The previous log part 1/2
(due to the forum limit of 32,000 characters per message).
The next log part 2/2
:
...
2025-07-22T06:45:53Z DBG github.com/traefik/traefik/v3/pkg/server/router/tcp/manager.go:237 > Adding route for pic.example.com with TLS options default entryPointName=http
2025-07-22T06:45:53Z WRN github.com/traefik/traefik/v3/pkg/server/router/tcp/manager.go:182 > No domain found in rule HostRegexp(`{host:.+}`), the TLS options applied for this router will depend on the SNI of each request entryPointName=https routerName=https-catchall@file
2025-07-22T06:45:53Z DBG github.com/traefik/traefik/v3/pkg/server/router/tcp/manager.go:237 > Adding route for pic.example.com with TLS options default entryPointName=https
2025-07-22T06:45:53Z DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:468 > No domain parsed in provider ACME ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory providerName=lets-encrypt.acme routerName=https-catchall@file rule=HostRegexp(`{host:.+}`)
2025-07-22T06:45:53Z DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:472 > Trying to challenge certificate for domain [pic.example.com] found in HostSNI rule ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory providerName=lets-encrypt.acme routerName=nginx@docker rule=Host(`pic.example.com`)
2025-07-22T06:45:53Z DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:472 > Trying to challenge certificate for domain [pic.example.com] found in HostSNI rule ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory providerName=lets-encrypt.acme routerName=https-nginx@docker rule=Host(`pic.example.com`)
2025-07-22T06:45:53Z DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:946 > Looking for provided certificate(s) to validate ["pic.example.com"]... ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory providerName=lets-encrypt.acme routerName=nginx@docker rule=Host(`pic.example.com`)
2025-07-22T06:45:53Z DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:946 > Looking for provided certificate(s) to validate ["pic.example.com"]... ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory providerName=lets-encrypt.acme routerName=https-nginx@docker rule=Host(`pic.example.com`)
2025-07-22T06:45:53Z DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:992 > Domains need ACME certificates generation for domains "pic.example.com". ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory domains=["pic.example.com"] providerName=lets-encrypt.acme routerName=nginx@docker rule=Host(`pic.example.com`)
2025-07-22T06:45:53Z DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:710 > Loading ACME certificates [pic.example.com]... ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory providerName=lets-encrypt.acme routerName=nginx@docker rule=Host(`pic.example.com`)
2025-07-22T06:45:53Z DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:990 > No ACME certificate generation required for domains ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory domains=["pic.example.com"] providerName=lets-encrypt.acme routerName=https-nginx@docker rule=Host(`pic.example.com`)
2025-07-22T06:45:54Z DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:272 > Building ACME client... providerName=lets-encrypt.acme
2025-07-22T06:45:54Z DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:278 > https://acme-v02.api.letsencrypt.org/directory providerName=lets-encrypt.acme
2025-07-22T06:45:55Z INF github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:459 > Register... providerName=lets-encrypt.acme
2025-07-22T06:45:55Z DBG github.com/go-acme/lego/v4@v4.23.1/log/logger.go:48 > [INFO] acme: Registering account for user@gmail.com lib=lego
2025-07-22T06:45:55Z DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:352 > Using HTTP Challenge provider. providerName=lets-encrypt.acme
2025-07-22T06:45:55Z DBG github.com/go-acme/lego/v4@v4.23.1/log/logger.go:48 > [INFO] [pic.example.com] acme: Obtaining bundled SAN certificate lib=lego
2025-07-22T06:45:56Z DBG github.com/go-acme/lego/v4@v4.23.1/log/logger.go:48 > [INFO] [pic.example.com] AuthURL: https://acme-v02.api.letsencrypt.org/acme/authz/[redacted]/[redacted] lib=lego
2025-07-22T06:45:56Z DBG github.com/go-acme/lego/v4@v4.23.1/log/logger.go:48 > [INFO] [pic.example.com] acme: Could not find solver for: tls-alpn-01 lib=lego
2025-07-22T06:45:56Z DBG github.com/go-acme/lego/v4@v4.23.1/log/logger.go:48 > [INFO] [pic.example.com] acme: use http-01 solver lib=lego
2025-07-22T06:45:56Z DBG github.com/go-acme/lego/v4@v4.23.1/log/logger.go:48 > [INFO] [pic.example.com] acme: Trying to solve HTTP-01 lib=lego
2025-07-22T06:45:58Z DBG github.com/traefik/traefik/v3/pkg/provider/acme/challenge_http.go:84 > Unable to split host and port. Fallback to request host. error="address pic.example.com: missing port in address" providerName=acme
2025-07-22T06:45:58Z DBG github.com/traefik/traefik/v3/pkg/provider/acme/challenge_http.go:104 > Retrieving the ACME challenge for pic.example.com (token "[redacted]-[redacted]")... providerName=acme
2025-07-22T06:45:58Z DBG github.com/traefik/traefik/v3/pkg/provider/acme/challenge_http.go:84 > Unable to split host and port. Fallback to request host. error="address pic.example.com: missing port in address" providerName=acme
2025-07-22T06:45:58Z DBG github.com/traefik/traefik/v3/pkg/provider/acme/challenge_http.go:104 > Retrieving the ACME challenge for pic.example.com (token "[redacted]-[redacted]")... providerName=acme
2025-07-22T06:45:59Z DBG github.com/traefik/traefik/v3/pkg/provider/acme/challenge_http.go:84 > Unable to split host and port. Fallback to request host. error="address pic.example.com: missing port in address" providerName=acme
2025-07-22T06:45:59Z DBG github.com/traefik/traefik/v3/pkg/provider/acme/challenge_http.go:104 > Retrieving the ACME challenge for pic.example.com (token "[redacted]-[redacted]")... providerName=acme
2025-07-22T06:45:59Z DBG github.com/traefik/traefik/v3/pkg/provider/acme/challenge_http.go:84 > Unable to split host and port. Fallback to request host. error="address pic.example.com: missing port in address" providerName=acme
2025-07-22T06:45:59Z DBG github.com/traefik/traefik/v3/pkg/provider/acme/challenge_http.go:104 > Retrieving the ACME challenge for pic.example.com (token "[redacted]-[redacted]")... providerName=acme
2025-07-22T06:45:59Z DBG github.com/traefik/traefik/v3/pkg/provider/acme/challenge_http.go:84 > Unable to split host and port. Fallback to request host. error="address pic.example.com: missing port in address" providerName=acme
2025-07-22T06:45:59Z DBG github.com/traefik/traefik/v3/pkg/provider/acme/challenge_http.go:104 > Retrieving the ACME challenge for pic.example.com (token "[redacted]-[redacted]")... providerName=acme
2025-07-22T06:46:00Z DBG github.com/traefik/traefik/v3/pkg/tls/tlsmanager.go:228 > Serving default certificate for request: "example.com"
2025-07-22T06:46:00Z DBG github.com/traefik/traefik/v3/pkg/tls/tlsmanager.go:228 > Serving default certificate for request: "example.com"
2025-07-22T06:46:02Z DBG github.com/go-acme/lego/v4@v4.23.1/log/logger.go:48 > [INFO] [pic.example.com] The server validated our request lib=lego
2025-07-22T06:46:02Z DBG github.com/go-acme/lego/v4@v4.23.1/log/logger.go:48 > [INFO] [pic.example.com] acme: Validations succeeded; requesting certificates lib=lego
2025-07-22T06:46:04Z DBG github.com/traefik/traefik/v3/pkg/tls/tlsmanager.go:228 > Serving default certificate for request: "example.com"
2025-07-22T06:46:04Z DBG github.com/traefik/traefik/v3/pkg/tls/tlsmanager.go:228 > Serving default certificate for request: "example.com"
2025-07-22T06:46:06Z DBG github.com/go-acme/lego/v4@v4.23.1/log/logger.go:48 > [INFO] [pic.example.com] Server responded with a certificate. lib=lego
2025-07-22T06:46:06Z DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:736 > Certificates obtained for domains [pic.example.com] ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory providerName=lets-encrypt.acme routerName=nginx@docker rule=Host(`pic.example.com`)
2025-07-22T06:46:06Z DBG github.com/traefik/traefik/v3/pkg/server/configurationwatcher.go:227 > Configuration received config={"http":{},"tcp":{},"tls":{},"udp":{}} providerName=lets-encrypt.acme
2025-07-22T06:46:06Z DBG github.com/traefik/traefik/v3/pkg/tls/certificate.go:132 > Adding certificate for domain(s) pic.example.com
2025-07-22T06:46:06Z DBG github.com/traefik/traefik/v3/pkg/tls/tlsmanager.go:321 > No default certificate, fallback to the internal generated certificate tlsStoreName=default
2025-07-22T06:46:06Z DBG github.com/traefik/traefik/v3/pkg/middlewares/stripprefix/strip_prefix.go:32 > Creating middleware entryPointName=traefik middlewareName=dashboard_stripprefix@internal middlewareType=StripPrefix routerName=dashboard@internal
2025-07-22T06:46:06Z DBG github.com/traefik/traefik/v3/pkg/middlewares/observability/middleware.go:33 > Adding tracing to middleware entryPointName=traefik middlewareName=dashboard_stripprefix@internal routerName=dashboard@internal
2025-07-22T06:46:06Z DBG github.com/traefik/traefik/v3/pkg/middlewares/redirect/redirect_regex.go:17 > Creating middleware entryPointName=traefik middlewareName=dashboard_redirect@internal middlewareType=RedirectRegex routerName=dashboard@internal
2025-07-22T06:46:06Z DBG github.com/traefik/traefik/v3/pkg/middlewares/redirect/redirect_regex.go:18 > Setting up redirection from ^(http:\/\/(\[[\w:.]+\]|[\w\._-]+)(:\d+)?)\/$ to ${1}/dashboard/ entryPointName=traefik middlewareName=dashboard_redirect@internal middlewareType=RedirectRegex routerName=dashboard@internal
2025-07-22T06:46:06Z DBG github.com/traefik/traefik/v3/pkg/middlewares/observability/middleware.go:33 > Adding tracing to middleware entryPointName=traefik middlewareName=dashboard_redirect@internal routerName=dashboard@internal
2025-07-22T06:46:06Z DBG github.com/traefik/traefik/v3/pkg/middlewares/recovery/recovery.go:25 > Creating middleware entryPointName=traefik middlewareName=traefik-internal-recovery middlewareType=Recovery
2025-07-22T06:46:06Z DBG github.com/traefik/traefik/v3/pkg/middlewares/redirect/redirect_scheme.go:29 > Creating middleware entryPointName=http middlewareName=redirect-to-https@file middlewareType=RedirectScheme routerName=catchall@file
2025-07-22T06:46:06Z DBG github.com/traefik/traefik/v3/pkg/middlewares/redirect/redirect_scheme.go:30 > Setting up redirection to https 443 entryPointName=http middlewareName=redirect-to-https@file middlewareType=RedirectScheme routerName=catchall@file
2025-07-22T06:46:06Z DBG github.com/traefik/traefik/v3/pkg/middlewares/recovery/recovery.go:25 > Creating middleware entryPointName=http middlewareName=traefik-internal-recovery middlewareType=Recovery
2025-07-22T06:46:06Z DBG github.com/traefik/traefik/v3/pkg/server/service/service.go:320 > Creating load-balancer entryPointName=https routerName=https-nginx@docker serviceName=nginx@docker
2025-07-22T06:46:06Z DBG github.com/traefik/traefik/v3/pkg/server/service/service.go:363 > Creating server URL=http://192.168.176.2:12345 entryPointName=https routerName=https-nginx@docker serverIndex=0 serviceName=nginx@docker
2025-07-22T06:46:06Z DBG github.com/traefik/traefik/v3/pkg/middlewares/redirect/redirect_scheme.go:29 > Creating middleware entryPointName=https middlewareName=redirect-to-https@file middlewareType=RedirectScheme routerName=https-nginx@docker
2025-07-22T06:46:06Z DBG github.com/traefik/traefik/v3/pkg/middlewares/redirect/redirect_scheme.go:30 > Setting up redirection to https 443 entryPointName=https middlewareName=redirect-to-https@file middlewareType=RedirectScheme routerName=https-nginx@docker
2025-07-22T06:46:06Z DBG github.com/traefik/traefik/v3/pkg/middlewares/redirect/redirect_scheme.go:29 > Creating middleware entryPointName=https middlewareName=redirect-to-https@file middlewareType=RedirectScheme routerName=https-catchall@file
2025-07-22T06:46:06Z DBG github.com/traefik/traefik/v3/pkg/middlewares/redirect/redirect_scheme.go:30 > Setting up redirection to https 443 entryPointName=https middlewareName=redirect-to-https@file middlewareType=RedirectScheme routerName=https-catchall@file
2025-07-22T06:46:06Z DBG github.com/traefik/traefik/v3/pkg/middlewares/recovery/recovery.go:25 > Creating middleware entryPointName=https middlewareName=traefik-internal-recovery middlewareType=Recovery
2025-07-22T06:46:06Z DBG github.com/traefik/traefik/v3/pkg/middlewares/redirect/redirect_scheme.go:29 > Creating middleware entryPointName=http middlewareName=redirect-to-https@file middlewareType=RedirectScheme routerName=nginx@docker
2025-07-22T06:46:06Z DBG github.com/traefik/traefik/v3/pkg/middlewares/redirect/redirect_scheme.go:30 > Setting up redirection to https 443 entryPointName=http middlewareName=redirect-to-https@file middlewareType=RedirectScheme routerName=nginx@docker
2025-07-22T06:46:06Z DBG github.com/traefik/traefik/v3/pkg/middlewares/recovery/recovery.go:25 > Creating middleware entryPointName=http middlewareName=traefik-internal-recovery middlewareType=Recovery
2025-07-22T06:46:06Z DBG github.com/traefik/traefik/v3/pkg/server/router/tcp/manager.go:237 > Adding route for pic.example.com with TLS options default entryPointName=http
2025-07-22T06:46:06Z WRN github.com/traefik/traefik/v3/pkg/server/router/tcp/manager.go:182 > No domain found in rule HostRegexp(`{host:.+}`), the TLS options applied for this router will depend on the SNI of each request entryPointName=https routerName=https-catchall@file
2025-07-22T06:46:06Z DBG github.com/traefik/traefik/v3/pkg/server/router/tcp/manager.go:237 > Adding route for pic.example.com with TLS options default entryPointName=https
2025-07-22T06:46:06Z DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:468 > No domain parsed in provider ACME ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory providerName=lets-encrypt.acme routerName=https-catchall@file rule=HostRegexp(`{host:.+}`)
2025-07-22T06:46:06Z DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:472 > Trying to challenge certificate for domain [pic.example.com] found in HostSNI rule ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory providerName=lets-encrypt.acme routerName=nginx@docker rule=Host(`pic.example.com`)
2025-07-22T06:46:06Z DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:472 > Trying to challenge certificate for domain [pic.example.com] found in HostSNI rule ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory providerName=lets-encrypt.acme routerName=https-nginx@docker rule=Host(`pic.example.com`)
2025-07-22T06:46:06Z DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:946 > Looking for provided certificate(s) to validate ["pic.example.com"]... ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory providerName=lets-encrypt.acme routerName=nginx@docker rule=Host(`pic.example.com`)
2025-07-22T06:46:06Z DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:946 > Looking for provided certificate(s) to validate ["pic.example.com"]... ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory providerName=lets-encrypt.acme routerName=https-nginx@docker rule=Host(`pic.example.com`)
2025-07-22T06:46:06Z DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:990 > No ACME certificate generation required for domains ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory domains=["pic.example.com"] providerName=lets-encrypt.acme routerName=nginx@docker rule=Host(`pic.example.com`)
2025-07-22T06:46:06Z DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:990 > No ACME certificate generation required for domains ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory domains=["pic.example.com"] providerName=lets-encrypt.acme routerName=https-nginx@docker rule=Host(`pic.example.com`)
2025-07-22T06:46:07Z DBG github.com/traefik/traefik/v3/pkg/tls/tlsmanager.go:228 > Serving default certificate for request: "example.com"
2025-07-22T06:46:16Z DBG github.com/traefik/traefik/v3/pkg/server/service/loadbalancer/wrr/wrr.go:175 > Service selected by WRR: http://192.168.176.2:12345
2025-07-22T06:46:16Z DBG github.com/traefik/traefik/v3/pkg/server/service/loadbalancer/wrr/wrr.go:175 > Service selected by WRR: http://192.168.176.2:12345
2025-07-22T06:46:16Z DBG github.com/traefik/traefik/v3/pkg/tls/tlsmanager.go:228 > Serving default certificate for request: "100.101.102.103"
2025-07-22T06:46:16Z DBG log/log.go:245 > http: TLS handshake error from 192.168.176.1:44096: EOF
2025-07-22T06:46:16Z DBG github.com/traefik/traefik/v3/pkg/tls/tlsmanager.go:228 > Serving default certificate for request: "100.101.102.103"
2025-07-22T06:46:16Z DBG github.com/traefik/traefik/v3/pkg/tls/tlsmanager.go:228 > Serving default certificate for request: "100.101.102.103"
2025-07-22T06:46:16Z DBG log/log.go:245 > http: TLS handshake error from 192.168.176.1:59134: EOF
2025-07-22T06:46:16Z DBG log/log.go:245 > http: TLS handshake error from 192.168.176.1:44100: EOF
2025-07-22T06:46:16Z DBG github.com/traefik/traefik/v3/pkg/tls/tlsmanager.go:228 > Serving default certificate for request: "100.101.102.103"
2025-07-22T06:46:16Z DBG github.com/traefik/traefik/v3/pkg/tls/tlsmanager.go:228 > Serving default certificate for request: "100.101.102.103"
2025-07-22T06:46:16Z DBG log/log.go:245 > http: TLS handshake error from 192.168.176.1:44106: tls: no cipher suite supported by both client and server
2025-07-22T06:46:16Z DBG log/log.go:245 > http: TLS handshake error from 192.168.176.1:59140: EOF
2025-07-22T06:46:16Z DBG github.com/traefik/traefik/v3/pkg/tls/tlsmanager.go:228 > Serving default certificate for request: "100.101.102.103"
2025-07-22T06:46:16Z DBG log/log.go:245 > http: TLS handshake error from 192.168.176.1:59144: tls: no cipher suite supported by both client and server
2025-07-22T06:46:16Z DBG log/log.go:245 > http: TLS handshake error from 192.168.176.1:44110: tls: client requested unsupported application protocols ([http/0.9 http/1.0 spdy/1 spdy/2 spdy/3 h2c hq])
2025-07-22T06:46:16Z DBG log/log.go:245 > http: TLS handshake error from 192.168.176.1:59148: tls: client requested unsupported application protocols ([http/0.9 http/1.0 spdy/1 spdy/2 spdy/3 h2c hq])
2025-07-22T06:46:16Z DBG log/log.go:245 > http: TLS handshake error from 192.168.176.1:44114: tls: client requested unsupported application protocols ([hq h2c spdy/3 spdy/2 spdy/1 http/1.0 http/0.9])
2025-07-22T06:46:16Z DBG github.com/traefik/traefik/v3/pkg/server/service/loadbalancer/wrr/wrr.go:175 > Service selected by WRR: http://192.168.176.2:12345
2025-07-22T06:46:16Z DBG log/log.go:245 > http: TLS handshake error from 192.168.176.1:44116: tls: client offered only unsupported versions: [302 301]
2025-07-22T06:46:16Z DBG github.com/traefik/traefik/v3/pkg/tls/tlsmanager.go:228 > Serving default certificate for request: "100.101.102.103"
2025-07-22T06:46:16Z DBG log/log.go:245 > http: TLS handshake error from 192.168.176.1:44120: EOF
2025-07-22T06:46:16Z DBG github.com/traefik/traefik/v3/pkg/tls/tlsmanager.go:228 > Serving default certificate for request: "100.101.102.103"
2025-07-22T06:46:16Z DBG log/log.go:245 > http: TLS handshake error from 192.168.176.1:44122: EOF
2025-07-22T06:46:25Z DBG github.com/traefik/traefik/v3/pkg/server/service/loadbalancer/wrr/wrr.go:175 > Service selected by WRR: http://192.168.176.2:12345
2025-07-22T06:46:26Z DBG github.com/traefik/traefik/v3/pkg/server/service/loadbalancer/wrr/wrr.go:175 > Service selected by WRR: http://192.168.176.2:12345
2025-07-22T06:46:28Z DBG github.com/traefik/traefik/v3/pkg/tls/tlsmanager.go:228 > Serving default certificate for request: "example.com"
2025-07-22T06:46:28Z DBG log/log.go:245 > http: TLS handshake error from 192.168.176.1:44152: local error: tls: bad record MAC
2025-07-22T06:46:29Z DBG github.com/traefik/traefik/v3/pkg/server/service/loadbalancer/wrr/wrr.go:175 > Service selected by WRR: http://192.168.176.2:12345
2025-07-22T06:46:32Z DBG github.com/traefik/traefik/v3/pkg/server/service/loadbalancer/wrr/wrr.go:175 > Service selected by WRR: http://192.168.176.2:12345
2025-07-22T06:46:44Z DBG github.com/traefik/traefik/v3/pkg/tls/tlsmanager.go:228 > Serving default certificate for request: "example.com"
2025-07-22T06:46:44Z DBG log/log.go:245 > http: TLS handshake error from 192.168.176.1:44196: local error: tls: bad record MAC
2025-07-22T06:46:48Z DBG github.com/traefik/traefik/v3/pkg/server/service/loadbalancer/wrr/wrr.go:175 > Service selected by WRR: http://192.168.176.2:12345
2025-07-22T06:46:55Z DBG github.com/traefik/traefik/v3/pkg/tls/tlsmanager.go:228 > Serving default certificate for request: "example.com"
2025-07-22T06:46:55Z DBG log/log.go:245 > http: TLS handshake error from 192.168.176.1:44230: local error: tls: bad record MAC
2025-07-22T06:48:02Z DBG github.com/traefik/traefik/v3/pkg/server/service/loadbalancer/wrr/wrr.go:175 > Service selected by WRR: http://192.168.176.2:12345
2025-07-22T06:48:07Z DBG github.com/traefik/traefik/v3/pkg/server/service/loadbalancer/wrr/wrr.go:175 > Service selected by WRR: http://192.168.176.2:12345
2025-07-22T06:48:09Z DBG log/log.go:245 > http: TLS handshake error from 192.168.176.1:44304: EOF
2025-07-22T06:48:09Z DBG log/log.go:245 > http: TLS handshake error from 192.168.176.1:44302: EOF
2025-07-22T06:48:10Z DBG log/log.go:245 > http: TLS handshake error from 192.168.176.1:44310: tls: no cipher suite supported by both client and server
2025-07-22T06:48:10Z DBG log/log.go:245 > http: TLS handshake error from 192.168.176.1:44312: tls: client requested unsupported application protocols ([http/0.9 http/1.0 spdy/1 spdy/2 spdy/3 h2c hq])
2025-07-22T06:48:12Z DBG log/log.go:245 > http: TLS handshake error from 192.168.176.1:44318: tls: client offered only unsupported versions: [302 301]
2025-07-22T06:48:12Z DBG log/log.go:245 > http: TLS handshake error from 192.168.176.1:44316: tls: client requested unsupported application protocols ([hq h2c spdy/3 spdy/2 spdy/1 http/1.0 http/0.9])
2025-07-22T06:48:14Z DBG github.com/traefik/traefik/v3/pkg/server/service/loadbalancer/wrr/wrr.go:175 > Service selected by WRR: http://192.168.176.2:12345
2025-07-22T06:48:14Z DBG github.com/traefik/traefik/v3/pkg/server/service/loadbalancer/wrr/wrr.go:175 > Service selected by WRR: http://192.168.176.2:12345
...