My traefik instance seems to be unable to pick up anything directed at my domain name. Letsencrypt creates the certs just fine, but traefik never gets the request, not even a 404. I can ping the domain name from the server and other computers on LAN and get a response (I have a static DNS entry in my router). This system had worked previously for inside the network but now nothing gets to traefik. What is wrong with the configuration?
If I use a default docker-compose config file, I can curl whoami.localhost and get a response.
version: "3.3"
services:
traefik:
image: "traefik:v2.6"
container_name: "traefik"
command:
- "--log.level=DEBUG"
- "--api.insecure=true"
- "--providers.docker=true"
- "--providers.docker.exposedbydefault=false"
- "--entrypoints.web.address=:80"
ports:
- "80:80"
- "8080:8080"
volumes:
- "/var/run/docker.sock:/var/run/docker.sock:ro"
whoami:
image: "traefik/whoami"
container_name: "simple-service"
labels:
- "traefik.enable=true"
- "traefik.http.routers.whoami.rule=Host(`whoami.localhost`)"
- "traefik.http.routers.whoami.entrypoints=web"
time="2022-03-24T22:22:41Z" level=debug msg="vulcand/oxy/roundrobin/rr: begin ServeHttp on request" Request="{\"Method\":\"GET\",\"URL\":{\"Scheme\":\"\",\"Opaque\":\"\",\"User\":null,\"Host\":\"\",\"Path\":\"/\",\"RawPath\":\"\",\"ForceQuery\":false,\"RawQuery\":\"\",\"Fragment\":\"\",\"RawFragment\":\"\"},\"Proto\":\"HTTP/1.1\",\"ProtoMajor\":1,\"ProtoMinor\":1,\"Header\":{\"Accept\":[\"*/*\"],\"User-Agent\":[\"curl/7.68.0\"],\"X-Forwarded-Host\":[\"whoami.localhost\"],\"X-Forwarded-Port\":[\"80\"],\"X-Forwarded-Proto\":[\"http\"],\"X-Forwarded-Server\":[\"7272c5bd7ba3\"],\"X-Real-Ip\":[\"172.27.0.1\"]},\"ContentLength\":0,\"TransferEncoding\":null,\"Host\":\"whoami.localhost\",\"Form\":null,\"PostForm\":null,\"MultipartForm\":null,\"Trailer\":null,\"RemoteAddr\":\"172.27.0.1:36940\",\"RequestURI\":\"/\",\"TLS\":null}"
time="2022-03-24T22:22:41Z" level=debug msg="vulcand/oxy/roundrobin/rr: Forwarding this request to URL" Request="{\"Method\":\"GET\",\"URL\":{\"Scheme\":\"\",\"Opaque\":\"\",\"User\":null,\"Host\":\"\",\"Path\":\"/\",\"RawPath\":\"\",\"ForceQuery\":false,\"RawQuery\":\"\",\"Fragment\":\"\",\"RawFragment\":\"\"},\"Proto\":\"HTTP/1.1\",\"ProtoMajor\":1,\"ProtoMinor\":1,\"Header\":{\"Accept\":[\"*/*\"],\"User-Agent\":[\"curl/7.68.0\"],\"X-Forwarded-Host\":[\"whoami.localhost\"],\"X-Forwarded-Port\":[\"80\"],\"X-Forwarded-Proto\":[\"http\"],\"X-Forwarded-Server\":[\"7272c5bd7ba3\"],\"X-Real-Ip\":[\"172.27.0.1\"]},\"ContentLength\":0,\"TransferEncoding\":null,\"Host\":\"whoami.localhost\",\"Form\":null,\"PostForm\":null,\"MultipartForm\":null,\"Trailer\":null,\"RemoteAddr\":\"172.27.0.1:36940\",\"RequestURI\":\"/\",\"TLS\":null}" ForwardURL="http://172.27.0.2:80"
time="2022-03-24T22:22:41Z" level=debug msg="vulcand/oxy/roundrobin/rr: completed ServeHttp on request" Request="{\"Method\":\"GET\",\"URL\":{\"Scheme\":\"\",\"Opaque\":\"\",\"User\":null,\"Host\":\"\",\"Path\":\"/\",\"RawPath\":\"\",\"ForceQuery\":false,\"RawQuery\":\"\",\"Fragment\":\"\",\"RawFragment\":\"\"},\"Proto\":\"HTTP/1.1\",\"ProtoMajor\":1,\"ProtoMinor\":1,\"Header\":{\"Accept\":[\"*/*\"],\"User-Agent\":[\"curl/7.68.0\"],\"X-Forwarded-Host\":[\"whoami.localhost\"],\"X-Forwarded-Port\":[\"80\"],\"X-Forwarded-Proto\":[\"http\"],\"X-Forwarded-Server\":[\"7272c5bd7ba3\"],\"X-Real-Ip\":[\"172.27.0.1\"]},\"ContentLength\":0,\"TransferEncoding\":null,\"Host\":\"whoami.localhost\",\"Form\":null,\"PostForm\":null,\"MultipartForm\":null,\"Trailer\":null,\"RemoteAddr\":\"172.27.0.1:36940\",\"RequestURI\":\"/\",\"TLS\":null}"
However, attempting to run the connection through https causes the connection attempt to hang
version: "3.3"
services:
traefik:
image: traefik:latest
container_name: traefik
command:
- --log.level=DEBUG
- --log.filePath=/log/traefik.log
- --log.format=json
- --api.insecure=true
- --ping=true
- --providers.docker=true
- --providers.docker.exposedbydefault=true
- --providers.docker.endpoint=unix:///var/run/docker.sock
- --providers.docker.network=traefik
- --providers.docker.defaultRule=Host(`{{ index .Labels "com.docker.compose.service" }}.${HOST}`)
- --entrypoints.web.address=:80
- --entrypoints.websecure.address=:443
- --entrypoints.https.http.tls.certresolver=leresolver
- --certificatesresolvers.leresolver.acme.dnschallenge=true
- --certificatesresolvers.leresolver.acme.dnschallenge.provider=cloudflare
- --certificatesresolvers.leresolver.acme.email=${EMAIL}
- --certificatesresolvers.leresolver.acme.caServer=https://acme-staging-v02.api.letsencrypt.org/directory
- --certificatesresolvers.leresolver.acme.storage=/letsencrypt/acme.json
- --certificatesresolvers.leresolver.acme.dnschallenge.resolvers=1.1.1.1:53
- --certificatesresolvers.leresolver.acme.dnschallenge.delayBeforeCheck=5
# Global HTTP -> HTTPS
- --entrypoints.web.http.redirections.entrypoint.to=websecure
- --entrypoints.web.http.redirections.entrypoint.scheme=https
ports:
- target: 80
published: 80
protocol: tcp
mode: host
- target: 443
published: 443
protocol: tcp
mode: host
- target: 8080
published: 8080
protocol: tcp
mode: host
networks:
- traefik
environment:
- CF_API_EMAIL=${EMAIL}
- CF_API_KEY=${TOKEN}
volumes:
- ./letsencrypt:/letsencrypt
- ./log:/log
- /var/run/docker.sock:/var/run/docker.sock:ro
whoami:
image: "traefik/whoami"
container_name: whoami
networks:
- traefik
expose:
- 80
networks:
traefik:
external: true
I can see in the logs that both services are attaching, but traefik never sees the request
{"level":"info","msg":"Traefik version 2.6.1 built on 2022-02-14T16:50:25Z","time":"2022-03-24T22:13:28Z"}
{"level":"debug","msg":"Static configuration loaded {\"global\":{\"checkNewVersion\":true},\"serversTransport\":{\"maxIdleConnsPerHost\":200},\"entryPoints\":{\"traefik\":{\"address\":\":8080\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":\"10s\"},\"respondingTimeouts\":{\"idleTimeout\":\"3m0s\"}},\"forwardedHeaders\":{},\"http\":{},\"udp\":{\"timeout\":\"3s\"}},\"web\":{\"address\":\":80\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":\"10s\"},\"respondingTimeouts\":{\"idleTimeout\":\"3m0s\"}},\"forwardedHeaders\":{},\"http\":{\"redirections\":{\"entryPoint\":{\"to\":\"websecure\",\"scheme\":\"https\",\"permanent\":true,\"priority\":2147483646}}},\"udp\":{\"timeout\":\"3s\"}},\"websecure\":{\"address\":\":443\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":\"10s\"},\"respondingTimeouts\":{\"idleTimeout\":\"3m0s\"}},\"forwardedHeaders\":{},\"http\":{\"tls\":{\"certResolver\":\"leresolver\"}},\"udp\":{\"timeout\":\"3s\"}}},\"providers\":{\"providersThrottleDuration\":\"2s\",\"docker\":{\"watch\":true,\"endpoint\":\"unix:///var/run/docker.sock\",\"defaultRule\":\"Host(`{{ index .Labels \\\"com.docker.compose.service\\\" }}.${HOST}`)\",\"exposedByDefault\":true,\"network\":\"traefik\",\"swarmModeRefreshSeconds\":\"15s\"}},\"api\":{\"insecure\":true,\"dashboard\":true},\"ping\":{\"entryPoint\":\"traefik\",\"terminatingStatusCode\":503},\"log\":{\"level\":\"DEBUG\",\"filePath\":\"/log/traefik.log\",\"format\":\"json\"},\"certificatesResolvers\":{\"leresolver\":{\"acme\":{\"email\":\"${EMAIL}\",\"caServer\":\"https://acme-staging-v02.api.letsencrypt.org/directory\",\"storage\":\"/letsencrypt/acme.json\",\"keyType\":\"RSA4096\",\"certificatesDuration\":2160,\"dnsChallenge\":{\"provider\":\"cloudflare\",\"delayBeforeCheck\":\"5s\",\"resolvers\":[\"1.1.1.1:53\"]}}}},\"pilot\":{\"dashboard\":true}}","time":"2022-03-24T22:13:28Z"}
{"level":"info","msg":"\nStats collection is disabled.\nHelp us improve Traefik by turning this feature on :)\nMore details on: https://doc.traefik.io/traefik/contributing/data-collection/\n","time":"2022-03-24T22:13:28Z"}
{"entryPointName":"traefik","level":"debug","msg":"Start TCP Server","time":"2022-03-24T22:13:28Z"}
{"level":"info","msg":"Starting provider aggregator.ProviderAggregator","time":"2022-03-24T22:13:28Z"}
{"entryPointName":"websecure","level":"debug","msg":"Start TCP Server","time":"2022-03-24T22:13:28Z"}
{"entryPointName":"web","level":"debug","msg":"Start TCP Server","time":"2022-03-24T22:13:28Z"}
{"level":"info","msg":"Starting provider *docker.Provider","time":"2022-03-24T22:13:28Z"}
{"level":"debug","msg":"*docker.Provider provider configuration: {\"watch\":true,\"endpoint\":\"unix:///var/run/docker.sock\",\"defaultRule\":\"Host(`{{ index .Labels \\\"com.docker.compose.service\\\" }}.${HOST}`)\",\"exposedByDefault\":true,\"network\":\"traefik\",\"swarmModeRefreshSeconds\":\"15s\"}","time":"2022-03-24T22:13:28Z"}
{"level":"info","msg":"Starting provider *traefik.Provider","time":"2022-03-24T22:13:28Z"}
{"level":"debug","msg":"*traefik.Provider provider configuration: {}","time":"2022-03-24T22:13:28Z"}
{"level":"info","msg":"Starting provider *acme.ChallengeTLSALPN","time":"2022-03-24T22:13:28Z"}
{"level":"debug","msg":"*acme.ChallengeTLSALPN provider configuration: {\"Timeout\":4000000000}","time":"2022-03-24T22:13:28Z"}
{"level":"info","msg":"Starting provider *acme.Provider","time":"2022-03-24T22:13:28Z"}
{"level":"debug","msg":"*acme.Provider provider configuration: {\"email\":\"${EMAIL}\",\"caServer\":\"https://acme-staging-v02.api.letsencrypt.org/directory\",\"storage\":\"/letsencrypt/acme.json\",\"keyType\":\"RSA4096\",\"certificatesDuration\":2160,\"dnsChallenge\":{\"provider\":\"cloudflare\",\"delayBeforeCheck\":\"5s\",\"resolvers\":[\"1.1.1.1:53\"]},\"ResolverName\":\"leresolver\",\"store\":{},\"TLSChallengeProvider\":{\"Timeout\":4000000000},\"HTTPChallengeProvider\":{}}","time":"2022-03-24T22:13:28Z"}
{"ACME CA":"https://acme-staging-v02.api.letsencrypt.org/directory","level":"debug","msg":"Attempt to renew certificates \"720h0m0s\" before expiry and check every \"24h0m0s\"","providerName":"leresolver.acme","time":"2022-03-24T22:13:28Z"}
{"ACME CA":"https://acme-staging-v02.api.letsencrypt.org/directory","level":"info","msg":"Testing certificate renew...","providerName":"leresolver.acme","time":"2022-03-24T22:13:28Z"}
{"level":"debug","msg":"Configuration received from provider internal: {\"http\":{\"routers\":{\"api\":{\"entryPoints\":[\"traefik\"],\"service\":\"api@internal\",\"rule\":\"PathPrefix(`/api`)\",\"priority\":2147483646},\"dashboard\":{\"entryPoints\":[\"traefik\"],\"middlewares\":[\"dashboard_redirect@internal\",\"dashboard_stripprefix@internal\"],\"service\":\"dashboard@internal\",\"rule\":\"PathPrefix(`/`)\",\"priority\":2147483645},\"ping\":{\"entryPoints\":[\"traefik\"],\"service\":\"ping@internal\",\"rule\":\"PathPrefix(`/ping`)\",\"priority\":2147483647},\"web-to-websecure\":{\"entryPoints\":[\"web\"],\"middlewares\":[\"redirect-web-to-websecure\"],\"service\":\"noop@internal\",\"rule\":\"HostRegexp(`{host:.+}`)\",\"priority\":2147483646}},\"services\":{\"api\":{},\"dashboard\":{},\"noop\":{},\"ping\":{}},\"middlewares\":{\"dashboard_redirect\":{\"redirectRegex\":{\"regex\":\"^(http:\\\\/\\\\/(\\\\[[\\\\w:.]+\\\\]|[\\\\w\\\\._-]+)(:\\\\d+)?)\\\\/$\",\"replacement\":\"${1}/dashboard/\",\"permanent\":true}},\"dashboard_stripprefix\":{\"stripPrefix\":{\"prefixes\":[\"/dashboard/\",\"/dashboard\"]}},\"redirect-web-to-websecure\":{\"redirectScheme\":{\"scheme\":\"https\",\"port\":\"443\",\"permanent\":true}}},\"models\":{\"websecure\":{\"tls\":{\"certResolver\":\"leresolver\"}}},\"serversTransports\":{\"default\":{\"maxIdleConnsPerHost\":200}}},\"tcp\":{},\"tls\":{}}","providerName":"internal","time":"2022-03-24T22:13:28Z"}
{"level":"debug","msg":"Configuration received from provider leresolver.acme: {\"http\":{},\"tls\":{}}","providerName":"leresolver.acme","time":"2022-03-24T22:13:28Z"}
{"level":"debug","msg":"No default certificate, generating one","time":"2022-03-24T22:13:28Z","tlsStoreName":"default"}
{"level":"debug","msg":"Provider connection established with docker 20.10.13 (API 1.41)","providerName":"docker","time":"2022-03-24T22:13:28Z"}
{"level":"debug","msg":"Configuration received from provider docker: {\"http\":{\"routers\":{\"traefik-proxy\":{\"service\":\"traefik-proxy\",\"rule\":\"Host(`traefik.${HOST}`)\"},\"whoami-proxy\":{\"service\":\"whoami-proxy\",\"rule\":\"Host(`whoami.${HOST}`)\"}},\"services\":{\"traefik-proxy\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://172.21.0.3:80\"}],\"passHostHeader\":true}},\"whoami-proxy\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://172.21.0.2:80\"}],\"passHostHeader\":true}}}},\"tcp\":{},\"udp\":{}}","providerName":"docker","time":"2022-03-24T22:13:28Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"tracing","middlewareType":"TracingForwarder","msg":"Added outgoing tracing middleware ping@internal","routerName":"ping@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"tracing","middlewareType":"TracingForwarder","msg":"Added outgoing tracing middleware api@internal","routerName":"api@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"tracing","middlewareType":"TracingForwarder","msg":"Added outgoing tracing middleware dashboard@internal","routerName":"dashboard@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"dashboard_stripprefix@internal","middlewareType":"StripPrefix","msg":"Creating middleware","routerName":"dashboard@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"dashboard_stripprefix@internal","msg":"Adding tracing to middleware","routerName":"dashboard@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"dashboard_redirect@internal","middlewareType":"RedirectRegex","msg":"Creating middleware","routerName":"dashboard@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"dashboard_redirect@internal","middlewareType":"RedirectRegex","msg":"Setting up redirection from ^(http:\\/\\/(\\[[\\w:.]+\\]|[\\w\\._-]+)(:\\d+)?)\\/$ to ${1}/dashboard/","routerName":"dashboard@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"dashboard_redirect@internal","msg":"Adding tracing to middleware","routerName":"dashboard@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"traefik-internal-recovery","middlewareType":"Recovery","msg":"Creating middleware","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"web","level":"debug","middlewareName":"tracing","middlewareType":"TracingForwarder","msg":"Added outgoing tracing middleware noop@internal","routerName":"web-to-websecure@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"web","level":"debug","middlewareName":"redirect-web-to-websecure@internal","middlewareType":"RedirectScheme","msg":"Creating middleware","routerName":"web-to-websecure@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"web","level":"debug","middlewareName":"redirect-web-to-websecure@internal","middlewareType":"RedirectScheme","msg":"Setting up redirection to https 443","routerName":"web-to-websecure@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"web","level":"debug","middlewareName":"redirect-web-to-websecure@internal","msg":"Adding tracing to middleware","routerName":"web-to-websecure@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"web","level":"debug","middlewareName":"traefik-internal-recovery","middlewareType":"Recovery","msg":"Creating middleware","time":"2022-03-24T22:13:29Z"}
{"level":"debug","msg":"No default certificate, generating one","time":"2022-03-24T22:13:29Z","tlsStoreName":"default"}
{"level":"debug","msg":"Adding certificate for domain(s) whoami.${HOST}","time":"2022-03-24T22:13:29Z"}
{"level":"debug","msg":"Adding certificate for domain(s) traefik.${HOST}","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"web","level":"debug","middlewareName":"tracing","middlewareType":"TracingForwarder","msg":"Added outgoing tracing middleware noop@internal","routerName":"web-to-websecure@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"web","level":"debug","middlewareName":"redirect-web-to-websecure@internal","middlewareType":"RedirectScheme","msg":"Creating middleware","routerName":"web-to-websecure@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"web","level":"debug","middlewareName":"redirect-web-to-websecure@internal","middlewareType":"RedirectScheme","msg":"Setting up redirection to https 443","routerName":"web-to-websecure@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"web","level":"debug","middlewareName":"redirect-web-to-websecure@internal","msg":"Adding tracing to middleware","routerName":"web-to-websecure@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"web","level":"debug","middlewareName":"traefik-internal-recovery","middlewareType":"Recovery","msg":"Creating middleware","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"tracing","middlewareType":"TracingForwarder","msg":"Added outgoing tracing middleware ping@internal","routerName":"ping@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"tracing","middlewareType":"TracingForwarder","msg":"Added outgoing tracing middleware api@internal","routerName":"api@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"tracing","middlewareType":"TracingForwarder","msg":"Added outgoing tracing middleware dashboard@internal","routerName":"dashboard@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"dashboard_stripprefix@internal","middlewareType":"StripPrefix","msg":"Creating middleware","routerName":"dashboard@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"dashboard_stripprefix@internal","msg":"Adding tracing to middleware","routerName":"dashboard@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"dashboard_redirect@internal","middlewareType":"RedirectRegex","msg":"Creating middleware","routerName":"dashboard@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"dashboard_redirect@internal","middlewareType":"RedirectRegex","msg":"Setting up redirection from ^(http:\\/\\/(\\[[\\w:.]+\\]|[\\w\\._-]+)(:\\d+)?)\\/$ to ${1}/dashboard/","routerName":"dashboard@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"dashboard_redirect@internal","msg":"Adding tracing to middleware","routerName":"dashboard@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"traefik-internal-recovery","middlewareType":"Recovery","msg":"Creating middleware","time":"2022-03-24T22:13:29Z"}
{"level":"debug","msg":"No entryPoint defined for this router, using the default one(s) instead: [web websecure]","routerName":"whoami-proxy","time":"2022-03-24T22:13:29Z"}
{"level":"debug","msg":"No entryPoint defined for this router, using the default one(s) instead: [web websecure]","routerName":"traefik-proxy","time":"2022-03-24T22:13:29Z"}
{"level":"debug","msg":"No default certificate, generating one","time":"2022-03-24T22:13:29Z","tlsStoreName":"default"}
{"level":"debug","msg":"Adding certificate for domain(s) whoami.${HOST}","time":"2022-03-24T22:13:29Z"}
{"level":"debug","msg":"Adding certificate for domain(s) traefik.${HOST}","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"web","level":"debug","middlewareName":"tracing","middlewareType":"TracingForwarder","msg":"Added outgoing tracing middleware noop@internal","routerName":"web-to-websecure@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"web","level":"debug","middlewareName":"redirect-web-to-websecure@internal","middlewareType":"RedirectScheme","msg":"Creating middleware","routerName":"web-to-websecure@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"web","level":"debug","middlewareName":"redirect-web-to-websecure@internal","middlewareType":"RedirectScheme","msg":"Setting up redirection to https 443","routerName":"web-to-websecure@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"web","level":"debug","middlewareName":"redirect-web-to-websecure@internal","msg":"Adding tracing to middleware","routerName":"web-to-websecure@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"web","level":"debug","middlewareName":"pipelining","middlewareType":"Pipelining","msg":"Creating middleware","routerName":"whoami-proxy@docker","serviceName":"whoami-proxy","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"web","level":"debug","msg":"Creating load-balancer","routerName":"whoami-proxy@docker","serviceName":"whoami-proxy","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"web","level":"debug","msg":"Creating server 0 http://172.21.0.2:80","routerName":"whoami-proxy@docker","serverName":0,"serviceName":"whoami-proxy","time":"2022-03-24T22:13:29Z"}
{"level":"debug","msg":"child http://172.21.0.2:80 now UP","time":"2022-03-24T22:13:29Z"}
{"level":"debug","msg":"Propagating new UP status","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"web","level":"debug","middlewareName":"tracing","middlewareType":"TracingForwarder","msg":"Added outgoing tracing middleware whoami-proxy","routerName":"whoami-proxy@docker","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"web","level":"debug","middlewareName":"pipelining","middlewareType":"Pipelining","msg":"Creating middleware","routerName":"traefik-proxy@docker","serviceName":"traefik-proxy","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"web","level":"debug","msg":"Creating load-balancer","routerName":"traefik-proxy@docker","serviceName":"traefik-proxy","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"web","level":"debug","msg":"Creating server 0 http://172.21.0.3:80","routerName":"traefik-proxy@docker","serverName":0,"serviceName":"traefik-proxy","time":"2022-03-24T22:13:29Z"}
{"level":"debug","msg":"child http://172.21.0.3:80 now UP","time":"2022-03-24T22:13:29Z"}
{"level":"debug","msg":"Propagating new UP status","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"web","level":"debug","middlewareName":"tracing","middlewareType":"TracingForwarder","msg":"Added outgoing tracing middleware traefik-proxy","routerName":"traefik-proxy@docker","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"web","level":"debug","middlewareName":"traefik-internal-recovery","middlewareType":"Recovery","msg":"Creating middleware","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"tracing","middlewareType":"TracingForwarder","msg":"Added outgoing tracing middleware dashboard@internal","routerName":"dashboard@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"dashboard_stripprefix@internal","middlewareType":"StripPrefix","msg":"Creating middleware","routerName":"dashboard@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"dashboard_stripprefix@internal","msg":"Adding tracing to middleware","routerName":"dashboard@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"dashboard_redirect@internal","middlewareType":"RedirectRegex","msg":"Creating middleware","routerName":"dashboard@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"dashboard_redirect@internal","middlewareType":"RedirectRegex","msg":"Setting up redirection from ^(http:\\/\\/(\\[[\\w:.]+\\]|[\\w\\._-]+)(:\\d+)?)\\/$ to ${1}/dashboard/","routerName":"dashboard@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"dashboard_redirect@internal","msg":"Adding tracing to middleware","routerName":"dashboard@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"tracing","middlewareType":"TracingForwarder","msg":"Added outgoing tracing middleware ping@internal","routerName":"ping@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"tracing","middlewareType":"TracingForwarder","msg":"Added outgoing tracing middleware api@internal","routerName":"api@internal","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"traefik","level":"debug","middlewareName":"traefik-internal-recovery","middlewareType":"Recovery","msg":"Creating middleware","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"websecure","level":"debug","middlewareName":"pipelining","middlewareType":"Pipelining","msg":"Creating middleware","routerName":"websecure-traefik-proxy@docker","serviceName":"traefik-proxy","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"websecure","level":"debug","msg":"Creating load-balancer","routerName":"websecure-traefik-proxy@docker","serviceName":"traefik-proxy","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"websecure","level":"debug","msg":"Creating server 0 http://172.21.0.3:80","routerName":"websecure-traefik-proxy@docker","serverName":0,"serviceName":"traefik-proxy","time":"2022-03-24T22:13:29Z"}
{"level":"debug","msg":"child http://172.21.0.3:80 now UP","time":"2022-03-24T22:13:29Z"}
{"level":"debug","msg":"Propagating new UP status","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"websecure","level":"debug","middlewareName":"tracing","middlewareType":"TracingForwarder","msg":"Added outgoing tracing middleware traefik-proxy","routerName":"websecure-traefik-proxy@docker","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"websecure","level":"debug","middlewareName":"pipelining","middlewareType":"Pipelining","msg":"Creating middleware","routerName":"websecure-whoami-proxy@docker","serviceName":"whoami-proxy","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"websecure","level":"debug","msg":"Creating load-balancer","routerName":"websecure-whoami-proxy@docker","serviceName":"whoami-proxy","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"websecure","level":"debug","msg":"Creating server 0 http://172.21.0.2:80","routerName":"websecure-whoami-proxy@docker","serverName":0,"serviceName":"whoami-proxy","time":"2022-03-24T22:13:29Z"}
{"level":"debug","msg":"child http://172.21.0.2:80 now UP","time":"2022-03-24T22:13:29Z"}
{"level":"debug","msg":"Propagating new UP status","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"websecure","level":"debug","middlewareName":"tracing","middlewareType":"TracingForwarder","msg":"Added outgoing tracing middleware whoami-proxy","routerName":"websecure-whoami-proxy@docker","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"websecure","level":"debug","middlewareName":"traefik-internal-recovery","middlewareType":"Recovery","msg":"Creating middleware","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"websecure","level":"debug","msg":"Adding route for traefik.${HOST} with TLS options default","time":"2022-03-24T22:13:29Z"}
{"entryPointName":"websecure","level":"debug","msg":"Adding route for whoami.${HOST} with TLS options default","time":"2022-03-24T22:13:29Z"}
{"ACME CA":"https://acme-staging-v02.api.letsencrypt.org/directory","level":"debug","msg":"Try to challenge certificate for domain [whoami.${HOST}] found in HostSNI rule","providerName":"leresolver.acme","routerName":"websecure-whoami-proxy@docker","rule":"Host(`whoami.${HOST}`)","time":"2022-03-24T22:13:29Z"}
{"ACME CA":"https://acme-staging-v02.api.letsencrypt.org/directory","level":"debug","msg":"Try to challenge certificate for domain [traefik.${HOST}] found in HostSNI rule","providerName":"leresolver.acme","routerName":"websecure-traefik-proxy@docker","rule":"Host(`traefik.${HOST}`)","time":"2022-03-24T22:13:29Z"}
{"ACME CA":"https://acme-staging-v02.api.letsencrypt.org/directory","level":"debug","msg":"Looking for provided certificate(s) to validate [\"traefik.${HOST}\"]...","providerName":"leresolver.acme","routerName":"websecure-traefik-proxy@docker","rule":"Host(`traefik.${HOST}`)","time":"2022-03-24T22:13:29Z"}
{"ACME CA":"https://acme-staging-v02.api.letsencrypt.org/directory","level":"debug","msg":"No ACME certificate generation required for domains [\"traefik.${HOST}\"].","providerName":"leresolver.acme","routerName":"websecure-traefik-proxy@docker","rule":"Host(`traefik.${HOST}`)","time":"2022-03-24T22:13:29Z"}
{"ACME CA":"https://acme-staging-v02.api.letsencrypt.org/directory","level":"debug","msg":"Looking for provided certificate(s) to validate [\"whoami.${HOST}\"]...","providerName":"leresolver.acme","routerName":"websecure-whoami-proxy@docker","rule":"Host(`whoami.${HOST}`)","time":"2022-03-24T22:13:29Z"}
{"ACME CA":"https://acme-staging-v02.api.letsencrypt.org/directory","level":"debug","msg":"No ACME certificate generation required for domains [\"whoami.${HOST}\"].","providerName":"leresolver.acme","routerName":"websecure-whoami-proxy@docker","rule":"Host(`whoami.${HOST}`)","time":"2022-03-24T22:13:29Z"}
my hosts file
127.0.0.1 localhost
127.0.1.1 ${HOSTNAME}
# The following lines are desirable for IPv6 capable hosts
::1 ip6-localhost ip6-loopback
fe00::0 ip6-localnet
ff00::0 ip6-mcastprefix
ff02::1 ip6-allnodes
ff02::2 ip6-allrouters
my router (Mikrotik) has a static and wildcard DNS entry pointing to the server
name regexp type address
${HOST} A ${local_server_ip}
*.${HOST} A ${local_server_ip}