Created
March 1, 2024 20:59
-
-
Save johntdyer/9ad0149a2705fd84e9278bea4cfe50e7 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
0.0s2024-03-01T15:49:15-05:00 INF github.com/traefik/traefik/v3/cmd/traefik/traefik.go:101 > Traefik version 3.0.0-rc1 built on 2024-02-13T13:41:20Z version=3.0.0-rc1 | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/cmd/traefik/traefik.go:108 > Static configuration loaded [json] staticConfiguration={"accessLog":{"addInternals":true,"bufferingSize":100,"fields":{"defaultMode":"keep","headers":{"defaultMode":"drop"}},"filePath":"/var/log/access.log","filters":{"statusCodes":["200","300-399","500-599"]},"format":"common"},"api":{"dashboard":true,"insecure":true},"certificatesResolvers":{"letsencrypt":{"acme":{"caServer":"https://acme-v02.api.letsencrypt.org/directory","certificatesDuration":2160,"dnsChallenge":{"delayBeforeCheck":"5s","provider":"cloudflare","resolvers":["1.1.1.1:53","8.8.8.8:53"]},"keyType":"RSA4096","storage":"/letsencrypt/acme.json"}}},"entryPoints":{"traefik":{"address":":8080","forwardedHeaders":{},"http":{},"http2":{"maxConcurrentStreams":250},"transport":{"lifeCycle":{"graceTimeOut":"10s"},"respondingTimeouts":{"idleTimeout":"3m0s"}},"udp":{"timeout":"3s"}},"web":{"address":":80","forwardedHeaders":{},"http":{"redirections":{"entryPoint":{"permanent":true,"priority":2147483646,"scheme":"https","to":"websecure"}}},"http2":{"maxConcurrentStreams":250},"transport":{"lifeCycle":{"graceTimeOut":"10s"},"respondingTimeouts":{"idleTimeout":"3m0s"}},"udp":{"timeout":"3s"}},"websecure":{"address":":443","forwardedHeaders":{},"http":{},"http2":{"maxConcurrentStreams":250},"transport":{"lifeCycle":{"graceTimeOut":"10s"},"respondingTimeouts":{"idleTimeout":"3m0s"}},"udp":{"timeout":"3s"}}},"global":{"checkNewVersion":true},"log":{"format":"common","level":"DEBUG"},"providers":{"docker":{"defaultRule":"Host(`{{ normalize .Name }}`)","endpoint":"unix:///var/run/docker.sock","network":"public","watch":true},"providersThrottleDuration":"2s"},"serversTransport":{"maxIdleConnsPerHost":200},"tcpServersTransport":{"dialKeepAlive":"15s","dialTimeout":"30s"}} | |
2024-03-01T15:49:15-05:00 INF github.com/traefik/traefik/v3/cmd/traefik/traefik.go:599 > | |
Stats collection is disabled. | |
Help us improve Traefik by turning this feature on :) | |
More details on: https://doc.traefik.io/traefik/contributing/data-collection/ | |
2024-03-01T15:49:15-05:00 INF github.com/traefik/traefik/v3/pkg/server/configurationwatcher.go:73 > Starting provider aggregator aggregator.ProviderAggregator | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/server/server_entrypoint_tcp.go:220 > Starting TCP Server entryPointName=traefik | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/server/server_entrypoint_tcp.go:220 > Starting TCP Server entryPointName=web | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/server/server_entrypoint_tcp.go:220 > Starting TCP Server entryPointName=websecure | |
2024-03-01T15:49:15-05:00 INF github.com/traefik/traefik/v3/pkg/provider/aggregator/aggregator.go:203 > Starting provider *acme.ChallengeTLSALPN | |
2024-03-01T15:49:15-05:00 INF github.com/traefik/traefik/v3/pkg/provider/aggregator/aggregator.go:203 > Starting provider *docker.Provider | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/aggregator/aggregator.go:204 > *acme.ChallengeTLSALPN provider configuration config={} | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/aggregator/aggregator.go:204 > *docker.Provider provider configuration config={"defaultRule":"Host(`{{ normalize .Name }}`)","endpoint":"unix:///var/run/docker.sock","network":"public","watch":true} | |
2024-03-01T15:49:15-05:00 INF github.com/traefik/traefik/v3/pkg/provider/aggregator/aggregator.go:203 > Starting provider *traefik.Provider | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/aggregator/aggregator.go:204 > *traefik.Provider provider configuration config={} | |
2024-03-01T15:49:15-05:00 INF github.com/traefik/traefik/v3/pkg/provider/aggregator/aggregator.go:203 > Starting provider *acme.Provider | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/aggregator/aggregator.go:204 > *acme.Provider provider configuration config={"HTTPChallengeProvider":{},"ResolverName":"letsencrypt","TLSChallengeProvider":{},"caServer":"https://acme-v02.api.letsencrypt.org/directory","certificatesDuration":2160,"dnsChallenge":{"delayBeforeCheck":"5s","provider":"cloudflare","resolvers":["1.1.1.1:53","8.8.8.8:53"]},"keyType":"RSA4096","storage":"/letsencrypt/acme.json","store":{}} | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:216 > Attempt to renew certificates "720h0m0s" before expiry and check every "24h0m0s" acmeCA=https://acme-v02.api.letsencrypt.org/directory providerName=letsencrypt.acme | |
2024-03-01T15:49:15-05:00 INF github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:800 > Testing certificate renew... acmeCA=https://acme-v02.api.letsencrypt.org/directory providerName=letsencrypt.acme | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/server/configurationwatcher.go:227 > Configuration received config={"http":{"middlewares":{"dashboard_redirect":{"redirectRegex":{"permanent":true,"regex":"^(http:\\/\\/(\\[[\\w:.]+\\]|[\\w\\._-]+)(:\\d+)?)\\/$","replacement":"${1}/dashboard/"}},"dashboard_stripprefix":{"stripPrefix":{"prefixes":["/dashboard/","/dashboard"]}},"redirect-web-to-websecure":{"redirectScheme":{"permanent":true,"port":"443","scheme":"https"}}},"routers":{"api":{"entryPoints":["traefik"],"priority":2147483646,"rule":"PathPrefix(`/api`)","service":"api@internal"},"dashboard":{"entryPoints":["traefik"],"middlewares":["dashboard_redirect@internal","dashboard_stripprefix@internal"],"priority":2147483645,"rule":"PathPrefix(`/`)","service":"dashboard@internal"},"web-to-websecure":{"entryPoints":["web"],"middlewares":["redirect-web-to-websecure"],"priority":2147483646,"rule":"HostRegexp(`^.+$`)","service":"noop@internal"}},"serversTransports":{"default":{"maxIdleConnsPerHost":200}},"services":{"api":{},"dashboard":{},"noop":{}}},"tcp":{"serversTransports":{"default":{"dialKeepAlive":"15s","dialTimeout":"30s"}}},"tls":{},"udp":{}} providerName=internal | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/server/configurationwatcher.go:227 > Configuration received config={"http":{},"tcp":{},"tls":{},"udp":{}} providerName=letsencrypt.acme | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/docker/pdocker.go:89 > Provider connection established with docker 20.10.22 (API 1.41) providerName=docker | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/docker/config.go:184 > Filtering disabled container container=vuegraf-shared-configs-f57db13ab9d593f70dd5b87e5f9a9bb3cb081c9cc3772bf6ff2646071454a7ed providerName=docker | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/docker/config.go:184 > Filtering disabled container container=proxy-1-shared-configs-1ad491866f93afa854f054f7bad1b2251956859daae191af2147bef357b78974 providerName=docker | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/docker/config.go:184 > Filtering disabled container container=frigate-shared-configs-b9f2be7936d4ef6a33fe2fd7d0a0016a7065a66495f76abeb516d8c74ddd02b5 providerName=docker | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/docker/config.go:184 > Filtering disabled container container=apprise-ui-shared-configs-758f069f85a09a0e1f88b1a111f775eb5d387f2cadd15c1986d1120b8724d23f providerName=docker | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/docker/config.go:184 > Filtering disabled container container=watchyourlan-shared-configs-46d842ec4220aedb1ee7b8841c6396286882e9c03d3b0e4624b220f1f2ed4acf providerName=docker | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/docker/config.go:184 > Filtering disabled container container=atlas-exporter-shared-configs-696887eea104bbe5d612b79697d3266f72d000a59de4bda39a47cbb97da87b80 providerName=docker | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/docker/config.go:184 > Filtering disabled container container=globalping-probe-1a141a41ff81fefd117bbee9db0a54f79227fb8492f113ce91194831cfa25b7c providerName=docker | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/docker/config.go:184 > Filtering disabled container container=ha-fusion-shared-configs-73316b9c8ea70f5b439d06fc5eb0d097508f392ba01530db8b0dfbaaee5f25b2 providerName=docker | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/docker/config.go:184 > Filtering disabled container container=mimir-shared-configs-72143e699471a55d86bfc874c79b4276736104e22a74c8374831501518d3ff74 providerName=docker | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/docker/config.go:184 > Filtering disabled container container=redis-commander-shared-configs-77c44f0983cb2d3c86f29ec12819480ee8ef11044779f908417e270b5e3e90e5 providerName=docker | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/docker/config.go:184 > Filtering disabled container container=apprise-api-shared-configs-15872f940a38578d96c50d514d052683d07273a3f147c686c8c794cc03495211 providerName=docker | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/docker/config.go:184 > Filtering disabled container container=homepage-shared-configs-70e10caa09375b990e9fc88b62682283b981993d5808f4e6d09e392843eddd99 providerName=docker | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/docker/config.go:184 > Filtering disabled container container=fileflows-shared-configs-f793edb862c18051ed45144e58c4fdcdb16d26df22eec39bb15a708e52857d9a providerName=docker | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/docker/config.go:184 > Filtering disabled container container=yacht-shared-configs-53cf2488755ad24862de0197dbb8d7a7c08cda99f82942ed8534fdff832c7a5b providerName=docker | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/docker/config.go:184 > Filtering disabled container container=dockerproxy-shared-configs-5080d5235d5cc034db63bcccac0fa4e9d44d9a2c33c9a85570094cf278f8533c providerName=docker | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/docker/config.go:184 > Filtering disabled container container=whatsupdocker-shared-configs-73e4b127b25c0f7a6540d0067dc595bd7434ca5262b0bd1d41b0f250b9221ac5 providerName=docker | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/docker/config.go:184 > Filtering disabled container container=youtube-watching-shared-configs-d565a02153ae6987143c4c5ea83110ab076f6d51e4a14d6d9a3dee5fdddcdf77 providerName=docker | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/docker/config.go:184 > Filtering disabled container container=speedtest-exporter-shared-configs-e962db60489fea8ece4d1e11e7cdf8eaafa4ed59e90323e5da5811af160b0c9f providerName=docker | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/docker/config.go:184 > Filtering disabled container container=postfix-shared-configs-23d8ff98f845301ba4e7b468eb2b00245abde82830495cdd7fcf0d6f0f4c9ffc providerName=docker | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/docker/config.go:184 > Filtering disabled container container=bgw320-exporter-shared-configs-a552d9335adbd2c4e2eef036cf3477f574af336e9932ed066e478def85f49421 providerName=docker | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/docker/config.go:184 > Filtering disabled container container=renderer-shared-configs-cd72aec10febdd9bfd131b06c02e9831d71fd483fbb8c3ced2c1a72d35af3f2e providerName=docker | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/docker/config.go:184 > Filtering disabled container container=dashy-shared-configs-591bde4c911daeb37b1c3d00888416a7505fc9e1cf95563801a4ec0ba0517ede providerName=docker | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/docker/config.go:184 > Filtering disabled container container=redis-shared-configs-3ea3f8c0e329d3afad8b0064c7912551be953bd7ec0db01d4bd79d7c16e50f47 providerName=docker | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/docker/config.go:184 > Filtering disabled container container=raritanpdu-shared-configs-6efd26c4468f8134c70e679b2697caebcf06105dc2430ae0c95e1dcd8a2d76f7 providerName=docker | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/docker/config.go:184 > Filtering disabled container container=monocker-shared-configs-f096b213c44ea5e5ed74c13bc556cecc9e1305c5cffd17a9385ae2f4d208b5b5 providerName=docker | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/docker/config.go:184 > Filtering disabled container container=cadvisor-shared-configs-73d58a40a0cf7af2ca81fe458dd28489c9957d27d5155feba91fad93e168b0f3 providerName=docker | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/docker/config.go:184 > Filtering disabled container container=homebridge-shared-configs-f9570f5d55e4a32001133c152b2339f8ccdd4adad77b155386f70d649b439288 providerName=docker | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/docker/config.go:184 > Filtering disabled container container=autoheal-shared-configs-04028365812f2e53b718dd364bf41d8a0f9c2501dbf3098b9253b4e553eea52f providerName=docker | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/docker/config.go:184 > Filtering disabled container container=plex-meta-manager-shared-configs-b541961a681c3927eac295e75eef9bfaa3f14dab1b9d95f382b09ba2e7ec41f8 providerName=docker | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/docker/config.go:184 > Filtering disabled container container=blackbox-exporter-shared-configs-bb47a7b9e1b1c2f4ac53540bfc472c8bfa968a8a5334f18eb35860c8fe063953 providerName=docker | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/docker/config.go:184 > Filtering disabled container container=flame-shared-configs-c753e9184ab8a60d4567ba73bd9b2872c49aca36532eda0a45f0cc5f9fc308ad providerName=docker | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/docker/config.go:184 > Filtering disabled container container=overseerr-shared-configs-44f33ec8e837e21d00eabab90a493d7056b47816a72b792e7e88c2c2068db780 providerName=docker | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/docker/config.go:184 > Filtering disabled container container=ecobee-shared-configs-4bf6993acb831c386c991ba4d278056c5867650af4ba147c2603d9066b0a79af providerName=docker | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/docker/config.go:184 > Filtering disabled container container=syncthing-c95e7bb0d2646e70951a87234a7ffc7fb70b9687ebe7205abbd948a39f14bd33 providerName=docker | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/docker/config.go:184 > Filtering disabled container container=twingate-red-buzzard-19666fa181a053a510584db8dd6afbd9428ece9a04f248d1321d2c5110624387 providerName=docker | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/server/configurationwatcher.go:227 > Configuration received config={"http":{"routers":{"api":{"entryPoints":["websecure"],"rule":"Host(`traefik.xxxxx.xxxxxx`)","service":"traefik-shared-configs","tls":{"certResolver":"letsencrypt"}},"traefik":{"entryPoints":["websecure","web"],"rule":"Host(`start.xxxxx.xxxxxx`)","service":"api@internal","tls":{"certResolver":"letsencrypt"}},"traefik-secure":{"rule":"Host(`traefik-shared-configs`)","service":"traefik-shared-configs","tls":{"domains":[{"main":"xxxxx.xxxxxx","sans":["*.xxxxx.xxxxxx"]}]}},"whoami":{"entryPoints":["web","websecure"],"rule":"Host(`whoami.xxxxx.xxxxxx`)","service":"whoami-shared-configs","tls":{"certResolver":"letsencrypt"}}},"services":{"traefik-shared-configs":{"loadBalancer":{"passHostHeader":true,"responseForwarding":{"flushInterval":"100ms"},"servers":[{"url":"http://172.26.0.2:80"}]}},"whoami-shared-configs":{"loadBalancer":{"passHostHeader":true,"responseForwarding":{"flushInterval":"100ms"},"servers":[{"url":"http://172.26.0.3:80"}]}}}},"tcp":{},"udp":{}} providerName=docker | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/tls/tlsmanager.go:320 > No default certificate, fallback to the internal generated certificate tlsStoreName=default | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/stripprefix/strip_prefix.go:32 > Creating middleware entryPointName=traefik middlewareName=dashboard_stripprefix@internal middlewareType=StripPrefix routerName=dashboard@internal | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/tracing/middleware.go:33 > Adding tracing to middleware entryPointName=traefik middlewareName=dashboard_stripprefix@internal routerName=dashboard@internal | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/redirect/redirect_regex.go:17 > Creating middleware entryPointName=traefik middlewareName=dashboard_redirect@internal middlewareType=RedirectRegex routerName=dashboard@internal | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/redirect/redirect_regex.go:18 > Setting up redirection from ^(http:\/\/(\[[\w:.]+\]|[\w\._-]+)(:\d+)?)\/$ to ${1}/dashboard/ entryPointName=traefik middlewareName=dashboard_redirect@internal middlewareType=RedirectRegex routerName=dashboard@internal | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/tracing/middleware.go:33 > Adding tracing to middleware entryPointName=traefik middlewareName=dashboard_redirect@internal routerName=dashboard@internal | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/recovery/recovery.go:22 > Creating middleware entryPointName=traefik middlewareName=traefik-internal-recovery middlewareType=Recovery | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/redirect/redirect_scheme.go:29 > Creating middleware entryPointName=web middlewareName=redirect-web-to-websecure@internal middlewareType=RedirectScheme routerName=web-to-websecure@internal | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/redirect/redirect_scheme.go:30 > Setting up redirection to https 443 entryPointName=web middlewareName=redirect-web-to-websecure@internal middlewareType=RedirectScheme routerName=web-to-websecure@internal | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/recovery/recovery.go:22 > Creating middleware entryPointName=web middlewareName=traefik-internal-recovery middlewareType=Recovery | |
2024-03-01T15:49:15-05:00 DBG github.com/traefik/traefik/v3/pkg/server/aggregator.go:49 > No entryPoint defined for this router, using the default one(s) instead entryPointName=["web","websecure"] routerName=traefik-secure | |
2024-03-01T15:49:16-05:00 DBG github.com/traefik/traefik/v3/pkg/tls/tlsmanager.go:320 > No default certificate, fallback to the internal generated certificate tlsStoreName=default | |
2024-03-01T15:49:16-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/stripprefix/strip_prefix.go:32 > Creating middleware entryPointName=traefik middlewareName=dashboard_stripprefix@internal middlewareType=StripPrefix routerName=dashboard@internal | |
2024-03-01T15:49:16-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/tracing/middleware.go:33 > Adding tracing to middleware entryPointName=traefik middlewareName=dashboard_stripprefix@internal routerName=dashboard@internal | |
2024-03-01T15:49:16-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/redirect/redirect_regex.go:17 > Creating middleware entryPointName=traefik middlewareName=dashboard_redirect@internal middlewareType=RedirectRegex routerName=dashboard@internal | |
2024-03-01T15:49:16-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/redirect/redirect_regex.go:18 > Setting up redirection from ^(http:\/\/(\[[\w:.]+\]|[\w\._-]+)(:\d+)?)\/$ to ${1}/dashboard/ entryPointName=traefik middlewareName=dashboard_redirect@internal middlewareType=RedirectRegex routerName=dashboard@internal | |
2024-03-01T15:49:16-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/tracing/middleware.go:33 > Adding tracing to middleware entryPointName=traefik middlewareName=dashboard_redirect@internal routerName=dashboard@internal | |
2024-03-01T15:49:16-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/recovery/recovery.go:22 > Creating middleware entryPointName=traefik middlewareName=traefik-internal-recovery middlewareType=Recovery | |
2024-03-01T15:49:16-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/redirect/redirect_scheme.go:29 > Creating middleware entryPointName=web middlewareName=redirect-web-to-websecure@internal middlewareType=RedirectScheme routerName=web-to-websecure@internal | |
2024-03-01T15:49:16-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/redirect/redirect_scheme.go:30 > Setting up redirection to https 443 entryPointName=web middlewareName=redirect-web-to-websecure@internal middlewareType=RedirectScheme routerName=web-to-websecure@internal | |
2024-03-01T15:49:16-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/recovery/recovery.go:22 > Creating middleware entryPointName=web middlewareName=traefik-internal-recovery middlewareType=Recovery | |
2024-03-01T15:49:16-05:00 DBG github.com/traefik/traefik/v3/pkg/server/service/service.go:259 > Creating load-balancer entryPointName=websecure routerName=api@docker serviceName=traefik-shared-configs@docker | |
2024-03-01T15:49:16-05:00 DBG github.com/traefik/traefik/v3/pkg/server/service/service.go:301 > Creating server entryPointName=websecure routerName=api@docker serverName=da346bb9c37fbb49 serviceName=traefik-shared-configs@docker target=http://172.26.0.2:80 | |
2024-03-01T15:49:16-05:00 DBG github.com/traefik/traefik/v3/pkg/server/service/service.go:259 > Creating load-balancer entryPointName=websecure routerName=whoami@docker serviceName=whoami-shared-configs@docker | |
2024-03-01T15:49:16-05:00 DBG github.com/traefik/traefik/v3/pkg/server/service/service.go:301 > Creating server entryPointName=websecure routerName=whoami@docker serverName=8e0be3b10c10dfcc serviceName=whoami-shared-configs@docker target=http://172.26.0.3:80 | |
2024-03-01T15:49:16-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/recovery/recovery.go:22 > Creating middleware entryPointName=websecure middlewareName=traefik-internal-recovery middlewareType=Recovery | |
2024-03-01T15:49:16-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/recovery/recovery.go:22 > Creating middleware entryPointName=web middlewareName=traefik-internal-recovery middlewareType=Recovery | |
2024-03-01T15:49:16-05:00 DBG github.com/traefik/traefik/v3/pkg/server/router/tcp/manager.go:235 > Adding route for traefik-shared-configs with TLS options default entryPointName=web | |
2024-03-01T15:49:16-05:00 DBG github.com/traefik/traefik/v3/pkg/server/router/tcp/manager.go:235 > Adding route for start.xxxxx.xxxxxx with TLS options default entryPointName=web | |
2024-03-01T15:49:16-05:00 DBG github.com/traefik/traefik/v3/pkg/server/router/tcp/manager.go:235 > Adding route for whoami.xxxxx.xxxxxx with TLS options default entryPointName=web | |
2024-03-01T15:49:16-05:00 DBG github.com/traefik/traefik/v3/pkg/server/router/tcp/manager.go:235 > Adding route for whoami.xxxxx.xxxxxx with TLS options default entryPointName=websecure | |
2024-03-01T15:49:16-05:00 DBG github.com/traefik/traefik/v3/pkg/server/router/tcp/manager.go:235 > Adding route for traefik.xxxxx.xxxxxx with TLS options default entryPointName=websecure | |
2024-03-01T15:49:16-05:00 DBG github.com/traefik/traefik/v3/pkg/server/router/tcp/manager.go:235 > Adding route for traefik-shared-configs with TLS options default entryPointName=websecure | |
2024-03-01T15:49:16-05:00 DBG github.com/traefik/traefik/v3/pkg/server/router/tcp/manager.go:235 > Adding route for start.xxxxx.xxxxxx with TLS options default entryPointName=websecure | |
2024-03-01T15:49:16-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:387 > Trying to challenge certificate for domain [start.xxxxx.xxxxxx] found in HostSNI rule ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory providerName=letsencrypt.acme routerName=traefik@docker rule=Host(`start.xxxxx.xxxxxx`) | |
2024-03-01T15:49:16-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:387 > Trying to challenge certificate for domain [whoami.xxxxx.xxxxxx] found in HostSNI rule ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory providerName=letsencrypt.acme routerName=whoami@docker rule=Host(`whoami.xxxxx.xxxxxx`) | |
2024-03-01T15:49:16-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:849 > Looking for provided certificate(s) to validate ["start.xxxxx.xxxxxx"]... ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory providerName=letsencrypt.acme routerName=traefik@docker rule=Host(`start.xxxxx.xxxxxx`) | |
2024-03-01T15:49:16-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:387 > Trying to challenge certificate for domain [traefik.xxxxx.xxxxxx] found in HostSNI rule ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory providerName=letsencrypt.acme routerName=api@docker rule=Host(`traefik.xxxxx.xxxxxx`) | |
2024-03-01T15:49:16-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:895 > Domains need ACME certificates generation for domains "start.xxxxx.xxxxxx". ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory domains=["start.xxxxx.xxxxxx"] providerName=letsencrypt.acme routerName=traefik@docker rule=Host(`start.xxxxx.xxxxxx`) | |
2024-03-01T15:49:16-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:849 > Looking for provided certificate(s) to validate ["whoami.xxxxx.xxxxxx"]... ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory providerName=letsencrypt.acme routerName=whoami@docker rule=Host(`whoami.xxxxx.xxxxxx`) | |
2024-03-01T15:49:16-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:849 > Looking for provided certificate(s) to validate ["traefik.xxxxx.xxxxxx"]... ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory providerName=letsencrypt.acme routerName=api@docker rule=Host(`traefik.xxxxx.xxxxxx`) | |
2024-03-01T15:49:16-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:623 > Loading ACME certificates [start.xxxxx.xxxxxx]... ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory providerName=letsencrypt.acme routerName=traefik@docker rule=Host(`start.xxxxx.xxxxxx`) | |
2024-03-01T15:49:16-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:895 > Domains need ACME certificates generation for domains "traefik.xxxxx.xxxxxx". ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory domains=["traefik.xxxxx.xxxxxx"] providerName=letsencrypt.acme routerName=api@docker rule=Host(`traefik.xxxxx.xxxxxx`) | |
2024-03-01T15:49:16-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:623 > Loading ACME certificates [traefik.xxxxx.xxxxxx]... ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory providerName=letsencrypt.acme routerName=api@docker rule=Host(`traefik.xxxxx.xxxxxx`) | |
2024-03-01T15:49:16-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:895 > Domains need ACME certificates generation for domains "whoami.xxxxx.xxxxxx". ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory domains=["whoami.xxxxx.xxxxxx"] providerName=letsencrypt.acme routerName=whoami@docker rule=Host(`whoami.xxxxx.xxxxxx`) | |
2024-03-01T15:49:16-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:623 > Loading ACME certificates [whoami.xxxxx.xxxxxx]... ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory providerName=letsencrypt.acme routerName=whoami@docker rule=Host(`whoami.xxxxx.xxxxxx`) | |
2024-03-01T15:49:21-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:254 > Building ACME client... providerName=letsencrypt.acme | |
2024-03-01T15:49:21-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:260 > https://acme-v02.api.letsencrypt.org/directory providerName=letsencrypt.acme | |
2024-03-01T15:49:21-05:00 INF github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:374 > Register... providerName=letsencrypt.acme | |
2024-03-01T15:49:22-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:296 > Using DNS Challenge provider: cloudflare providerName=letsencrypt.acme | |
2024-03-01T15:49:22-05:00 DBG github.com/go-acme/lego/v4@v4.15.0/log/logger.go:48 > [INFO] [start.xxxxx.xxxxxx] acme: Obtaining bundled SAN certificate lib=lego | |
2024-03-01T15:49:22-05:00 DBG github.com/go-acme/lego/v4@v4.15.0/log/logger.go:48 > [INFO] [traefik.xxxxx.xxxxxx] acme: Obtaining bundled SAN certificate lib=lego | |
2024-03-01T15:49:22-05:00 DBG github.com/go-acme/lego/v4@v4.15.0/log/logger.go:48 > [INFO] [whoami.xxxxx.xxxxxx] acme: Obtaining bundled SAN certificate lib=lego | |
2024-03-01T15:49:22-05:00 DBG github.com/go-acme/lego/v4@v4.15.0/log/logger.go:48 > [INFO] [start.xxxxx.xxxxxx] AuthURL: https://acme-v02.api.letsencrypt.org/acme/authz-v3/321338501587 lib=lego | |
2024-03-01T15:49:22-05:00 DBG github.com/go-acme/lego/v4@v4.15.0/log/logger.go:48 > [INFO] [start.xxxxx.xxxxxx] acme: Could not find solver for: tls-alpn-01 lib=lego | |
2024-03-01T15:49:22-05:00 DBG github.com/go-acme/lego/v4@v4.15.0/log/logger.go:48 > [INFO] [start.xxxxx.xxxxxx] acme: Could not find solver for: http-01 lib=lego | |
2024-03-01T15:49:22-05:00 DBG github.com/go-acme/lego/v4@v4.15.0/log/logger.go:48 > [INFO] [start.xxxxx.xxxxxx] acme: use dns-01 solver lib=lego | |
2024-03-01T15:49:22-05:00 DBG github.com/go-acme/lego/v4@v4.15.0/log/logger.go:48 > [INFO] [start.xxxxx.xxxxxx] acme: Preparing to solve DNS-01 lib=lego | |
2024-03-01T15:49:22-05:00 DBG github.com/go-acme/lego/v4@v4.15.0/log/logger.go:48 > [INFO] [whoami.xxxxx.xxxxxx] AuthURL: https://acme-v02.api.letsencrypt.org/acme/authz-v3/321338501717 lib=lego | |
2024-03-01T15:49:22-05:00 DBG github.com/go-acme/lego/v4@v4.15.0/log/logger.go:48 > [INFO] [whoami.xxxxx.xxxxxx] acme: Could not find solver for: tls-alpn-01 lib=lego | |
2024-03-01T15:49:22-05:00 DBG github.com/go-acme/lego/v4@v4.15.0/log/logger.go:48 > [INFO] [whoami.xxxxx.xxxxxx] acme: Could not find solver for: http-01 lib=lego | |
2024-03-01T15:49:22-05:00 DBG github.com/go-acme/lego/v4@v4.15.0/log/logger.go:48 > [INFO] [whoami.xxxxx.xxxxxx] acme: use dns-01 solver lib=lego | |
2024-03-01T15:49:22-05:00 DBG github.com/go-acme/lego/v4@v4.15.0/log/logger.go:48 > [INFO] [whoami.xxxxx.xxxxxx] acme: Preparing to solve DNS-01 lib=lego | |
2024-03-01T15:49:22-05:00 DBG github.com/go-acme/lego/v4@v4.15.0/log/logger.go:48 > [INFO] [traefik.xxxxx.xxxxxx] AuthURL: https://acme-v02.api.letsencrypt.org/acme/authz-v3/321338501627 lib=lego | |
2024-03-01T15:49:22-05:00 DBG github.com/go-acme/lego/v4@v4.15.0/log/logger.go:48 > [INFO] [traefik.xxxxx.xxxxxx] acme: Could not find solver for: tls-alpn-01 lib=lego | |
2024-03-01T15:49:22-05:00 DBG github.com/go-acme/lego/v4@v4.15.0/log/logger.go:48 > [INFO] [traefik.xxxxx.xxxxxx] acme: Could not find solver for: http-01 lib=lego | |
2024-03-01T15:49:22-05:00 DBG github.com/go-acme/lego/v4@v4.15.0/log/logger.go:48 > [INFO] [traefik.xxxxx.xxxxxx] acme: use dns-01 solver lib=lego | |
2024-03-01T15:49:22-05:00 DBG github.com/go-acme/lego/v4@v4.15.0/log/logger.go:48 > [INFO] [traefik.xxxxx.xxxxxx] acme: Preparing to solve DNS-01 lib=lego | |
2024-03-01T15:49:23-05:00 DBG github.com/go-acme/lego/v4@v4.15.0/log/logger.go:48 > [INFO] cloudflare: new record for start.xxxxx.xxxxxx, ID 7e41a904710251bf52b8a90bf6b6ae53 lib=lego | |
2024-03-01T15:49:23-05:00 DBG github.com/go-acme/lego/v4@v4.15.0/log/logger.go:48 > [INFO] [start.xxxxx.xxxxxx] acme: Trying to solve DNS-01 lib=lego | |
2024-03-01T15:49:23-05:00 DBG github.com/go-acme/lego/v4@v4.15.0/log/logger.go:48 > [INFO] [start.xxxxx.xxxxxx] acme: Checking DNS record propagation using [1.1.1.1:53 8.8.8.8:53] lib=lego | |
2024-03-01T15:49:23-05:00 DBG github.com/go-acme/lego/v4@v4.15.0/log/logger.go:48 > [INFO] cloudflare: new record for whoami.xxxxx.xxxxxx, ID fa41b406a8afcfb40e4c925199e3cc06 lib=lego | |
2024-03-01T15:49:23-05:00 DBG github.com/go-acme/lego/v4@v4.15.0/log/logger.go:48 > [INFO] [whoami.xxxxx.xxxxxx] acme: Trying to solve DNS-01 lib=lego | |
2024-03-01T15:49:23-05:00 DBG github.com/go-acme/lego/v4@v4.15.0/log/logger.go:48 > [INFO] [whoami.xxxxx.xxxxxx] acme: Checking DNS record propagation using [1.1.1.1:53 8.8.8.8:53] lib=lego | |
2024-03-01T15:49:23-05:00 DBG github.com/go-acme/lego/v4@v4.15.0/log/logger.go:48 > [INFO] cloudflare: new record for traefik.xxxxx.xxxxxx, ID 5de510792f0a201371705ea76f43e177 lib=lego | |
2024-03-01T15:49:23-05:00 DBG github.com/go-acme/lego/v4@v4.15.0/log/logger.go:48 > [INFO] [traefik.xxxxx.xxxxxx] acme: Trying to solve DNS-01 lib=lego | |
2024-03-01T15:49:23-05:00 DBG github.com/go-acme/lego/v4@v4.15.0/log/logger.go:48 > [INFO] [traefik.xxxxx.xxxxxx] acme: Checking DNS record propagation using [1.1.1.1:53 8.8.8.8:53] lib=lego | |
2024-03-01T15:49:25-05:00 DBG github.com/go-acme/lego/v4@v4.15.0/log/logger.go:48 > [INFO] Wait for propagation [timeout: 2m0s, interval: 2s] lib=lego | |
2024-03-01T15:49:25-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:308 > Delaying 5000000000 rather than validating DNS propagation now. providerName=letsencrypt.acme | |
2024-03-01T15:49:25-05:00 DBG github.com/go-acme/lego/v4@v4.15.0/log/logger.go:48 > [INFO] Wait for propagation [timeout: 2m0s, interval: 2s] lib=lego | |
2024-03-01T15:49:25-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:308 > Delaying 5000000000 rather than validating DNS propagation now. providerName=letsencrypt.acme | |
2024-03-01T15:49:25-05:00 DBG github.com/go-acme/lego/v4@v4.15.0/log/logger.go:48 > [INFO] Wait for propagation [timeout: 2m0s, interval: 2s] lib=lego | |
2024-03-01T15:49:25-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:308 > Delaying 5000000000 rather than validating DNS propagation now. providerName=letsencrypt.acme | |
2024-03-01T15:49:30-05:00 DBG github.com/go-acme/lego/v4@v4.15.0/log/logger.go:48 > [INFO] [whoami.xxxxx.xxxxxx] acme: Waiting for DNS record propagation. lib=lego | |
2024-03-01T15:49:30-05:00 DBG github.com/go-acme/lego/v4@v4.15.0/log/logger.go:48 > [INFO] [traefik.xxxxx.xxxxxx] acme: Waiting for DNS record propagation. lib=lego | |
2024-03-01T15:49:32-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:308 > Delaying 5000000000 rather than validating DNS propagation now. providerName=letsencrypt.acme | |
2024-03-01T15:49:32-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:308 > Delaying 5000000000 rather than validating DNS propagation now. providerName=letsencrypt.acme | |
2024-03-01T15:49:35-05:00 DBG github.com/go-acme/lego/v4@v4.15.0/log/logger.go:48 > [INFO] [start.xxxxx.xxxxxx] The server validated our request lib=lego | |
2024-03-01T15:49:35-05:00 DBG github.com/go-acme/lego/v4@v4.15.0/log/logger.go:48 > [INFO] [start.xxxxx.xxxxxx] acme: Cleaning DNS-01 challenge lib=lego | |
2024-03-01T15:49:35-05:00 DBG github.com/go-acme/lego/v4@v4.15.0/log/logger.go:48 > [INFO] [start.xxxxx.xxxxxx] acme: Validations succeeded; requesting certificates lib=lego | |
2024-03-01T15:49:37-05:00 DBG github.com/go-acme/lego/v4@v4.15.0/log/logger.go:48 > [INFO] [whoami.xxxxx.xxxxxx] acme: Waiting for DNS record propagation. lib=lego | |
2024-03-01T15:49:37-05:00 DBG github.com/go-acme/lego/v4@v4.15.0/log/logger.go:48 > [INFO] [traefik.xxxxx.xxxxxx] acme: Waiting for DNS record propagation. lib=lego | |
2024-03-01T15:49:39-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:308 > Delaying 5000000000 rather than validating DNS propagation now. providerName=letsencrypt.acme | |
2024-03-01T15:49:39-05:00 DBG github.com/go-acme/lego/v4@v4.15.0/log/logger.go:48 > [INFO] [start.xxxxx.xxxxxx] Server responded with a certificate. lib=lego | |
2024-03-01T15:49:39-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:648 > Certificates obtained for domains [start.xxxxx.xxxxxx] ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory providerName=letsencrypt.acme routerName=traefik@docker rule=Host(`start.xxxxx.xxxxxx`) | |
2024-03-01T15:49:39-05:00 DBG github.com/traefik/traefik/v3/pkg/server/configurationwatcher.go:227 > Configuration received config={"http":{},"tcp":{},"tls":{},"udp":{}} providerName=letsencrypt.acme | |
2024-03-01T15:49:39-05:00 DBG github.com/traefik/traefik/v3/pkg/server/aggregator.go:49 > No entryPoint defined for this router, using the default one(s) instead entryPointName=["web","websecure"] routerName=traefik-secure | |
2024-03-01T15:49:39-05:00 DBG github.com/traefik/traefik/v3/pkg/tls/certificate.go:131 > Adding certificate for domain(s) start.xxxxx.xxxxxx | |
2024-03-01T15:49:39-05:00 DBG github.com/traefik/traefik/v3/pkg/tls/tlsmanager.go:320 > No default certificate, fallback to the internal generated certificate tlsStoreName=default | |
2024-03-01T15:49:39-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/redirect/redirect_scheme.go:29 > Creating middleware entryPointName=web middlewareName=redirect-web-to-websecure@internal middlewareType=RedirectScheme routerName=web-to-websecure@internal | |
2024-03-01T15:49:39-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/redirect/redirect_scheme.go:30 > Setting up redirection to https 443 entryPointName=web middlewareName=redirect-web-to-websecure@internal middlewareType=RedirectScheme routerName=web-to-websecure@internal | |
2024-03-01T15:49:39-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/recovery/recovery.go:22 > Creating middleware entryPointName=web middlewareName=traefik-internal-recovery middlewareType=Recovery | |
2024-03-01T15:49:39-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/stripprefix/strip_prefix.go:32 > Creating middleware entryPointName=traefik middlewareName=dashboard_stripprefix@internal middlewareType=StripPrefix routerName=dashboard@internal | |
2024-03-01T15:49:39-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/tracing/middleware.go:33 > Adding tracing to middleware entryPointName=traefik middlewareName=dashboard_stripprefix@internal routerName=dashboard@internal | |
2024-03-01T15:49:39-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/redirect/redirect_regex.go:17 > Creating middleware entryPointName=traefik middlewareName=dashboard_redirect@internal middlewareType=RedirectRegex routerName=dashboard@internal | |
2024-03-01T15:49:39-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/redirect/redirect_regex.go:18 > Setting up redirection from ^(http:\/\/(\[[\w:.]+\]|[\w\._-]+)(:\d+)?)\/$ to ${1}/dashboard/ entryPointName=traefik middlewareName=dashboard_redirect@internal middlewareType=RedirectRegex routerName=dashboard@internal | |
2024-03-01T15:49:39-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/tracing/middleware.go:33 > Adding tracing to middleware entryPointName=traefik middlewareName=dashboard_redirect@internal routerName=dashboard@internal | |
2024-03-01T15:49:39-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/recovery/recovery.go:22 > Creating middleware entryPointName=traefik middlewareName=traefik-internal-recovery middlewareType=Recovery | |
2024-03-01T15:49:39-05:00 DBG github.com/traefik/traefik/v3/pkg/server/service/service.go:259 > Creating load-balancer entryPointName=websecure routerName=api@docker serviceName=traefik-shared-configs@docker | |
2024-03-01T15:49:39-05:00 DBG github.com/traefik/traefik/v3/pkg/server/service/service.go:301 > Creating server entryPointName=websecure routerName=api@docker serverName=da346bb9c37fbb49 serviceName=traefik-shared-configs@docker target=http://172.26.0.2:80 | |
2024-03-01T15:49:39-05:00 DBG github.com/traefik/traefik/v3/pkg/server/service/service.go:259 > Creating load-balancer entryPointName=websecure routerName=whoami@docker serviceName=whoami-shared-configs@docker | |
2024-03-01T15:49:39-05:00 DBG github.com/traefik/traefik/v3/pkg/server/service/service.go:301 > Creating server entryPointName=websecure routerName=whoami@docker serverName=8e0be3b10c10dfcc serviceName=whoami-shared-configs@docker target=http://172.26.0.3:80 | |
2024-03-01T15:49:39-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/recovery/recovery.go:22 > Creating middleware entryPointName=websecure middlewareName=traefik-internal-recovery middlewareType=Recovery | |
2024-03-01T15:49:39-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:308 > Delaying 5000000000 rather than validating DNS propagation now. providerName=letsencrypt.acme | |
2024-03-01T15:49:39-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/recovery/recovery.go:22 > Creating middleware entryPointName=web middlewareName=traefik-internal-recovery middlewareType=Recovery | |
2024-03-01T15:49:39-05:00 DBG github.com/traefik/traefik/v3/pkg/server/router/tcp/manager.go:235 > Adding route for whoami.xxxxx.xxxxxx with TLS options default entryPointName=web | |
2024-03-01T15:49:39-05:00 DBG github.com/traefik/traefik/v3/pkg/server/router/tcp/manager.go:235 > Adding route for traefik-shared-configs with TLS options default entryPointName=web | |
2024-03-01T15:49:39-05:00 DBG github.com/traefik/traefik/v3/pkg/server/router/tcp/manager.go:235 > Adding route for start.xxxxx.xxxxxx with TLS options default entryPointName=web | |
2024-03-01T15:49:39-05:00 DBG github.com/traefik/traefik/v3/pkg/server/router/tcp/manager.go:235 > Adding route for traefik-shared-configs with TLS options default entryPointName=websecure | |
2024-03-01T15:49:39-05:00 DBG github.com/traefik/traefik/v3/pkg/server/router/tcp/manager.go:235 > Adding route for start.xxxxx.xxxxxx with TLS options default entryPointName=websecure | |
2024-03-01T15:49:39-05:00 DBG github.com/traefik/traefik/v3/pkg/server/router/tcp/manager.go:235 > Adding route for whoami.xxxxx.xxxxxx with TLS options default entryPointName=websecure | |
2024-03-01T15:49:39-05:00 DBG github.com/traefik/traefik/v3/pkg/server/router/tcp/manager.go:235 > Adding route for traefik.xxxxx.xxxxxx with TLS options default entryPointName=websecure | |
2024-03-01T15:49:39-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:387 > Trying to challenge certificate for domain [traefik.xxxxx.xxxxxx] found in HostSNI rule ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory providerName=letsencrypt.acme routerName=api@docker rule=Host(`traefik.xxxxx.xxxxxx`) | |
2024-03-01T15:49:39-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:387 > Trying to challenge certificate for domain [start.xxxxx.xxxxxx] found in HostSNI rule ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory providerName=letsencrypt.acme routerName=traefik@docker rule=Host(`start.xxxxx.xxxxxx`) | |
2024-03-01T15:49:39-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:849 > Looking for provided certificate(s) to validate ["traefik.xxxxx.xxxxxx"]... ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory providerName=letsencrypt.acme routerName=api@docker rule=Host(`traefik.xxxxx.xxxxxx`) | |
2024-03-01T15:49:39-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:893 > No ACME certificate generation required for domains ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory domains=["traefik.xxxxx.xxxxxx"] providerName=letsencrypt.acme routerName=api@docker rule=Host(`traefik.xxxxx.xxxxxx`) | |
2024-03-01T15:49:39-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:387 > Trying to challenge certificate for domain [whoami.xxxxx.xxxxxx] found in HostSNI rule ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory providerName=letsencrypt.acme routerName=whoami@docker rule=Host(`whoami.xxxxx.xxxxxx`) | |
2024-03-01T15:49:39-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:849 > Looking for provided certificate(s) to validate ["start.xxxxx.xxxxxx"]... ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory providerName=letsencrypt.acme routerName=traefik@docker rule=Host(`start.xxxxx.xxxxxx`) | |
2024-03-01T15:49:39-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:849 > Looking for provided certificate(s) to validate ["whoami.xxxxx.xxxxxx"]... ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory providerName=letsencrypt.acme routerName=whoami@docker rule=Host(`whoami.xxxxx.xxxxxx`) | |
2024-03-01T15:49:39-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:893 > No ACME certificate generation required for domains ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory domains=["start.xxxxx.xxxxxx"] providerName=letsencrypt.acme routerName=traefik@docker rule=Host(`start.xxxxx.xxxxxx`) | |
2024-03-01T15:49:39-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:893 > No ACME certificate generation required for domains ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory domains=["whoami.xxxxx.xxxxxx"] providerName=letsencrypt.acme routerName=whoami@docker rule=Host(`whoami.xxxxx.xxxxxx`) | |
2024-03-01T15:49:47-05:00 DBG github.com/go-acme/lego/v4@v4.15.0/log/logger.go:48 > [INFO] [whoami.xxxxx.xxxxxx] The server validated our request lib=lego | |
2024-03-01T15:49:47-05:00 DBG github.com/go-acme/lego/v4@v4.15.0/log/logger.go:48 > [INFO] [whoami.xxxxx.xxxxxx] acme: Cleaning DNS-01 challenge lib=lego | |
2024-03-01T15:49:47-05:00 DBG github.com/go-acme/lego/v4@v4.15.0/log/logger.go:48 > [INFO] [whoami.xxxxx.xxxxxx] acme: Validations succeeded; requesting certificates lib=lego | |
2024-03-01T15:49:51-05:00 DBG github.com/go-acme/lego/v4@v4.15.0/log/logger.go:48 > [INFO] [whoami.xxxxx.xxxxxx] Server responded with a certificate. lib=lego | |
2024-03-01T15:49:51-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:648 > Certificates obtained for domains [whoami.xxxxx.xxxxxx] ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory providerName=letsencrypt.acme routerName=whoami@docker rule=Host(`whoami.xxxxx.xxxxxx`) | |
2024-03-01T15:49:51-05:00 DBG github.com/traefik/traefik/v3/pkg/server/configurationwatcher.go:227 > Configuration received config={"http":{},"tcp":{},"tls":{},"udp":{}} providerName=letsencrypt.acme | |
2024-03-01T15:49:51-05:00 DBG github.com/traefik/traefik/v3/pkg/server/aggregator.go:49 > No entryPoint defined for this router, using the default one(s) instead entryPointName=["web","websecure"] routerName=traefik-secure | |
2024-03-01T15:49:51-05:00 DBG github.com/traefik/traefik/v3/pkg/tls/certificate.go:131 > Adding certificate for domain(s) start.xxxxx.xxxxxx | |
2024-03-01T15:49:51-05:00 DBG github.com/traefik/traefik/v3/pkg/tls/certificate.go:131 > Adding certificate for domain(s) whoami.xxxxx.xxxxxx | |
2024-03-01T15:49:51-05:00 DBG github.com/go-acme/lego/v4@v4.15.0/log/logger.go:48 > [INFO] [traefik.xxxxx.xxxxxx] The server validated our request lib=lego | |
2024-03-01T15:49:51-05:00 DBG github.com/go-acme/lego/v4@v4.15.0/log/logger.go:48 > [INFO] [traefik.xxxxx.xxxxxx] acme: Cleaning DNS-01 challenge lib=lego | |
2024-03-01T15:49:51-05:00 DBG github.com/go-acme/lego/v4@v4.15.0/log/logger.go:48 > [INFO] [traefik.xxxxx.xxxxxx] acme: Validations succeeded; requesting certificates lib=lego | |
2024-03-01T15:49:51-05:00 DBG github.com/traefik/traefik/v3/pkg/tls/tlsmanager.go:320 > No default certificate, fallback to the internal generated certificate tlsStoreName=default | |
2024-03-01T15:49:51-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/redirect/redirect_scheme.go:29 > Creating middleware entryPointName=web middlewareName=redirect-web-to-websecure@internal middlewareType=RedirectScheme routerName=web-to-websecure@internal | |
2024-03-01T15:49:51-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/redirect/redirect_scheme.go:30 > Setting up redirection to https 443 entryPointName=web middlewareName=redirect-web-to-websecure@internal middlewareType=RedirectScheme routerName=web-to-websecure@internal | |
2024-03-01T15:49:51-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/recovery/recovery.go:22 > Creating middleware entryPointName=web middlewareName=traefik-internal-recovery middlewareType=Recovery | |
2024-03-01T15:49:51-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/stripprefix/strip_prefix.go:32 > Creating middleware entryPointName=traefik middlewareName=dashboard_stripprefix@internal middlewareType=StripPrefix routerName=dashboard@internal | |
2024-03-01T15:49:51-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/tracing/middleware.go:33 > Adding tracing to middleware entryPointName=traefik middlewareName=dashboard_stripprefix@internal routerName=dashboard@internal | |
2024-03-01T15:49:51-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/redirect/redirect_regex.go:17 > Creating middleware entryPointName=traefik middlewareName=dashboard_redirect@internal middlewareType=RedirectRegex routerName=dashboard@internal | |
2024-03-01T15:49:51-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/redirect/redirect_regex.go:18 > Setting up redirection from ^(http:\/\/(\[[\w:.]+\]|[\w\._-]+)(:\d+)?)\/$ to ${1}/dashboard/ entryPointName=traefik middlewareName=dashboard_redirect@internal middlewareType=RedirectRegex routerName=dashboard@internal | |
2024-03-01T15:49:51-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/tracing/middleware.go:33 > Adding tracing to middleware entryPointName=traefik middlewareName=dashboard_redirect@internal routerName=dashboard@internal | |
2024-03-01T15:49:51-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/recovery/recovery.go:22 > Creating middleware entryPointName=traefik middlewareName=traefik-internal-recovery middlewareType=Recovery | |
2024-03-01T15:49:51-05:00 DBG github.com/traefik/traefik/v3/pkg/server/service/service.go:259 > Creating load-balancer entryPointName=web routerName=whoami@docker serviceName=whoami-shared-configs@docker | |
2024-03-01T15:49:51-05:00 DBG github.com/traefik/traefik/v3/pkg/server/service/service.go:301 > Creating server entryPointName=web routerName=whoami@docker serverName=8e0be3b10c10dfcc serviceName=whoami-shared-configs@docker target=http://172.26.0.3:80 | |
2024-03-01T15:49:51-05:00 DBG github.com/traefik/traefik/v3/pkg/server/service/service.go:259 > Creating load-balancer entryPointName=web routerName=traefik-secure@docker serviceName=traefik-shared-configs@docker | |
2024-03-01T15:49:51-05:00 DBG github.com/traefik/traefik/v3/pkg/server/service/service.go:301 > Creating server entryPointName=web routerName=traefik-secure@docker serverName=da346bb9c37fbb49 serviceName=traefik-shared-configs@docker target=http://172.26.0.2:80 | |
2024-03-01T15:49:51-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/recovery/recovery.go:22 > Creating middleware entryPointName=web middlewareName=traefik-internal-recovery middlewareType=Recovery | |
2024-03-01T15:49:51-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/recovery/recovery.go:22 > Creating middleware entryPointName=websecure middlewareName=traefik-internal-recovery middlewareType=Recovery | |
2024-03-01T15:49:51-05:00 DBG github.com/traefik/traefik/v3/pkg/server/router/tcp/manager.go:235 > Adding route for whoami.xxxxx.xxxxxx with TLS options default entryPointName=web | |
2024-03-01T15:49:51-05:00 DBG github.com/traefik/traefik/v3/pkg/server/router/tcp/manager.go:235 > Adding route for traefik-shared-configs with TLS options default entryPointName=web | |
2024-03-01T15:49:51-05:00 DBG github.com/traefik/traefik/v3/pkg/server/router/tcp/manager.go:235 > Adding route for start.xxxxx.xxxxxx with TLS options default entryPointName=web | |
2024-03-01T15:49:51-05:00 DBG github.com/traefik/traefik/v3/pkg/server/router/tcp/manager.go:235 > Adding route for start.xxxxx.xxxxxx with TLS options default entryPointName=websecure | |
2024-03-01T15:49:51-05:00 DBG github.com/traefik/traefik/v3/pkg/server/router/tcp/manager.go:235 > Adding route for whoami.xxxxx.xxxxxx with TLS options default entryPointName=websecure | |
2024-03-01T15:49:51-05:00 DBG github.com/traefik/traefik/v3/pkg/server/router/tcp/manager.go:235 > Adding route for traefik.xxxxx.xxxxxx with TLS options default entryPointName=websecure | |
2024-03-01T15:49:51-05:00 DBG github.com/traefik/traefik/v3/pkg/server/router/tcp/manager.go:235 > Adding route for traefik-shared-configs with TLS options default entryPointName=websecure | |
2024-03-01T15:49:51-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:387 > Trying to challenge certificate for domain [traefik.xxxxx.xxxxxx] found in HostSNI rule ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory providerName=letsencrypt.acme routerName=api@docker rule=Host(`traefik.xxxxx.xxxxxx`) | |
2024-03-01T15:49:51-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:387 > Trying to challenge certificate for domain [start.xxxxx.xxxxxx] found in HostSNI rule ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory providerName=letsencrypt.acme routerName=traefik@docker rule=Host(`start.xxxxx.xxxxxx`) | |
2024-03-01T15:49:51-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:849 > Looking for provided certificate(s) to validate ["traefik.xxxxx.xxxxxx"]... ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory providerName=letsencrypt.acme routerName=api@docker rule=Host(`traefik.xxxxx.xxxxxx`) | |
2024-03-01T15:49:51-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:387 > Trying to challenge certificate for domain [whoami.xxxxx.xxxxxx] found in HostSNI rule ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory providerName=letsencrypt.acme routerName=whoami@docker rule=Host(`whoami.xxxxx.xxxxxx`) | |
2024-03-01T15:49:51-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:849 > Looking for provided certificate(s) to validate ["start.xxxxx.xxxxxx"]... ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory providerName=letsencrypt.acme routerName=traefik@docker rule=Host(`start.xxxxx.xxxxxx`) | |
2024-03-01T15:49:51-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:849 > Looking for provided certificate(s) to validate ["whoami.xxxxx.xxxxxx"]... ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory providerName=letsencrypt.acme routerName=whoami@docker rule=Host(`whoami.xxxxx.xxxxxx`) | |
2024-03-01T15:49:51-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:893 > No ACME certificate generation required for domains ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory domains=["traefik.xxxxx.xxxxxx"] providerName=letsencrypt.acme routerName=api@docker rule=Host(`traefik.xxxxx.xxxxxx`) | |
2024-03-01T15:49:51-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:893 > No ACME certificate generation required for domains ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory domains=["start.xxxxx.xxxxxx"] providerName=letsencrypt.acme routerName=traefik@docker rule=Host(`start.xxxxx.xxxxxx`) | |
2024-03-01T15:49:51-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:893 > No ACME certificate generation required for domains ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory domains=["whoami.xxxxx.xxxxxx"] providerName=letsencrypt.acme routerName=whoami@docker rule=Host(`whoami.xxxxx.xxxxxx`) | |
2024-03-01T15:49:57-05:00 DBG github.com/go-acme/lego/v4@v4.15.0/log/logger.go:48 > [INFO] [traefik.xxxxx.xxxxxx] Server responded with a certificate. lib=lego | |
2024-03-01T15:49:57-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:648 > Certificates obtained for domains [traefik.xxxxx.xxxxxx] ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory providerName=letsencrypt.acme routerName=api@docker rule=Host(`traefik.xxxxx.xxxxxx`) | |
2024-03-01T15:49:57-05:00 DBG github.com/traefik/traefik/v3/pkg/server/configurationwatcher.go:227 > Configuration received config={"http":{},"tcp":{},"tls":{},"udp":{}} providerName=letsencrypt.acme | |
2024-03-01T15:49:57-05:00 DBG github.com/traefik/traefik/v3/pkg/server/aggregator.go:49 > No entryPoint defined for this router, using the default one(s) instead entryPointName=["web","websecure"] routerName=traefik-secure | |
2024-03-01T15:49:57-05:00 DBG github.com/traefik/traefik/v3/pkg/tls/certificate.go:131 > Adding certificate for domain(s) start.xxxxx.xxxxxx | |
2024-03-01T15:49:57-05:00 DBG github.com/traefik/traefik/v3/pkg/tls/certificate.go:131 > Adding certificate for domain(s) whoami.xxxxx.xxxxxx | |
2024-03-01T15:49:57-05:00 DBG github.com/traefik/traefik/v3/pkg/tls/certificate.go:131 > Adding certificate for domain(s) traefik.xxxxx.xxxxxx | |
2024-03-01T15:49:57-05:00 DBG github.com/traefik/traefik/v3/pkg/tls/tlsmanager.go:320 > No default certificate, fallback to the internal generated certificate tlsStoreName=default | |
2024-03-01T15:49:57-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/stripprefix/strip_prefix.go:32 > Creating middleware entryPointName=traefik middlewareName=dashboard_stripprefix@internal middlewareType=StripPrefix routerName=dashboard@internal | |
2024-03-01T15:49:57-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/tracing/middleware.go:33 > Adding tracing to middleware entryPointName=traefik middlewareName=dashboard_stripprefix@internal routerName=dashboard@internal | |
2024-03-01T15:49:57-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/redirect/redirect_regex.go:17 > Creating middleware entryPointName=traefik middlewareName=dashboard_redirect@internal middlewareType=RedirectRegex routerName=dashboard@internal | |
2024-03-01T15:49:57-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/redirect/redirect_regex.go:18 > Setting up redirection from ^(http:\/\/(\[[\w:.]+\]|[\w\._-]+)(:\d+)?)\/$ to ${1}/dashboard/ entryPointName=traefik middlewareName=dashboard_redirect@internal middlewareType=RedirectRegex routerName=dashboard@internal | |
2024-03-01T15:49:57-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/tracing/middleware.go:33 > Adding tracing to middleware entryPointName=traefik middlewareName=dashboard_redirect@internal routerName=dashboard@internal | |
2024-03-01T15:49:57-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/recovery/recovery.go:22 > Creating middleware entryPointName=traefik middlewareName=traefik-internal-recovery middlewareType=Recovery | |
2024-03-01T15:49:57-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/redirect/redirect_scheme.go:29 > Creating middleware entryPointName=web middlewareName=redirect-web-to-websecure@internal middlewareType=RedirectScheme routerName=web-to-websecure@internal | |
2024-03-01T15:49:57-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/redirect/redirect_scheme.go:30 > Setting up redirection to https 443 entryPointName=web middlewareName=redirect-web-to-websecure@internal middlewareType=RedirectScheme routerName=web-to-websecure@internal | |
2024-03-01T15:49:57-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/recovery/recovery.go:22 > Creating middleware entryPointName=web middlewareName=traefik-internal-recovery middlewareType=Recovery | |
2024-03-01T15:49:57-05:00 DBG github.com/traefik/traefik/v3/pkg/server/service/service.go:259 > Creating load-balancer entryPointName=websecure routerName=api@docker serviceName=traefik-shared-configs@docker | |
2024-03-01T15:49:57-05:00 DBG github.com/traefik/traefik/v3/pkg/server/service/service.go:301 > Creating server entryPointName=websecure routerName=api@docker serverName=da346bb9c37fbb49 serviceName=traefik-shared-configs@docker target=http://172.26.0.2:80 | |
2024-03-01T15:49:57-05:00 DBG github.com/traefik/traefik/v3/pkg/server/service/service.go:259 > Creating load-balancer entryPointName=websecure routerName=whoami@docker serviceName=whoami-shared-configs@docker | |
2024-03-01T15:49:57-05:00 DBG github.com/traefik/traefik/v3/pkg/server/service/service.go:301 > Creating server entryPointName=websecure routerName=whoami@docker serverName=8e0be3b10c10dfcc serviceName=whoami-shared-configs@docker target=http://172.26.0.3:80 | |
2024-03-01T15:49:57-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/recovery/recovery.go:22 > Creating middleware entryPointName=websecure middlewareName=traefik-internal-recovery middlewareType=Recovery | |
2024-03-01T15:49:57-05:00 DBG github.com/traefik/traefik/v3/pkg/middlewares/recovery/recovery.go:22 > Creating middleware entryPointName=web middlewareName=traefik-internal-recovery middlewareType=Recovery | |
2024-03-01T15:49:57-05:00 DBG github.com/traefik/traefik/v3/pkg/server/router/tcp/manager.go:235 > Adding route for whoami.xxxxx.xxxxxx with TLS options default entryPointName=web | |
2024-03-01T15:49:57-05:00 DBG github.com/traefik/traefik/v3/pkg/server/router/tcp/manager.go:235 > Adding route for traefik-shared-configs with TLS options default entryPointName=web | |
2024-03-01T15:49:57-05:00 DBG github.com/traefik/traefik/v3/pkg/server/router/tcp/manager.go:235 > Adding route for start.xxxxx.xxxxxx with TLS options default entryPointName=web | |
2024-03-01T15:49:57-05:00 DBG github.com/traefik/traefik/v3/pkg/server/router/tcp/manager.go:235 > Adding route for traefik.xxxxx.xxxxxx with TLS options default entryPointName=websecure | |
2024-03-01T15:49:57-05:00 DBG github.com/traefik/traefik/v3/pkg/server/router/tcp/manager.go:235 > Adding route for traefik-shared-configs with TLS options default entryPointName=websecure | |
2024-03-01T15:49:57-05:00 DBG github.com/traefik/traefik/v3/pkg/server/router/tcp/manager.go:235 > Adding route for start.xxxxx.xxxxxx with TLS options default entryPointName=websecure | |
2024-03-01T15:49:57-05:00 DBG github.com/traefik/traefik/v3/pkg/server/router/tcp/manager.go:235 > Adding route for whoami.xxxxx.xxxxxx with TLS options default entryPointName=websecure | |
2024-03-01T15:49:57-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:387 > Trying to challenge certificate for domain [traefik.xxxxx.xxxxxx] found in HostSNI rule ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory providerName=letsencrypt.acme routerName=api@docker rule=Host(`traefik.xxxxx.xxxxxx`) | |
2024-03-01T15:49:57-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:387 > Trying to challenge certificate for domain [start.xxxxx.xxxxxx] found in HostSNI rule ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory providerName=letsencrypt.acme routerName=traefik@docker rule=Host(`start.xxxxx.xxxxxx`) | |
2024-03-01T15:49:57-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:849 > Looking for provided certificate(s) to validate ["traefik.xxxxx.xxxxxx"]... ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory providerName=letsencrypt.acme routerName=api@docker rule=Host(`traefik.xxxxx.xxxxxx`) | |
2024-03-01T15:49:57-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:387 > Trying to challenge certificate for domain [whoami.xxxxx.xxxxxx] found in HostSNI rule ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory providerName=letsencrypt.acme routerName=whoami@docker rule=Host(`whoami.xxxxx.xxxxxx`) | |
2024-03-01T15:49:57-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:893 > No ACME certificate generation required for domains ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory domains=["traefik.xxxxx.xxxxxx"] providerName=letsencrypt.acme routerName=api@docker rule=Host(`traefik.xxxxx.xxxxxx`) | |
2024-03-01T15:49:57-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:849 > Looking for provided certificate(s) to validate ["whoami.xxxxx.xxxxxx"]... ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory providerName=letsencrypt.acme routerName=whoami@docker rule=Host(`whoami.xxxxx.xxxxxx`) | |
2024-03-01T15:49:57-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:849 > Looking for provided certificate(s) to validate ["start.xxxxx.xxxxxx"]... ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory providerName=letsencrypt.acme routerName=traefik@docker rule=Host(`start.xxxxx.xxxxxx`) | |
2024-03-01T15:49:57-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:893 > No ACME certificate generation required for domains ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory domains=["whoami.xxxxx.xxxxxx"] providerName=letsencrypt.acme routerName=whoami@docker rule=Host(`whoami.xxxxx.xxxxxx`) | |
2024-03-01T15:49:57-05:00 DBG github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:893 > No ACME certificate generation required for domains ACME CA=https://acme-v02.api.letsencrypt.org/directory acmeCA=https://acme-v02.api.letsencrypt.org/directory domains=["start.xxxxx.xxxxxx"] providerName=letsencrypt.acme routerName=traefik@docker rule=Host(`start.xxxxx.xxxxxx`) |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment