRegex routerName=dashboard@internal
time="2020-07-19T20:50:40+03:00" level=debug msg="Setting up redirection from ^(http:\\/\\/[^:\\/]+(:\\d+)?)\\/$ to ${1}/dashboard/" middlewareName=dashboard_redirect@internal middlewareType=RedirectRegex routerName=dashboard@internal entryPointName=traefik
time="2020-07-19T20:50:40+03:00" level=debug msg="Adding tracing to middleware" entryPointName=traefik routerName=dashboard@internal middlewareName=dashboard_redirect@internal
time="2020-07-19T20:50:40+03:00" level=debug msg="Added outgoing tracing middleware api@internal" routerName=api@internal middlewareName=tracing middlewareType=TracingForwarder entryPointName=traefik
time="2020-07-19T20:50:40+03:00" level=debug msg="Creating middleware" entryPointName=traefik middlewareName=traefik-internal-recovery middlewareType=Recovery
time="2020-07-19T20:50:40+03:00" level=debug msg="Creating middleware" serviceName=service-qnap entryPointName=websecure middlewareName=pipelining middlewareType=Pipelining routerName=service-router@file
time="2020-07-19T20:50:40+03:00" level=debug msg="Creating load-balancer" routerName=service-router@file serviceName=service-qnap entryPointName=websecure
time="2020-07-19T20:50:40+03:00" level=debug msg="Creating server 0 http://192.168.1.112:8089" entryPointName=websecure routerName=service-router@file serviceName=service-qnap serverName=0
time="2020-07-19T20:50:40+03:00" level=debug msg="Added outgoing tracing middleware service-qnap" middlewareName=tracing middlewareType=TracingForwarder entryPointName=websecure routerName=service-router@file
time="2020-07-19T20:50:40+03:00" level=debug msg="Creating middleware" entryPointName=websecure middlewareName=traefik-internal-recovery middlewareType=Recovery
time="2020-07-19T20:50:40+03:00" level=debug msg="Try to challenge certificate for domain [qnap.MEEE.com] found in HostSNI rule" providerName=myresolver.acme routerName=service-router@file rule="Host(`qnap.MEEE.com`)"
time="2020-07-19T20:50:40+03:00" level=debug msg="Looking for provided certificate(s) to validate [\"qnap.MEEE.com\"]..." providerName=myresolver.acme routerName=service-router@file rule="Host(`qnap.MEEE.com`)"
time="2020-07-19T20:50:40+03:00" level=debug msg="No ACME certificate generation required for domains [\"qnap.MEEE.com\"]." providerName=myresolver.acme routerName=service-router@file rule="Host(`qnap.MEEE.com`)"
time="2020-07-19T20:50:40+03:00" level=debug msg="Adding certificate for domain(s) ha.MEEE.com"
time="2020-07-19T20:50:40+03:00" level=debug msg="Adding certificate for domain(s) qnap.MEEE.com"
time="2020-07-19T20:50:40+03:00" level=debug msg="Adding certificate for domain(s) traefik.MEEE.com"
time="2020-07-19T20:50:40+03:00" level=debug msg="No default certificate, generating one"
time="2020-07-19T20:50:41+03:00" level=debug msg="Added outgoing tracing middleware noop@internal" middlewareType=TracingForwarder entryPointName=web routerName=web-to-websecure@internal middlewareName=tracing
time="2020-07-19T20:50:41+03:00" level=debug msg="Creating middleware" middlewareType=RedirectScheme entryPointName=web routerName=web-to-websecure@internal middlewareName=redirect-web-to-websecure@internal
time="2020-07-19T20:50:41+03:00" level=debug msg="Setting up redirection to https 443" routerName=web-to-websecure@internal middlewareName=redirect-web-to-websecure@internal middlewareType=RedirectScheme entryPointName=web
time="2020-07-19T20:50:41+03:00" level=debug msg="Adding tracing to middleware" entryPointName=web routerName=web-to-websecure@internal middlewareName=redirect-web-to-websecure@internal
time="2020-07-19T20:50:41+03:00" level=debug msg="Creating middleware" middlewareName=traefik-internal-recovery middlewareType=Recovery entryPointName=web
time="2020-07-19T20:50:41+03:00" level=debug msg="Added outgoing tracing middleware api@internal" middlewareType=TracingForwarder entryPointName=traefik routerName=api@internal middlewareName=tracing
time="2020-07-19T20:50:41+03:00" level=debug msg="Added outgoing tracing middleware dashboard@internal" middlewareType=TracingForwarder routerName=dashboard@internal entryPointName=traefik middlewareName=tracing
time="2020-07-19T20:50:41+03:00" level=debug msg="Creating middleware" middlewareType=StripPrefix routerName=dashboard@internal entryPointName=traefik middlewareName=dashboard_stripprefix@internal
time="2020-07-19T20:50:41+03:00" level=debug msg="Adding tracing to middleware" routerName=dashboard@internal entryPointName=traefik middlewareName=dashboard_stripprefix@internal
time="2020-07-19T20:50:41+03:00" level=debug msg="Creating middleware" entryPointName=traefik routerName=dashboard@internal middlewareName=dashboard_redirect@internal middlewareType=RedirectRegex
time="2020-07-19T20:50:41+03:00" level=debug msg="Setting up redirection from ^(http:\\/\\/[^:\\/]+(:\\d+)?)\\/$ to ${1}/dashboard/" entryPointName=traefik routerName=dashboard@internal middlewareName=dashboard_redirect@internal middlewareType=RedirectRegex
time="2020-07-19T20:50:41+03:00" level=debug msg="Adding tracing to middleware" entryPointName=traefik routerName=dashboard@internal middlewareName=dashboard_redirect@internal
time="2020-07-19T20:50:41+03:00" level=debug msg="Creating middleware" entryPointName=traefik middlewareName=traefik-internal-recovery middlewareType=Recovery
time="2020-07-19T20:50:41+03:00" level=debug msg="Creating middleware" serviceName=service-qnap entryPointName=websecure routerName=service-router@file middlewareName=pipelining middlewareType=Pipelining
time="2020-07-19T20:50:41+03:00" level=debug msg="Creating load-balancer" routerName=service-router@file serviceName=service-qnap entryPointName=websecure
time="2020-07-19T20:50:41+03:00" level=debug msg="Creating server 0 http://192.168.1.112:8089" routerName=service-router@file serviceName=service-qnap entryPointName=websecure serverName=0
time="2020-07-19T20:50:41+03:00" level=debug msg="Added outgoing tracing middleware service-qnap" routerName=service-router@file middlewareName=tracing middlewareType=TracingForwarder entryPointName=websecure
time="2020-07-19T20:50:41+03:00" level=debug msg="Creating middleware" entryPointName=websecure middlewareName=traefik-internal-recovery middlewareType=Recovery
time="2020-07-19T20:50:41+03:00" level=debug msg="Try to challenge certificate for domain [qnap.MEEE.com] found in HostSNI rule" providerName=myresolver.acme routerName=service-router@file rule="Host(`qnap.MEEE.com`)"
time="2020-07-19T20:50:41+03:00" level=debug msg="Looking for provided certificate(s) to validate [\"qnap.MEEE.com\"]..." providerName=myresolver.acme routerName=service-router@file rule="Host(`qnap.MEEE.com`)"
time="2020-07-19T20:50:41+03:00" level=debug msg="No ACME certificate generation required for domains [\"qnap.MEEE.com\"]." providerName=myresolver.acme routerName=service-router@file rule="Host(`qnap.MEEE.com`)"
time="2020-07-19T20:50:41+03:00" level=debug msg="Adding certificate for domain(s) ha.MEEE.com"
time="2020-07-19T20:50:41+03:00" level=debug msg="Adding certificate for domain(s) qnap.MEEE.com"
time="2020-07-19T20:50:41+03:00" level=debug msg="Adding certificate for domain(s) traefik.MEEE.com"
time="2020-07-19T20:50:41+03:00" level=debug msg="No default certificate, generating one"
time="2020-07-19T20:50:42+03:00" level=debug msg="Added outgoing tracing middleware noop@internal" entryPointName=web routerName=web-to-websecure@internal middlewareName=tracing middlewareType=TracingForwarder
time="2020-07-19T20:50:42+03:00" level=debug msg="Creating middleware" middlewareName=redirect-web-to-websecure@internal middlewareType=RedirectScheme entryPointName=web routerName=web-to-websecure@internal
time="2020-07-19T20:50:42+03:00" level=debug msg="Setting up redirection to https 443" entryPointName=web routerName=web-to-websecure@internal middlewareName=redirect-web-to-websecure@internal middlewareType=RedirectScheme
time="2020-07-19T20:50:42+03:00" level=debug msg="Adding tracing to middleware" routerName=web-to-websecure@internal middlewareName=redirect-web-to-websecure@internal entryPointName=web
time="2020-07-19T20:50:42+03:00" level=debug msg="Creating middleware" entryPointName=web middlewareName=traefik-internal-recovery middlewareType=Recovery
time="2020-07-19T20:50:42+03:00" level=debug msg="Added outgoing tracing middleware api@internal" entryPointName=traefik routerName=api@internal middlewareName=tracing middlewareType=TracingForwarder
time="2020-07-19T20:50:42+03:00" level=debug msg="Added outgoing tracing middleware dashboard@internal" entryPointName=traefik routerName=dashboard@internal middlewareName=tracing middlewareType=TracingForwarder
time="2020-07-19T20:50:42+03:00" level=debug msg="Creating middleware" entryPointName=traefik routerName=dashboard@internal middlewareName=dashboard_stripprefix@internal middlewareType=StripPrefix
time="2020-07-19T20:50:42+03:00" level=debug msg="Adding tracing to middleware" middlewareName=dashboard_stripprefix@internal routerName=dashboard@internal entryPointName=traefik
time="2020-07-19T20:50:42+03:00" level=debug msg="Creating middleware" routerName=dashboard@internal middlewareName=dashboard_redirect@internal middlewareType=RedirectRegex entryPointName=traefik
time="2020-07-19T20:50:42+03:00" level=debug msg="Setting up redirection from ^(http:\\/\\/[^:\\/]+(:\\d+)?)\\/$ to ${1}/dashboard/" entryPointName=traefik routerName=dashboard@internal middlewareName=dashboard_redirect@internal middlewareType=RedirectRegex
time="2020-07-19T20:50:42+03:00" level=debug msg="Adding tracing to middleware" entryPointName=traefik routerName=dashboard@internal middlewareName=dashboard_redirect@internal
time="2020-07-19T20:50:42+03:00" level=debug msg="Creating middleware" middlewareType=Recovery middlewareName=traefik-internal-recovery entryPointName=traefik
time="2020-07-19T20:50:42+03:00" level=debug msg="Added outgoing tracing middleware api@internal" middlewareType=TracingForwarder middlewareName=tracing entryPointName=websecure routerName=traefik@docker
time="2020-07-19T20:50:42+03:00" level=debug msg="Creating middleware" entryPointName=websecure routerName=traefik@docker middlewareName=auth@docker middlewareType=BasicAuth
time="2020-07-19T20:50:42+03:00" level=debug msg="Adding tracing to middleware" entryPointName=websecure routerName=traefik@docker middlewareName=auth@docker
time="2020-07-19T20:50:42+03:00" level=debug msg="Creating middleware" serviceName=service-qnap middlewareName=pipelining middlewareType=Pipelining entryPointName=websecure routerName=service-router@file
time="2020-07-19T20:50:42+03:00" level=debug msg="Creating load-balancer" entryPointName=websecure routerName=service-router@file serviceName=service-qnap
time="2020-07-19T20:50:42+03:00" level=debug msg="Creating server 0 http://192.168.1.112:8089" serviceName=service-qnap serverName=0 entryPointName=websecure routerName=service-router@file
time="2020-07-19T20:50:42+03:00" level=debug msg="Added outgoing tracing middleware service-qnap" entryPointName=websecure routerName=service-router@file middlewareName=tracing middlewareType=TracingForwarder
time="2020-07-19T20:50:42+03:00" level=debug msg="Creating middleware" routerName=hasss@docker entryPointName=websecure serviceName=hasss middlewareName=pipelining middlewareType=Pipelining
time="2020-07-19T20:50:42+03:00" level=debug msg="Creating load-balancer" routerName=hasss@docker entryPointName=websecure serviceName=hasss
time="2020-07-19T20:50:42+03:00" level=debug msg="Creating server 0 http://172.29.0.3:8123" serviceName=hasss serverName=0 routerName=hasss@docker entryPointName=websecure
time="2020-07-19T20:50:42+03:00" level=debug msg="Added outgoing tracing middleware hasss" entryPointName=websecure routerName=hasss@docker middlewareName=tracing middlewareType=TracingForwarder
time="2020-07-19T20:50:42+03:00" level=debug msg="Creating middleware" entryPointName=websecure middlewareName=traefik-internal-recovery middlewareType=Recovery
time="2020-07-19T20:50:42+03:00" level=debug msg="Try to challenge certificate for domain [ha.MEEE.com] found in HostSNI rule" providerName=myresolver.acme routerName=hasss@docker rule="Host(`ha.MEEE.com`)"
time="2020-07-19T20:50:42+03:00" level=debug msg="Try to challenge certificate for domain [traefik.MEEE.com] found in HostSNI rule" providerName=myresolver.acme routerName=traefik@docker rule="Host(`traefik.MEEE.com`)"
time="2020-07-19T20:50:42+03:00" level=debug msg="Looking for provided certificate(s) to validate [\"ha.MEEE.com\"]..." providerName=myresolver.acme routerName=hasss@docker rule="Host(`ha.MEEE.com`)"
time="2020-07-19T20:50:42+03:00" level=debug msg="Try to challenge certificate for domain [qnap.MEEE.com] found in HostSNI rule" providerName=myresolver.acme routerName=service-router@file rule="Host(`qnap.MEEE.com`)"
time="2020-07-19T20:50:42+03:00" level=debug msg="Looking for provided certificate(s) to validate [\"qnap.MEEE.com\"]..." providerName=myresolver.acme routerName=service-router@file rule="Host(`qnap.MEEE.com`)"
time="2020-07-19T20:50:42+03:00" level=debug msg="No ACME certificate generation required for domains [\"ha.MEEE.com\"]." rule="Host(`ha.MEEE.com`)" providerName=myresolver.acme routerName=hasss@docker
time="2020-07-19T20:50:42+03:00" level=debug msg="Looking for provided certificate(s) to validate [\"traefik.MEEE.com\"]..." rule="Host(`traefik.MEEE.com`)" providerName=myresolver.acme routerName=traefik@docker
time="2020-07-19T20:50:42+03:00" level=debug msg="No ACME certificate generation required for domains [\"traefik.MEEE.com\"]." routerName=traefik@docker rule="Host(`traefik.MEEE.com`)" providerName=myresolver.acme
time="2020-07-19T20:50:42+03:00" level=debug msg="No ACME certificate generation required for domains [\"qnap.MEEE.com\"]." providerName=myresolver.acme routerName=service-router@file rule="Host(`qnap.MEEE.com`)"
Keep getting following error: