Created
May 18, 2020 17:06
-
-
Save McFateM/3f4bc94a6d1031debcf2dfbec305093b to your computer and use it in GitHub Desktop.
Static Test 5 Log - DNS-01 Challenge with LE Staging
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
c345dd40b4435cb710eaf1fed3bf6c8eae1d61b711e94a77064e5c196c405943 | |
Pulling traefik (traefik:2.2.1)... | |
2.2.1: Pulling from library/traefik | |
cbdbe7a5bc2a: Pull complete | |
f16506d32a25: Pull complete | |
2be216d464d0: Pull complete | |
aed51f08b610: Pull complete | |
Creating traefik ... | |
Pulling traefik (traefik:2.2.1)... | |
Creating traefik ... done | |
Attaching to traefik | |
traefik | time="2020-05-18T11:57:59-05:00" level=info msg="Configuration loaded from file: /traefik.yml" | |
Creating network "watchtower_default" with the default driver | |
Pulling watchtower (containrrr/watchtower:)... | |
latest: Pulling from containrrr/watchtower | |
c4b177d7cf7a: Pull complete | |
676d5222541c: Pull complete | |
00dbe20f4a5b: Pull complete | |
Creating watchtower ... | |
Pulling watchtower (containrrr/watchtower:)... | |
Creating watchtower ... done | |
Attaching to watchtower | |
Pulling portainer (portainer/portainer:1.23.2)... | |
1.23.2: Pulling from portainer/portainer | |
d1e017099d17: Pull complete | |
a7dca5b5a9e8: Pull complete | |
Creating portainer ... | |
Pulling portainer (portainer/portainer:1.23.2)... | |
Creating portainer ... done | |
Attaching to portainer | |
portainer | 2020/05/18 11:58:11 Templates already registered inside the database. Skipping template import. | |
portainer | 2020/05/18 11:58:11 server: Reverse tunnelling enabled | |
portainer | 2020/05/18 11:58:11 server: Fingerprint 6f:99:ec:c8:52:4a:fd:1e:0d:4c:9d:20:ca:16:39:fb | |
portainer | 2020/05/18 11:58:11 server: Listening on 0.0.0.0:8000... | |
portainer | 2020/05/18 11:58:11 Starting Portainer 1.23.2 on :9000 | |
portainer | 2020/05/18 11:58:11 [DEBUG] [chisel, monitoring] [check_interval_seconds: 10.000000] [message: starting tunnel management process] | |
Pulling landing (mcfatem/static-landing:latest)... | |
latest: Pulling from mcfatem/static-landing | |
4167d3e14976: Pull complete | |
db94a93dfca0: Pull complete | |
2b8e94aa476d: Pull complete | |
Creating landing-page ... | |
Pulling landing (mcfatem/static-landing:latest)... | |
Creating landing-page ... done | |
Attaching to landing-page | |
Pulling rootstalk (mcfatem/rootstalk:latest)... | |
latest: Pulling from mcfatem/rootstalk | |
4167d3e14976: Already exists | |
db94a93dfca0: Already exists | |
32152e4c4d01: Pull complete | |
Creating rootstalk-static ... | |
Pulling rootstalk (mcfatem/rootstalk:latest)... | |
Creating rootstalk-static ... done | |
Attaching to rootstalk-static | |
Pulling vaf (mcfatem/vaf:latest)... | |
latest: Pulling from mcfatem/vaf | |
050382585609: Pull complete | |
aa1504bc12ac: Pull complete | |
60b7ea37e17a: Pull complete | |
615a270f2edf: Pull complete | |
Creating vaf ... | |
Pulling vaf (mcfatem/vaf:latest)... | |
Creating vaf ... done | |
Attaching to vaf | |
WARNING: Found orphan containers (vaf) for this project. If you removed or renamed this service in your compose file, you can run this command with the --remove-orphans flag to clean it up. | |
Pulling kiosk (mcfatem/vaf-kiosk:latest)... | |
latest: Pulling from mcfatem/vaf-kiosk | |
8e402f1a9c57: Pull complete | |
7b69d8b552de: Pull complete | |
42e747db7e28: Pull complete | |
4f8106e1c445: Pull complete | |
78c7d59fe6a4: Pull complete | |
Creating vaf-kiosk ... done | |
Attaching to vaf | |
Dumping traefik.log... | |
time="2020-05-18T11:57:59-05:00" level=info msg="Traefik version 2.2.1 built on 2020-04-29T18:02:09Z" | |
time="2020-05-18T11:57:59-05:00" level=debug msg="Static configuration loaded {\"global\":{\"checkNewVersion\":true},\"serversTransport\":{\"maxIdleConnsPerHost\":200},\"entryPoints\":{\"http\":{\"address\":\":80\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":10000000000},\"respondingTimeouts\":{\"idleTimeout\":180000000000}},\"forwardedHeaders\":{},\"http\":{}},\"https\":{\"address\":\":443\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":10000000000},\"respondingTimeouts\":{\"idleTimeout\":180000000000}},\"forwardedHeaders\":{},\"http\":{}}},\"providers\":{\"providersThrottleDuration\":2000000000,\"docker\":{\"watch\":true,\"endpoint\":\"unix:///var/run/docker.sock\",\"defaultRule\":\"Host(`{{ normalize .Name }}`)\",\"swarmModeRefreshSeconds\":15000000000}},\"api\":{\"dashboard\":true},\"log\":{\"level\":\"DEBUG\",\"filePath\":\"/var/log/traefik.log\",\"format\":\"common\"},\"certificatesResolvers\":{\"http\":{\"acme\":{\"email\":\"[email protected]\",\"caServer\":\"https://acme-staging-v02.api.letsencrypt.org/directory\",\"storage\":\"acme.json\",\"keyType\":\"RSA4096\",\"dnsChallenge\":{\"provider\":\"azure\"}}}}}" | |
time="2020-05-18T11:57:59-05:00" level=info msg="\nStats collection is disabled.\nHelp us improve Traefik by turning this feature on :)\nMore details on: https://docs.traefik.io/contributing/data-collection/\n" | |
time="2020-05-18T11:57:59-05:00" level=info msg="Starting provider aggregator.ProviderAggregator {}" | |
time="2020-05-18T11:57:59-05:00" level=debug msg="Start TCP Server" entryPointName=https | |
time="2020-05-18T11:57:59-05:00" level=debug msg="Start TCP Server" entryPointName=http | |
time="2020-05-18T11:57:59-05:00" level=info msg="Starting provider *acme.Provider {\"email\":\"[email protected]\",\"caServer\":\"https://acme-staging-v02.api.letsencrypt.org/directory\",\"storage\":\"acme.json\",\"keyType\":\"RSA4096\",\"dnsChallenge\":{\"provider\":\"azure\"},\"ResolverName\":\"http\",\"store\":{},\"ChallengeStore\":{}}" | |
time="2020-05-18T11:57:59-05:00" level=info msg="Testing certificate renew..." providerName=http.acme | |
time="2020-05-18T11:57:59-05:00" level=info msg="Starting provider *docker.Provider {\"watch\":true,\"endpoint\":\"unix:///var/run/docker.sock\",\"defaultRule\":\"Host(`{{ normalize .Name }}`)\",\"swarmModeRefreshSeconds\":15000000000}" | |
time="2020-05-18T11:57:59-05:00" level=info msg="Starting provider *traefik.Provider {}" | |
time="2020-05-18T11:57:59-05:00" level=debug msg="Configuration received from provider http.acme: {\"http\":{},\"tls\":{}}" providerName=http.acme | |
time="2020-05-18T11:57:59-05:00" level=debug msg="Configuration received from provider internal: {\"http\":{\"services\":{\"api\":{},\"dashboard\":{},\"noop\":{}}},\"tcp\":{},\"tls\":{}}" providerName=internal | |
time="2020-05-18T11:57:59-05:00" level=debug msg="No default certificate, generating one" | |
time="2020-05-18T11:57:59-05:00" level=debug msg="Provider connection established with docker 19.03.8 (API 1.40)" providerName=docker | |
time="2020-05-18T11:57:59-05:00" level=debug msg="Configuration received from provider docker: {\"http\":{\"routers\":{\"http-catchall\":{\"entryPoints\":[\"http\"],\"middlewares\":[\"redirect-to-https\"],\"service\":\"traefik-traefik\",\"rule\":\"hostregexp(`{host:[a-z-.]+}`)\"},\"traefik-secure\":{\"entryPoints\":[\"https\"],\"middlewares\":[\"traefik-auth\"],\"service\":\"api@internal\",\"rule\":\"Host(`static.grinnell.edu`) \\u0026\\u0026 (PathPrefix(`/api`) || PathPrefix(`/dashboard`))\",\"tls\":{\"certResolver\":\"http\"}}},\"services\":{\"traefik-traefik\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.224.2:80\"}],\"passHostHeader\":true}}},\"middlewares\":{\"redirect-to-https\":{\"redirectScheme\":{\"scheme\":\"https\"}},\"traefik-auth\":{\"basicAuth\":{\"users\":[\"admin:$2y$05$pJEzHJBzfoYYS7/hGAedcOP8XdsqNXE7j.LHFBVjueASOqOvvjGOy\"]}}}},\"tcp\":{},\"udp\":{}}" providerName=docker | |
time="2020-05-18T11:57:59-05:00" level=debug msg="No default certificate, generating one" | |
time="2020-05-18T11:58:00-05:00" level=debug msg="Creating middleware" entryPointName=http routerName=http-catchall@docker serviceName=traefik-traefik middlewareName=pipelining middlewareType=Pipelining | |
time="2020-05-18T11:58:00-05:00" level=debug msg="Creating load-balancer" entryPointName=http routerName=http-catchall@docker serviceName=traefik-traefik | |
time="2020-05-18T11:58:00-05:00" level=debug msg="Creating server 0 http://192.168.224.2:80" serverName=0 entryPointName=http routerName=http-catchall@docker serviceName=traefik-traefik | |
time="2020-05-18T11:58:00-05:00" level=debug msg="Added outgoing tracing middleware traefik-traefik" entryPointName=http routerName=http-catchall@docker middlewareName=tracing middlewareType=TracingForwarder | |
time="2020-05-18T11:58:00-05:00" level=debug msg="Creating middleware" routerName=http-catchall@docker middlewareName=redirect-to-https@docker middlewareType=RedirectScheme entryPointName=http | |
time="2020-05-18T11:58:00-05:00" level=debug msg="Setting up redirection to https " entryPointName=http routerName=http-catchall@docker middlewareName=redirect-to-https@docker middlewareType=RedirectScheme | |
time="2020-05-18T11:58:00-05:00" level=debug msg="Adding tracing to middleware" entryPointName=http routerName=http-catchall@docker middlewareName=redirect-to-https@docker | |
time="2020-05-18T11:58:00-05:00" level=debug msg="Creating middleware" middlewareType=Recovery entryPointName=http middlewareName=traefik-internal-recovery | |
time="2020-05-18T11:58:00-05:00" level=debug msg="Added outgoing tracing middleware api@internal" middlewareName=tracing middlewareType=TracingForwarder entryPointName=https routerName=traefik-secure@docker | |
time="2020-05-18T11:58:00-05:00" level=debug msg="Creating middleware" entryPointName=https routerName=traefik-secure@docker middlewareName=traefik-auth@docker middlewareType=BasicAuth | |
time="2020-05-18T11:58:00-05:00" level=debug msg="Adding tracing to middleware" routerName=traefik-secure@docker middlewareName=traefik-auth@docker entryPointName=https | |
time="2020-05-18T11:58:00-05:00" level=debug msg="Creating middleware" entryPointName=https middlewareName=traefik-internal-recovery middlewareType=Recovery | |
time="2020-05-18T11:58:00-05:00" level=debug msg="No default certificate, generating one" | |
time="2020-05-18T11:58:00-05:00" level=debug msg="Try to challenge certificate for domain [static.grinnell.edu] found in HostSNI rule" providerName=http.acme routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" | |
time="2020-05-18T11:58:00-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"static.grinnell.edu\"]..." providerName=http.acme routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" | |
time="2020-05-18T11:58:00-05:00" level=debug msg="Domains [\"static.grinnell.edu\"] need ACME certificates generation for domains \"static.grinnell.edu\"." providerName=http.acme routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" | |
time="2020-05-18T11:58:00-05:00" level=debug msg="Loading ACME certificates [static.grinnell.edu]..." providerName=http.acme routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" | |
time="2020-05-18T11:58:02-05:00" level=debug msg="Serving default certificate for request: \"static.grinnell.edu\"" | |
time="2020-05-18T11:58:02-05:00" level=debug msg="http: TLS handshake error from 132.161.249.72:57914: remote error: tls: bad certificate" | |
time="2020-05-18T11:58:04-05:00" level=debug msg="Provider event received {Status:start ID:b539c55f3631972393cd2b401289a28656b7cfa053b835e5ae292c602c6d5b7e From:containrrr/watchtower Type:container Action:start Actor:{ID:b539c55f3631972393cd2b401289a28656b7cfa053b835e5ae292c602c6d5b7e Attributes:map[com.centurylinklabs.watchtower:true com.docker.compose.config-hash:72da3999b54f0b744907f5756a345c4a6e454b570a653d5079aa27ddef6fea5c com.docker.compose.container-number:1 com.docker.compose.oneoff:False com.docker.compose.project:watchtower com.docker.compose.service:watchtower com.docker.compose.slug:51d92c5b02eb3c4f19e2ba36b3dd4938d5d6a1eecd8659ab40ffc17c11c94c4 com.docker.compose.version:1.23.1 image:containrrr/watchtower name:watchtower traefik.enable:false]} Scope:local Time:1589821084 TimeNano:1589821084957970982}" providerName=docker | |
time="2020-05-18T11:58:04-05:00" level=debug msg="Filtering disabled container" providerName=docker container=watchtower-watchtower-b539c55f3631972393cd2b401289a28656b7cfa053b835e5ae292c602c6d5b7e | |
time="2020-05-18T11:58:04-05:00" level=debug msg="Configuration received from provider docker: {\"http\":{\"routers\":{\"http-catchall\":{\"entryPoints\":[\"http\"],\"middlewares\":[\"redirect-to-https\"],\"service\":\"traefik-traefik\",\"rule\":\"hostregexp(`{host:[a-z-.]+}`)\"},\"traefik-secure\":{\"entryPoints\":[\"https\"],\"middlewares\":[\"traefik-auth\"],\"service\":\"api@internal\",\"rule\":\"Host(`static.grinnell.edu`) \\u0026\\u0026 (PathPrefix(`/api`) || PathPrefix(`/dashboard`))\",\"tls\":{\"certResolver\":\"http\"}}},\"services\":{\"traefik-traefik\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.224.2:80\"}],\"passHostHeader\":true}}},\"middlewares\":{\"redirect-to-https\":{\"redirectScheme\":{\"scheme\":\"https\"}},\"traefik-auth\":{\"basicAuth\":{\"users\":[\"admin:$2y$05$pJEzHJBzfoYYS7/hGAedcOP8XdsqNXE7j.LHFBVjueASOqOvvjGOy\"]}}}},\"tcp\":{},\"udp\":{}}" providerName=docker | |
time="2020-05-18T11:58:04-05:00" level=debug msg="Creating middleware" middlewareName=pipelining middlewareType=Pipelining routerName=http-catchall@docker serviceName=traefik-traefik entryPointName=http | |
time="2020-05-18T11:58:04-05:00" level=debug msg="Creating load-balancer" serviceName=traefik-traefik entryPointName=http routerName=http-catchall@docker | |
time="2020-05-18T11:58:04-05:00" level=debug msg="Creating server 0 http://192.168.224.2:80" serviceName=traefik-traefik serverName=0 entryPointName=http routerName=http-catchall@docker | |
time="2020-05-18T11:58:04-05:00" level=debug msg="Added outgoing tracing middleware traefik-traefik" middlewareName=tracing entryPointName=http routerName=http-catchall@docker middlewareType=TracingForwarder | |
time="2020-05-18T11:58:04-05:00" level=debug msg="Creating middleware" entryPointName=http routerName=http-catchall@docker middlewareName=redirect-to-https@docker middlewareType=RedirectScheme | |
time="2020-05-18T11:58:04-05:00" level=debug msg="Setting up redirection to https " middlewareName=redirect-to-https@docker middlewareType=RedirectScheme entryPointName=http routerName=http-catchall@docker | |
time="2020-05-18T11:58:04-05:00" level=debug msg="Adding tracing to middleware" entryPointName=http routerName=http-catchall@docker middlewareName=redirect-to-https@docker | |
time="2020-05-18T11:58:04-05:00" level=debug msg="Creating middleware" entryPointName=http middlewareName=traefik-internal-recovery middlewareType=Recovery | |
time="2020-05-18T11:58:04-05:00" level=debug msg="Added outgoing tracing middleware api@internal" routerName=traefik-secure@docker middlewareName=tracing middlewareType=TracingForwarder entryPointName=https | |
time="2020-05-18T11:58:04-05:00" level=debug msg="Creating middleware" middlewareName=traefik-auth@docker middlewareType=BasicAuth entryPointName=https routerName=traefik-secure@docker | |
time="2020-05-18T11:58:04-05:00" level=debug msg="Adding tracing to middleware" middlewareName=traefik-auth@docker entryPointName=https routerName=traefik-secure@docker | |
time="2020-05-18T11:58:04-05:00" level=debug msg="Creating middleware" middlewareName=traefik-internal-recovery middlewareType=Recovery entryPointName=https | |
time="2020-05-18T11:58:04-05:00" level=debug msg="No default certificate, generating one" | |
time="2020-05-18T11:58:06-05:00" level=debug msg="Try to challenge certificate for domain [static.grinnell.edu] found in HostSNI rule" routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" providerName=http.acme | |
time="2020-05-18T11:58:06-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"static.grinnell.edu\"]..." providerName=http.acme routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" | |
time="2020-05-18T11:58:06-05:00" level=debug msg="No ACME certificate generation required for domains [\"static.grinnell.edu\"]." providerName=http.acme routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" | |
time="2020-05-18T11:58:06-05:00" level=debug msg="Building ACME client..." providerName=http.acme | |
time="2020-05-18T11:58:06-05:00" level=debug msg="https://acme-staging-v02.api.letsencrypt.org/directory" providerName=http.acme | |
time="2020-05-18T11:58:06-05:00" level=info msg=Register... providerName=http.acme | |
time="2020-05-18T11:58:06-05:00" level=debug msg="legolog: [INFO] acme: Registering account for [email protected]" | |
time="2020-05-18T11:58:06-05:00" level=debug msg="Using DNS Challenge provider: azure" providerName=http.acme | |
time="2020-05-18T11:58:07-05:00" level=debug msg="Serving default certificate for request: \"static.grinnell.edu\"" | |
time="2020-05-18T11:58:07-05:00" level=debug msg="http: TLS handshake error from 132.161.249.72:57927: remote error: tls: bad certificate" | |
time="2020-05-18T11:58:11-05:00" level=debug msg="Provider event received {Status:start ID:f91eabe9cd087fba37ceb888b33dbbb430d022c244862a6a09e987e7df0d80f1 From:portainer/portainer:1.23.2 Type:container Action:start Actor:{ID:f91eabe9cd087fba37ceb888b33dbbb430d022c244862a6a09e987e7df0d80f1 Attributes:map[com.docker.compose.config-hash:33a9d811b0a1a475c282531bf2e54d3cbcbfdd929b2e3243bd3a7a25c0206d3c com.docker.compose.container-number:1 com.docker.compose.oneoff:False com.docker.compose.project:portainer com.docker.compose.service:portainer com.docker.compose.slug:b1d534e3f2f1719c179ac501afdee4ada73774c91c51b49f56a7f8e01e7cab3 com.docker.compose.version:1.23.1 image:portainer/portainer:1.23.2 name:portainer traefik.docker.network:proxy traefik.enable:true traefik.http.middlewares.portainer-auth.basicauth.users:admin:$2y$05$pJEzHJBzfoYYS7/hGAedcOP8XdsqNXE7j.LHFBVjueASOqOvvjGOy traefik.http.middlewares.portainer-stripprefix.stripprefix.prefixes:/portainer traefik.http.routers.portainer-secure.entrypoints:https traefik.http.routers.portainer-secure.middlewares:portainer-stripprefix traefik.http.routers.portainer-secure.rule:Host(`static.grinnell.edu`) && PathPrefix(`/portainer`) traefik.http.routers.portainer-secure.service:portainer traefik.http.routers.portainer-secure.tls:true traefik.http.routers.portainer-secure.tls.certresolver:http traefik.http.services.portainer.loadbalancer.server.port:9000]} Scope:local Time:1589821091 TimeNano:1589821091096687588}" providerName=docker | |
time="2020-05-18T11:58:11-05:00" level=debug msg="Filtering disabled container" providerName=docker container=watchtower-watchtower-b539c55f3631972393cd2b401289a28656b7cfa053b835e5ae292c602c6d5b7e | |
time="2020-05-18T11:58:11-05:00" level=debug msg="Configuration received from provider docker: {\"http\":{\"routers\":{\"http-catchall\":{\"entryPoints\":[\"http\"],\"middlewares\":[\"redirect-to-https\"],\"service\":\"traefik-traefik\",\"rule\":\"hostregexp(`{host:[a-z-.]+}`)\"},\"portainer-secure\":{\"entryPoints\":[\"https\"],\"middlewares\":[\"portainer-stripprefix\"],\"service\":\"portainer\",\"rule\":\"Host(`static.grinnell.edu`) \\u0026\\u0026 PathPrefix(`/portainer`)\",\"tls\":{\"certResolver\":\"http\"}},\"traefik-secure\":{\"entryPoints\":[\"https\"],\"middlewares\":[\"traefik-auth\"],\"service\":\"api@internal\",\"rule\":\"Host(`static.grinnell.edu`) \\u0026\\u0026 (PathPrefix(`/api`) || PathPrefix(`/dashboard`))\",\"tls\":{\"certResolver\":\"http\"}}},\"services\":{\"portainer\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.224.3:9000\"}],\"passHostHeader\":true}},\"traefik-traefik\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.224.2:80\"}],\"passHostHeader\":true}}},\"middlewares\":{\"portainer-auth\":{\"basicAuth\":{\"users\":[\"admin:$2y$05$pJEzHJBzfoYYS7/hGAedcOP8XdsqNXE7j.LHFBVjueASOqOvvjGOy\"]}},\"portainer-stripprefix\":{\"stripPrefix\":{\"prefixes\":[\"/portainer\"],\"forceSlash\":true}},\"redirect-to-https\":{\"redirectScheme\":{\"scheme\":\"https\"}},\"traefik-auth\":{\"basicAuth\":{\"users\":[\"admin:$2y$05$pJEzHJBzfoYYS7/hGAedcOP8XdsqNXE7j.LHFBVjueASOqOvvjGOy\"]}}}},\"tcp\":{},\"udp\":{}}" providerName=docker | |
time="2020-05-18T11:58:11-05:00" level=debug msg="Creating middleware" middlewareType=Pipelining entryPointName=http routerName=http-catchall@docker serviceName=traefik-traefik middlewareName=pipelining | |
time="2020-05-18T11:58:11-05:00" level=debug msg="Creating load-balancer" entryPointName=http routerName=http-catchall@docker serviceName=traefik-traefik | |
time="2020-05-18T11:58:11-05:00" level=debug msg="Creating server 0 http://192.168.224.2:80" serverName=0 entryPointName=http routerName=http-catchall@docker serviceName=traefik-traefik | |
time="2020-05-18T11:58:11-05:00" level=debug msg="Added outgoing tracing middleware traefik-traefik" middlewareType=TracingForwarder entryPointName=http routerName=http-catchall@docker middlewareName=tracing | |
time="2020-05-18T11:58:11-05:00" level=debug msg="Creating middleware" routerName=http-catchall@docker middlewareName=redirect-to-https@docker middlewareType=RedirectScheme entryPointName=http | |
time="2020-05-18T11:58:11-05:00" level=debug msg="Setting up redirection to https " routerName=http-catchall@docker middlewareName=redirect-to-https@docker middlewareType=RedirectScheme entryPointName=http | |
time="2020-05-18T11:58:11-05:00" level=debug msg="Adding tracing to middleware" entryPointName=http routerName=http-catchall@docker middlewareName=redirect-to-https@docker | |
time="2020-05-18T11:58:11-05:00" level=debug msg="Creating middleware" middlewareName=traefik-internal-recovery middlewareType=Recovery entryPointName=http | |
time="2020-05-18T11:58:11-05:00" level=debug msg="Added outgoing tracing middleware api@internal" routerName=traefik-secure@docker middlewareName=tracing middlewareType=TracingForwarder entryPointName=https | |
time="2020-05-18T11:58:11-05:00" level=debug msg="Creating middleware" entryPointName=https routerName=traefik-secure@docker middlewareName=traefik-auth@docker middlewareType=BasicAuth | |
time="2020-05-18T11:58:11-05:00" level=debug msg="Adding tracing to middleware" entryPointName=https routerName=traefik-secure@docker middlewareName=traefik-auth@docker | |
time="2020-05-18T11:58:11-05:00" level=debug msg="Creating middleware" serviceName=portainer middlewareName=pipelining middlewareType=Pipelining entryPointName=https routerName=portainer-secure@docker | |
time="2020-05-18T11:58:11-05:00" level=debug msg="Creating load-balancer" entryPointName=https routerName=portainer-secure@docker serviceName=portainer | |
time="2020-05-18T11:58:11-05:00" level=debug msg="Creating server 0 http://192.168.224.3:9000" serverName=0 entryPointName=https routerName=portainer-secure@docker serviceName=portainer | |
time="2020-05-18T11:58:11-05:00" level=debug msg="Added outgoing tracing middleware portainer" routerName=portainer-secure@docker middlewareName=tracing middlewareType=TracingForwarder entryPointName=https | |
time="2020-05-18T11:58:11-05:00" level=debug msg="Creating middleware" entryPointName=https routerName=portainer-secure@docker middlewareName=portainer-stripprefix@docker middlewareType=StripPrefix | |
time="2020-05-18T11:58:11-05:00" level=debug msg="Adding tracing to middleware" middlewareName=portainer-stripprefix@docker entryPointName=https routerName=portainer-secure@docker | |
time="2020-05-18T11:58:11-05:00" level=debug msg="Creating middleware" middlewareType=Recovery entryPointName=https middlewareName=traefik-internal-recovery | |
time="2020-05-18T11:58:11-05:00" level=debug msg="No default certificate, generating one" | |
time="2020-05-18T11:58:11-05:00" level=debug msg="Try to challenge certificate for domain [static.grinnell.edu] found in HostSNI rule" providerName=http.acme routerName=portainer-secure@docker rule="Host(`static.grinnell.edu`) && PathPrefix(`/portainer`)" | |
time="2020-05-18T11:58:11-05:00" level=debug msg="Try to challenge certificate for domain [static.grinnell.edu] found in HostSNI rule" routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" providerName=http.acme | |
time="2020-05-18T11:58:11-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"static.grinnell.edu\"]..." providerName=http.acme routerName=portainer-secure@docker rule="Host(`static.grinnell.edu`) && PathPrefix(`/portainer`)" | |
time="2020-05-18T11:58:11-05:00" level=debug msg="No ACME certificate generation required for domains [\"static.grinnell.edu\"]." providerName=http.acme routerName=portainer-secure@docker rule="Host(`static.grinnell.edu`) && PathPrefix(`/portainer`)" | |
time="2020-05-18T11:58:11-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"static.grinnell.edu\"]..." providerName=http.acme routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" | |
time="2020-05-18T11:58:11-05:00" level=debug msg="No ACME certificate generation required for domains [\"static.grinnell.edu\"]." providerName=http.acme routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" | |
time="2020-05-18T11:58:12-05:00" level=debug msg="Serving default certificate for request: \"static.grinnell.edu\"" | |
time="2020-05-18T11:58:12-05:00" level=debug msg="http: TLS handshake error from 132.161.249.72:57934: remote error: tls: bad certificate" | |
time="2020-05-18T11:58:16-05:00" level=debug msg="Provider event received {Status:start ID:5bddcd04aed2a62fcc28dc95be6dc3414582a0c1765ba9c72a66539a9a8a0bc4 From:mcfatem/static-landing:latest Type:container Action:start Actor:{ID:5bddcd04aed2a62fcc28dc95be6dc3414582a0c1765ba9c72a66539a9a8a0bc4 Attributes:map[authors:Mark A. McFate <[email protected]> com.centurylinklabs.watchtower.enable:true com.docker.compose.config-hash:bd8e2bbee97b7e66481bc75c229ca3b4ab5aac8c02ab43797ea353ebe298fbad com.docker.compose.container-number:1 com.docker.compose.oneoff:False com.docker.compose.project:landing com.docker.compose.service:landing com.docker.compose.slug:7f0a5186ca6e74b412afeba19f2f7fe246508212d6fdff21938e50d838617af com.docker.compose.version:1.23.1 image:mcfatem/static-landing:latest maintainer:NGINX Docker Maintainers <[email protected]> name:landing-page traefik.docker.network:proxy traefik.enable:true traefik.http.routers.landing-secure.entrypoints:https traefik.http.routers.landing-secure.rule:Host(`static.grinnell.edu`) traefik.http.routers.landing-secure.service:landing-landing traefik.http.routers.landing-secure.tls:true traefik.http.routers.landing-secure.tls.certresolver:http]} Scope:local Time:1589821096 TimeNano:1589821096548181624}" providerName=docker | |
time="2020-05-18T11:58:16-05:00" level=debug msg="Filtering disabled container" providerName=docker container=watchtower-watchtower-b539c55f3631972393cd2b401289a28656b7cfa053b835e5ae292c602c6d5b7e | |
time="2020-05-18T11:58:16-05:00" level=debug msg="Configuration received from provider docker: {\"http\":{\"routers\":{\"http-catchall\":{\"entryPoints\":[\"http\"],\"middlewares\":[\"redirect-to-https\"],\"service\":\"traefik-traefik\",\"rule\":\"hostregexp(`{host:[a-z-.]+}`)\"},\"landing-secure\":{\"entryPoints\":[\"https\"],\"service\":\"landing-landing\",\"rule\":\"Host(`static.grinnell.edu`)\",\"tls\":{\"certResolver\":\"http\"}},\"portainer-secure\":{\"entryPoints\":[\"https\"],\"middlewares\":[\"portainer-stripprefix\"],\"service\":\"portainer\",\"rule\":\"Host(`static.grinnell.edu`) \\u0026\\u0026 PathPrefix(`/portainer`)\",\"tls\":{\"certResolver\":\"http\"}},\"traefik-secure\":{\"entryPoints\":[\"https\"],\"middlewares\":[\"traefik-auth\"],\"service\":\"api@internal\",\"rule\":\"Host(`static.grinnell.edu`) \\u0026\\u0026 (PathPrefix(`/api`) || PathPrefix(`/dashboard`))\",\"tls\":{\"certResolver\":\"http\"}}},\"services\":{\"landing-landing\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.224.4:80\"}],\"passHostHeader\":true}},\"portainer\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.224.3:9000\"}],\"passHostHeader\":true}},\"traefik-traefik\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.224.2:80\"}],\"passHostHeader\":true}}},\"middlewares\":{\"portainer-auth\":{\"basicAuth\":{\"users\":[\"admin:$2y$05$pJEzHJBzfoYYS7/hGAedcOP8XdsqNXE7j.LHFBVjueASOqOvvjGOy\"]}},\"portainer-stripprefix\":{\"stripPrefix\":{\"prefixes\":[\"/portainer\"],\"forceSlash\":true}},\"redirect-to-https\":{\"redirectScheme\":{\"scheme\":\"https\"}},\"traefik-auth\":{\"basicAuth\":{\"users\":[\"admin:$2y$05$pJEzHJBzfoYYS7/hGAedcOP8XdsqNXE7j.LHFBVjueASOqOvvjGOy\"]}}}},\"tcp\":{},\"udp\":{}}" providerName=docker | |
time="2020-05-18T11:58:16-05:00" level=debug msg="Creating middleware" middlewareType=Pipelining entryPointName=http routerName=http-catchall@docker serviceName=traefik-traefik middlewareName=pipelining | |
time="2020-05-18T11:58:16-05:00" level=debug msg="Creating load-balancer" entryPointName=http routerName=http-catchall@docker serviceName=traefik-traefik | |
time="2020-05-18T11:58:16-05:00" level=debug msg="Creating server 0 http://192.168.224.2:80" serviceName=traefik-traefik entryPointName=http serverName=0 routerName=http-catchall@docker | |
time="2020-05-18T11:58:16-05:00" level=debug msg="Added outgoing tracing middleware traefik-traefik" middlewareName=tracing middlewareType=TracingForwarder entryPointName=http routerName=http-catchall@docker | |
time="2020-05-18T11:58:16-05:00" level=debug msg="Creating middleware" entryPointName=http routerName=http-catchall@docker middlewareType=RedirectScheme middlewareName=redirect-to-https@docker | |
time="2020-05-18T11:58:16-05:00" level=debug msg="Setting up redirection to https " routerName=http-catchall@docker middlewareType=RedirectScheme middlewareName=redirect-to-https@docker entryPointName=http | |
time="2020-05-18T11:58:16-05:00" level=debug msg="Adding tracing to middleware" entryPointName=http routerName=http-catchall@docker middlewareName=redirect-to-https@docker | |
time="2020-05-18T11:58:16-05:00" level=debug msg="Creating middleware" middlewareType=Recovery middlewareName=traefik-internal-recovery entryPointName=http | |
time="2020-05-18T11:58:16-05:00" level=debug msg="Added outgoing tracing middleware api@internal" routerName=traefik-secure@docker entryPointName=https middlewareName=tracing middlewareType=TracingForwarder | |
time="2020-05-18T11:58:16-05:00" level=debug msg="Creating middleware" middlewareType=BasicAuth entryPointName=https routerName=traefik-secure@docker middlewareName=traefik-auth@docker | |
time="2020-05-18T11:58:16-05:00" level=debug msg="Adding tracing to middleware" entryPointName=https routerName=traefik-secure@docker middlewareName=traefik-auth@docker | |
time="2020-05-18T11:58:16-05:00" level=debug msg="Creating middleware" middlewareType=Pipelining entryPointName=https routerName=landing-secure@docker serviceName=landing-landing middlewareName=pipelining | |
time="2020-05-18T11:58:16-05:00" level=debug msg="Creating load-balancer" serviceName=landing-landing entryPointName=https routerName=landing-secure@docker | |
time="2020-05-18T11:58:16-05:00" level=debug msg="Creating server 0 http://192.168.224.4:80" entryPointName=https serverName=0 routerName=landing-secure@docker serviceName=landing-landing | |
time="2020-05-18T11:58:16-05:00" level=debug msg="Added outgoing tracing middleware landing-landing" middlewareType=TracingForwarder entryPointName=https routerName=landing-secure@docker middlewareName=tracing | |
time="2020-05-18T11:58:16-05:00" level=debug msg="Creating middleware" routerName=portainer-secure@docker serviceName=portainer middlewareName=pipelining middlewareType=Pipelining entryPointName=https | |
time="2020-05-18T11:58:16-05:00" level=debug msg="Creating load-balancer" entryPointName=https routerName=portainer-secure@docker serviceName=portainer | |
time="2020-05-18T11:58:16-05:00" level=debug msg="Creating server 0 http://192.168.224.3:9000" routerName=portainer-secure@docker serviceName=portainer serverName=0 entryPointName=https | |
time="2020-05-18T11:58:16-05:00" level=debug msg="Added outgoing tracing middleware portainer" middlewareName=tracing middlewareType=TracingForwarder entryPointName=https routerName=portainer-secure@docker | |
time="2020-05-18T11:58:16-05:00" level=debug msg="Creating middleware" routerName=portainer-secure@docker middlewareName=portainer-stripprefix@docker middlewareType=StripPrefix entryPointName=https | |
time="2020-05-18T11:58:16-05:00" level=debug msg="Adding tracing to middleware" entryPointName=https routerName=portainer-secure@docker middlewareName=portainer-stripprefix@docker | |
time="2020-05-18T11:58:16-05:00" level=debug msg="Creating middleware" entryPointName=https middlewareName=traefik-internal-recovery middlewareType=Recovery | |
time="2020-05-18T11:58:16-05:00" level=debug msg="No default certificate, generating one" | |
time="2020-05-18T11:58:17-05:00" level=debug msg="Try to challenge certificate for domain [static.grinnell.edu] found in HostSNI rule" routerName=landing-secure@docker rule="Host(`static.grinnell.edu`)" providerName=http.acme | |
time="2020-05-18T11:58:17-05:00" level=debug msg="Try to challenge certificate for domain [static.grinnell.edu] found in HostSNI rule" rule="Host(`static.grinnell.edu`) && PathPrefix(`/portainer`)" providerName=http.acme routerName=portainer-secure@docker | |
time="2020-05-18T11:58:17-05:00" level=debug msg="Try to challenge certificate for domain [static.grinnell.edu] found in HostSNI rule" routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" providerName=http.acme | |
time="2020-05-18T11:58:17-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"static.grinnell.edu\"]..." providerName=http.acme routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" | |
time="2020-05-18T11:58:17-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"static.grinnell.edu\"]..." providerName=http.acme routerName=portainer-secure@docker rule="Host(`static.grinnell.edu`) && PathPrefix(`/portainer`)" | |
time="2020-05-18T11:58:17-05:00" level=debug msg="No ACME certificate generation required for domains [\"static.grinnell.edu\"]." rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" providerName=http.acme routerName=traefik-secure@docker | |
time="2020-05-18T11:58:17-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"static.grinnell.edu\"]..." providerName=http.acme routerName=landing-secure@docker rule="Host(`static.grinnell.edu`)" | |
time="2020-05-18T11:58:17-05:00" level=debug msg="No ACME certificate generation required for domains [\"static.grinnell.edu\"]." routerName=portainer-secure@docker rule="Host(`static.grinnell.edu`) && PathPrefix(`/portainer`)" providerName=http.acme | |
time="2020-05-18T11:58:17-05:00" level=debug msg="No ACME certificate generation required for domains [\"static.grinnell.edu\"]." routerName=landing-secure@docker rule="Host(`static.grinnell.edu`)" providerName=http.acme | |
time="2020-05-18T11:58:25-05:00" level=debug msg="Serving default certificate for request: \"static.grinnell.edu\"" | |
time="2020-05-18T11:58:25-05:00" level=debug msg="http: TLS handshake error from 132.161.249.72:57939: remote error: tls: bad certificate" | |
time="2020-05-18T11:58:26-05:00" level=debug msg="Serving default certificate for request: \"static.grinnell.edu\"" | |
time="2020-05-18T11:58:26-05:00" level=debug msg="Serving default certificate for request: \"static.grinnell.edu\"" | |
time="2020-05-18T11:58:26-05:00" level=debug msg="http: TLS handshake error from 132.161.249.72:57943: remote error: tls: bad certificate" | |
time="2020-05-18T11:58:26-05:00" level=debug msg="http: TLS handshake error from 132.161.249.72:57941: remote error: tls: bad certificate" | |
time="2020-05-18T11:58:26-05:00" level=debug msg="Provider event received {Status:start ID:55befa369443fb9219416739349a7089fe6b3f0ceb05c9f06bde1d97d46f42a5 From:mcfatem/rootstalk:latest Type:container Action:start Actor:{ID:55befa369443fb9219416739349a7089fe6b3f0ceb05c9f06bde1d97d46f42a5 Attributes:map[authors:Mark A. McFate <[email protected]>, Jeremy Sparagon '20 com.centurylinklabs.watchtower.enable:true com.docker.compose.config-hash:5cefc7f4b3742a172da66877fad1d2c40d1492fb3e9cf9b7980f6afe617e45b1 com.docker.compose.container-number:1 com.docker.compose.oneoff:False com.docker.compose.project:rootstalk com.docker.compose.service:rootstalk com.docker.compose.slug:b8360b20bae186c2baac5523845090a57030337db9a3c37d463fe974c2f7a2b com.docker.compose.version:1.23.1 image:mcfatem/rootstalk:latest maintainer:NGINX Docker Maintainers <[email protected]> name:rootstalk-static traefik.docker.network:proxy traefik.enable:true traefik.http.routers.rootstalk-static-secure.entrypoints:https traefik.http.routers.rootstalk-static-secure.rule:Host(`rootstalk-static.grinnell.edu`) traefik.http.routers.rootstalk-static-secure.service:rootstalk-rootstalk traefik.http.routers.rootstalk-static-secure.tls:true traefik.http.routers.rootstalk-static-secure.tls.certresolver:http]} Scope:local Time:1589821106 TimeNano:1589821106905743961}" providerName=docker | |
time="2020-05-18T11:58:26-05:00" level=debug msg="Filtering disabled container" providerName=docker container=watchtower-watchtower-b539c55f3631972393cd2b401289a28656b7cfa053b835e5ae292c602c6d5b7e | |
time="2020-05-18T11:58:26-05:00" level=debug msg="Configuration received from provider docker: {\"http\":{\"routers\":{\"http-catchall\":{\"entryPoints\":[\"http\"],\"middlewares\":[\"redirect-to-https\"],\"service\":\"traefik-traefik\",\"rule\":\"hostregexp(`{host:[a-z-.]+}`)\"},\"landing-secure\":{\"entryPoints\":[\"https\"],\"service\":\"landing-landing\",\"rule\":\"Host(`static.grinnell.edu`)\",\"tls\":{\"certResolver\":\"http\"}},\"portainer-secure\":{\"entryPoints\":[\"https\"],\"middlewares\":[\"portainer-stripprefix\"],\"service\":\"portainer\",\"rule\":\"Host(`static.grinnell.edu`) \\u0026\\u0026 PathPrefix(`/portainer`)\",\"tls\":{\"certResolver\":\"http\"}},\"rootstalk-static-secure\":{\"entryPoints\":[\"https\"],\"service\":\"rootstalk-rootstalk\",\"rule\":\"Host(`rootstalk-static.grinnell.edu`)\",\"tls\":{\"certResolver\":\"http\"}},\"traefik-secure\":{\"entryPoints\":[\"https\"],\"middlewares\":[\"traefik-auth\"],\"service\":\"api@internal\",\"rule\":\"Host(`static.grinnell.edu`) \\u0026\\u0026 (PathPrefix(`/api`) || PathPrefix(`/dashboard`))\",\"tls\":{\"certResolver\":\"http\"}}},\"services\":{\"landing-landing\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.224.4:80\"}],\"passHostHeader\":true}},\"portainer\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.224.3:9000\"}],\"passHostHeader\":true}},\"rootstalk-rootstalk\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.224.5:80\"}],\"passHostHeader\":true}},\"traefik-traefik\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.224.2:80\"}],\"passHostHeader\":true}}},\"middlewares\":{\"portainer-auth\":{\"basicAuth\":{\"users\":[\"admin:$2y$05$pJEzHJBzfoYYS7/hGAedcOP8XdsqNXE7j.LHFBVjueASOqOvvjGOy\"]}},\"portainer-stripprefix\":{\"stripPrefix\":{\"prefixes\":[\"/portainer\"],\"forceSlash\":true}},\"redirect-to-https\":{\"redirectScheme\":{\"scheme\":\"https\"}},\"traefik-auth\":{\"basicAuth\":{\"users\":[\"admin:$2y$05$pJEzHJBzfoYYS7/hGAedcOP8XdsqNXE7j.LHFBVjueASOqOvvjGOy\"]}}}},\"tcp\":{},\"udp\":{}}" providerName=docker | |
time="2020-05-18T11:58:26-05:00" level=debug msg="Creating middleware" entryPointName=http routerName=http-catchall@docker serviceName=traefik-traefik middlewareName=pipelining middlewareType=Pipelining | |
time="2020-05-18T11:58:26-05:00" level=debug msg="Creating load-balancer" entryPointName=http routerName=http-catchall@docker serviceName=traefik-traefik | |
time="2020-05-18T11:58:26-05:00" level=debug msg="Creating server 0 http://192.168.224.2:80" serviceName=traefik-traefik serverName=0 entryPointName=http routerName=http-catchall@docker | |
time="2020-05-18T11:58:26-05:00" level=debug msg="Added outgoing tracing middleware traefik-traefik" routerName=http-catchall@docker middlewareName=tracing middlewareType=TracingForwarder entryPointName=http | |
time="2020-05-18T11:58:26-05:00" level=debug msg="Creating middleware" middlewareName=redirect-to-https@docker middlewareType=RedirectScheme entryPointName=http routerName=http-catchall@docker | |
time="2020-05-18T11:58:26-05:00" level=debug msg="Setting up redirection to https " entryPointName=http routerName=http-catchall@docker middlewareName=redirect-to-https@docker middlewareType=RedirectScheme | |
time="2020-05-18T11:58:26-05:00" level=debug msg="Adding tracing to middleware" entryPointName=http routerName=http-catchall@docker middlewareName=redirect-to-https@docker | |
time="2020-05-18T11:58:26-05:00" level=debug msg="Creating middleware" entryPointName=http middlewareName=traefik-internal-recovery middlewareType=Recovery | |
time="2020-05-18T11:58:26-05:00" level=debug msg="Added outgoing tracing middleware api@internal" entryPointName=https routerName=traefik-secure@docker middlewareName=tracing middlewareType=TracingForwarder | |
time="2020-05-18T11:58:26-05:00" level=debug msg="Creating middleware" entryPointName=https routerName=traefik-secure@docker middlewareType=BasicAuth middlewareName=traefik-auth@docker | |
time="2020-05-18T11:58:26-05:00" level=debug msg="Adding tracing to middleware" entryPointName=https routerName=traefik-secure@docker middlewareName=traefik-auth@docker | |
time="2020-05-18T11:58:26-05:00" level=debug msg="Creating middleware" middlewareName=pipelining middlewareType=Pipelining entryPointName=https routerName=landing-secure@docker serviceName=landing-landing | |
time="2020-05-18T11:58:26-05:00" level=debug msg="Creating load-balancer" entryPointName=https routerName=landing-secure@docker serviceName=landing-landing | |
time="2020-05-18T11:58:26-05:00" level=debug msg="Creating server 0 http://192.168.224.4:80" entryPointName=https routerName=landing-secure@docker serviceName=landing-landing serverName=0 | |
time="2020-05-18T11:58:26-05:00" level=debug msg="Added outgoing tracing middleware landing-landing" middlewareType=TracingForwarder middlewareName=tracing entryPointName=https routerName=landing-secure@docker | |
time="2020-05-18T11:58:26-05:00" level=debug msg="Creating middleware" serviceName=portainer middlewareName=pipelining middlewareType=Pipelining entryPointName=https routerName=portainer-secure@docker | |
time="2020-05-18T11:58:26-05:00" level=debug msg="Creating load-balancer" serviceName=portainer entryPointName=https routerName=portainer-secure@docker | |
time="2020-05-18T11:58:26-05:00" level=debug msg="Creating server 0 http://192.168.224.3:9000" routerName=portainer-secure@docker serverName=0 serviceName=portainer entryPointName=https | |
time="2020-05-18T11:58:26-05:00" level=debug msg="Added outgoing tracing middleware portainer" entryPointName=https routerName=portainer-secure@docker middlewareName=tracing middlewareType=TracingForwarder | |
time="2020-05-18T11:58:26-05:00" level=debug msg="Creating middleware" entryPointName=https routerName=portainer-secure@docker middlewareName=portainer-stripprefix@docker middlewareType=StripPrefix | |
time="2020-05-18T11:58:26-05:00" level=debug msg="Adding tracing to middleware" entryPointName=https routerName=portainer-secure@docker middlewareName=portainer-stripprefix@docker | |
time="2020-05-18T11:58:26-05:00" level=debug msg="Creating middleware" middlewareType=Pipelining entryPointName=https routerName=rootstalk-static-secure@docker serviceName=rootstalk-rootstalk middlewareName=pipelining | |
time="2020-05-18T11:58:26-05:00" level=debug msg="Creating load-balancer" entryPointName=https routerName=rootstalk-static-secure@docker serviceName=rootstalk-rootstalk | |
time="2020-05-18T11:58:26-05:00" level=debug msg="Creating server 0 http://192.168.224.5:80" entryPointName=https routerName=rootstalk-static-secure@docker serviceName=rootstalk-rootstalk serverName=0 | |
time="2020-05-18T11:58:26-05:00" level=debug msg="Added outgoing tracing middleware rootstalk-rootstalk" entryPointName=https middlewareName=tracing middlewareType=TracingForwarder routerName=rootstalk-static-secure@docker | |
time="2020-05-18T11:58:26-05:00" level=debug msg="Creating middleware" entryPointName=https middlewareName=traefik-internal-recovery middlewareType=Recovery | |
time="2020-05-18T11:58:26-05:00" level=debug msg="No default certificate, generating one" | |
time="2020-05-18T11:58:27-05:00" level=debug msg="Try to challenge certificate for domain [static.grinnell.edu] found in HostSNI rule" routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" providerName=http.acme | |
time="2020-05-18T11:58:27-05:00" level=debug msg="Try to challenge certificate for domain [static.grinnell.edu] found in HostSNI rule" rule="Host(`static.grinnell.edu`)" routerName=landing-secure@docker providerName=http.acme | |
time="2020-05-18T11:58:27-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"static.grinnell.edu\"]..." rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" providerName=http.acme routerName=traefik-secure@docker | |
time="2020-05-18T11:58:27-05:00" level=debug msg="No ACME certificate generation required for domains [\"static.grinnell.edu\"]." providerName=http.acme routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" | |
time="2020-05-18T11:58:27-05:00" level=debug msg="Try to challenge certificate for domain [static.grinnell.edu] found in HostSNI rule" rule="Host(`static.grinnell.edu`) && PathPrefix(`/portainer`)" providerName=http.acme routerName=portainer-secure@docker | |
time="2020-05-18T11:58:27-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"static.grinnell.edu\"]..." providerName=http.acme rule="Host(`static.grinnell.edu`)" routerName=landing-secure@docker | |
time="2020-05-18T11:58:27-05:00" level=debug msg="No ACME certificate generation required for domains [\"static.grinnell.edu\"]." providerName=http.acme rule="Host(`static.grinnell.edu`)" routerName=landing-secure@docker | |
time="2020-05-18T11:58:27-05:00" level=debug msg="Try to challenge certificate for domain [rootstalk-static.grinnell.edu] found in HostSNI rule" providerName=http.acme routerName=rootstalk-static-secure@docker rule="Host(`rootstalk-static.grinnell.edu`)" | |
time="2020-05-18T11:58:27-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"rootstalk-static.grinnell.edu\"]..." providerName=http.acme routerName=rootstalk-static-secure@docker rule="Host(`rootstalk-static.grinnell.edu`)" | |
time="2020-05-18T11:58:27-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"static.grinnell.edu\"]..." providerName=http.acme routerName=portainer-secure@docker rule="Host(`static.grinnell.edu`) && PathPrefix(`/portainer`)" | |
time="2020-05-18T11:58:27-05:00" level=debug msg="No ACME certificate generation required for domains [\"static.grinnell.edu\"]." providerName=http.acme routerName=portainer-secure@docker rule="Host(`static.grinnell.edu`) && PathPrefix(`/portainer`)" | |
time="2020-05-18T11:58:27-05:00" level=debug msg="Domains [\"rootstalk-static.grinnell.edu\"] need ACME certificates generation for domains \"rootstalk-static.grinnell.edu\"." routerName=rootstalk-static-secure@docker rule="Host(`rootstalk-static.grinnell.edu`)" providerName=http.acme | |
time="2020-05-18T11:58:27-05:00" level=debug msg="Loading ACME certificates [rootstalk-static.grinnell.edu]..." rule="Host(`rootstalk-static.grinnell.edu`)" providerName=http.acme routerName=rootstalk-static-secure@docker | |
time="2020-05-18T11:58:27-05:00" level=debug msg="Serving default certificate for request: \"static.grinnell.edu\"" | |
time="2020-05-18T11:58:27-05:00" level=debug msg="Serving default certificate for request: \"static.grinnell.edu\"" | |
time="2020-05-18T11:58:27-05:00" level=debug msg="http: TLS handshake error from 132.161.249.72:57948: remote error: tls: bad certificate" | |
time="2020-05-18T11:58:27-05:00" level=debug msg="http: TLS handshake error from 132.161.249.72:57949: remote error: tls: bad certificate" | |
time="2020-05-18T11:58:32-05:00" level=debug msg="Serving default certificate for request: \"static.grinnell.edu\"" | |
time="2020-05-18T11:58:32-05:00" level=debug msg="http: TLS handshake error from 132.161.249.72:57955: remote error: tls: bad certificate" | |
time="2020-05-18T11:58:32-05:00" level=debug msg="Provider event received {Status:start ID:84ca37989aecf803278a68816f81d370a6aa769e58b1315137de675334baf02c From:mcfatem/vaf:latest Type:container Action:start Actor:{ID:84ca37989aecf803278a68816f81d370a6aa769e58b1315137de675334baf02c Attributes:map[com.centurylinklabs.watchtower.enable:true com.docker.compose.config-hash:b999951403fea9466289148824ba40444c2ac3529d0e547d8142b5a64ad4b4f3 com.docker.compose.container-number:1 com.docker.compose.oneoff:False com.docker.compose.project:vaf com.docker.compose.service:vaf com.docker.compose.slug:7d5e9e53e530fe41ff6e6e13b9741df0372f681c09ede97ef331c1d1bd5752d com.docker.compose.version:1.23.1 image:mcfatem/vaf:latest maintainer:NGINX Docker Maintainers <[email protected]> name:vaf traefik.docker.network:proxy traefik.enable:true traefik.http.routers.vaf-secure.entrypoints:https traefik.http.routers.vaf-secure.rule:Host(`vaf.grinnell.edu`) traefik.http.routers.vaf-secure.service:vaf-vaf traefik.http.routers.vaf-secure.tls:true traefik.http.routers.vaf-secure.tls.certresolver:http]} Scope:local Time:1589821112 TimeNano:1589821112575821125}" providerName=docker | |
time="2020-05-18T11:58:32-05:00" level=debug msg="Filtering disabled container" container=watchtower-watchtower-b539c55f3631972393cd2b401289a28656b7cfa053b835e5ae292c602c6d5b7e providerName=docker | |
time="2020-05-18T11:58:32-05:00" level=debug msg="Configuration received from provider docker: {\"http\":{\"routers\":{\"http-catchall\":{\"entryPoints\":[\"http\"],\"middlewares\":[\"redirect-to-https\"],\"service\":\"traefik-traefik\",\"rule\":\"hostregexp(`{host:[a-z-.]+}`)\"},\"landing-secure\":{\"entryPoints\":[\"https\"],\"service\":\"landing-landing\",\"rule\":\"Host(`static.grinnell.edu`)\",\"tls\":{\"certResolver\":\"http\"}},\"portainer-secure\":{\"entryPoints\":[\"https\"],\"middlewares\":[\"portainer-stripprefix\"],\"service\":\"portainer\",\"rule\":\"Host(`static.grinnell.edu`) \\u0026\\u0026 PathPrefix(`/portainer`)\",\"tls\":{\"certResolver\":\"http\"}},\"rootstalk-static-secure\":{\"entryPoints\":[\"https\"],\"service\":\"rootstalk-rootstalk\",\"rule\":\"Host(`rootstalk-static.grinnell.edu`)\",\"tls\":{\"certResolver\":\"http\"}},\"traefik-secure\":{\"entryPoints\":[\"https\"],\"middlewares\":[\"traefik-auth\"],\"service\":\"api@internal\",\"rule\":\"Host(`static.grinnell.edu`) \\u0026\\u0026 (PathPrefix(`/api`) || PathPrefix(`/dashboard`))\",\"tls\":{\"certResolver\":\"http\"}},\"vaf-secure\":{\"entryPoints\":[\"https\"],\"service\":\"vaf-vaf\",\"rule\":\"Host(`vaf.grinnell.edu`)\",\"tls\":{\"certResolver\":\"http\"}}},\"services\":{\"landing-landing\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.224.4:80\"}],\"passHostHeader\":true}},\"portainer\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.224.3:9000\"}],\"passHostHeader\":true}},\"rootstalk-rootstalk\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.224.5:80\"}],\"passHostHeader\":true}},\"traefik-traefik\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.224.2:80\"}],\"passHostHeader\":true}},\"vaf-vaf\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.224.6:80\"}],\"passHostHeader\":true}}},\"middlewares\":{\"portainer-auth\":{\"basicAuth\":{\"users\":[\"admin:$2y$05$pJEzHJBzfoYYS7/hGAedcOP8XdsqNXE7j.LHFBVjueASOqOvvjGOy\"]}},\"portainer-stripprefix\":{\"stripPrefix\":{\"prefixes\":[\"/portainer\"],\"forceSlash\":true}},\"redirect-to-https\":{\"redirectScheme\":{\"scheme\":\"https\"}},\"traefik-auth\":{\"basicAuth\":{\"users\":[\"admin:$2y$05$pJEzHJBzfoYYS7/hGAedcOP8XdsqNXE7j.LHFBVjueASOqOvvjGOy\"]}}}},\"tcp\":{},\"udp\":{}}" providerName=docker | |
time="2020-05-18T11:58:32-05:00" level=debug msg="Creating middleware" middlewareName=pipelining middlewareType=Pipelining entryPointName=http routerName=http-catchall@docker serviceName=traefik-traefik | |
time="2020-05-18T11:58:32-05:00" level=debug msg="Creating load-balancer" routerName=http-catchall@docker serviceName=traefik-traefik entryPointName=http | |
time="2020-05-18T11:58:32-05:00" level=debug msg="Creating server 0 http://192.168.224.2:80" serviceName=traefik-traefik entryPointName=http routerName=http-catchall@docker serverName=0 | |
time="2020-05-18T11:58:32-05:00" level=debug msg="Added outgoing tracing middleware traefik-traefik" middlewareType=TracingForwarder entryPointName=http routerName=http-catchall@docker middlewareName=tracing | |
time="2020-05-18T11:58:32-05:00" level=debug msg="Creating middleware" routerName=http-catchall@docker middlewareName=redirect-to-https@docker middlewareType=RedirectScheme entryPointName=http | |
time="2020-05-18T11:58:32-05:00" level=debug msg="Setting up redirection to https " entryPointName=http routerName=http-catchall@docker middlewareName=redirect-to-https@docker middlewareType=RedirectScheme | |
time="2020-05-18T11:58:32-05:00" level=debug msg="Adding tracing to middleware" entryPointName=http routerName=http-catchall@docker middlewareName=redirect-to-https@docker | |
time="2020-05-18T11:58:32-05:00" level=debug msg="Creating middleware" middlewareType=Recovery entryPointName=http middlewareName=traefik-internal-recovery | |
time="2020-05-18T11:58:32-05:00" level=debug msg="Creating middleware" routerName=vaf-secure@docker serviceName=vaf-vaf middlewareName=pipelining middlewareType=Pipelining entryPointName=https | |
time="2020-05-18T11:58:32-05:00" level=debug msg="Creating load-balancer" entryPointName=https routerName=vaf-secure@docker serviceName=vaf-vaf | |
time="2020-05-18T11:58:32-05:00" level=debug msg="Creating server 0 http://192.168.224.6:80" routerName=vaf-secure@docker serviceName=vaf-vaf serverName=0 entryPointName=https | |
time="2020-05-18T11:58:32-05:00" level=debug msg="Added outgoing tracing middleware vaf-vaf" middlewareName=tracing middlewareType=TracingForwarder entryPointName=https routerName=vaf-secure@docker | |
time="2020-05-18T11:58:32-05:00" level=debug msg="Creating middleware" entryPointName=https routerName=landing-secure@docker middlewareType=Pipelining middlewareName=pipelining serviceName=landing-landing | |
time="2020-05-18T11:58:32-05:00" level=debug msg="Creating load-balancer" entryPointName=https routerName=landing-secure@docker serviceName=landing-landing | |
time="2020-05-18T11:58:32-05:00" level=debug msg="Creating server 0 http://192.168.224.4:80" serviceName=landing-landing serverName=0 entryPointName=https routerName=landing-secure@docker | |
time="2020-05-18T11:58:32-05:00" level=debug msg="Added outgoing tracing middleware landing-landing" routerName=landing-secure@docker middlewareName=tracing middlewareType=TracingForwarder entryPointName=https | |
time="2020-05-18T11:58:32-05:00" level=debug msg="Creating middleware" middlewareName=pipelining entryPointName=https routerName=portainer-secure@docker serviceName=portainer middlewareType=Pipelining | |
time="2020-05-18T11:58:32-05:00" level=debug msg="Creating load-balancer" serviceName=portainer entryPointName=https routerName=portainer-secure@docker | |
time="2020-05-18T11:58:32-05:00" level=debug msg="Creating server 0 http://192.168.224.3:9000" serverName=0 entryPointName=https routerName=portainer-secure@docker serviceName=portainer | |
time="2020-05-18T11:58:32-05:00" level=debug msg="Added outgoing tracing middleware portainer" entryPointName=https routerName=portainer-secure@docker middlewareName=tracing middlewareType=TracingForwarder | |
time="2020-05-18T11:58:32-05:00" level=debug msg="Creating middleware" middlewareName=portainer-stripprefix@docker middlewareType=StripPrefix entryPointName=https routerName=portainer-secure@docker | |
time="2020-05-18T11:58:32-05:00" level=debug msg="Adding tracing to middleware" entryPointName=https routerName=portainer-secure@docker middlewareName=portainer-stripprefix@docker | |
time="2020-05-18T11:58:32-05:00" level=debug msg="Creating middleware" serviceName=rootstalk-rootstalk middlewareName=pipelining middlewareType=Pipelining entryPointName=https routerName=rootstalk-static-secure@docker | |
time="2020-05-18T11:58:32-05:00" level=debug msg="Creating load-balancer" serviceName=rootstalk-rootstalk entryPointName=https routerName=rootstalk-static-secure@docker | |
time="2020-05-18T11:58:32-05:00" level=debug msg="Creating server 0 http://192.168.224.5:80" routerName=rootstalk-static-secure@docker serviceName=rootstalk-rootstalk serverName=0 entryPointName=https | |
time="2020-05-18T11:58:32-05:00" level=debug msg="Added outgoing tracing middleware rootstalk-rootstalk" entryPointName=https routerName=rootstalk-static-secure@docker middlewareName=tracing middlewareType=TracingForwarder | |
time="2020-05-18T11:58:32-05:00" level=debug msg="Added outgoing tracing middleware api@internal" entryPointName=https routerName=traefik-secure@docker middlewareName=tracing middlewareType=TracingForwarder | |
time="2020-05-18T11:58:32-05:00" level=debug msg="Creating middleware" middlewareName=traefik-auth@docker middlewareType=BasicAuth entryPointName=https routerName=traefik-secure@docker | |
time="2020-05-18T11:58:32-05:00" level=debug msg="Adding tracing to middleware" entryPointName=https routerName=traefik-secure@docker middlewareName=traefik-auth@docker | |
time="2020-05-18T11:58:32-05:00" level=debug msg="Creating middleware" middlewareType=Recovery entryPointName=https middlewareName=traefik-internal-recovery | |
time="2020-05-18T11:58:32-05:00" level=debug msg="No default certificate, generating one" | |
time="2020-05-18T11:58:33-05:00" level=debug msg="Try to challenge certificate for domain [static.grinnell.edu] found in HostSNI rule" rule="Host(`static.grinnell.edu`)" providerName=http.acme routerName=landing-secure@docker | |
time="2020-05-18T11:58:33-05:00" level=debug msg="Try to challenge certificate for domain [static.grinnell.edu] found in HostSNI rule" providerName=http.acme routerName=portainer-secure@docker rule="Host(`static.grinnell.edu`) && PathPrefix(`/portainer`)" | |
time="2020-05-18T11:58:33-05:00" level=debug msg="Try to challenge certificate for domain [rootstalk-static.grinnell.edu] found in HostSNI rule" rule="Host(`rootstalk-static.grinnell.edu`)" providerName=http.acme routerName=rootstalk-static-secure@docker | |
time="2020-05-18T11:58:33-05:00" level=debug msg="Try to challenge certificate for domain [static.grinnell.edu] found in HostSNI rule" providerName=http.acme routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" | |
time="2020-05-18T11:58:33-05:00" level=debug msg="Try to challenge certificate for domain [vaf.grinnell.edu] found in HostSNI rule" rule="Host(`vaf.grinnell.edu`)" routerName=vaf-secure@docker providerName=http.acme | |
time="2020-05-18T11:58:33-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"vaf.grinnell.edu\"]..." providerName=http.acme rule="Host(`vaf.grinnell.edu`)" routerName=vaf-secure@docker | |
time="2020-05-18T11:58:33-05:00" level=debug msg="Domains [\"vaf.grinnell.edu\"] need ACME certificates generation for domains \"vaf.grinnell.edu\"." providerName=http.acme rule="Host(`vaf.grinnell.edu`)" routerName=vaf-secure@docker | |
time="2020-05-18T11:58:33-05:00" level=debug msg="Loading ACME certificates [vaf.grinnell.edu]..." routerName=vaf-secure@docker providerName=http.acme rule="Host(`vaf.grinnell.edu`)" | |
time="2020-05-18T11:58:33-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"static.grinnell.edu\"]..." routerName=landing-secure@docker rule="Host(`static.grinnell.edu`)" providerName=http.acme | |
time="2020-05-18T11:58:33-05:00" level=debug msg="No ACME certificate generation required for domains [\"static.grinnell.edu\"]." providerName=http.acme routerName=landing-secure@docker rule="Host(`static.grinnell.edu`)" | |
time="2020-05-18T11:58:33-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"static.grinnell.edu\"]..." routerName=portainer-secure@docker rule="Host(`static.grinnell.edu`) && PathPrefix(`/portainer`)" providerName=http.acme | |
time="2020-05-18T11:58:33-05:00" level=debug msg="No ACME certificate generation required for domains [\"static.grinnell.edu\"]." routerName=portainer-secure@docker rule="Host(`static.grinnell.edu`) && PathPrefix(`/portainer`)" providerName=http.acme | |
time="2020-05-18T11:58:33-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"rootstalk-static.grinnell.edu\"]..." rule="Host(`rootstalk-static.grinnell.edu`)" providerName=http.acme routerName=rootstalk-static-secure@docker | |
time="2020-05-18T11:58:33-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"static.grinnell.edu\"]..." rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" providerName=http.acme routerName=traefik-secure@docker | |
time="2020-05-18T11:58:33-05:00" level=debug msg="No ACME certificate generation required for domains [\"rootstalk-static.grinnell.edu\"]." rule="Host(`rootstalk-static.grinnell.edu`)" providerName=http.acme routerName=rootstalk-static-secure@docker | |
time="2020-05-18T11:58:33-05:00" level=debug msg="No ACME certificate generation required for domains [\"static.grinnell.edu\"]." routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" providerName=http.acme | |
time="2020-05-18T11:58:36-05:00" level=error msg="Unable to obtain ACME certificate for domains \"static.grinnell.edu\": cannot get ACME client azure: Get \"http://169.254.169.254/metadata/instance/compute/subscriptionId?api-version=2017-12-01&format=text\": dial tcp 169.254.169.254:80: i/o timeout" providerName=http.acme routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" | |
time="2020-05-18T11:58:36-05:00" level=debug msg="Building ACME client..." providerName=http.acme | |
time="2020-05-18T11:58:36-05:00" level=debug msg="https://acme-staging-v02.api.letsencrypt.org/directory" providerName=http.acme | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Using DNS Challenge provider: azure" providerName=http.acme | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Serving default certificate for request: \"static.grinnell.edu\"" | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Provider event received {Status:start ID:ba0db1a2c2d742ee18aebc6256525581bf4cca3b68032c71aaee0754860a5ccc From:mcfatem/vaf-kiosk:latest Type:container Action:start Actor:{ID:ba0db1a2c2d742ee18aebc6256525581bf4cca3b68032c71aaee0754860a5ccc Attributes:map[com.centurylinklabs.watchtower.enable:true com.docker.compose.config-hash:f8b92f21b12ae8261664dca61308602f0cf8e2fe711665f4993eb2186c883c0c com.docker.compose.container-number:1 com.docker.compose.oneoff:False com.docker.compose.project:vaf com.docker.compose.service:kiosk com.docker.compose.slug:a64ba74df7a13f2269365b61f73010c2105fc1b5d54b6d204c1f249cc342f0e com.docker.compose.version:1.23.1 image:mcfatem/vaf-kiosk:latest maintainer:NGINX Docker Maintainers <[email protected]> name:vaf-kiosk traefik.docker.network:proxy traefik.enable:true traefik.http.routers.vaf-kiosk-secure.entrypoints:https traefik.http.routers.vaf-kiosk-secure.rule:Host(`vaf-kiosk.grinnell.edu`) traefik.http.routers.vaf-kiosk-secure.service:kiosk-vaf traefik.http.routers.vaf-kiosk-secure.tls:true traefik.http.routers.vaf-kiosk-secure.tls.certresolver:http]} Scope:local Time:1589821117 TimeNano:1589821117459177093}" providerName=docker | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Filtering disabled container" providerName=docker container=watchtower-watchtower-b539c55f3631972393cd2b401289a28656b7cfa053b835e5ae292c602c6d5b7e | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Configuration received from provider docker: {\"http\":{\"routers\":{\"http-catchall\":{\"entryPoints\":[\"http\"],\"middlewares\":[\"redirect-to-https\"],\"service\":\"traefik-traefik\",\"rule\":\"hostregexp(`{host:[a-z-.]+}`)\"},\"landing-secure\":{\"entryPoints\":[\"https\"],\"service\":\"landing-landing\",\"rule\":\"Host(`static.grinnell.edu`)\",\"tls\":{\"certResolver\":\"http\"}},\"portainer-secure\":{\"entryPoints\":[\"https\"],\"middlewares\":[\"portainer-stripprefix\"],\"service\":\"portainer\",\"rule\":\"Host(`static.grinnell.edu`) \\u0026\\u0026 PathPrefix(`/portainer`)\",\"tls\":{\"certResolver\":\"http\"}},\"rootstalk-static-secure\":{\"entryPoints\":[\"https\"],\"service\":\"rootstalk-rootstalk\",\"rule\":\"Host(`rootstalk-static.grinnell.edu`)\",\"tls\":{\"certResolver\":\"http\"}},\"traefik-secure\":{\"entryPoints\":[\"https\"],\"middlewares\":[\"traefik-auth\"],\"service\":\"api@internal\",\"rule\":\"Host(`static.grinnell.edu`) \\u0026\\u0026 (PathPrefix(`/api`) || PathPrefix(`/dashboard`))\",\"tls\":{\"certResolver\":\"http\"}},\"vaf-kiosk-secure\":{\"entryPoints\":[\"https\"],\"service\":\"kiosk-vaf\",\"rule\":\"Host(`vaf-kiosk.grinnell.edu`)\",\"tls\":{\"certResolver\":\"http\"}},\"vaf-secure\":{\"entryPoints\":[\"https\"],\"service\":\"vaf-vaf\",\"rule\":\"Host(`vaf.grinnell.edu`)\",\"tls\":{\"certResolver\":\"http\"}}},\"services\":{\"kiosk-vaf\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.224.7:80\"}],\"passHostHeader\":true}},\"landing-landing\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.224.4:80\"}],\"passHostHeader\":true}},\"portainer\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.224.3:9000\"}],\"passHostHeader\":true}},\"rootstalk-rootstalk\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.224.5:80\"}],\"passHostHeader\":true}},\"traefik-traefik\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.224.2:80\"}],\"passHostHeader\":true}},\"vaf-vaf\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.224.6:80\"}],\"passHostHeader\":true}}},\"middlewares\":{\"portainer-auth\":{\"basicAuth\":{\"users\":[\"admin:$2y$05$pJEzHJBzfoYYS7/hGAedcOP8XdsqNXE7j.LHFBVjueASOqOvvjGOy\"]}},\"portainer-stripprefix\":{\"stripPrefix\":{\"prefixes\":[\"/portainer\"],\"forceSlash\":true}},\"redirect-to-https\":{\"redirectScheme\":{\"scheme\":\"https\"}},\"traefik-auth\":{\"basicAuth\":{\"users\":[\"admin:$2y$05$pJEzHJBzfoYYS7/hGAedcOP8XdsqNXE7j.LHFBVjueASOqOvvjGOy\"]}}}},\"tcp\":{},\"udp\":{}}" providerName=docker | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Creating middleware" middlewareName=pipelining middlewareType=Pipelining routerName=http-catchall@docker entryPointName=http serviceName=traefik-traefik | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Creating load-balancer" entryPointName=http serviceName=traefik-traefik routerName=http-catchall@docker | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Creating server 0 http://192.168.224.2:80" entryPointName=http serviceName=traefik-traefik routerName=http-catchall@docker serverName=0 | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Added outgoing tracing middleware traefik-traefik" routerName=http-catchall@docker middlewareName=tracing middlewareType=TracingForwarder entryPointName=http | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Creating middleware" middlewareType=RedirectScheme routerName=http-catchall@docker entryPointName=http middlewareName=redirect-to-https@docker | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Setting up redirection to https " routerName=http-catchall@docker entryPointName=http middlewareName=redirect-to-https@docker middlewareType=RedirectScheme | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Adding tracing to middleware" routerName=http-catchall@docker middlewareName=redirect-to-https@docker entryPointName=http | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Creating middleware" entryPointName=http middlewareName=traefik-internal-recovery middlewareType=Recovery | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Creating middleware" serviceName=portainer middlewareName=pipelining middlewareType=Pipelining entryPointName=https routerName=portainer-secure@docker | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Creating load-balancer" routerName=portainer-secure@docker serviceName=portainer entryPointName=https | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Creating server 0 http://192.168.224.3:9000" routerName=portainer-secure@docker serverName=0 serviceName=portainer entryPointName=https | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Added outgoing tracing middleware portainer" middlewareName=tracing middlewareType=TracingForwarder entryPointName=https routerName=portainer-secure@docker | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Creating middleware" entryPointName=https routerName=portainer-secure@docker middlewareName=portainer-stripprefix@docker middlewareType=StripPrefix | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Adding tracing to middleware" entryPointName=https routerName=portainer-secure@docker middlewareName=portainer-stripprefix@docker | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Creating middleware" middlewareName=pipelining middlewareType=Pipelining entryPointName=https routerName=rootstalk-static-secure@docker serviceName=rootstalk-rootstalk | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Creating load-balancer" routerName=rootstalk-static-secure@docker serviceName=rootstalk-rootstalk entryPointName=https | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Creating server 0 http://192.168.224.5:80" serverName=0 entryPointName=https routerName=rootstalk-static-secure@docker serviceName=rootstalk-rootstalk | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Added outgoing tracing middleware rootstalk-rootstalk" middlewareName=tracing middlewareType=TracingForwarder entryPointName=https routerName=rootstalk-static-secure@docker | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Added outgoing tracing middleware api@internal" entryPointName=https routerName=traefik-secure@docker middlewareName=tracing middlewareType=TracingForwarder | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Creating middleware" middlewareName=traefik-auth@docker routerName=traefik-secure@docker entryPointName=https middlewareType=BasicAuth | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Adding tracing to middleware" entryPointName=https routerName=traefik-secure@docker middlewareName=traefik-auth@docker | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Creating middleware" serviceName=vaf-vaf middlewareName=pipelining middlewareType=Pipelining entryPointName=https routerName=vaf-secure@docker | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Creating load-balancer" entryPointName=https routerName=vaf-secure@docker serviceName=vaf-vaf | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Creating server 0 http://192.168.224.6:80" serverName=0 entryPointName=https routerName=vaf-secure@docker serviceName=vaf-vaf | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Added outgoing tracing middleware vaf-vaf" entryPointName=https routerName=vaf-secure@docker middlewareName=tracing middlewareType=TracingForwarder | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Creating middleware" routerName=vaf-kiosk-secure@docker entryPointName=https serviceName=kiosk-vaf middlewareName=pipelining middlewareType=Pipelining | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Creating load-balancer" routerName=vaf-kiosk-secure@docker entryPointName=https serviceName=kiosk-vaf | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Creating server 0 http://192.168.224.7:80" serviceName=kiosk-vaf serverName=0 routerName=vaf-kiosk-secure@docker entryPointName=https | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Added outgoing tracing middleware kiosk-vaf" middlewareName=tracing middlewareType=TracingForwarder routerName=vaf-kiosk-secure@docker entryPointName=https | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Creating middleware" serviceName=landing-landing middlewareType=Pipelining middlewareName=pipelining entryPointName=https routerName=landing-secure@docker | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Creating load-balancer" serviceName=landing-landing entryPointName=https routerName=landing-secure@docker | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Creating server 0 http://192.168.224.4:80" serviceName=landing-landing serverName=0 entryPointName=https routerName=landing-secure@docker | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Added outgoing tracing middleware landing-landing" entryPointName=https routerName=landing-secure@docker middlewareName=tracing middlewareType=TracingForwarder | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Creating middleware" middlewareType=Recovery entryPointName=https middlewareName=traefik-internal-recovery | |
time="2020-05-18T11:58:37-05:00" level=debug msg="No default certificate, generating one" | |
time="2020-05-18T11:58:37-05:00" level=debug msg="http: TLS handshake error from 132.161.249.72:57961: remote error: tls: bad certificate" | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Try to challenge certificate for domain [static.grinnell.edu] found in HostSNI rule" rule="Host(`static.grinnell.edu`) && PathPrefix(`/portainer`)" providerName=http.acme routerName=portainer-secure@docker | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Try to challenge certificate for domain [rootstalk-static.grinnell.edu] found in HostSNI rule" providerName=http.acme routerName=rootstalk-static-secure@docker rule="Host(`rootstalk-static.grinnell.edu`)" | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"static.grinnell.edu\"]..." routerName=portainer-secure@docker rule="Host(`static.grinnell.edu`) && PathPrefix(`/portainer`)" providerName=http.acme | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Domains [\"static.grinnell.edu\"] need ACME certificates generation for domains \"static.grinnell.edu\"." providerName=http.acme routerName=portainer-secure@docker rule="Host(`static.grinnell.edu`) && PathPrefix(`/portainer`)" | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Loading ACME certificates [static.grinnell.edu]..." providerName=http.acme routerName=portainer-secure@docker rule="Host(`static.grinnell.edu`) && PathPrefix(`/portainer`)" | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Try to challenge certificate for domain [static.grinnell.edu] found in HostSNI rule" providerName=http.acme routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"rootstalk-static.grinnell.edu\"]..." rule="Host(`rootstalk-static.grinnell.edu`)" providerName=http.acme routerName=rootstalk-static-secure@docker | |
time="2020-05-18T11:58:37-05:00" level=debug msg="No ACME certificate generation required for domains [\"rootstalk-static.grinnell.edu\"]." providerName=http.acme routerName=rootstalk-static-secure@docker rule="Host(`rootstalk-static.grinnell.edu`)" | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Try to challenge certificate for domain [vaf.grinnell.edu] found in HostSNI rule" providerName=http.acme routerName=vaf-secure@docker rule="Host(`vaf.grinnell.edu`)" | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Try to challenge certificate for domain [vaf-kiosk.grinnell.edu] found in HostSNI rule" providerName=http.acme routerName=vaf-kiosk-secure@docker rule="Host(`vaf-kiosk.grinnell.edu`)" | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Try to challenge certificate for domain [static.grinnell.edu] found in HostSNI rule" providerName=http.acme routerName=landing-secure@docker rule="Host(`static.grinnell.edu`)" | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"static.grinnell.edu\"]..." providerName=http.acme routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" | |
time="2020-05-18T11:58:37-05:00" level=debug msg="No ACME certificate generation required for domains [\"static.grinnell.edu\"]." routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" providerName=http.acme | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"vaf.grinnell.edu\"]..." routerName=vaf-secure@docker rule="Host(`vaf.grinnell.edu`)" providerName=http.acme | |
time="2020-05-18T11:58:37-05:00" level=debug msg="No ACME certificate generation required for domains [\"vaf.grinnell.edu\"]." routerName=vaf-secure@docker rule="Host(`vaf.grinnell.edu`)" providerName=http.acme | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"vaf-kiosk.grinnell.edu\"]..." rule="Host(`vaf-kiosk.grinnell.edu`)" providerName=http.acme routerName=vaf-kiosk-secure@docker | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Domains [\"vaf-kiosk.grinnell.edu\"] need ACME certificates generation for domains \"vaf-kiosk.grinnell.edu\"." rule="Host(`vaf-kiosk.grinnell.edu`)" providerName=http.acme routerName=vaf-kiosk-secure@docker | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"static.grinnell.edu\"]..." routerName=landing-secure@docker rule="Host(`static.grinnell.edu`)" providerName=http.acme | |
time="2020-05-18T11:58:37-05:00" level=debug msg="No ACME certificate generation required for domains [\"static.grinnell.edu\"]." rule="Host(`static.grinnell.edu`)" providerName=http.acme routerName=landing-secure@docker | |
time="2020-05-18T11:58:37-05:00" level=debug msg="Loading ACME certificates [vaf-kiosk.grinnell.edu]..." providerName=http.acme routerName=vaf-kiosk-secure@docker rule="Host(`vaf-kiosk.grinnell.edu`)" | |
...and printing acme.json... | |
{ | |
"http": { | |
"Account": { | |
"Email": "[email protected]", | |
"Registration": { | |
"body": { | |
"status": "valid", | |
"contact": [ | |
"mailto:[email protected]" | |
] | |
}, | |
"uri": "https://acme-staging-v02.api.letsencrypt.org/acme/acct/13741940" | |
}, | |
"PrivateKey": "MIIJKQIBAAKCA...3Qqr5/", | |
"KeyType": "4096" | |
}, | |
"Certificates": null | |
} | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment