Traefik wont route subdomain except .localhost, can access dashboard and docker applications through domain:port

My traefik instance seems to be unable to pick up anything directed at my domain name. Letsencrypt creates the certs just fine, but traefik never gets the request, not even a 404. I can ping the domain name from the server and other computers on LAN and get a response (I have a static DNS entry in my router). This system had worked previously for inside the network but now nothing gets to traefik. What is wrong with the configuration?

If I use a default docker-compose config file, I can curl whoami.localhost and get a response.

version: "3.3"

services:

  traefik:
    image: "traefik:v2.6"
    container_name: "traefik"
    command:
      - "--log.level=DEBUG"
      - "--api.insecure=true"
      - "--providers.docker=true"
      - "--providers.docker.exposedbydefault=false"
      - "--entrypoints.web.address=:80"
    ports:
      - "80:80"
      - "8080:8080"
    volumes:
      - "/var/run/docker.sock:/var/run/docker.sock:ro"

  whoami:
    image: "traefik/whoami"
    container_name: "simple-service"
    labels:
      - "traefik.enable=true"
      - "traefik.http.routers.whoami.rule=Host(`whoami.localhost`)"
      - "traefik.http.routers.whoami.entrypoints=web"
time="2022-03-24T22:22:41Z" level=debug msg="vulcand/oxy/roundrobin/rr: begin ServeHttp on request" Request="{\"Method\":\"GET\",\"URL\":{\"Scheme\":\"\",\"Opaque\":\"\",\"User\":null,\"Host\":\"\",\"Path\":\"/\",\"RawPath\":\"\",\"ForceQuery\":false,\"RawQuery\":\"\",\"Fragment\":\"\",\"RawFragment\":\"\"},\"Proto\":\"HTTP/1.1\",\"ProtoMajor\":1,\"ProtoMinor\":1,\"Header\":{\"Accept\":[\"*/*\"],\"User-Agent\":[\"curl/7.68.0\"],\"X-Forwarded-Host\":[\"whoami.localhost\"],\"X-Forwarded-Port\":[\"80\"],\"X-Forwarded-Proto\":[\"http\"],\"X-Forwarded-Server\":[\"7272c5bd7ba3\"],\"X-Real-Ip\":[\"172.27.0.1\"]},\"ContentLength\":0,\"TransferEncoding\":null,\"Host\":\"whoami.localhost\",\"Form\":null,\"PostForm\":null,\"MultipartForm\":null,\"Trailer\":null,\"RemoteAddr\":\"172.27.0.1:36940\",\"RequestURI\":\"/\",\"TLS\":null}"
time="2022-03-24T22:22:41Z" level=debug msg="vulcand/oxy/roundrobin/rr: Forwarding this request to URL" Request="{\"Method\":\"GET\",\"URL\":{\"Scheme\":\"\",\"Opaque\":\"\",\"User\":null,\"Host\":\"\",\"Path\":\"/\",\"RawPath\":\"\",\"ForceQuery\":false,\"RawQuery\":\"\",\"Fragment\":\"\",\"RawFragment\":\"\"},\"Proto\":\"HTTP/1.1\",\"ProtoMajor\":1,\"ProtoMinor\":1,\"Header\":{\"Accept\":[\"*/*\"],\"User-Agent\":[\"curl/7.68.0\"],\"X-Forwarded-Host\":[\"whoami.localhost\"],\"X-Forwarded-Port\":[\"80\"],\"X-Forwarded-Proto\":[\"http\"],\"X-Forwarded-Server\":[\"7272c5bd7ba3\"],\"X-Real-Ip\":[\"172.27.0.1\"]},\"ContentLength\":0,\"TransferEncoding\":null,\"Host\":\"whoami.localhost\",\"Form\":null,\"PostForm\":null,\"MultipartForm\":null,\"Trailer\":null,\"RemoteAddr\":\"172.27.0.1:36940\",\"RequestURI\":\"/\",\"TLS\":null}" ForwardURL="http://172.27.0.2:80"
time="2022-03-24T22:22:41Z" level=debug msg="vulcand/oxy/roundrobin/rr: completed ServeHttp on request" Request="{\"Method\":\"GET\",\"URL\":{\"Scheme\":\"\",\"Opaque\":\"\",\"User\":null,\"Host\":\"\",\"Path\":\"/\",\"RawPath\":\"\",\"ForceQuery\":false,\"RawQuery\":\"\",\"Fragment\":\"\",\"RawFragment\":\"\"},\"Proto\":\"HTTP/1.1\",\"ProtoMajor\":1,\"ProtoMinor\":1,\"Header\":{\"Accept\":[\"*/*\"],\"User-Agent\":[\"curl/7.68.0\"],\"X-Forwarded-Host\":[\"whoami.localhost\"],\"X-Forwarded-Port\":[\"80\"],\"X-Forwarded-Proto\":[\"http\"],\"X-Forwarded-Server\":[\"7272c5bd7ba3\"],\"X-Real-Ip\":[\"172.27.0.1\"]},\"ContentLength\":0,\"TransferEncoding\":null,\"Host\":\"whoami.localhost\",\"Form\":null,\"PostForm\":null,\"MultipartForm\":null,\"Trailer\":null,\"RemoteAddr\":\"172.27.0.1:36940\",\"RequestURI\":\"/\",\"TLS\":null}"

However, attempting to run the connection through https causes the connection attempt to hang

version: "3.3"

services:

  traefik:
    image: traefik:latest
    container_name: traefik
    command:
      - --log.level=DEBUG
      - --log.filePath=/log/traefik.log
      - --log.format=json 
      - --api.insecure=true
      - --ping=true
      - --providers.docker=true
      - --providers.docker.exposedbydefault=true
      - --providers.docker.endpoint=unix:///var/run/docker.sock
      - --providers.docker.network=traefik
      - --providers.docker.defaultRule=Host(`{{ index .Labels "com.docker.compose.service" }}.${HOST}`)
      - --entrypoints.web.address=:80
      - --entrypoints.websecure.address=:443
      - --entrypoints.https.http.tls.certresolver=leresolver
      - --certificatesresolvers.leresolver.acme.dnschallenge=true
      - --certificatesresolvers.leresolver.acme.dnschallenge.provider=cloudflare
      - --certificatesresolvers.leresolver.acme.email=${EMAIL}
      - --certificatesresolvers.leresolver.acme.caServer=https://acme-staging-v02.api.letsencrypt.org/directory
      - --certificatesresolvers.leresolver.acme.storage=/letsencrypt/acme.json
      - --certificatesresolvers.leresolver.acme.dnschallenge.resolvers=1.1.1.1:53
      - --certificatesresolvers.leresolver.acme.dnschallenge.delayBeforeCheck=5
      # Global HTTP -> HTTPS
      - --entrypoints.web.http.redirections.entrypoint.to=websecure
      - --entrypoints.web.http.redirections.entrypoint.scheme=https
    ports:
      - target: 80
        published: 80
        protocol: tcp
        mode: host
      - target: 443
        published: 443
        protocol: tcp
        mode: host
      - target: 8080
        published: 8080
        protocol: tcp
        mode: host
    networks:
      - traefik
    environment:
      - CF_API_EMAIL=${EMAIL}
      - CF_API_KEY=${TOKEN}
    volumes:
      - ./letsencrypt:/letsencrypt
      - ./log:/log
      - /var/run/docker.sock:/var/run/docker.sock:ro

  whoami:
    image: "traefik/whoami"
    container_name: whoami
    networks:
      - traefik
    expose:
    - 80

networks:
  traefik:
    external: true

I can see in the logs that both services are attaching, but traefik never sees the request

{"level":"info","msg":"Traefik version 2.6.1 built on 2022-02-14T16:50:25Z","time":"2022-03-24T22:13:28Z"}
{"level":"debug","msg":"Static configuration loaded {\"global\":{\"checkNewVersion\":true},\"serversTransport\":{\"maxIdleConnsPerHost\":200},\"entryPoints\":{\"traefik\":{\"address\":\":8080\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":\"10s\"},\"respondingTimeouts\":{\"idleTimeout\":\"3m0s\"}},\"forwardedHeaders\":{},\"http\":{},\"udp\":{\"timeout\":\"3s\"}},\"web\":{\"address\":\":80\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":\"10s\"},\"respondingTimeouts\":{\"idleTimeout\":\"3m0s\"}},\"forwardedHeaders\":{},\"http\":{\"redirections\":{\"entryPoint\":{\"to\":\"websecure\",\"scheme\":\"https\",\"permanent\":true,\"priority\":2147483646}}},\"udp\":{\"timeout\":\"3s\"}},\"websecure\":{\"address\":\":443\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":\"10s\"},\"respondingTimeouts\":{\"idleTimeout\":\"3m0s\"}},\"forwardedHeaders\":{},\"http\":{\"tls\":{\"certResolver\":\"leresolver\"}},\"udp\":{\"timeout\":\"3s\"}}},\"providers\":{\"providersThrottleDuration\":\"2s\",\"docker\":{\"watch\":true,\"endpoint\":\"unix:///var/run/docker.sock\",\"defaultRule\":\"Host(`{{ index .Labels \\\"com.docker.compose.service\\\" }}.${HOST}`)\",\"exposedByDefault\":true,\"network\":\"traefik\",\"swarmModeRefreshSeconds\":\"15s\"}},\"api\":{\"insecure\":true,\"dashboard\":true},\"ping\":{\"entryPoint\":\"traefik\",\"terminatingStatusCode\":503},\"log\":{\"level\":\"DEBUG\",\"filePath\":\"/log/traefik.log\",\"format\":\"json\"},\"certificatesResolvers\":{\"leresolver\":{\"acme\":{\"email\":\"${EMAIL}\",\"caServer\":\"https://acme-staging-v02.api.letsencrypt.org/directory\",\"storage\":\"/letsencrypt/acme.json\",\"keyType\":\"RSA4096\",\"certificatesDuration\":2160,\"dnsChallenge\":{\"provider\":\"cloudflare\",\"delayBeforeCheck\":\"5s\",\"resolvers\":[\"1.1.1.1:53\"]}}}},\"pilot\":{\"dashboard\":true}}","time":"2022-03-24T22:13:28Z"}
{"level":"info","msg":"\nStats collection is disabled.\nHelp us improve Traefik by turning this feature on :)\nMore details on: https://doc.traefik.io/traefik/contributing/data-collection/\n","time":"2022-03-24T22:13:28Z"}
{"entryPointName":"traefik","level":"debug","msg":"Start TCP Server","time":"2022-03-24T22:13:28Z"}
{"level":"info","msg":"Starting provider aggregator.ProviderAggregator","time":"2022-03-24T22:13:28Z"}
{"entryPointName":"websecure","level":"debug","msg":"Start TCP Server","time":"2022-03-24T22:13:28Z"}
{"entryPointName":"web","level":"debug","msg":"Start TCP Server","time":"2022-03-24T22:13:28Z"}
{"level":"info","msg":"Starting provider *docker.Provider","time":"2022-03-24T22:13:28Z"}
{"level":"debug","msg":"*docker.Provider provider configuration: {\"watch\":true,\"endpoint\":\"unix:///var/run/docker.sock\",\"defaultRule\":\"Host(`{{ index .Labels \\\"com.docker.compose.service\\\" }}.${HOST}`)\",\"exposedByDefault\":true,\"network\":\"traefik\",\"swarmModeRefreshSeconds\":\"15s\"}","time":"2022-03-24T22:13:28Z"}
{"level":"info","msg":"Starting provider *traefik.Provider","time":"2022-03-24T22:13:28Z"}
{"level":"debug","msg":"*traefik.Provider provider configuration: {}","time":"2022-03-24T22:13:28Z"}
{"level":"info","msg":"Starting provider *acme.ChallengeTLSALPN","time":"2022-03-24T22:13:28Z"}
{"level":"debug","msg":"*acme.ChallengeTLSALPN provider configuration: {\"Timeout\":4000000000}","time":"2022-03-24T22:13:28Z"}
{"level":"info","msg":"Starting provider *acme.Provider","time":"2022-03-24T22:13:28Z"}
{"level":"debug","msg":"*acme.Provider provider configuration: {\"email\":\"${EMAIL}\",\"caServer\":\"https://acme-staging-v02.api.letsencrypt.org/directory\",\"storage\":\"/letsencrypt/acme.json\",\"keyType\":\"RSA4096\",\"certificatesDuration\":2160,\"dnsChallenge\":{\"provider\":\"cloudflare\",\"delayBeforeCheck\":\"5s\",\"resolvers\":[\"1.1.1.1:53\"]},\"ResolverName\":\"leresolver\",\"store\":{},\"TLSChallengeProvider\":{\"Timeout\":4000000000},\"HTTPChallengeProvider\":{}}","time":"2022-03-24T22:13:28Z"}
{"ACME CA":"https://acme-staging-v02.api.letsencrypt.org/directory","level":"debug","msg":"Attempt to renew certificates \"720h0m0s\" before expiry and check every \"24h0m0s\"","providerName":"leresolver.acme","time":"2022-03-24T22:13:28Z"}
{"ACME CA":"https://acme-staging-v02.api.letsencrypt.org/directory","level":"info","msg":"Testing certificate renew...","providerName":"leresolver.acme","time":"2022-03-24T22:13:28Z"}
{"level":"debug","msg":"Configuration received from provider internal: {\"http\":{\"routers\":{\"api\":{\"entryPoints\":[\"traefik\"],\"service\":\"api@internal\",\"rule\":\"PathPrefix(`/api`)\",\"priority\":2147483646},\"dashboard\":{\"entryPoints\":[\"traefik\"],\"middlewares\":[\"dashboard_redirect@internal\",\"dashboard_stripprefix@internal\"],\"service\":\"dashboard@internal\",\"rule\":\"PathPrefix(`/`)\",\"priority\":2147483645},\"ping\":{\"entryPoints\":[\"traefik\"],\"service\":\"ping@internal\",\"rule\":\"PathPrefix(`/ping`)\",\"priority\":2147483647},\"web-to-websecure\":{\"entryPoints\":[\"web\"],\"middlewares\":[\"redirect-web-to-websecure\"],\"service\":\"noop@internal\",\"rule\":\"HostRegexp(`{host:.+}`)\",\"priority\":2147483646}},\"services\":{\"api\":{},\"dashboard\":{},\"noop\":{},\"ping\":{}},\"middlewares\":{\"dashboard_redirect\":{\"redirectRegex\":{\"regex\":\"^(http:\\\\/\\\\/(\\\\[[\\\\w:.]+\\\\]|[\\\\w\\\\._-]+)(:\\\\d+)?)\\\\/$\",\"replacement\":\"${1}/dashboard/\",\"permanent\":true}},\"dashboard_stripprefix\":{\"stripPrefix\":{\"prefixes\":[\"/dashboard/\",\"/dashboard\"]}},\"redirect-web-to-websecure\":{\"redirectScheme\":{\"scheme\":\"https\",\"port\":\"443\",\"permanent\":true}}},\"models\":{\"websecure\":{\"tls\":{\"certResolver\":\"leresolver\"}}},\"serversTransports\":{\"default\":{\"maxIdleConnsPerHost\":200}}},\"tcp\":{},\"tls\":{}}","providerName":"internal","time":"2022-03-24T22:13:28Z"}
{"level":"debug","msg":"Configuration received from provider leresolver.acme: {\"http\":{},\"tls\":{}}","providerName":"leresolver.acme","time":"2022-03-24T22:13:28Z"}
{"level":"debug","msg":"No default certificate, generating one","time":"2022-03-24T22:13:28Z","tlsStoreName":"default"}
{"level":"debug","msg":"Provider connection established with docker 20.10.13 (API 1.41)","providerName":"docker","time":"2022-03-24T22:13:28Z"}
{"level":"debug","msg":"Configuration received from provider docker: {\"http\":{\"routers\":{\"traefik-proxy\":{\"service\":\"traefik-proxy\",\"rule\":\"Host(`traefik.${HOST}`)\"},\"whoami-proxy\":{\"service\":\"whoami-proxy\",\"rule\":\"Host(`whoami.${HOST}`)\"}},\"services\":{\"traefik-proxy\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://172.21.0.3:80\"}],\"passHostHeader\":true}},\"whoami-proxy\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://172.21.0.2:80\"}],\"passHostHeader\":true}}}},\"tcp\":{},\"udp\":{}}","providerName":"docker","time":"2022-03-24T22:13:28Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"tracing","middlewareType":"TracingForwarder","msg":"Added outgoing tracing middleware ping@internal","routerName":"ping@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"tracing","middlewareType":"TracingForwarder","msg":"Added outgoing tracing middleware api@internal","routerName":"api@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"tracing","middlewareType":"TracingForwarder","msg":"Added outgoing tracing middleware dashboard@internal","routerName":"dashboard@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"dashboard_stripprefix@internal","middlewareType":"StripPrefix","msg":"Creating middleware","routerName":"dashboard@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"dashboard_stripprefix@internal","msg":"Adding tracing to middleware","routerName":"dashboard@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"dashboard_redirect@internal","middlewareType":"RedirectRegex","msg":"Creating middleware","routerName":"dashboard@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"dashboard_redirect@internal","middlewareType":"RedirectRegex","msg":"Setting up redirection from ^(http:\\/\\/(\\[[\\w:.]+\\]|[\\w\\._-]+)(:\\d+)?)\\/$ to ${1}/dashboard/","routerName":"dashboard@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"dashboard_redirect@internal","msg":"Adding tracing to middleware","routerName":"dashboard@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"traefik-internal-recovery","middlewareType":"Recovery","msg":"Creating middleware","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"web","level":"debug","middlewareName":"tracing","middlewareType":"TracingForwarder","msg":"Added outgoing tracing middleware noop@internal","routerName":"web-to-websecure@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"web","level":"debug","middlewareName":"redirect-web-to-websecure@internal","middlewareType":"RedirectScheme","msg":"Creating middleware","routerName":"web-to-websecure@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"web","level":"debug","middlewareName":"redirect-web-to-websecure@internal","middlewareType":"RedirectScheme","msg":"Setting up redirection to https 443","routerName":"web-to-websecure@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"web","level":"debug","middlewareName":"redirect-web-to-websecure@internal","msg":"Adding tracing to middleware","routerName":"web-to-websecure@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"web","level":"debug","middlewareName":"traefik-internal-recovery","middlewareType":"Recovery","msg":"Creating middleware","time":"2022-03-24T22:13:29Z"}
{"level":"debug","msg":"No default certificate, generating one","time":"2022-03-24T22:13:29Z","tlsStoreName":"default"}
{"level":"debug","msg":"Adding certificate for domain(s) whoami.${HOST}","time":"2022-03-24T22:13:29Z"}
{"level":"debug","msg":"Adding certificate for domain(s) traefik.${HOST}","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"web","level":"debug","middlewareName":"tracing","middlewareType":"TracingForwarder","msg":"Added outgoing tracing middleware noop@internal","routerName":"web-to-websecure@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"web","level":"debug","middlewareName":"redirect-web-to-websecure@internal","middlewareType":"RedirectScheme","msg":"Creating middleware","routerName":"web-to-websecure@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"web","level":"debug","middlewareName":"redirect-web-to-websecure@internal","middlewareType":"RedirectScheme","msg":"Setting up redirection to https 443","routerName":"web-to-websecure@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"web","level":"debug","middlewareName":"redirect-web-to-websecure@internal","msg":"Adding tracing to middleware","routerName":"web-to-websecure@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"web","level":"debug","middlewareName":"traefik-internal-recovery","middlewareType":"Recovery","msg":"Creating middleware","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"tracing","middlewareType":"TracingForwarder","msg":"Added outgoing tracing middleware ping@internal","routerName":"ping@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"tracing","middlewareType":"TracingForwarder","msg":"Added outgoing tracing middleware api@internal","routerName":"api@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"tracing","middlewareType":"TracingForwarder","msg":"Added outgoing tracing middleware dashboard@internal","routerName":"dashboard@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"dashboard_stripprefix@internal","middlewareType":"StripPrefix","msg":"Creating middleware","routerName":"dashboard@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"dashboard_stripprefix@internal","msg":"Adding tracing to middleware","routerName":"dashboard@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"dashboard_redirect@internal","middlewareType":"RedirectRegex","msg":"Creating middleware","routerName":"dashboard@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"dashboard_redirect@internal","middlewareType":"RedirectRegex","msg":"Setting up redirection from ^(http:\\/\\/(\\[[\\w:.]+\\]|[\\w\\._-]+)(:\\d+)?)\\/$ to ${1}/dashboard/","routerName":"dashboard@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"dashboard_redirect@internal","msg":"Adding tracing to middleware","routerName":"dashboard@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"traefik-internal-recovery","middlewareType":"Recovery","msg":"Creating middleware","time":"2022-03-24T22:13:29Z"}
{"level":"debug","msg":"No entryPoint defined for this router, using the default one(s) instead: [web websecure]","routerName":"whoami-proxy","time":"2022-03-24T22:13:29Z"}
{"level":"debug","msg":"No entryPoint defined for this router, using the default one(s) instead: [web websecure]","routerName":"traefik-proxy","time":"2022-03-24T22:13:29Z"}
{"level":"debug","msg":"No default certificate, generating one","time":"2022-03-24T22:13:29Z","tlsStoreName":"default"}
{"level":"debug","msg":"Adding certificate for domain(s) whoami.${HOST}","time":"2022-03-24T22:13:29Z"}
{"level":"debug","msg":"Adding certificate for domain(s) traefik.${HOST}","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"web","level":"debug","middlewareName":"tracing","middlewareType":"TracingForwarder","msg":"Added outgoing tracing middleware noop@internal","routerName":"web-to-websecure@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"web","level":"debug","middlewareName":"redirect-web-to-websecure@internal","middlewareType":"RedirectScheme","msg":"Creating middleware","routerName":"web-to-websecure@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"web","level":"debug","middlewareName":"redirect-web-to-websecure@internal","middlewareType":"RedirectScheme","msg":"Setting up redirection to https 443","routerName":"web-to-websecure@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"web","level":"debug","middlewareName":"redirect-web-to-websecure@internal","msg":"Adding tracing to middleware","routerName":"web-to-websecure@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"web","level":"debug","middlewareName":"pipelining","middlewareType":"Pipelining","msg":"Creating middleware","routerName":"whoami-proxy@docker","serviceName":"whoami-proxy","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"web","level":"debug","msg":"Creating load-balancer","routerName":"whoami-proxy@docker","serviceName":"whoami-proxy","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"web","level":"debug","msg":"Creating server 0 http://172.21.0.2:80","routerName":"whoami-proxy@docker","serverName":0,"serviceName":"whoami-proxy","time":"2022-03-24T22:13:29Z"}
{"level":"debug","msg":"child http://172.21.0.2:80 now UP","time":"2022-03-24T22:13:29Z"}
{"level":"debug","msg":"Propagating new UP status","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"web","level":"debug","middlewareName":"tracing","middlewareType":"TracingForwarder","msg":"Added outgoing tracing middleware whoami-proxy","routerName":"whoami-proxy@docker","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"web","level":"debug","middlewareName":"pipelining","middlewareType":"Pipelining","msg":"Creating middleware","routerName":"traefik-proxy@docker","serviceName":"traefik-proxy","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"web","level":"debug","msg":"Creating load-balancer","routerName":"traefik-proxy@docker","serviceName":"traefik-proxy","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"web","level":"debug","msg":"Creating server 0 http://172.21.0.3:80","routerName":"traefik-proxy@docker","serverName":0,"serviceName":"traefik-proxy","time":"2022-03-24T22:13:29Z"}
{"level":"debug","msg":"child http://172.21.0.3:80 now UP","time":"2022-03-24T22:13:29Z"}
{"level":"debug","msg":"Propagating new UP status","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"web","level":"debug","middlewareName":"tracing","middlewareType":"TracingForwarder","msg":"Added outgoing tracing middleware traefik-proxy","routerName":"traefik-proxy@docker","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"web","level":"debug","middlewareName":"traefik-internal-recovery","middlewareType":"Recovery","msg":"Creating middleware","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"tracing","middlewareType":"TracingForwarder","msg":"Added outgoing tracing middleware dashboard@internal","routerName":"dashboard@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"dashboard_stripprefix@internal","middlewareType":"StripPrefix","msg":"Creating middleware","routerName":"dashboard@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"dashboard_stripprefix@internal","msg":"Adding tracing to middleware","routerName":"dashboard@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"dashboard_redirect@internal","middlewareType":"RedirectRegex","msg":"Creating middleware","routerName":"dashboard@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"dashboard_redirect@internal","middlewareType":"RedirectRegex","msg":"Setting up redirection from ^(http:\\/\\/(\\[[\\w:.]+\\]|[\\w\\._-]+)(:\\d+)?)\\/$ to ${1}/dashboard/","routerName":"dashboard@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"dashboard_redirect@internal","msg":"Adding tracing to middleware","routerName":"dashboard@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"tracing","middlewareType":"TracingForwarder","msg":"Added outgoing tracing middleware ping@internal","routerName":"ping@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"tracing","middlewareType":"TracingForwarder","msg":"Added outgoing tracing middleware api@internal","routerName":"api@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"traefik-internal-recovery","middlewareType":"Recovery","msg":"Creating middleware","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"websecure","level":"debug","middlewareName":"pipelining","middlewareType":"Pipelining","msg":"Creating middleware","routerName":"websecure-traefik-proxy@docker","serviceName":"traefik-proxy","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"websecure","level":"debug","msg":"Creating load-balancer","routerName":"websecure-traefik-proxy@docker","serviceName":"traefik-proxy","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"websecure","level":"debug","msg":"Creating server 0 http://172.21.0.3:80","routerName":"websecure-traefik-proxy@docker","serverName":0,"serviceName":"traefik-proxy","time":"2022-03-24T22:13:29Z"}
{"level":"debug","msg":"child http://172.21.0.3:80 now UP","time":"2022-03-24T22:13:29Z"}
{"level":"debug","msg":"Propagating new UP status","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"websecure","level":"debug","middlewareName":"tracing","middlewareType":"TracingForwarder","msg":"Added outgoing tracing middleware traefik-proxy","routerName":"websecure-traefik-proxy@docker","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"websecure","level":"debug","middlewareName":"pipelining","middlewareType":"Pipelining","msg":"Creating middleware","routerName":"websecure-whoami-proxy@docker","serviceName":"whoami-proxy","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"websecure","level":"debug","msg":"Creating load-balancer","routerName":"websecure-whoami-proxy@docker","serviceName":"whoami-proxy","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"websecure","level":"debug","msg":"Creating server 0 http://172.21.0.2:80","routerName":"websecure-whoami-proxy@docker","serverName":0,"serviceName":"whoami-proxy","time":"2022-03-24T22:13:29Z"}
{"level":"debug","msg":"child http://172.21.0.2:80 now UP","time":"2022-03-24T22:13:29Z"}
{"level":"debug","msg":"Propagating new UP status","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"websecure","level":"debug","middlewareName":"tracing","middlewareType":"TracingForwarder","msg":"Added outgoing tracing middleware whoami-proxy","routerName":"websecure-whoami-proxy@docker","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"websecure","level":"debug","middlewareName":"traefik-internal-recovery","middlewareType":"Recovery","msg":"Creating middleware","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"websecure","level":"debug","msg":"Adding route for traefik.${HOST} with TLS options default","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"websecure","level":"debug","msg":"Adding route for whoami.${HOST} with TLS options default","time":"2022-03-24T22:13:29Z"}
{"ACME CA":"https://acme-staging-v02.api.letsencrypt.org/directory","level":"debug","msg":"Try to challenge certificate for domain [whoami.${HOST}] found in HostSNI rule","providerName":"leresolver.acme","routerName":"websecure-whoami-proxy@docker","rule":"Host(`whoami.${HOST}`)","time":"2022-03-24T22:13:29Z"}
{"ACME CA":"https://acme-staging-v02.api.letsencrypt.org/directory","level":"debug","msg":"Try to challenge certificate for domain [traefik.${HOST}] found in HostSNI rule","providerName":"leresolver.acme","routerName":"websecure-traefik-proxy@docker","rule":"Host(`traefik.${HOST}`)","time":"2022-03-24T22:13:29Z"}
{"ACME CA":"https://acme-staging-v02.api.letsencrypt.org/directory","level":"debug","msg":"Looking for provided certificate(s) to validate [\"traefik.${HOST}\"]...","providerName":"leresolver.acme","routerName":"websecure-traefik-proxy@docker","rule":"Host(`traefik.${HOST}`)","time":"2022-03-24T22:13:29Z"}
{"ACME CA":"https://acme-staging-v02.api.letsencrypt.org/directory","level":"debug","msg":"No ACME certificate generation required for domains [\"traefik.${HOST}\"].","providerName":"leresolver.acme","routerName":"websecure-traefik-proxy@docker","rule":"Host(`traefik.${HOST}`)","time":"2022-03-24T22:13:29Z"}
{"ACME CA":"https://acme-staging-v02.api.letsencrypt.org/directory","level":"debug","msg":"Looking for provided certificate(s) to validate [\"whoami.${HOST}\"]...","providerName":"leresolver.acme","routerName":"websecure-whoami-proxy@docker","rule":"Host(`whoami.${HOST}`)","time":"2022-03-24T22:13:29Z"}
{"ACME CA":"https://acme-staging-v02.api.letsencrypt.org/directory","level":"debug","msg":"No ACME certificate generation required for domains [\"whoami.${HOST}\"].","providerName":"leresolver.acme","routerName":"websecure-whoami-proxy@docker","rule":"Host(`whoami.${HOST}`)","time":"2022-03-24T22:13:29Z"}

my hosts file

127.0.0.1 localhost
127.0.1.1 ${HOSTNAME}

# The following lines are desirable for IPv6 capable hosts
::1     ip6-localhost ip6-loopback
fe00::0 ip6-localnet
ff00::0 ip6-mcastprefix
ff02::1 ip6-allnodes
ff02::2 ip6-allrouters

my router (Mikrotik) has a static and wildcard DNS entry pointing to the server

name        regexp        type      address
${HOST}                   A         ${local_server_ip}
            *.${HOST}     A         ${local_server_ip}

Did you ever got this fixed? I’m running a docker swarm mode VM with vagrant on Ubuntu image, I mapped the manager IP of the guest VM to my localhost (host) machine (localswarm.vagrant), using Traefik I can only access the home directory localswarm.vagrant, but not the subdirectory/subdomain of services defined (eg portainer.localswarm.vagrant), I’ve been trying to figure this out for the past 24 hours. Thanks

Share your Traefik static and dynamic config, and docker-compose.yml if used.

What do you see in Traefik debug logs and on the Traefik dashboard?

Is it an issue about sub-domains or paths? Have you set the sub-domains in the DNS?

1 Like

This was right, I needed to set the subdomain from the dns, I thought this was automatic.

If I’m setting the subdomain DNS, what will the record be as the main IP points to the main subdomain (as I’m running the services on a subdomain of our domain, say api.example.com), I believe it can’t be an A record anymore, if it were to be a CNAME, what host will it point to.

Thank you.

You sub-domain can be an A record pointing to the same IP.

1 Like

Thank you for the wonderful insight.