Last active
May 18, 2020 17:06
-
-
Save McFateM/4ad29fa0a30e2a3fc5ef3b4b566a031a to your computer and use it in GitHub Desktop.
Static Test 3 Log - DNS-01 Challenge with LE Production
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
root@static:/opt/containers# ./restart.sh | |
440ddf714c8d66b833b0cba6c0541b8cf38e177a7cb2649759fee6a0ec59d7b2 | |
Pulling traefik (traefik:2.2.1)... | |
2.2.1: Pulling from library/traefik | |
cbdbe7a5bc2a: Pull complete | |
f16506d32a25: Pull complete | |
2be216d464d0: Pull complete | |
aed51f08b610: Pull complete | |
Creating traefik ... | |
Pulling traefik (traefik:2.2.1)... | |
Creating traefik ... done | |
Attaching to traefik | |
traefik | time="2020-05-18T09:20:59-05:00" level=info msg="Configuration loaded from file: /traefik.yml" | |
Creating network "watchtower_default" with the default driver | |
Pulling watchtower (containrrr/watchtower:)... | |
latest: Pulling from containrrr/watchtower | |
c4b177d7cf7a: Pull complete | |
676d5222541c: Pull complete | |
00dbe20f4a5b: Pull complete | |
Creating watchtower ... | |
Pulling watchtower (containrrr/watchtower:)... | |
Creating watchtower ... done | |
Attaching to watchtower | |
Pulling portainer (portainer/portainer:1.23.2)... | |
1.23.2: Pulling from portainer/portainer | |
d1e017099d17: Pull complete | |
a7dca5b5a9e8: Pull complete | |
Creating portainer ... | |
Pulling portainer (portainer/portainer:1.23.2)... | |
Creating portainer ... done | |
Attaching to portainer | |
portainer | 2020/05/18 09:21:11 Templates already registered inside the database. Skipping template import. | |
portainer | 2020/05/18 09:21:11 server: Reverse tunnelling enabled | |
portainer | 2020/05/18 09:21:11 server: Fingerprint 6f:99:ec:c8:52:4a:fd:1e:0d:4c:9d:20:ca:16:39:fb | |
portainer | 2020/05/18 09:21:11 server: Listening on 0.0.0.0:8000... | |
portainer | 2020/05/18 09:21:11 Starting Portainer 1.23.2 on :9000 | |
portainer | 2020/05/18 09:21:11 [DEBUG] [chisel, monitoring] [check_interval_seconds: 10.000000] [message: starting tunnel management process] | |
./restart.sh: line 16: cd: ../landinge: No such file or directory | |
portainer is up-to-date | |
Attaching to portainer | |
portainer | 2020/05/18 09:21:11 Templates already registered inside the database. Skipping template import. | |
portainer | 2020/05/18 09:21:11 server: Reverse tunnelling enabled | |
portainer | 2020/05/18 09:21:11 server: Fingerprint 6f:99:ec:c8:52:4a:fd:1e:0d:4c:9d:20:ca:16:39:fb | |
portainer | 2020/05/18 09:21:11 server: Listening on 0.0.0.0:8000... | |
portainer | 2020/05/18 09:21:11 Starting Portainer 1.23.2 on :9000 | |
portainer | 2020/05/18 09:21:11 [DEBUG] [chisel, monitoring] [check_interval_seconds: 10.000000] [message: starting tunnel management process] | |
Pulling rootstalk (mcfatem/rootstalk:latest)... | |
latest: Pulling from mcfatem/rootstalk | |
4167d3e14976: Pull complete | |
db94a93dfca0: Pull complete | |
32152e4c4d01: Pull complete | |
Creating rootstalk-static ... | |
Pulling rootstalk (mcfatem/rootstalk:latest)... | |
Creating rootstalk-static ... done | |
Attaching to rootstalk-static | |
Pulling vaf (mcfatem/vaf:latest)... | |
latest: Pulling from mcfatem/vaf | |
050382585609: Pull complete | |
aa1504bc12ac: Pull complete | |
60b7ea37e17a: Pull complete | |
615a270f2edf: Pull complete | |
Creating vaf ... | |
Pulling vaf (mcfatem/vaf:latest)... | |
Creating vaf ... done | |
Attaching to vaf | |
WARNING: Found orphan containers (vaf) for this project. If you removed or renamed this service in your compose file, you can run this command with the --remove-orphans flag to clean it up. | |
Pulling kiosk (mcfatem/vaf-kiosk:latest)... | |
latest: Pulling from mcfatem/vaf-kiosk | |
8e402f1a9c57: Pull complete | |
7b69d8b552de: Pull complete | |
42e747db7e28: Pull complete | |
4f8106e1c445: Pull complete | |
78c7d59fe6a4: Pull complete | |
Creating vaf-kiosk ... | |
Pulling kiosk (mcfatem/vaf-kiosk:latest)... | |
Creating vaf-kiosk ... done | |
Attaching to vaf | |
Dumping traefik.log... | |
time="2020-05-18T09:20:59-05:00" level=info msg="Traefik version 2.2.1 built on 2020-04-29T18:02:09Z" | |
time="2020-05-18T09:20:59-05:00" level=debug msg="Static configuration loaded {\"global\":{\"checkNewVersion\":true},\"serversTransport\":{\"maxIdleConnsPerHost\":200},\"entryPoints\":{\"http\":{\"address\":\":80\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":10000000000},\"respondingTimeouts\":{\"idleTimeout\":180000000000}},\"forwardedHeaders\":{},\"http\":{}},\"https\":{\"address\":\":443\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":10000000000},\"respondingTimeouts\":{\"idleTimeout\":180000000000}},\"forwardedHeaders\":{},\"http\":{}}},\"providers\":{\"providersThrottleDuration\":2000000000,\"docker\":{\"watch\":true,\"endpoint\":\"unix:///var/run/docker.sock\",\"defaultRule\":\"Host(`{{ normalize .Name }}`)\",\"swarmModeRefreshSeconds\":15000000000}},\"api\":{\"dashboard\":true},\"log\":{\"level\":\"DEBUG\",\"filePath\":\"/var/log/traefik.log\",\"format\":\"common\"},\"certificatesResolvers\":{\"http\":{\"acme\":{\"email\":\"digital@grinnell.edu\",\"caServer\":\"https://acme-v02.api.letsencrypt.org/directory\",\"storage\":\"acme.json\",\"keyType\":\"RSA4096\",\"dnsChallenge\":{\"provider\":\"azure\"}}}}}" | |
time="2020-05-18T09:20:59-05:00" level=info msg="\nStats collection is disabled.\nHelp us improve Traefik by turning this feature on :)\nMore details on: https://docs.traefik.io/contributing/data-collection/\n" | |
time="2020-05-18T09:20:59-05:00" level=info msg="Starting provider aggregator.ProviderAggregator {}" | |
time="2020-05-18T09:20:59-05:00" level=debug msg="Start TCP Server" entryPointName=https | |
time="2020-05-18T09:20:59-05:00" level=debug msg="Start TCP Server" entryPointName=http | |
time="2020-05-18T09:20:59-05:00" level=info msg="Starting provider *acme.Provider {\"email\":\"digital@grinnell.edu\",\"caServer\":\"https://acme-v02.api.letsencrypt.org/directory\",\"storage\":\"acme.json\",\"keyType\":\"RSA4096\",\"dnsChallenge\":{\"provider\":\"azure\"},\"ResolverName\":\"http\",\"store\":{},\"ChallengeStore\":{}}" | |
time="2020-05-18T09:20:59-05:00" level=info msg="Testing certificate renew..." providerName=http.acme | |
time="2020-05-18T09:20:59-05:00" level=info msg="Starting provider *docker.Provider {\"watch\":true,\"endpoint\":\"unix:///var/run/docker.sock\",\"defaultRule\":\"Host(`{{ normalize .Name }}`)\",\"swarmModeRefreshSeconds\":15000000000}" | |
time="2020-05-18T09:20:59-05:00" level=info msg="Starting provider *traefik.Provider {}" | |
time="2020-05-18T09:20:59-05:00" level=debug msg="Configuration received from provider http.acme: {\"http\":{},\"tls\":{}}" providerName=http.acme | |
time="2020-05-18T09:20:59-05:00" level=debug msg="Configuration received from provider internal: {\"http\":{\"services\":{\"api\":{},\"dashboard\":{},\"noop\":{}}},\"tcp\":{},\"tls\":{}}" providerName=internal | |
time="2020-05-18T09:20:59-05:00" level=debug msg="No default certificate, generating one" | |
time="2020-05-18T09:20:59-05:00" level=debug msg="Provider connection established with docker 19.03.8 (API 1.40)" providerName=docker | |
time="2020-05-18T09:20:59-05:00" level=debug msg="Configuration received from provider docker: {\"http\":{\"routers\":{\"http-catchall\":{\"entryPoints\":[\"http\"],\"middlewares\":[\"redirect-to-https\"],\"service\":\"traefik-traefik\",\"rule\":\"hostregexp(`{host:[a-z-.]+}`)\"},\"traefik-secure\":{\"entryPoints\":[\"https\"],\"middlewares\":[\"traefik-auth\"],\"service\":\"api@internal\",\"rule\":\"Host(`static.grinnell.edu`) \\u0026\\u0026 (PathPrefix(`/api`) || PathPrefix(`/dashboard`))\",\"tls\":{\"certResolver\":\"http\"}}},\"services\":{\"traefik-traefik\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.192.2:80\"}],\"passHostHeader\":true}}},\"middlewares\":{\"redirect-to-https\":{\"redirectScheme\":{\"scheme\":\"https\"}},\"traefik-auth\":{\"basicAuth\":{\"users\":[\"admin:$2y$05$pJEzHJBzfoYYS7/hGAedcOP8XdsqNXE7j.LHFBVjueASOqOvvjGOy\"]}}}},\"tcp\":{},\"udp\":{}}" providerName=docker | |
time="2020-05-18T09:20:59-05:00" level=debug msg="No default certificate, generating one" | |
time="2020-05-18T09:21:00-05:00" level=debug msg="Creating middleware" entryPointName=http routerName=http-catchall@docker serviceName=traefik-traefik middlewareName=pipelining middlewareType=Pipelining | |
time="2020-05-18T09:21:00-05:00" level=debug msg="Creating load-balancer" entryPointName=http routerName=http-catchall@docker serviceName=traefik-traefik | |
time="2020-05-18T09:21:00-05:00" level=debug msg="Creating server 0 http://192.168.192.2:80" serviceName=traefik-traefik serverName=0 entryPointName=http routerName=http-catchall@docker | |
time="2020-05-18T09:21:00-05:00" level=debug msg="Added outgoing tracing middleware traefik-traefik" entryPointName=http routerName=http-catchall@docker middlewareName=tracing middlewareType=TracingForwarder | |
time="2020-05-18T09:21:00-05:00" level=debug msg="Creating middleware" entryPointName=http routerName=http-catchall@docker middlewareType=RedirectScheme middlewareName=redirect-to-https@docker | |
time="2020-05-18T09:21:00-05:00" level=debug msg="Setting up redirection to https " routerName=http-catchall@docker middlewareType=RedirectScheme middlewareName=redirect-to-https@docker entryPointName=http | |
time="2020-05-18T09:21:00-05:00" level=debug msg="Adding tracing to middleware" middlewareName=redirect-to-https@docker entryPointName=http routerName=http-catchall@docker | |
time="2020-05-18T09:21:00-05:00" level=debug msg="Creating middleware" entryPointName=http middlewareName=traefik-internal-recovery middlewareType=Recovery | |
time="2020-05-18T09:21:00-05:00" level=debug msg="Added outgoing tracing middleware api@internal" routerName=traefik-secure@docker middlewareName=tracing middlewareType=TracingForwarder entryPointName=https | |
time="2020-05-18T09:21:00-05:00" level=debug msg="Creating middleware" middlewareType=BasicAuth entryPointName=https routerName=traefik-secure@docker middlewareName=traefik-auth@docker | |
time="2020-05-18T09:21:00-05:00" level=debug msg="Adding tracing to middleware" entryPointName=https routerName=traefik-secure@docker middlewareName=traefik-auth@docker | |
time="2020-05-18T09:21:00-05:00" level=debug msg="Creating middleware" entryPointName=https middlewareName=traefik-internal-recovery middlewareType=Recovery | |
time="2020-05-18T09:21:00-05:00" level=debug msg="No default certificate, generating one" | |
time="2020-05-18T09:21:00-05:00" level=debug msg="Try to challenge certificate for domain [static.grinnell.edu] found in HostSNI rule" providerName=http.acme routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" | |
time="2020-05-18T09:21:00-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"static.grinnell.edu\"]..." providerName=http.acme routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" | |
time="2020-05-18T09:21:00-05:00" level=debug msg="Domains [\"static.grinnell.edu\"] need ACME certificates generation for domains \"static.grinnell.edu\"." providerName=http.acme routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" | |
time="2020-05-18T09:21:00-05:00" level=debug msg="Loading ACME certificates [static.grinnell.edu]..." routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" providerName=http.acme | |
time="2020-05-18T09:21:04-05:00" level=debug msg="Building ACME client..." providerName=http.acme | |
time="2020-05-18T09:21:04-05:00" level=debug msg="https://acme-v02.api.letsencrypt.org/directory" providerName=http.acme | |
time="2020-05-18T09:21:04-05:00" level=info msg=Register... providerName=http.acme | |
time="2020-05-18T09:21:04-05:00" level=debug msg="legolog: [INFO] acme: Registering account for digital@grinnell.edu" | |
time="2020-05-18T09:21:05-05:00" level=debug msg="Provider event received {Status:start ID:415052a204d5538f506f51cdfeee3e6a21f6d420b549e43bd3a86824adac2423 From:containrrr/watchtower Type:container Action:start Actor:{ID:415052a204d5538f506f51cdfeee3e6a21f6d420b549e43bd3a86824adac2423 Attributes:map[com.centurylinklabs.watchtower:true com.docker.compose.config-hash:72da3999b54f0b744907f5756a345c4a6e454b570a653d5079aa27ddef6fea5c com.docker.compose.container-number:1 com.docker.compose.oneoff:False com.docker.compose.project:watchtower com.docker.compose.service:watchtower com.docker.compose.slug:5d3947f6f3319544f191926dea367cf5ffe14ae494263a13ad9bd3b5c29f86b com.docker.compose.version:1.23.1 image:containrrr/watchtower name:watchtower traefik.enable:false]} Scope:local Time:1589811665 TimeNano:1589811665208915099}" providerName=docker | |
time="2020-05-18T09:21:05-05:00" level=debug msg="Filtering disabled container" providerName=docker container=watchtower-watchtower-415052a204d5538f506f51cdfeee3e6a21f6d420b549e43bd3a86824adac2423 | |
time="2020-05-18T09:21:05-05:00" level=debug msg="Configuration received from provider docker: {\"http\":{\"routers\":{\"http-catchall\":{\"entryPoints\":[\"http\"],\"middlewares\":[\"redirect-to-https\"],\"service\":\"traefik-traefik\",\"rule\":\"hostregexp(`{host:[a-z-.]+}`)\"},\"traefik-secure\":{\"entryPoints\":[\"https\"],\"middlewares\":[\"traefik-auth\"],\"service\":\"api@internal\",\"rule\":\"Host(`static.grinnell.edu`) \\u0026\\u0026 (PathPrefix(`/api`) || PathPrefix(`/dashboard`))\",\"tls\":{\"certResolver\":\"http\"}}},\"services\":{\"traefik-traefik\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.192.2:80\"}],\"passHostHeader\":true}}},\"middlewares\":{\"redirect-to-https\":{\"redirectScheme\":{\"scheme\":\"https\"}},\"traefik-auth\":{\"basicAuth\":{\"users\":[\"admin:$2y$05$pJEzHJBzfoYYS7/hGAedcOP8XdsqNXE7j.LHFBVjueASOqOvvjGOy\"]}}}},\"tcp\":{},\"udp\":{}}" providerName=docker | |
time="2020-05-18T09:21:05-05:00" level=debug msg="Creating middleware" serviceName=traefik-traefik middlewareName=pipelining middlewareType=Pipelining entryPointName=http routerName=http-catchall@docker | |
time="2020-05-18T09:21:05-05:00" level=debug msg="Creating load-balancer" entryPointName=http routerName=http-catchall@docker serviceName=traefik-traefik | |
time="2020-05-18T09:21:05-05:00" level=debug msg="Creating server 0 http://192.168.192.2:80" serviceName=traefik-traefik entryPointName=http serverName=0 routerName=http-catchall@docker | |
time="2020-05-18T09:21:05-05:00" level=debug msg="Added outgoing tracing middleware traefik-traefik" middlewareName=tracing middlewareType=TracingForwarder entryPointName=http routerName=http-catchall@docker | |
time="2020-05-18T09:21:05-05:00" level=debug msg="Creating middleware" entryPointName=http routerName=http-catchall@docker middlewareType=RedirectScheme middlewareName=redirect-to-https@docker | |
time="2020-05-18T09:21:05-05:00" level=debug msg="Setting up redirection to https " middlewareName=redirect-to-https@docker entryPointName=http routerName=http-catchall@docker middlewareType=RedirectScheme | |
time="2020-05-18T09:21:05-05:00" level=debug msg="Adding tracing to middleware" entryPointName=http routerName=http-catchall@docker middlewareName=redirect-to-https@docker | |
time="2020-05-18T09:21:05-05:00" level=debug msg="Creating middleware" middlewareName=traefik-internal-recovery middlewareType=Recovery entryPointName=http | |
time="2020-05-18T09:21:05-05:00" level=debug msg="Added outgoing tracing middleware api@internal" middlewareName=tracing middlewareType=TracingForwarder entryPointName=https routerName=traefik-secure@docker | |
time="2020-05-18T09:21:05-05:00" level=debug msg="Creating middleware" entryPointName=https routerName=traefik-secure@docker middlewareName=traefik-auth@docker middlewareType=BasicAuth | |
time="2020-05-18T09:21:05-05:00" level=debug msg="Adding tracing to middleware" routerName=traefik-secure@docker entryPointName=https middlewareName=traefik-auth@docker | |
time="2020-05-18T09:21:05-05:00" level=debug msg="Creating middleware" middlewareType=Recovery entryPointName=https middlewareName=traefik-internal-recovery | |
time="2020-05-18T09:21:05-05:00" level=debug msg="No default certificate, generating one" | |
time="2020-05-18T09:21:05-05:00" level=debug msg="Using DNS Challenge provider: azure" providerName=http.acme | |
time="2020-05-18T09:21:05-05:00" level=debug msg="Try to challenge certificate for domain [static.grinnell.edu] found in HostSNI rule" providerName=http.acme routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" | |
time="2020-05-18T09:21:05-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"static.grinnell.edu\"]..." providerName=http.acme routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" | |
time="2020-05-18T09:21:05-05:00" level=debug msg="No ACME certificate generation required for domains [\"static.grinnell.edu\"]." rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" providerName=http.acme routerName=traefik-secure@docker | |
time="2020-05-18T09:21:11-05:00" level=debug msg="Provider event received {Status:start ID:ee01ad568054734ec323de099774928e59972ec88f90bd56ec3ac689e8272135 From:portainer/portainer:1.23.2 Type:container Action:start Actor:{ID:ee01ad568054734ec323de099774928e59972ec88f90bd56ec3ac689e8272135 Attributes:map[com.docker.compose.config-hash:33a9d811b0a1a475c282531bf2e54d3cbcbfdd929b2e3243bd3a7a25c0206d3c com.docker.compose.container-number:1 com.docker.compose.oneoff:False com.docker.compose.project:portainer com.docker.compose.service:portainer com.docker.compose.slug:9e13afe6528ff70bf5c8dc1bf4f95e6a88dfffbc9e24546c7ecf337fb24e1ed com.docker.compose.version:1.23.1 image:portainer/portainer:1.23.2 name:portainer traefik.docker.network:proxy traefik.enable:true traefik.http.middlewares.portainer-auth.basicauth.users:admin:$2y$05$pJEzHJBzfoYYS7/hGAedcOP8XdsqNXE7j.LHFBVjueASOqOvvjGOy traefik.http.middlewares.portainer-stripprefix.stripprefix.prefixes:/portainer traefik.http.routers.portainer-secure.entrypoints:https traefik.http.routers.portainer-secure.middlewares:portainer-stripprefix traefik.http.routers.portainer-secure.rule:Host(`static.grinnell.edu`) && PathPrefix(`/portainer`) traefik.http.routers.portainer-secure.service:portainer traefik.http.routers.portainer-secure.tls:true traefik.http.routers.portainer-secure.tls.certresolver:http traefik.http.services.portainer.loadbalancer.server.port:9000]} Scope:local Time:1589811671 TimeNano:1589811671124452087}" providerName=docker | |
time="2020-05-18T09:21:11-05:00" level=debug msg="Filtering disabled container" providerName=docker container=watchtower-watchtower-415052a204d5538f506f51cdfeee3e6a21f6d420b549e43bd3a86824adac2423 | |
time="2020-05-18T09:21:11-05:00" level=debug msg="Configuration received from provider docker: {\"http\":{\"routers\":{\"http-catchall\":{\"entryPoints\":[\"http\"],\"middlewares\":[\"redirect-to-https\"],\"service\":\"traefik-traefik\",\"rule\":\"hostregexp(`{host:[a-z-.]+}`)\"},\"portainer-secure\":{\"entryPoints\":[\"https\"],\"middlewares\":[\"portainer-stripprefix\"],\"service\":\"portainer\",\"rule\":\"Host(`static.grinnell.edu`) \\u0026\\u0026 PathPrefix(`/portainer`)\",\"tls\":{\"certResolver\":\"http\"}},\"traefik-secure\":{\"entryPoints\":[\"https\"],\"middlewares\":[\"traefik-auth\"],\"service\":\"api@internal\",\"rule\":\"Host(`static.grinnell.edu`) \\u0026\\u0026 (PathPrefix(`/api`) || PathPrefix(`/dashboard`))\",\"tls\":{\"certResolver\":\"http\"}}},\"services\":{\"portainer\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.192.3:9000\"}],\"passHostHeader\":true}},\"traefik-traefik\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.192.2:80\"}],\"passHostHeader\":true}}},\"middlewares\":{\"portainer-auth\":{\"basicAuth\":{\"users\":[\"admin:$2y$05$pJEzHJBzfoYYS7/hGAedcOP8XdsqNXE7j.LHFBVjueASOqOvvjGOy\"]}},\"portainer-stripprefix\":{\"stripPrefix\":{\"prefixes\":[\"/portainer\"],\"forceSlash\":true}},\"redirect-to-https\":{\"redirectScheme\":{\"scheme\":\"https\"}},\"traefik-auth\":{\"basicAuth\":{\"users\":[\"admin:$2y$05$pJEzHJBzfoYYS7/hGAedcOP8XdsqNXE7j.LHFBVjueASOqOvvjGOy\"]}}}},\"tcp\":{},\"udp\":{}}" providerName=docker | |
time="2020-05-18T09:21:11-05:00" level=debug msg="Creating middleware" entryPointName=http routerName=http-catchall@docker serviceName=traefik-traefik middlewareName=pipelining middlewareType=Pipelining | |
time="2020-05-18T09:21:11-05:00" level=debug msg="Creating load-balancer" entryPointName=http routerName=http-catchall@docker serviceName=traefik-traefik | |
time="2020-05-18T09:21:11-05:00" level=debug msg="Creating server 0 http://192.168.192.2:80" entryPointName=http routerName=http-catchall@docker serviceName=traefik-traefik serverName=0 | |
time="2020-05-18T09:21:11-05:00" level=debug msg="Added outgoing tracing middleware traefik-traefik" middlewareName=tracing middlewareType=TracingForwarder entryPointName=http routerName=http-catchall@docker | |
time="2020-05-18T09:21:11-05:00" level=debug msg="Creating middleware" routerName=http-catchall@docker middlewareName=redirect-to-https@docker middlewareType=RedirectScheme entryPointName=http | |
time="2020-05-18T09:21:11-05:00" level=debug msg="Setting up redirection to https " middlewareName=redirect-to-https@docker middlewareType=RedirectScheme entryPointName=http routerName=http-catchall@docker | |
time="2020-05-18T09:21:11-05:00" level=debug msg="Adding tracing to middleware" entryPointName=http routerName=http-catchall@docker middlewareName=redirect-to-https@docker | |
time="2020-05-18T09:21:11-05:00" level=debug msg="Creating middleware" middlewareName=traefik-internal-recovery middlewareType=Recovery entryPointName=http | |
time="2020-05-18T09:21:11-05:00" level=debug msg="Added outgoing tracing middleware api@internal" middlewareName=tracing middlewareType=TracingForwarder entryPointName=https routerName=traefik-secure@docker | |
time="2020-05-18T09:21:11-05:00" level=debug msg="Creating middleware" middlewareName=traefik-auth@docker middlewareType=BasicAuth entryPointName=https routerName=traefik-secure@docker | |
time="2020-05-18T09:21:11-05:00" level=debug msg="Adding tracing to middleware" entryPointName=https routerName=traefik-secure@docker middlewareName=traefik-auth@docker | |
time="2020-05-18T09:21:11-05:00" level=debug msg="Creating middleware" entryPointName=https routerName=portainer-secure@docker serviceName=portainer middlewareName=pipelining middlewareType=Pipelining | |
time="2020-05-18T09:21:11-05:00" level=debug msg="Creating load-balancer" entryPointName=https routerName=portainer-secure@docker serviceName=portainer | |
time="2020-05-18T09:21:11-05:00" level=debug msg="Creating server 0 http://192.168.192.3:9000" serviceName=portainer serverName=0 entryPointName=https routerName=portainer-secure@docker | |
time="2020-05-18T09:21:11-05:00" level=debug msg="Added outgoing tracing middleware portainer" entryPointName=https routerName=portainer-secure@docker middlewareName=tracing middlewareType=TracingForwarder | |
time="2020-05-18T09:21:11-05:00" level=debug msg="Creating middleware" middlewareType=StripPrefix middlewareName=portainer-stripprefix@docker entryPointName=https routerName=portainer-secure@docker | |
time="2020-05-18T09:21:11-05:00" level=debug msg="Adding tracing to middleware" entryPointName=https routerName=portainer-secure@docker middlewareName=portainer-stripprefix@docker | |
time="2020-05-18T09:21:11-05:00" level=debug msg="Creating middleware" middlewareType=Recovery entryPointName=https middlewareName=traefik-internal-recovery | |
time="2020-05-18T09:21:11-05:00" level=debug msg="No default certificate, generating one" | |
time="2020-05-18T09:21:11-05:00" level=debug msg="Try to challenge certificate for domain [static.grinnell.edu] found in HostSNI rule" rule="Host(`static.grinnell.edu`) && PathPrefix(`/portainer`)" providerName=http.acme routerName=portainer-secure@docker | |
time="2020-05-18T09:21:11-05:00" level=debug msg="Try to challenge certificate for domain [static.grinnell.edu] found in HostSNI rule" rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" providerName=http.acme routerName=traefik-secure@docker | |
time="2020-05-18T09:21:11-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"static.grinnell.edu\"]..." providerName=http.acme routerName=portainer-secure@docker rule="Host(`static.grinnell.edu`) && PathPrefix(`/portainer`)" | |
time="2020-05-18T09:21:11-05:00" level=debug msg="No ACME certificate generation required for domains [\"static.grinnell.edu\"]." providerName=http.acme routerName=portainer-secure@docker rule="Host(`static.grinnell.edu`) && PathPrefix(`/portainer`)" | |
time="2020-05-18T09:21:11-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"static.grinnell.edu\"]..." routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" providerName=http.acme | |
time="2020-05-18T09:21:11-05:00" level=debug msg="No ACME certificate generation required for domains [\"static.grinnell.edu\"]." rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" providerName=http.acme routerName=traefik-secure@docker | |
time="2020-05-18T09:21:24-05:00" level=debug msg="Provider event received {Status:start ID:f743273b612ecb1c02b9ed4f2530aac1c1b40cef5829c2d1ef0aad96cdae195b From:mcfatem/rootstalk:latest Type:container Action:start Actor:{ID:f743273b612ecb1c02b9ed4f2530aac1c1b40cef5829c2d1ef0aad96cdae195b Attributes:map[authors:Mark A. McFate <mcfatem@grinnell.edu>, Jeremy Sparagon '20 com.centurylinklabs.watchtower.enable:true com.docker.compose.config-hash:5cefc7f4b3742a172da66877fad1d2c40d1492fb3e9cf9b7980f6afe617e45b1 com.docker.compose.container-number:1 com.docker.compose.oneoff:False com.docker.compose.project:rootstalk com.docker.compose.service:rootstalk com.docker.compose.slug:9813dd784b5d768f35800a302bf7201774edf4771780d6aed94570ee88b4569 com.docker.compose.version:1.23.1 image:mcfatem/rootstalk:latest maintainer:NGINX Docker Maintainers <docker-maint@nginx.com> name:rootstalk-static traefik.docker.network:proxy traefik.enable:true traefik.http.routers.rootstalk-static-secure.entrypoints:https traefik.http.routers.rootstalk-static-secure.rule:Host(`rootstalk-static.grinnell.edu`) traefik.http.routers.rootstalk-static-secure.service:rootstalk-rootstalk traefik.http.routers.rootstalk-static-secure.tls:true traefik.http.routers.rootstalk-static-secure.tls.certresolver:http]} Scope:local Time:1589811684 TimeNano:1589811684229204203}" providerName=docker | |
time="2020-05-18T09:21:24-05:00" level=debug msg="Filtering disabled container" providerName=docker container=watchtower-watchtower-415052a204d5538f506f51cdfeee3e6a21f6d420b549e43bd3a86824adac2423 | |
time="2020-05-18T09:21:24-05:00" level=debug msg="Configuration received from provider docker: {\"http\":{\"routers\":{\"http-catchall\":{\"entryPoints\":[\"http\"],\"middlewares\":[\"redirect-to-https\"],\"service\":\"traefik-traefik\",\"rule\":\"hostregexp(`{host:[a-z-.]+}`)\"},\"portainer-secure\":{\"entryPoints\":[\"https\"],\"middlewares\":[\"portainer-stripprefix\"],\"service\":\"portainer\",\"rule\":\"Host(`static.grinnell.edu`) \\u0026\\u0026 PathPrefix(`/portainer`)\",\"tls\":{\"certResolver\":\"http\"}},\"rootstalk-static-secure\":{\"entryPoints\":[\"https\"],\"service\":\"rootstalk-rootstalk\",\"rule\":\"Host(`rootstalk-static.grinnell.edu`)\",\"tls\":{\"certResolver\":\"http\"}},\"traefik-secure\":{\"entryPoints\":[\"https\"],\"middlewares\":[\"traefik-auth\"],\"service\":\"api@internal\",\"rule\":\"Host(`static.grinnell.edu`) \\u0026\\u0026 (PathPrefix(`/api`) || PathPrefix(`/dashboard`))\",\"tls\":{\"certResolver\":\"http\"}}},\"services\":{\"portainer\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.192.3:9000\"}],\"passHostHeader\":true}},\"rootstalk-rootstalk\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.192.4:80\"}],\"passHostHeader\":true}},\"traefik-traefik\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.192.2:80\"}],\"passHostHeader\":true}}},\"middlewares\":{\"portainer-auth\":{\"basicAuth\":{\"users\":[\"admin:$2y$05$pJEzHJBzfoYYS7/hGAedcOP8XdsqNXE7j.LHFBVjueASOqOvvjGOy\"]}},\"portainer-stripprefix\":{\"stripPrefix\":{\"prefixes\":[\"/portainer\"],\"forceSlash\":true}},\"redirect-to-https\":{\"redirectScheme\":{\"scheme\":\"https\"}},\"traefik-auth\":{\"basicAuth\":{\"users\":[\"admin:$2y$05$pJEzHJBzfoYYS7/hGAedcOP8XdsqNXE7j.LHFBVjueASOqOvvjGOy\"]}}}},\"tcp\":{},\"udp\":{}}" providerName=docker | |
time="2020-05-18T09:21:24-05:00" level=debug msg="Creating middleware" middlewareName=pipelining middlewareType=Pipelining routerName=http-catchall@docker serviceName=traefik-traefik entryPointName=http | |
time="2020-05-18T09:21:24-05:00" level=debug msg="Creating load-balancer" serviceName=traefik-traefik entryPointName=http routerName=http-catchall@docker | |
time="2020-05-18T09:21:24-05:00" level=debug msg="Creating server 0 http://192.168.192.2:80" entryPointName=http serverName=0 routerName=http-catchall@docker serviceName=traefik-traefik | |
time="2020-05-18T09:21:24-05:00" level=debug msg="Added outgoing tracing middleware traefik-traefik" entryPointName=http routerName=http-catchall@docker middlewareName=tracing middlewareType=TracingForwarder | |
time="2020-05-18T09:21:24-05:00" level=debug msg="Creating middleware" entryPointName=http routerName=http-catchall@docker middlewareName=redirect-to-https@docker middlewareType=RedirectScheme | |
time="2020-05-18T09:21:24-05:00" level=debug msg="Setting up redirection to https " middlewareName=redirect-to-https@docker middlewareType=RedirectScheme entryPointName=http routerName=http-catchall@docker | |
time="2020-05-18T09:21:24-05:00" level=debug msg="Adding tracing to middleware" entryPointName=http routerName=http-catchall@docker middlewareName=redirect-to-https@docker | |
time="2020-05-18T09:21:24-05:00" level=debug msg="Creating middleware" entryPointName=http middlewareName=traefik-internal-recovery middlewareType=Recovery | |
time="2020-05-18T09:21:24-05:00" level=debug msg="Added outgoing tracing middleware api@internal" middlewareType=TracingForwarder entryPointName=https routerName=traefik-secure@docker middlewareName=tracing | |
time="2020-05-18T09:21:24-05:00" level=debug msg="Creating middleware" middlewareName=traefik-auth@docker entryPointName=https routerName=traefik-secure@docker middlewareType=BasicAuth | |
time="2020-05-18T09:21:24-05:00" level=debug msg="Adding tracing to middleware" entryPointName=https routerName=traefik-secure@docker middlewareName=traefik-auth@docker | |
time="2020-05-18T09:21:24-05:00" level=debug msg="Creating middleware" entryPointName=https routerName=portainer-secure@docker serviceName=portainer middlewareName=pipelining middlewareType=Pipelining | |
time="2020-05-18T09:21:24-05:00" level=debug msg="Creating load-balancer" entryPointName=https routerName=portainer-secure@docker serviceName=portainer | |
time="2020-05-18T09:21:24-05:00" level=debug msg="Creating server 0 http://192.168.192.3:9000" serviceName=portainer entryPointName=https routerName=portainer-secure@docker serverName=0 | |
time="2020-05-18T09:21:24-05:00" level=debug msg="Added outgoing tracing middleware portainer" middlewareName=tracing middlewareType=TracingForwarder entryPointName=https routerName=portainer-secure@docker | |
time="2020-05-18T09:21:24-05:00" level=debug msg="Creating middleware" routerName=portainer-secure@docker middlewareName=portainer-stripprefix@docker middlewareType=StripPrefix entryPointName=https | |
time="2020-05-18T09:21:24-05:00" level=debug msg="Adding tracing to middleware" entryPointName=https routerName=portainer-secure@docker middlewareName=portainer-stripprefix@docker | |
time="2020-05-18T09:21:24-05:00" level=debug msg="Creating middleware" routerName=rootstalk-static-secure@docker serviceName=rootstalk-rootstalk middlewareName=pipelining middlewareType=Pipelining entryPointName=https | |
time="2020-05-18T09:21:24-05:00" level=debug msg="Creating load-balancer" entryPointName=https routerName=rootstalk-static-secure@docker serviceName=rootstalk-rootstalk | |
time="2020-05-18T09:21:24-05:00" level=debug msg="Creating server 0 http://192.168.192.4:80" entryPointName=https routerName=rootstalk-static-secure@docker serviceName=rootstalk-rootstalk serverName=0 | |
time="2020-05-18T09:21:24-05:00" level=debug msg="Added outgoing tracing middleware rootstalk-rootstalk" middlewareType=TracingForwarder entryPointName=https routerName=rootstalk-static-secure@docker middlewareName=tracing | |
time="2020-05-18T09:21:24-05:00" level=debug msg="Creating middleware" middlewareName=traefik-internal-recovery middlewareType=Recovery entryPointName=https | |
time="2020-05-18T09:21:24-05:00" level=debug msg="No default certificate, generating one" | |
time="2020-05-18T09:21:24-05:00" level=debug msg="Try to challenge certificate for domain [static.grinnell.edu] found in HostSNI rule" providerName=http.acme routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" | |
time="2020-05-18T09:21:24-05:00" level=debug msg="Try to challenge certificate for domain [static.grinnell.edu] found in HostSNI rule" providerName=http.acme routerName=portainer-secure@docker rule="Host(`static.grinnell.edu`) && PathPrefix(`/portainer`)" | |
time="2020-05-18T09:21:24-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"static.grinnell.edu\"]..." routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" providerName=http.acme | |
time="2020-05-18T09:21:24-05:00" level=debug msg="No ACME certificate generation required for domains [\"static.grinnell.edu\"]." providerName=http.acme routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" | |
time="2020-05-18T09:21:24-05:00" level=debug msg="Try to challenge certificate for domain [rootstalk-static.grinnell.edu] found in HostSNI rule" providerName=http.acme routerName=rootstalk-static-secure@docker rule="Host(`rootstalk-static.grinnell.edu`)" | |
time="2020-05-18T09:21:24-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"static.grinnell.edu\"]..." providerName=http.acme routerName=portainer-secure@docker rule="Host(`static.grinnell.edu`) && PathPrefix(`/portainer`)" | |
time="2020-05-18T09:21:24-05:00" level=debug msg="No ACME certificate generation required for domains [\"static.grinnell.edu\"]." providerName=http.acme routerName=portainer-secure@docker rule="Host(`static.grinnell.edu`) && PathPrefix(`/portainer`)" | |
time="2020-05-18T09:21:24-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"rootstalk-static.grinnell.edu\"]..." routerName=rootstalk-static-secure@docker rule="Host(`rootstalk-static.grinnell.edu`)" providerName=http.acme | |
time="2020-05-18T09:21:24-05:00" level=debug msg="Domains [\"rootstalk-static.grinnell.edu\"] need ACME certificates generation for domains \"rootstalk-static.grinnell.edu\"." rule="Host(`rootstalk-static.grinnell.edu`)" providerName=http.acme routerName=rootstalk-static-secure@docker | |
time="2020-05-18T09:21:24-05:00" level=debug msg="Loading ACME certificates [rootstalk-static.grinnell.edu]..." routerName=rootstalk-static-secure@docker rule="Host(`rootstalk-static.grinnell.edu`)" providerName=http.acme | |
time="2020-05-18T09:21:30-05:00" level=debug msg="Provider event received {Status:start ID:528fc92cea1093a7f39c4686440404eb509d43db68e39f864b3d669e33069f17 From:mcfatem/vaf:latest Type:container Action:start Actor:{ID:528fc92cea1093a7f39c4686440404eb509d43db68e39f864b3d669e33069f17 Attributes:map[com.centurylinklabs.watchtower.enable:true com.docker.compose.config-hash:b999951403fea9466289148824ba40444c2ac3529d0e547d8142b5a64ad4b4f3 com.docker.compose.container-number:1 com.docker.compose.oneoff:False com.docker.compose.project:vaf com.docker.compose.service:vaf com.docker.compose.slug:dab7bdc335ae483b1c96c036fa3cdd75d4ea08c40f794daf0f8d53106f23323 com.docker.compose.version:1.23.1 image:mcfatem/vaf:latest maintainer:NGINX Docker Maintainers <docker-maint@nginx.com> name:vaf traefik.docker.network:proxy traefik.enable:true traefik.http.routers.vaf-secure.entrypoints:https traefik.http.routers.vaf-secure.rule:Host(`vaf.grinnell.edu`) traefik.http.routers.vaf-secure.service:vaf-vaf traefik.http.routers.vaf-secure.tls:true traefik.http.routers.vaf-secure.tls.certresolver:http]} Scope:local Time:1589811690 TimeNano:1589811690206277376}" providerName=docker | |
time="2020-05-18T09:21:30-05:00" level=debug msg="Filtering disabled container" container=watchtower-watchtower-415052a204d5538f506f51cdfeee3e6a21f6d420b549e43bd3a86824adac2423 providerName=docker | |
time="2020-05-18T09:21:30-05:00" level=debug msg="Configuration received from provider docker: {\"http\":{\"routers\":{\"http-catchall\":{\"entryPoints\":[\"http\"],\"middlewares\":[\"redirect-to-https\"],\"service\":\"traefik-traefik\",\"rule\":\"hostregexp(`{host:[a-z-.]+}`)\"},\"portainer-secure\":{\"entryPoints\":[\"https\"],\"middlewares\":[\"portainer-stripprefix\"],\"service\":\"portainer\",\"rule\":\"Host(`static.grinnell.edu`) \\u0026\\u0026 PathPrefix(`/portainer`)\",\"tls\":{\"certResolver\":\"http\"}},\"rootstalk-static-secure\":{\"entryPoints\":[\"https\"],\"service\":\"rootstalk-rootstalk\",\"rule\":\"Host(`rootstalk-static.grinnell.edu`)\",\"tls\":{\"certResolver\":\"http\"}},\"traefik-secure\":{\"entryPoints\":[\"https\"],\"middlewares\":[\"traefik-auth\"],\"service\":\"api@internal\",\"rule\":\"Host(`static.grinnell.edu`) \\u0026\\u0026 (PathPrefix(`/api`) || PathPrefix(`/dashboard`))\",\"tls\":{\"certResolver\":\"http\"}},\"vaf-secure\":{\"entryPoints\":[\"https\"],\"service\":\"vaf-vaf\",\"rule\":\"Host(`vaf.grinnell.edu`)\",\"tls\":{\"certResolver\":\"http\"}}},\"services\":{\"portainer\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.192.3:9000\"}],\"passHostHeader\":true}},\"rootstalk-rootstalk\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.192.4:80\"}],\"passHostHeader\":true}},\"traefik-traefik\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.192.2:80\"}],\"passHostHeader\":true}},\"vaf-vaf\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.192.5:80\"}],\"passHostHeader\":true}}},\"middlewares\":{\"portainer-auth\":{\"basicAuth\":{\"users\":[\"admin:$2y$05$pJEzHJBzfoYYS7/hGAedcOP8XdsqNXE7j.LHFBVjueASOqOvvjGOy\"]}},\"portainer-stripprefix\":{\"stripPrefix\":{\"prefixes\":[\"/portainer\"],\"forceSlash\":true}},\"redirect-to-https\":{\"redirectScheme\":{\"scheme\":\"https\"}},\"traefik-auth\":{\"basicAuth\":{\"users\":[\"admin:$2y$05$pJEzHJBzfoYYS7/hGAedcOP8XdsqNXE7j.LHFBVjueASOqOvvjGOy\"]}}}},\"tcp\":{},\"udp\":{}}" providerName=docker | |
time="2020-05-18T09:21:30-05:00" level=debug msg="Creating middleware" entryPointName=http routerName=http-catchall@docker serviceName=traefik-traefik middlewareName=pipelining middlewareType=Pipelining | |
time="2020-05-18T09:21:30-05:00" level=debug msg="Creating load-balancer" routerName=http-catchall@docker serviceName=traefik-traefik entryPointName=http | |
time="2020-05-18T09:21:30-05:00" level=debug msg="Creating server 0 http://192.168.192.2:80" entryPointName=http routerName=http-catchall@docker serviceName=traefik-traefik serverName=0 | |
time="2020-05-18T09:21:30-05:00" level=debug msg="Added outgoing tracing middleware traefik-traefik" middlewareType=TracingForwarder entryPointName=http routerName=http-catchall@docker middlewareName=tracing | |
time="2020-05-18T09:21:30-05:00" level=debug msg="Creating middleware" entryPointName=http routerName=http-catchall@docker middlewareName=redirect-to-https@docker middlewareType=RedirectScheme | |
time="2020-05-18T09:21:30-05:00" level=debug msg="Setting up redirection to https " entryPointName=http routerName=http-catchall@docker middlewareName=redirect-to-https@docker middlewareType=RedirectScheme | |
time="2020-05-18T09:21:30-05:00" level=debug msg="Adding tracing to middleware" entryPointName=http routerName=http-catchall@docker middlewareName=redirect-to-https@docker | |
time="2020-05-18T09:21:30-05:00" level=debug msg="Creating middleware" entryPointName=http middlewareName=traefik-internal-recovery middlewareType=Recovery | |
time="2020-05-18T09:21:30-05:00" level=debug msg="Creating middleware" middlewareName=pipelining middlewareType=Pipelining serviceName=vaf-vaf routerName=vaf-secure@docker entryPointName=https | |
time="2020-05-18T09:21:30-05:00" level=debug msg="Creating load-balancer" routerName=vaf-secure@docker entryPointName=https serviceName=vaf-vaf | |
time="2020-05-18T09:21:30-05:00" level=debug msg="Creating server 0 http://192.168.192.5:80" serverName=0 routerName=vaf-secure@docker entryPointName=https serviceName=vaf-vaf | |
time="2020-05-18T09:21:30-05:00" level=debug msg="Added outgoing tracing middleware vaf-vaf" entryPointName=https routerName=vaf-secure@docker middlewareName=tracing middlewareType=TracingForwarder | |
time="2020-05-18T09:21:30-05:00" level=debug msg="Creating middleware" entryPointName=https middlewareName=pipelining middlewareType=Pipelining routerName=portainer-secure@docker serviceName=portainer | |
time="2020-05-18T09:21:30-05:00" level=debug msg="Creating load-balancer" entryPointName=https routerName=portainer-secure@docker serviceName=portainer | |
time="2020-05-18T09:21:30-05:00" level=debug msg="Creating server 0 http://192.168.192.3:9000" entryPointName=https routerName=portainer-secure@docker serviceName=portainer serverName=0 | |
time="2020-05-18T09:21:30-05:00" level=debug msg="Added outgoing tracing middleware portainer" routerName=portainer-secure@docker entryPointName=https middlewareName=tracing middlewareType=TracingForwarder | |
time="2020-05-18T09:21:30-05:00" level=debug msg="Creating middleware" middlewareType=StripPrefix entryPointName=https routerName=portainer-secure@docker middlewareName=portainer-stripprefix@docker | |
time="2020-05-18T09:21:30-05:00" level=debug msg="Adding tracing to middleware" middlewareName=portainer-stripprefix@docker entryPointName=https routerName=portainer-secure@docker | |
time="2020-05-18T09:21:30-05:00" level=debug msg="Creating middleware" middlewareName=pipelining entryPointName=https routerName=rootstalk-static-secure@docker serviceName=rootstalk-rootstalk middlewareType=Pipelining | |
time="2020-05-18T09:21:30-05:00" level=debug msg="Creating load-balancer" routerName=rootstalk-static-secure@docker serviceName=rootstalk-rootstalk entryPointName=https | |
time="2020-05-18T09:21:30-05:00" level=debug msg="Creating server 0 http://192.168.192.4:80" entryPointName=https routerName=rootstalk-static-secure@docker serverName=0 serviceName=rootstalk-rootstalk | |
time="2020-05-18T09:21:30-05:00" level=debug msg="Added outgoing tracing middleware rootstalk-rootstalk" routerName=rootstalk-static-secure@docker middlewareName=tracing middlewareType=TracingForwarder entryPointName=https | |
time="2020-05-18T09:21:30-05:00" level=debug msg="Added outgoing tracing middleware api@internal" entryPointName=https routerName=traefik-secure@docker middlewareName=tracing middlewareType=TracingForwarder | |
time="2020-05-18T09:21:30-05:00" level=debug msg="Creating middleware" entryPointName=https routerName=traefik-secure@docker middlewareName=traefik-auth@docker middlewareType=BasicAuth | |
time="2020-05-18T09:21:30-05:00" level=debug msg="Adding tracing to middleware" middlewareName=traefik-auth@docker entryPointName=https routerName=traefik-secure@docker | |
time="2020-05-18T09:21:30-05:00" level=debug msg="Creating middleware" entryPointName=https middlewareName=traefik-internal-recovery middlewareType=Recovery | |
time="2020-05-18T09:21:30-05:00" level=debug msg="No default certificate, generating one" | |
time="2020-05-18T09:21:30-05:00" level=debug msg="Try to challenge certificate for domain [rootstalk-static.grinnell.edu] found in HostSNI rule" providerName=http.acme routerName=rootstalk-static-secure@docker rule="Host(`rootstalk-static.grinnell.edu`)" | |
time="2020-05-18T09:21:30-05:00" level=debug msg="Try to challenge certificate for domain [static.grinnell.edu] found in HostSNI rule" routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" providerName=http.acme | |
time="2020-05-18T09:21:30-05:00" level=debug msg="Try to challenge certificate for domain [vaf.grinnell.edu] found in HostSNI rule" providerName=http.acme routerName=vaf-secure@docker rule="Host(`vaf.grinnell.edu`)" | |
time="2020-05-18T09:21:30-05:00" level=debug msg="Try to challenge certificate for domain [static.grinnell.edu] found in HostSNI rule" routerName=portainer-secure@docker rule="Host(`static.grinnell.edu`) && PathPrefix(`/portainer`)" providerName=http.acme | |
time="2020-05-18T09:21:30-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"rootstalk-static.grinnell.edu\"]..." routerName=rootstalk-static-secure@docker rule="Host(`rootstalk-static.grinnell.edu`)" providerName=http.acme | |
time="2020-05-18T09:21:30-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"static.grinnell.edu\"]..." providerName=http.acme routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" | |
time="2020-05-18T09:21:30-05:00" level=debug msg="No ACME certificate generation required for domains [\"static.grinnell.edu\"]." routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" providerName=http.acme | |
time="2020-05-18T09:21:30-05:00" level=debug msg="No ACME certificate generation required for domains [\"rootstalk-static.grinnell.edu\"]." providerName=http.acme routerName=rootstalk-static-secure@docker rule="Host(`rootstalk-static.grinnell.edu`)" | |
time="2020-05-18T09:21:30-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"vaf.grinnell.edu\"]..." providerName=http.acme routerName=vaf-secure@docker rule="Host(`vaf.grinnell.edu`)" | |
time="2020-05-18T09:21:30-05:00" level=debug msg="Domains [\"vaf.grinnell.edu\"] need ACME certificates generation for domains \"vaf.grinnell.edu\"." providerName=http.acme routerName=vaf-secure@docker rule="Host(`vaf.grinnell.edu`)" | |
time="2020-05-18T09:21:30-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"static.grinnell.edu\"]..." providerName=http.acme routerName=portainer-secure@docker rule="Host(`static.grinnell.edu`) && PathPrefix(`/portainer`)" | |
time="2020-05-18T09:21:30-05:00" level=debug msg="No ACME certificate generation required for domains [\"static.grinnell.edu\"]." rule="Host(`static.grinnell.edu`) && PathPrefix(`/portainer`)" providerName=http.acme routerName=portainer-secure@docker | |
time="2020-05-18T09:21:30-05:00" level=debug msg="Loading ACME certificates [vaf.grinnell.edu]..." rule="Host(`vaf.grinnell.edu`)" providerName=http.acme routerName=vaf-secure@docker | |
time="2020-05-18T09:21:35-05:00" level=error msg="Unable to obtain ACME certificate for domains \"static.grinnell.edu\": cannot get ACME client azure: Get \"http://169.254.169.254/metadata/instance/compute/subscriptionId?api-version=2017-12-01&format=text\": dial tcp 169.254.169.254:80: i/o timeout" providerName=http.acme routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" | |
time="2020-05-18T09:21:35-05:00" level=debug msg="Building ACME client..." providerName=http.acme | |
time="2020-05-18T09:21:35-05:00" level=debug msg="https://acme-v02.api.letsencrypt.org/directory" providerName=http.acme | |
time="2020-05-18T09:21:35-05:00" level=debug msg="Using DNS Challenge provider: azure" providerName=http.acme | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Provider event received {Status:start ID:5dbed988250bcd9c88005bd0d2fbd9bafc30810da0ce2963a872aa1971682959 From:mcfatem/vaf-kiosk:latest Type:container Action:start Actor:{ID:5dbed988250bcd9c88005bd0d2fbd9bafc30810da0ce2963a872aa1971682959 Attributes:map[com.centurylinklabs.watchtower.enable:true com.docker.compose.config-hash:f8b92f21b12ae8261664dca61308602f0cf8e2fe711665f4993eb2186c883c0c com.docker.compose.container-number:1 com.docker.compose.oneoff:False com.docker.compose.project:vaf com.docker.compose.service:kiosk com.docker.compose.slug:24565ca769e8f40148fa4d3e0bf098258e5dc0ef8c42ed0ec2aa8375cc3c0f9 com.docker.compose.version:1.23.1 image:mcfatem/vaf-kiosk:latest maintainer:NGINX Docker Maintainers <docker-maint@nginx.com> name:vaf-kiosk traefik.docker.network:proxy traefik.enable:true traefik.http.routers.vaf-kiosk-secure.entrypoints:https traefik.http.routers.vaf-kiosk-secure.rule:Host(`vaf-kiosk.grinnell.edu`) traefik.http.routers.vaf-kiosk-secure.service:kiosk-vaf traefik.http.routers.vaf-kiosk-secure.tls:true traefik.http.routers.vaf-kiosk-secure.tls.certresolver:http]} Scope:local Time:1589811696 TimeNano:1589811696591907940}" providerName=docker | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Filtering disabled container" providerName=docker container=watchtower-watchtower-415052a204d5538f506f51cdfeee3e6a21f6d420b549e43bd3a86824adac2423 | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Configuration received from provider docker: {\"http\":{\"routers\":{\"http-catchall\":{\"entryPoints\":[\"http\"],\"middlewares\":[\"redirect-to-https\"],\"service\":\"traefik-traefik\",\"rule\":\"hostregexp(`{host:[a-z-.]+}`)\"},\"portainer-secure\":{\"entryPoints\":[\"https\"],\"middlewares\":[\"portainer-stripprefix\"],\"service\":\"portainer\",\"rule\":\"Host(`static.grinnell.edu`) \\u0026\\u0026 PathPrefix(`/portainer`)\",\"tls\":{\"certResolver\":\"http\"}},\"rootstalk-static-secure\":{\"entryPoints\":[\"https\"],\"service\":\"rootstalk-rootstalk\",\"rule\":\"Host(`rootstalk-static.grinnell.edu`)\",\"tls\":{\"certResolver\":\"http\"}},\"traefik-secure\":{\"entryPoints\":[\"https\"],\"middlewares\":[\"traefik-auth\"],\"service\":\"api@internal\",\"rule\":\"Host(`static.grinnell.edu`) \\u0026\\u0026 (PathPrefix(`/api`) || PathPrefix(`/dashboard`))\",\"tls\":{\"certResolver\":\"http\"}},\"vaf-kiosk-secure\":{\"entryPoints\":[\"https\"],\"service\":\"kiosk-vaf\",\"rule\":\"Host(`vaf-kiosk.grinnell.edu`)\",\"tls\":{\"certResolver\":\"http\"}},\"vaf-secure\":{\"entryPoints\":[\"https\"],\"service\":\"vaf-vaf\",\"rule\":\"Host(`vaf.grinnell.edu`)\",\"tls\":{\"certResolver\":\"http\"}}},\"services\":{\"kiosk-vaf\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.192.6:80\"}],\"passHostHeader\":true}},\"portainer\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.192.3:9000\"}],\"passHostHeader\":true}},\"rootstalk-rootstalk\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.192.4:80\"}],\"passHostHeader\":true}},\"traefik-traefik\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.192.2:80\"}],\"passHostHeader\":true}},\"vaf-vaf\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.192.5:80\"}],\"passHostHeader\":true}}},\"middlewares\":{\"portainer-auth\":{\"basicAuth\":{\"users\":[\"admin:$2y$05$pJEzHJBzfoYYS7/hGAedcOP8XdsqNXE7j.LHFBVjueASOqOvvjGOy\"]}},\"portainer-stripprefix\":{\"stripPrefix\":{\"prefixes\":[\"/portainer\"],\"forceSlash\":true}},\"redirect-to-https\":{\"redirectScheme\":{\"scheme\":\"https\"}},\"traefik-auth\":{\"basicAuth\":{\"users\":[\"admin:$2y$05$pJEzHJBzfoYYS7/hGAedcOP8XdsqNXE7j.LHFBVjueASOqOvvjGOy\"]}}}},\"tcp\":{},\"udp\":{}}" providerName=docker | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Creating middleware" middlewareName=pipelining entryPointName=http routerName=http-catchall@docker serviceName=traefik-traefik middlewareType=Pipelining | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Creating load-balancer" routerName=http-catchall@docker serviceName=traefik-traefik entryPointName=http | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Creating server 0 http://192.168.192.2:80" serviceName=traefik-traefik entryPointName=http routerName=http-catchall@docker serverName=0 | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Added outgoing tracing middleware traefik-traefik" middlewareType=TracingForwarder entryPointName=http routerName=http-catchall@docker middlewareName=tracing | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Creating middleware" routerName=http-catchall@docker entryPointName=http middlewareName=redirect-to-https@docker middlewareType=RedirectScheme | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Setting up redirection to https " routerName=http-catchall@docker entryPointName=http middlewareName=redirect-to-https@docker middlewareType=RedirectScheme | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Adding tracing to middleware" entryPointName=http middlewareName=redirect-to-https@docker routerName=http-catchall@docker | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Creating middleware" middlewareType=Recovery entryPointName=http middlewareName=traefik-internal-recovery | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Added outgoing tracing middleware api@internal" middlewareName=tracing routerName=traefik-secure@docker entryPointName=https middlewareType=TracingForwarder | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Creating middleware" routerName=traefik-secure@docker entryPointName=https middlewareType=BasicAuth middlewareName=traefik-auth@docker | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Adding tracing to middleware" routerName=traefik-secure@docker middlewareName=traefik-auth@docker entryPointName=https | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Creating middleware" routerName=vaf-secure@docker middlewareName=pipelining middlewareType=Pipelining serviceName=vaf-vaf entryPointName=https | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Creating load-balancer" routerName=vaf-secure@docker serviceName=vaf-vaf entryPointName=https | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Creating server 0 http://192.168.192.5:80" serviceName=vaf-vaf serverName=0 entryPointName=https routerName=vaf-secure@docker | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Added outgoing tracing middleware vaf-vaf" entryPointName=https routerName=vaf-secure@docker middlewareName=tracing middlewareType=TracingForwarder | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Creating middleware" middlewareType=Pipelining entryPointName=https routerName=vaf-kiosk-secure@docker serviceName=kiosk-vaf middlewareName=pipelining | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Creating load-balancer" routerName=vaf-kiosk-secure@docker serviceName=kiosk-vaf entryPointName=https | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Creating server 0 http://192.168.192.6:80" routerName=vaf-kiosk-secure@docker serviceName=kiosk-vaf serverName=0 entryPointName=https | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Added outgoing tracing middleware kiosk-vaf" middlewareType=TracingForwarder entryPointName=https routerName=vaf-kiosk-secure@docker middlewareName=tracing | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Creating middleware" serviceName=portainer entryPointName=https routerName=portainer-secure@docker middlewareName=pipelining middlewareType=Pipelining | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Creating load-balancer" entryPointName=https routerName=portainer-secure@docker serviceName=portainer | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Creating server 0 http://192.168.192.3:9000" routerName=portainer-secure@docker serviceName=portainer serverName=0 entryPointName=https | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Added outgoing tracing middleware portainer" middlewareName=tracing middlewareType=TracingForwarder entryPointName=https routerName=portainer-secure@docker | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Creating middleware" middlewareName=portainer-stripprefix@docker middlewareType=StripPrefix entryPointName=https routerName=portainer-secure@docker | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Adding tracing to middleware" entryPointName=https routerName=portainer-secure@docker middlewareName=portainer-stripprefix@docker | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Creating middleware" serviceName=rootstalk-rootstalk middlewareType=Pipelining middlewareName=pipelining entryPointName=https routerName=rootstalk-static-secure@docker | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Creating load-balancer" entryPointName=https routerName=rootstalk-static-secure@docker serviceName=rootstalk-rootstalk | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Creating server 0 http://192.168.192.4:80" serviceName=rootstalk-rootstalk serverName=0 entryPointName=https routerName=rootstalk-static-secure@docker | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Added outgoing tracing middleware rootstalk-rootstalk" entryPointName=https routerName=rootstalk-static-secure@docker middlewareName=tracing middlewareType=TracingForwarder | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Creating middleware" entryPointName=https middlewareName=traefik-internal-recovery middlewareType=Recovery | |
time="2020-05-18T09:21:36-05:00" level=debug msg="No default certificate, generating one" | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Try to challenge certificate for domain [vaf.grinnell.edu] found in HostSNI rule" providerName=http.acme routerName=vaf-secure@docker rule="Host(`vaf.grinnell.edu`)" | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Try to challenge certificate for domain [vaf-kiosk.grinnell.edu] found in HostSNI rule" providerName=http.acme routerName=vaf-kiosk-secure@docker rule="Host(`vaf-kiosk.grinnell.edu`)" | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"vaf.grinnell.edu\"]..." routerName=vaf-secure@docker rule="Host(`vaf.grinnell.edu`)" providerName=http.acme | |
time="2020-05-18T09:21:36-05:00" level=debug msg="No ACME certificate generation required for domains [\"vaf.grinnell.edu\"]." rule="Host(`vaf.grinnell.edu`)" providerName=http.acme routerName=vaf-secure@docker | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Try to challenge certificate for domain [static.grinnell.edu] found in HostSNI rule" providerName=http.acme routerName=portainer-secure@docker rule="Host(`static.grinnell.edu`) && PathPrefix(`/portainer`)" | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"vaf-kiosk.grinnell.edu\"]..." providerName=http.acme routerName=vaf-kiosk-secure@docker rule="Host(`vaf-kiosk.grinnell.edu`)" | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Domains [\"vaf-kiosk.grinnell.edu\"] need ACME certificates generation for domains \"vaf-kiosk.grinnell.edu\"." providerName=http.acme routerName=vaf-kiosk-secure@docker rule="Host(`vaf-kiosk.grinnell.edu`)" | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Loading ACME certificates [vaf-kiosk.grinnell.edu]..." providerName=http.acme routerName=vaf-kiosk-secure@docker rule="Host(`vaf-kiosk.grinnell.edu`)" | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Try to challenge certificate for domain [rootstalk-static.grinnell.edu] found in HostSNI rule" providerName=http.acme routerName=rootstalk-static-secure@docker rule="Host(`rootstalk-static.grinnell.edu`)" | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Try to challenge certificate for domain [static.grinnell.edu] found in HostSNI rule" rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" routerName=traefik-secure@docker providerName=http.acme | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"static.grinnell.edu\"]..." providerName=http.acme rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" routerName=traefik-secure@docker | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"rootstalk-static.grinnell.edu\"]..." providerName=http.acme routerName=rootstalk-static-secure@docker rule="Host(`rootstalk-static.grinnell.edu`)" | |
time="2020-05-18T09:21:36-05:00" level=debug msg="No ACME certificate generation required for domains [\"rootstalk-static.grinnell.edu\"]." providerName=http.acme routerName=rootstalk-static-secure@docker rule="Host(`rootstalk-static.grinnell.edu`)" | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"static.grinnell.edu\"]..." routerName=portainer-secure@docker rule="Host(`static.grinnell.edu`) && PathPrefix(`/portainer`)" providerName=http.acme | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Domains [\"static.grinnell.edu\"] need ACME certificates generation for domains \"static.grinnell.edu\"." providerName=http.acme routerName=portainer-secure@docker rule="Host(`static.grinnell.edu`) && PathPrefix(`/portainer`)" | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Domains [\"static.grinnell.edu\"] need ACME certificates generation for domains \"static.grinnell.edu\"." providerName=http.acme rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" routerName=traefik-secure@docker | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Loading ACME certificates [static.grinnell.edu]..." providerName=http.acme routerName=portainer-secure@docker rule="Host(`static.grinnell.edu`) && PathPrefix(`/portainer`)" | |
time="2020-05-18T09:21:36-05:00" level=debug msg="Loading ACME certificates [static.grinnell.edu]..." providerName=http.acme rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" routerName=traefik-secure@docker | |
...and printing acme.json... | |
{ | |
"http": { | |
"Account": { | |
"Email": "digital@grinnell.edu", | |
"Registration": { | |
"body": { | |
"status": "valid", | |
"contact": [ | |
"mailto:digital@grinnell.edu" | |
] | |
}, | |
"uri": "https://acme-v02.api.letsencrypt.org/acme/acct/86490920" | |
}, | |
"PrivateKey": "MIIJK...YIhaxMdbWs=", | |
"KeyType": "4096" | |
}, | |
"Certificates": null | |
} | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment