Created
May 18, 2020 17:57
-
-
Save McFateM/d504088f8df79ebf28bb70eec03500d8 to your computer and use it in GitHub Desktop.
Static Test 6 Log - HTTP-01 Challenge with LE Production
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
5956e1cf7a42c83691fc0e3fec04267b42e7860603c2b060804ea5e057d3e78b | |
Pulling traefik (traefik:2.2.1)... | |
2.2.1: Pulling from library/traefik | |
cbdbe7a5bc2a: Pull complete | |
f16506d32a25: Pull complete | |
2be216d464d0: Pull complete | |
aed51f08b610: Pull complete | |
Creating traefik ... | |
Pulling traefik (traefik:2.2.1)... | |
Creating traefik ... done | |
Attaching to traefik | |
traefik | time="2020-05-18T12:52:15-05:00" level=info msg="Configuration loaded from file: /traefik.yml" | |
Creating network "watchtower_default" with the default driver | |
Pulling watchtower (containrrr/watchtower:)... | |
latest: Pulling from containrrr/watchtower | |
c4b177d7cf7a: Pull complete | |
676d5222541c: Pull complete | |
00dbe20f4a5b: Pull complete | |
Creating watchtower ... | |
Pulling watchtower (containrrr/watchtower:)... | |
Creating watchtower ... done | |
Attaching to watchtower | |
Pulling portainer (portainer/portainer:1.23.2)... | |
1.23.2: Pulling from portainer/portainer | |
d1e017099d17: Pull complete | |
a7dca5b5a9e8: Pull complete | |
Creating portainer ... done | |
Attaching to portainer | |
portainer | 2020/05/18 12:52:27 Templates already registered inside the database. Skipping template import. | |
portainer | 2020/05/18 12:52:27 server: Reverse tunnelling enabled | |
portainer | 2020/05/18 12:52:27 server: Fingerprint 6f:99:ec:c8:52:4a:fd:1e:0d:4c:9d:20:ca:16:39:fb | |
portainer | 2020/05/18 12:52:27 server: Listening on 0.0.0.0:8000... | |
portainer | 2020/05/18 12:52:27 Starting Portainer 1.23.2 on :9000 | |
portainer | 2020/05/18 12:52:27 [DEBUG] [chisel, monitoring] [check_interval_seconds: 10.000000] [message: starting tunnel management process] | |
Pulling landing (mcfatem/static-landing:latest)... | |
latest: Pulling from mcfatem/static-landing | |
4167d3e14976: Pull complete | |
db94a93dfca0: Pull complete | |
2b8e94aa476d: Pull complete | |
Creating landing-page ... | |
Pulling landing (mcfatem/static-landing:latest)... | |
Creating landing-page ... done | |
Attaching to landing-page | |
Pulling rootstalk (mcfatem/rootstalk:latest)... | |
latest: Pulling from mcfatem/rootstalk | |
4167d3e14976: Already exists | |
db94a93dfca0: Already exists | |
32152e4c4d01: Pull complete | |
Creating rootstalk-static ... | |
Pulling rootstalk (mcfatem/rootstalk:latest)... | |
Creating rootstalk-static ... done | |
Attaching to rootstalk-static | |
Pulling vaf (mcfatem/vaf:latest)... | |
latest: Pulling from mcfatem/vaf | |
050382585609: Pull complete | |
aa1504bc12ac: Pull complete | |
60b7ea37e17a: Pull complete | |
615a270f2edf: Pull complete | |
Creating vaf ... | |
Pulling vaf (mcfatem/vaf:latest)... | |
Creating vaf ... done | |
Attaching to vaf | |
WARNING: Found orphan containers (vaf) for this project. If you removed or renamed this service in your compose file, you can run this command with the --remove-orphans flag to clean it up. | |
Pulling kiosk (mcfatem/vaf-kiosk:latest)... | |
latest: Pulling from mcfatem/vaf-kiosk | |
8e402f1a9c57: Pull complete | |
7b69d8b552de: Pull complete | |
42e747db7e28: Pull complete | |
4f8106e1c445: Pull complete | |
78c7d59fe6a4: Pull complete | |
Creating vaf-kiosk ... | |
Pulling kiosk (mcfatem/vaf-kiosk:latest)... | |
Creating vaf-kiosk ... done | |
Attaching to vaf | |
Dumping traefik.log... | |
time="2020-05-18T12:52:15-05:00" level=info msg="Traefik version 2.2.1 built on 2020-04-29T18:02:09Z" | |
time="2020-05-18T12:52:15-05:00" level=debug msg="Static configuration loaded {\"global\":{\"checkNewVersion\":true},\"serversTransport\":{\"maxIdleConnsPerHost\":200},\"entryPoints\":{\"http\":{\"address\":\":80\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":10000000000},\"respondingTimeouts\":{\"idleTimeout\":180000000000}},\"forwardedHeaders\":{},\"http\":{}},\"https\":{\"address\":\":443\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":10000000000},\"respondingTimeouts\":{\"idleTimeout\":180000000000}},\"forwardedHeaders\":{},\"http\":{}}},\"providers\":{\"providersThrottleDuration\":2000000000,\"docker\":{\"watch\":true,\"endpoint\":\"unix:///var/run/docker.sock\",\"defaultRule\":\"Host(`{{ normalize .Name }}`)\",\"swarmModeRefreshSeconds\":15000000000}},\"api\":{\"dashboard\":true},\"log\":{\"level\":\"DEBUG\",\"filePath\":\"/var/log/traefik.log\",\"format\":\"common\"},\"certificatesResolvers\":{\"http\":{\"acme\":{\"email\":\"[email protected]\",\"caServer\":\"https://acme-v02.api.letsencrypt.org/directory\",\"storage\":\"acme.json\",\"keyType\":\"RSA4096\",\"httpChallenge\":{\"entryPoint\":\"http\"}}}}}" | |
time="2020-05-18T12:52:15-05:00" level=info msg="\nStats collection is disabled.\nHelp us improve Traefik by turning this feature on :)\nMore details on: https://docs.traefik.io/contributing/data-collection/\n" | |
time="2020-05-18T12:52:15-05:00" level=info msg="Starting provider aggregator.ProviderAggregator {}" | |
time="2020-05-18T12:52:15-05:00" level=debug msg="Start TCP Server" entryPointName=http | |
time="2020-05-18T12:52:15-05:00" level=debug msg="Start TCP Server" entryPointName=https | |
time="2020-05-18T12:52:15-05:00" level=info msg="Starting provider *acme.Provider {\"email\":\"[email protected]\",\"caServer\":\"https://acme-v02.api.letsencrypt.org/directory\",\"storage\":\"acme.json\",\"keyType\":\"RSA4096\",\"httpChallenge\":{\"entryPoint\":\"http\"},\"ResolverName\":\"http\",\"store\":{},\"ChallengeStore\":{}}" | |
time="2020-05-18T12:52:15-05:00" level=info msg="Testing certificate renew..." providerName=http.acme | |
time="2020-05-18T12:52:15-05:00" level=info msg="Starting provider *docker.Provider {\"watch\":true,\"endpoint\":\"unix:///var/run/docker.sock\",\"defaultRule\":\"Host(`{{ normalize .Name }}`)\",\"swarmModeRefreshSeconds\":15000000000}" | |
time="2020-05-18T12:52:15-05:00" level=info msg="Starting provider *traefik.Provider {}" | |
time="2020-05-18T12:52:15-05:00" level=debug msg="Configuration received from provider http.acme: {\"http\":{},\"tls\":{}}" providerName=http.acme | |
time="2020-05-18T12:52:15-05:00" level=debug msg="Configuration received from provider internal: {\"http\":{\"services\":{\"api\":{},\"dashboard\":{},\"noop\":{}}},\"tcp\":{},\"tls\":{}}" providerName=internal | |
time="2020-05-18T12:52:15-05:00" level=debug msg="No default certificate, generating one" | |
time="2020-05-18T12:52:15-05:00" level=debug msg="Provider connection established with docker 19.03.8 (API 1.40)" providerName=docker | |
time="2020-05-18T12:52:15-05:00" level=debug msg="Configuration received from provider docker: {\"http\":{\"routers\":{\"http-catchall\":{\"entryPoints\":[\"http\"],\"middlewares\":[\"redirect-to-https\"],\"service\":\"traefik-traefik\",\"rule\":\"hostregexp(`{host:[a-z-.]+}`)\"},\"traefik-secure\":{\"entryPoints\":[\"https\"],\"middlewares\":[\"traefik-auth\"],\"service\":\"api@internal\",\"rule\":\"Host(`static.grinnell.edu`) \\u0026\\u0026 (PathPrefix(`/api`) || PathPrefix(`/dashboard`))\",\"tls\":{\"certResolver\":\"http\"}}},\"services\":{\"traefik-traefik\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://172.18.0.2:80\"}],\"passHostHeader\":true}}},\"middlewares\":{\"redirect-to-https\":{\"redirectScheme\":{\"scheme\":\"https\"}},\"traefik-auth\":{\"basicAuth\":{\"users\":[\"admin:$2y$05$pJEzHJBzfoYYS7/hGAedcOP8XdsqNXE7j.LHFBVjueASOqOvvjGOy\"]}}}},\"tcp\":{},\"udp\":{}}" providerName=docker | |
time="2020-05-18T12:52:16-05:00" level=debug msg="No default certificate, generating one" | |
time="2020-05-18T12:52:16-05:00" level=debug msg="Creating middleware" middlewareType=Pipelining routerName=http-catchall@docker serviceName=traefik-traefik entryPointName=http middlewareName=pipelining | |
time="2020-05-18T12:52:16-05:00" level=debug msg="Creating load-balancer" routerName=http-catchall@docker serviceName=traefik-traefik entryPointName=http | |
time="2020-05-18T12:52:16-05:00" level=debug msg="Creating server 0 http://172.18.0.2:80" serverName=0 entryPointName=http routerName=http-catchall@docker serviceName=traefik-traefik | |
time="2020-05-18T12:52:16-05:00" level=debug msg="Added outgoing tracing middleware traefik-traefik" middlewareName=tracing middlewareType=TracingForwarder entryPointName=http routerName=http-catchall@docker | |
time="2020-05-18T12:52:16-05:00" level=debug msg="Creating middleware" entryPointName=http routerName=http-catchall@docker middlewareName=redirect-to-https@docker middlewareType=RedirectScheme | |
time="2020-05-18T12:52:16-05:00" level=debug msg="Setting up redirection to https " routerName=http-catchall@docker middlewareName=redirect-to-https@docker middlewareType=RedirectScheme entryPointName=http | |
time="2020-05-18T12:52:16-05:00" level=debug msg="Adding tracing to middleware" entryPointName=http routerName=http-catchall@docker middlewareName=redirect-to-https@docker | |
time="2020-05-18T12:52:16-05:00" level=debug msg="Creating middleware" entryPointName=http middlewareName=traefik-internal-recovery middlewareType=Recovery | |
time="2020-05-18T12:52:16-05:00" level=debug msg="Added outgoing tracing middleware api@internal" entryPointName=https routerName=traefik-secure@docker middlewareName=tracing middlewareType=TracingForwarder | |
time="2020-05-18T12:52:16-05:00" level=debug msg="Creating middleware" entryPointName=https routerName=traefik-secure@docker middlewareName=traefik-auth@docker middlewareType=BasicAuth | |
time="2020-05-18T12:52:16-05:00" level=debug msg="Adding tracing to middleware" entryPointName=https routerName=traefik-secure@docker middlewareName=traefik-auth@docker | |
time="2020-05-18T12:52:16-05:00" level=debug msg="Creating middleware" entryPointName=https middlewareType=Recovery middlewareName=traefik-internal-recovery | |
time="2020-05-18T12:52:16-05:00" level=debug msg="No default certificate, generating one" | |
time="2020-05-18T12:52:16-05:00" level=debug msg="Try to challenge certificate for domain [static.grinnell.edu] found in HostSNI rule" routerName=traefik-secure@docker providerName=http.acme rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" | |
time="2020-05-18T12:52:16-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"static.grinnell.edu\"]..." routerName=traefik-secure@docker providerName=http.acme rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" | |
time="2020-05-18T12:52:16-05:00" level=debug msg="Domains [\"static.grinnell.edu\"] need ACME certificates generation for domains \"static.grinnell.edu\"." providerName=http.acme rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" routerName=traefik-secure@docker | |
time="2020-05-18T12:52:16-05:00" level=debug msg="Loading ACME certificates [static.grinnell.edu]..." rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" routerName=traefik-secure@docker providerName=http.acme | |
time="2020-05-18T12:52:17-05:00" level=debug msg="Building ACME client..." providerName=http.acme | |
time="2020-05-18T12:52:17-05:00" level=debug msg="https://acme-v02.api.letsencrypt.org/directory" providerName=http.acme | |
time="2020-05-18T12:52:17-05:00" level=info msg=Register... providerName=http.acme | |
time="2020-05-18T12:52:17-05:00" level=debug msg="legolog: [INFO] acme: Registering account for [email protected]" | |
time="2020-05-18T12:52:18-05:00" level=debug msg="Serving default certificate for request: \"static.grinnell.edu\"" | |
time="2020-05-18T12:52:18-05:00" level=debug msg="http: TLS handshake error from 132.161.249.72:60953: remote error: tls: bad certificate" | |
time="2020-05-18T12:52:18-05:00" level=debug msg="Using HTTP Challenge provider." providerName=http.acme | |
time="2020-05-18T12:52:18-05:00" level=debug msg="legolog: [INFO] [static.grinnell.edu] acme: Obtaining bundled SAN certificate" | |
time="2020-05-18T12:52:19-05:00" level=debug msg="legolog: [INFO] [static.grinnell.edu] AuthURL: https://acme-v02.api.letsencrypt.org/acme/authz-v3/4663819520" | |
time="2020-05-18T12:52:19-05:00" level=debug msg="legolog: [INFO] [static.grinnell.edu] acme: Could not find solver for: tls-alpn-01" | |
time="2020-05-18T12:52:19-05:00" level=debug msg="legolog: [INFO] [static.grinnell.edu] acme: use http-01 solver" | |
time="2020-05-18T12:52:19-05:00" level=debug msg="legolog: [INFO] [static.grinnell.edu] acme: Trying to solve HTTP-01" | |
time="2020-05-18T12:52:19-05:00" level=debug msg="Unable to split host and port: address static.grinnell.edu: missing port in address. Fallback to request host." providerName=http.acme | |
time="2020-05-18T12:52:19-05:00" level=debug msg="Retrieving the ACME challenge for token LDMaIHiUsyD8khVa0i_-QmyLHox7f-0YvqDPN-vuvUI..." providerName=http.acme | |
time="2020-05-18T12:52:19-05:00" level=debug msg="Unable to split host and port: address static.grinnell.edu: missing port in address. Fallback to request host." providerName=http.acme | |
time="2020-05-18T12:52:19-05:00" level=debug msg="Retrieving the ACME challenge for token LDMaIHiUsyD8khVa0i_-QmyLHox7f-0YvqDPN-vuvUI..." providerName=http.acme | |
time="2020-05-18T12:52:19-05:00" level=debug msg="Unable to split host and port: address static.grinnell.edu: missing port in address. Fallback to request host." providerName=http.acme | |
time="2020-05-18T12:52:19-05:00" level=debug msg="Retrieving the ACME challenge for token LDMaIHiUsyD8khVa0i_-QmyLHox7f-0YvqDPN-vuvUI..." providerName=http.acme | |
time="2020-05-18T12:52:19-05:00" level=debug msg="Unable to split host and port: address static.grinnell.edu: missing port in address. Fallback to request host." providerName=http.acme | |
time="2020-05-18T12:52:19-05:00" level=debug msg="Retrieving the ACME challenge for token LDMaIHiUsyD8khVa0i_-QmyLHox7f-0YvqDPN-vuvUI..." providerName=http.acme | |
time="2020-05-18T12:52:21-05:00" level=debug msg="Provider event received {Status:start ID:0bd42516b8f2c6c29b732f42955ffc643cd7fd1d6f2f2200d475a26b9e031dec From:containrrr/watchtower Type:container Action:start Actor:{ID:0bd42516b8f2c6c29b732f42955ffc643cd7fd1d6f2f2200d475a26b9e031dec Attributes:map[com.centurylinklabs.watchtower:true com.docker.compose.config-hash:72da3999b54f0b744907f5756a345c4a6e454b570a653d5079aa27ddef6fea5c com.docker.compose.container-number:1 com.docker.compose.oneoff:False com.docker.compose.project:watchtower com.docker.compose.service:watchtower com.docker.compose.slug:638b3a5b9a75ef4dfdd626054fe587e3e3b95cbe6b87586b47eac8c93087122 com.docker.compose.version:1.23.1 image:containrrr/watchtower name:watchtower traefik.enable:false]} Scope:local Time:1589824341 TimeNano:1589824341136481337}" providerName=docker | |
time="2020-05-18T12:52:21-05:00" level=debug msg="Filtering disabled container" providerName=docker container=watchtower-watchtower-0bd42516b8f2c6c29b732f42955ffc643cd7fd1d6f2f2200d475a26b9e031dec | |
time="2020-05-18T12:52:21-05:00" level=debug msg="Configuration received from provider docker: {\"http\":{\"routers\":{\"http-catchall\":{\"entryPoints\":[\"http\"],\"middlewares\":[\"redirect-to-https\"],\"service\":\"traefik-traefik\",\"rule\":\"hostregexp(`{host:[a-z-.]+}`)\"},\"traefik-secure\":{\"entryPoints\":[\"https\"],\"middlewares\":[\"traefik-auth\"],\"service\":\"api@internal\",\"rule\":\"Host(`static.grinnell.edu`) \\u0026\\u0026 (PathPrefix(`/api`) || PathPrefix(`/dashboard`))\",\"tls\":{\"certResolver\":\"http\"}}},\"services\":{\"traefik-traefik\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://172.18.0.2:80\"}],\"passHostHeader\":true}}},\"middlewares\":{\"redirect-to-https\":{\"redirectScheme\":{\"scheme\":\"https\"}},\"traefik-auth\":{\"basicAuth\":{\"users\":[\"admin:$2y$05$pJEzHJBzfoYYS7/hGAedcOP8XdsqNXE7j.LHFBVjueASOqOvvjGOy\"]}}}},\"tcp\":{},\"udp\":{}}" providerName=docker | |
time="2020-05-18T12:52:21-05:00" level=debug msg="Creating middleware" middlewareType=Pipelining routerName=http-catchall@docker entryPointName=http serviceName=traefik-traefik middlewareName=pipelining | |
time="2020-05-18T12:52:21-05:00" level=debug msg="Creating load-balancer" routerName=http-catchall@docker entryPointName=http serviceName=traefik-traefik | |
time="2020-05-18T12:52:21-05:00" level=debug msg="Creating server 0 http://172.18.0.2:80" routerName=http-catchall@docker entryPointName=http serviceName=traefik-traefik serverName=0 | |
time="2020-05-18T12:52:21-05:00" level=debug msg="Added outgoing tracing middleware traefik-traefik" routerName=http-catchall@docker middlewareName=tracing middlewareType=TracingForwarder entryPointName=http | |
time="2020-05-18T12:52:21-05:00" level=debug msg="Creating middleware" middlewareType=RedirectScheme entryPointName=http routerName=http-catchall@docker middlewareName=redirect-to-https@docker | |
time="2020-05-18T12:52:21-05:00" level=debug msg="Setting up redirection to https " routerName=http-catchall@docker middlewareName=redirect-to-https@docker middlewareType=RedirectScheme entryPointName=http | |
time="2020-05-18T12:52:21-05:00" level=debug msg="Adding tracing to middleware" entryPointName=http routerName=http-catchall@docker middlewareName=redirect-to-https@docker | |
time="2020-05-18T12:52:21-05:00" level=debug msg="Creating middleware" middlewareType=Recovery entryPointName=http middlewareName=traefik-internal-recovery | |
time="2020-05-18T12:52:21-05:00" level=debug msg="Added outgoing tracing middleware api@internal" middlewareType=TracingForwarder entryPointName=https routerName=traefik-secure@docker middlewareName=tracing | |
time="2020-05-18T12:52:21-05:00" level=debug msg="Creating middleware" middlewareType=BasicAuth entryPointName=https routerName=traefik-secure@docker middlewareName=traefik-auth@docker | |
time="2020-05-18T12:52:21-05:00" level=debug msg="Adding tracing to middleware" entryPointName=https routerName=traefik-secure@docker middlewareName=traefik-auth@docker | |
time="2020-05-18T12:52:21-05:00" level=debug msg="Creating middleware" middlewareName=traefik-internal-recovery middlewareType=Recovery entryPointName=https | |
time="2020-05-18T12:52:21-05:00" level=debug msg="No default certificate, generating one" | |
time="2020-05-18T12:52:21-05:00" level=debug msg="Try to challenge certificate for domain [static.grinnell.edu] found in HostSNI rule" routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" providerName=http.acme | |
time="2020-05-18T12:52:21-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"static.grinnell.edu\"]..." providerName=http.acme routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" | |
time="2020-05-18T12:52:21-05:00" level=debug msg="No ACME certificate generation required for domains [\"static.grinnell.edu\"]." rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" providerName=http.acme routerName=traefik-secure@docker | |
time="2020-05-18T12:52:23-05:00" level=debug msg="legolog: [INFO] [static.grinnell.edu] The server validated our request" | |
time="2020-05-18T12:52:23-05:00" level=debug msg="legolog: [INFO] [static.grinnell.edu] acme: Validations succeeded; requesting certificates" | |
time="2020-05-18T12:52:23-05:00" level=debug msg="Serving default certificate for request: \"static.grinnell.edu\"" | |
time="2020-05-18T12:52:23-05:00" level=debug msg="http: TLS handshake error from 132.161.249.72:60961: remote error: tls: bad certificate" | |
time="2020-05-18T12:52:26-05:00" level=debug msg="Provider event received {Status:start ID:19d7179214985064b141d2873ed74a79760eb107ed1f970462da0a12be6becd8 From:portainer/portainer:1.23.2 Type:container Action:start Actor:{ID:19d7179214985064b141d2873ed74a79760eb107ed1f970462da0a12be6becd8 Attributes:map[com.docker.compose.config-hash:33a9d811b0a1a475c282531bf2e54d3cbcbfdd929b2e3243bd3a7a25c0206d3c com.docker.compose.container-number:1 com.docker.compose.oneoff:False com.docker.compose.project:portainer com.docker.compose.service:portainer com.docker.compose.slug:5b3f65cc1bbd2a30ca0f6e55a2f77e2442818dc500e265fdc4172c4a2ef2217 com.docker.compose.version:1.23.1 image:portainer/portainer:1.23.2 name:portainer traefik.docker.network:proxy traefik.enable:true traefik.http.middlewares.portainer-auth.basicauth.users:admin:$2y$05$pJEzHJBzfoYYS7/hGAedcOP8XdsqNXE7j.LHFBVjueASOqOvvjGOy traefik.http.middlewares.portainer-stripprefix.stripprefix.prefixes:/portainer traefik.http.routers.portainer-secure.entrypoints:https traefik.http.routers.portainer-secure.middlewares:portainer-stripprefix traefik.http.routers.portainer-secure.rule:Host(`static.grinnell.edu`) && PathPrefix(`/portainer`) traefik.http.routers.portainer-secure.service:portainer traefik.http.routers.portainer-secure.tls:true traefik.http.routers.portainer-secure.tls.certresolver:http traefik.http.services.portainer.loadbalancer.server.port:9000]} Scope:local Time:1589824346 TimeNano:1589824346852934923}" providerName=docker | |
time="2020-05-18T12:52:26-05:00" level=debug msg="Filtering disabled container" providerName=docker container=watchtower-watchtower-0bd42516b8f2c6c29b732f42955ffc643cd7fd1d6f2f2200d475a26b9e031dec | |
time="2020-05-18T12:52:26-05:00" level=debug msg="Configuration received from provider docker: {\"http\":{\"routers\":{\"http-catchall\":{\"entryPoints\":[\"http\"],\"middlewares\":[\"redirect-to-https\"],\"service\":\"traefik-traefik\",\"rule\":\"hostregexp(`{host:[a-z-.]+}`)\"},\"portainer-secure\":{\"entryPoints\":[\"https\"],\"middlewares\":[\"portainer-stripprefix\"],\"service\":\"portainer\",\"rule\":\"Host(`static.grinnell.edu`) \\u0026\\u0026 PathPrefix(`/portainer`)\",\"tls\":{\"certResolver\":\"http\"}},\"traefik-secure\":{\"entryPoints\":[\"https\"],\"middlewares\":[\"traefik-auth\"],\"service\":\"api@internal\",\"rule\":\"Host(`static.grinnell.edu`) \\u0026\\u0026 (PathPrefix(`/api`) || PathPrefix(`/dashboard`))\",\"tls\":{\"certResolver\":\"http\"}}},\"services\":{\"portainer\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://172.18.0.3:9000\"}],\"passHostHeader\":true}},\"traefik-traefik\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://172.18.0.2:80\"}],\"passHostHeader\":true}}},\"middlewares\":{\"portainer-auth\":{\"basicAuth\":{\"users\":[\"admin:$2y$05$pJEzHJBzfoYYS7/hGAedcOP8XdsqNXE7j.LHFBVjueASOqOvvjGOy\"]}},\"portainer-stripprefix\":{\"stripPrefix\":{\"prefixes\":[\"/portainer\"],\"forceSlash\":true}},\"redirect-to-https\":{\"redirectScheme\":{\"scheme\":\"https\"}},\"traefik-auth\":{\"basicAuth\":{\"users\":[\"admin:$2y$05$pJEzHJBzfoYYS7/hGAedcOP8XdsqNXE7j.LHFBVjueASOqOvvjGOy\"]}}}},\"tcp\":{},\"udp\":{}}" providerName=docker | |
time="2020-05-18T12:52:26-05:00" level=debug msg="Creating middleware" middlewareType=Pipelining routerName=http-catchall@docker serviceName=traefik-traefik entryPointName=http middlewareName=pipelining | |
time="2020-05-18T12:52:26-05:00" level=debug msg="Creating load-balancer" entryPointName=http routerName=http-catchall@docker serviceName=traefik-traefik | |
time="2020-05-18T12:52:26-05:00" level=debug msg="Creating server 0 http://172.18.0.2:80" routerName=http-catchall@docker serverName=0 serviceName=traefik-traefik entryPointName=http | |
time="2020-05-18T12:52:26-05:00" level=debug msg="Added outgoing tracing middleware traefik-traefik" routerName=http-catchall@docker entryPointName=http middlewareName=tracing middlewareType=TracingForwarder | |
time="2020-05-18T12:52:26-05:00" level=debug msg="Creating middleware" middlewareName=redirect-to-https@docker middlewareType=RedirectScheme routerName=http-catchall@docker entryPointName=http | |
time="2020-05-18T12:52:26-05:00" level=debug msg="Setting up redirection to https " routerName=http-catchall@docker entryPointName=http middlewareName=redirect-to-https@docker middlewareType=RedirectScheme | |
time="2020-05-18T12:52:26-05:00" level=debug msg="Adding tracing to middleware" entryPointName=http routerName=http-catchall@docker middlewareName=redirect-to-https@docker | |
time="2020-05-18T12:52:26-05:00" level=debug msg="Creating middleware" middlewareType=Recovery entryPointName=http middlewareName=traefik-internal-recovery | |
time="2020-05-18T12:52:26-05:00" level=debug msg="Creating middleware" middlewareType=Pipelining routerName=portainer-secure@docker entryPointName=https serviceName=portainer middlewareName=pipelining | |
time="2020-05-18T12:52:26-05:00" level=debug msg="Creating load-balancer" routerName=portainer-secure@docker entryPointName=https serviceName=portainer | |
time="2020-05-18T12:52:26-05:00" level=debug msg="Creating server 0 http://172.18.0.3:9000" serviceName=portainer serverName=0 routerName=portainer-secure@docker entryPointName=https | |
time="2020-05-18T12:52:26-05:00" level=debug msg="Added outgoing tracing middleware portainer" middlewareName=tracing middlewareType=TracingForwarder entryPointName=https routerName=portainer-secure@docker | |
time="2020-05-18T12:52:26-05:00" level=debug msg="Creating middleware" middlewareName=portainer-stripprefix@docker middlewareType=StripPrefix entryPointName=https routerName=portainer-secure@docker | |
time="2020-05-18T12:52:26-05:00" level=debug msg="Adding tracing to middleware" routerName=portainer-secure@docker middlewareName=portainer-stripprefix@docker entryPointName=https | |
time="2020-05-18T12:52:26-05:00" level=debug msg="Added outgoing tracing middleware api@internal" entryPointName=https routerName=traefik-secure@docker middlewareName=tracing middlewareType=TracingForwarder | |
time="2020-05-18T12:52:26-05:00" level=debug msg="Creating middleware" entryPointName=https routerName=traefik-secure@docker middlewareName=traefik-auth@docker middlewareType=BasicAuth | |
time="2020-05-18T12:52:26-05:00" level=debug msg="Adding tracing to middleware" middlewareName=traefik-auth@docker entryPointName=https routerName=traefik-secure@docker | |
time="2020-05-18T12:52:26-05:00" level=debug msg="Creating middleware" entryPointName=https middlewareName=traefik-internal-recovery middlewareType=Recovery | |
time="2020-05-18T12:52:26-05:00" level=debug msg="No default certificate, generating one" | |
time="2020-05-18T12:52:28-05:00" level=debug msg="Try to challenge certificate for domain [static.grinnell.edu] found in HostSNI rule" providerName=http.acme routerName=portainer-secure@docker rule="Host(`static.grinnell.edu`) && PathPrefix(`/portainer`)" | |
time="2020-05-18T12:52:28-05:00" level=debug msg="Try to challenge certificate for domain [static.grinnell.edu] found in HostSNI rule" providerName=http.acme routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" | |
time="2020-05-18T12:52:28-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"static.grinnell.edu\"]..." providerName=http.acme routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" | |
time="2020-05-18T12:52:28-05:00" level=debug msg="No ACME certificate generation required for domains [\"static.grinnell.edu\"]." routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" providerName=http.acme | |
time="2020-05-18T12:52:28-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"static.grinnell.edu\"]..." routerName=portainer-secure@docker rule="Host(`static.grinnell.edu`) && PathPrefix(`/portainer`)" providerName=http.acme | |
time="2020-05-18T12:52:28-05:00" level=debug msg="No ACME certificate generation required for domains [\"static.grinnell.edu\"]." providerName=http.acme routerName=portainer-secure@docker rule="Host(`static.grinnell.edu`) && PathPrefix(`/portainer`)" | |
time="2020-05-18T12:52:28-05:00" level=debug msg="Serving default certificate for request: \"static.grinnell.edu\"" | |
time="2020-05-18T12:52:28-05:00" level=debug msg="http: TLS handshake error from 132.161.249.72:60967: remote error: tls: bad certificate" | |
time="2020-05-18T12:52:29-05:00" level=debug msg="legolog: [INFO] [static.grinnell.edu] Server responded with a certificate." | |
time="2020-05-18T12:52:29-05:00" level=debug msg="Certificates obtained for domains [static.grinnell.edu]" providerName=http.acme rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" routerName=traefik-secure@docker | |
time="2020-05-18T12:52:29-05:00" level=debug msg="Configuration received from provider http.acme: {\"http\":{},\"tls\":{}}" providerName=http.acme | |
time="2020-05-18T12:52:29-05:00" level=debug msg="Adding certificate for domain(s) static.grinnell.edu" | |
time="2020-05-18T12:52:29-05:00" level=debug msg="No default certificate, generating one" | |
time="2020-05-18T12:52:29-05:00" level=debug msg="Creating middleware" middlewareName=pipelining middlewareType=Pipelining routerName=http-catchall@docker entryPointName=http serviceName=traefik-traefik | |
time="2020-05-18T12:52:29-05:00" level=debug msg="Creating load-balancer" entryPointName=http serviceName=traefik-traefik routerName=http-catchall@docker | |
time="2020-05-18T12:52:29-05:00" level=debug msg="Creating server 0 http://172.18.0.2:80" serviceName=traefik-traefik serverName=0 routerName=http-catchall@docker entryPointName=http | |
time="2020-05-18T12:52:29-05:00" level=debug msg="Added outgoing tracing middleware traefik-traefik" routerName=http-catchall@docker middlewareName=tracing middlewareType=TracingForwarder entryPointName=http | |
time="2020-05-18T12:52:29-05:00" level=debug msg="Creating middleware" routerName=http-catchall@docker middlewareName=redirect-to-https@docker middlewareType=RedirectScheme entryPointName=http | |
time="2020-05-18T12:52:29-05:00" level=debug msg="Setting up redirection to https " entryPointName=http routerName=http-catchall@docker middlewareName=redirect-to-https@docker middlewareType=RedirectScheme | |
time="2020-05-18T12:52:29-05:00" level=debug msg="Adding tracing to middleware" entryPointName=http routerName=http-catchall@docker middlewareName=redirect-to-https@docker | |
time="2020-05-18T12:52:29-05:00" level=debug msg="Creating middleware" entryPointName=http middlewareName=traefik-internal-recovery middlewareType=Recovery | |
time="2020-05-18T12:52:29-05:00" level=debug msg="Creating middleware" middlewareType=Pipelining entryPointName=https routerName=portainer-secure@docker serviceName=portainer middlewareName=pipelining | |
time="2020-05-18T12:52:29-05:00" level=debug msg="Creating load-balancer" routerName=portainer-secure@docker serviceName=portainer entryPointName=https | |
time="2020-05-18T12:52:29-05:00" level=debug msg="Creating server 0 http://172.18.0.3:9000" entryPointName=https routerName=portainer-secure@docker serviceName=portainer serverName=0 | |
time="2020-05-18T12:52:29-05:00" level=debug msg="Added outgoing tracing middleware portainer" entryPointName=https routerName=portainer-secure@docker middlewareName=tracing middlewareType=TracingForwarder | |
time="2020-05-18T12:52:29-05:00" level=debug msg="Creating middleware" middlewareType=StripPrefix entryPointName=https routerName=portainer-secure@docker middlewareName=portainer-stripprefix@docker | |
time="2020-05-18T12:52:29-05:00" level=debug msg="Adding tracing to middleware" entryPointName=https routerName=portainer-secure@docker middlewareName=portainer-stripprefix@docker | |
time="2020-05-18T12:52:29-05:00" level=debug msg="Added outgoing tracing middleware api@internal" routerName=traefik-secure@docker middlewareType=TracingForwarder middlewareName=tracing entryPointName=https | |
time="2020-05-18T12:52:29-05:00" level=debug msg="Creating middleware" entryPointName=https routerName=traefik-secure@docker middlewareName=traefik-auth@docker middlewareType=BasicAuth | |
time="2020-05-18T12:52:29-05:00" level=debug msg="Adding tracing to middleware" entryPointName=https routerName=traefik-secure@docker middlewareName=traefik-auth@docker | |
time="2020-05-18T12:52:29-05:00" level=debug msg="Creating middleware" entryPointName=https middlewareName=traefik-internal-recovery middlewareType=Recovery | |
time="2020-05-18T12:52:29-05:00" level=debug msg="Try to challenge certificate for domain [static.grinnell.edu] found in HostSNI rule" rule="Host(`static.grinnell.edu`) && PathPrefix(`/portainer`)" providerName=http.acme routerName=portainer-secure@docker | |
time="2020-05-18T12:52:29-05:00" level=debug msg="Try to challenge certificate for domain [static.grinnell.edu] found in HostSNI rule" routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" providerName=http.acme | |
time="2020-05-18T12:52:29-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"static.grinnell.edu\"]..." routerName=portainer-secure@docker rule="Host(`static.grinnell.edu`) && PathPrefix(`/portainer`)" providerName=http.acme | |
time="2020-05-18T12:52:29-05:00" level=debug msg="No ACME certificate generation required for domains [\"static.grinnell.edu\"]." providerName=http.acme routerName=portainer-secure@docker rule="Host(`static.grinnell.edu`) && PathPrefix(`/portainer`)" | |
time="2020-05-18T12:52:29-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"static.grinnell.edu\"]..." routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" providerName=http.acme | |
time="2020-05-18T12:52:29-05:00" level=debug msg="No ACME certificate generation required for domains [\"static.grinnell.edu\"]." providerName=http.acme routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" | |
time="2020-05-18T12:52:32-05:00" level=debug msg="Provider event received {Status:start ID:116ecca4a854d53ab42f89da15a276bca1e5db258572b7809a70b1d33de7fe06 From:mcfatem/static-landing:latest Type:container Action:start Actor:{ID:116ecca4a854d53ab42f89da15a276bca1e5db258572b7809a70b1d33de7fe06 Attributes:map[authors:Mark A. McFate <[email protected]> com.centurylinklabs.watchtower.enable:true com.docker.compose.config-hash:bd8e2bbee97b7e66481bc75c229ca3b4ab5aac8c02ab43797ea353ebe298fbad com.docker.compose.container-number:1 com.docker.compose.oneoff:False com.docker.compose.project:landing com.docker.compose.service:landing com.docker.compose.slug:a8069b8e0b0176e5d603991e0c1b9cdeecb79a08f89ae02b663b3ae25029609 com.docker.compose.version:1.23.1 image:mcfatem/static-landing:latest maintainer:NGINX Docker Maintainers <[email protected]> name:landing-page traefik.docker.network:proxy traefik.enable:true traefik.http.routers.landing-secure.entrypoints:https traefik.http.routers.landing-secure.rule:Host(`static.grinnell.edu`) traefik.http.routers.landing-secure.service:landing-landing traefik.http.routers.landing-secure.tls:true traefik.http.routers.landing-secure.tls.certresolver:http]} Scope:local Time:1589824352 TimeNano:1589824352365383782}" providerName=docker | |
time="2020-05-18T12:52:32-05:00" level=debug msg="Filtering disabled container" container=watchtower-watchtower-0bd42516b8f2c6c29b732f42955ffc643cd7fd1d6f2f2200d475a26b9e031dec providerName=docker | |
time="2020-05-18T12:52:32-05:00" level=debug msg="Configuration received from provider docker: {\"http\":{\"routers\":{\"http-catchall\":{\"entryPoints\":[\"http\"],\"middlewares\":[\"redirect-to-https\"],\"service\":\"traefik-traefik\",\"rule\":\"hostregexp(`{host:[a-z-.]+}`)\"},\"landing-secure\":{\"entryPoints\":[\"https\"],\"service\":\"landing-landing\",\"rule\":\"Host(`static.grinnell.edu`)\",\"tls\":{\"certResolver\":\"http\"}},\"portainer-secure\":{\"entryPoints\":[\"https\"],\"middlewares\":[\"portainer-stripprefix\"],\"service\":\"portainer\",\"rule\":\"Host(`static.grinnell.edu`) \\u0026\\u0026 PathPrefix(`/portainer`)\",\"tls\":{\"certResolver\":\"http\"}},\"traefik-secure\":{\"entryPoints\":[\"https\"],\"middlewares\":[\"traefik-auth\"],\"service\":\"api@internal\",\"rule\":\"Host(`static.grinnell.edu`) \\u0026\\u0026 (PathPrefix(`/api`) || PathPrefix(`/dashboard`))\",\"tls\":{\"certResolver\":\"http\"}}},\"services\":{\"landing-landing\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://172.18.0.4:80\"}],\"passHostHeader\":true}},\"portainer\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://172.18.0.3:9000\"}],\"passHostHeader\":true}},\"traefik-traefik\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://172.18.0.2:80\"}],\"passHostHeader\":true}}},\"middlewares\":{\"portainer-auth\":{\"basicAuth\":{\"users\":[\"admin:$2y$05$pJEzHJBzfoYYS7/hGAedcOP8XdsqNXE7j.LHFBVjueASOqOvvjGOy\"]}},\"portainer-stripprefix\":{\"stripPrefix\":{\"prefixes\":[\"/portainer\"],\"forceSlash\":true}},\"redirect-to-https\":{\"redirectScheme\":{\"scheme\":\"https\"}},\"traefik-auth\":{\"basicAuth\":{\"users\":[\"admin:$2y$05$pJEzHJBzfoYYS7/hGAedcOP8XdsqNXE7j.LHFBVjueASOqOvvjGOy\"]}}}},\"tcp\":{},\"udp\":{}}" providerName=docker | |
time="2020-05-18T12:52:32-05:00" level=debug msg="Adding certificate for domain(s) static.grinnell.edu" | |
time="2020-05-18T12:52:32-05:00" level=debug msg="No default certificate, generating one" | |
time="2020-05-18T12:52:32-05:00" level=debug msg="Creating middleware" routerName=http-catchall@docker serviceName=traefik-traefik middlewareName=pipelining middlewareType=Pipelining entryPointName=http | |
time="2020-05-18T12:52:32-05:00" level=debug msg="Creating load-balancer" entryPointName=http routerName=http-catchall@docker serviceName=traefik-traefik | |
time="2020-05-18T12:52:32-05:00" level=debug msg="Creating server 0 http://172.18.0.2:80" entryPointName=http routerName=http-catchall@docker serviceName=traefik-traefik serverName=0 | |
time="2020-05-18T12:52:32-05:00" level=debug msg="Added outgoing tracing middleware traefik-traefik" routerName=http-catchall@docker middlewareName=tracing middlewareType=TracingForwarder entryPointName=http | |
time="2020-05-18T12:52:32-05:00" level=debug msg="Creating middleware" routerName=http-catchall@docker middlewareName=redirect-to-https@docker middlewareType=RedirectScheme entryPointName=http | |
time="2020-05-18T12:52:32-05:00" level=debug msg="Setting up redirection to https " entryPointName=http routerName=http-catchall@docker middlewareName=redirect-to-https@docker middlewareType=RedirectScheme | |
time="2020-05-18T12:52:32-05:00" level=debug msg="Adding tracing to middleware" entryPointName=http routerName=http-catchall@docker middlewareName=redirect-to-https@docker | |
time="2020-05-18T12:52:32-05:00" level=debug msg="Creating middleware" entryPointName=http middlewareName=traefik-internal-recovery middlewareType=Recovery | |
time="2020-05-18T12:52:32-05:00" level=debug msg="Added outgoing tracing middleware api@internal" middlewareName=tracing middlewareType=TracingForwarder entryPointName=https routerName=traefik-secure@docker | |
time="2020-05-18T12:52:32-05:00" level=debug msg="Creating middleware" middlewareType=BasicAuth entryPointName=https routerName=traefik-secure@docker middlewareName=traefik-auth@docker | |
time="2020-05-18T12:52:32-05:00" level=debug msg="Adding tracing to middleware" entryPointName=https routerName=traefik-secure@docker middlewareName=traefik-auth@docker | |
time="2020-05-18T12:52:32-05:00" level=debug msg="Creating middleware" serviceName=landing-landing middlewareType=Pipelining middlewareName=pipelining entryPointName=https routerName=landing-secure@docker | |
time="2020-05-18T12:52:32-05:00" level=debug msg="Creating load-balancer" entryPointName=https routerName=landing-secure@docker serviceName=landing-landing | |
time="2020-05-18T12:52:32-05:00" level=debug msg="Creating server 0 http://172.18.0.4:80" serverName=0 entryPointName=https routerName=landing-secure@docker serviceName=landing-landing | |
time="2020-05-18T12:52:32-05:00" level=debug msg="Added outgoing tracing middleware landing-landing" entryPointName=https routerName=landing-secure@docker middlewareName=tracing middlewareType=TracingForwarder | |
time="2020-05-18T12:52:32-05:00" level=debug msg="Creating middleware" middlewareType=Pipelining routerName=portainer-secure@docker entryPointName=https serviceName=portainer middlewareName=pipelining | |
time="2020-05-18T12:52:32-05:00" level=debug msg="Creating load-balancer" routerName=portainer-secure@docker entryPointName=https serviceName=portainer | |
time="2020-05-18T12:52:32-05:00" level=debug msg="Creating server 0 http://172.18.0.3:9000" routerName=portainer-secure@docker entryPointName=https serviceName=portainer serverName=0 | |
time="2020-05-18T12:52:32-05:00" level=debug msg="Added outgoing tracing middleware portainer" entryPointName=https routerName=portainer-secure@docker middlewareName=tracing middlewareType=TracingForwarder | |
time="2020-05-18T12:52:32-05:00" level=debug msg="Creating middleware" routerName=portainer-secure@docker middlewareName=portainer-stripprefix@docker middlewareType=StripPrefix entryPointName=https | |
time="2020-05-18T12:52:32-05:00" level=debug msg="Adding tracing to middleware" routerName=portainer-secure@docker middlewareName=portainer-stripprefix@docker entryPointName=https | |
time="2020-05-18T12:52:32-05:00" level=debug msg="Creating middleware" middlewareType=Recovery entryPointName=https middlewareName=traefik-internal-recovery | |
time="2020-05-18T12:52:32-05:00" level=debug msg="Try to challenge certificate for domain [static.grinnell.edu] found in HostSNI rule" rule="Host(`static.grinnell.edu`)" providerName=http.acme routerName=landing-secure@docker | |
time="2020-05-18T12:52:32-05:00" level=debug msg="Try to challenge certificate for domain [static.grinnell.edu] found in HostSNI rule" providerName=http.acme routerName=portainer-secure@docker rule="Host(`static.grinnell.edu`) && PathPrefix(`/portainer`)" | |
time="2020-05-18T12:52:32-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"static.grinnell.edu\"]..." providerName=http.acme routerName=landing-secure@docker rule="Host(`static.grinnell.edu`)" | |
time="2020-05-18T12:52:32-05:00" level=debug msg="No ACME certificate generation required for domains [\"static.grinnell.edu\"]." routerName=landing-secure@docker rule="Host(`static.grinnell.edu`)" providerName=http.acme | |
time="2020-05-18T12:52:32-05:00" level=debug msg="Try to challenge certificate for domain [static.grinnell.edu] found in HostSNI rule" rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" providerName=http.acme routerName=traefik-secure@docker | |
time="2020-05-18T12:52:32-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"static.grinnell.edu\"]..." providerName=http.acme routerName=portainer-secure@docker rule="Host(`static.grinnell.edu`) && PathPrefix(`/portainer`)" | |
time="2020-05-18T12:52:32-05:00" level=debug msg="No ACME certificate generation required for domains [\"static.grinnell.edu\"]." providerName=http.acme routerName=portainer-secure@docker rule="Host(`static.grinnell.edu`) && PathPrefix(`/portainer`)" | |
time="2020-05-18T12:52:32-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"static.grinnell.edu\"]..." providerName=http.acme routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" | |
time="2020-05-18T12:52:32-05:00" level=debug msg="No ACME certificate generation required for domains [\"static.grinnell.edu\"]." providerName=http.acme routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" | |
time="2020-05-18T12:52:35-05:00" level=debug msg="Authentication succeeded" middlewareType=BasicAuth middlewareName=traefik-auth@docker | |
time="2020-05-18T12:52:38-05:00" level=debug msg="Authentication succeeded" middlewareName=traefik-auth@docker middlewareType=BasicAuth | |
time="2020-05-18T12:52:42-05:00" level=debug msg="Provider event received {Status:start ID:05f7be8337a48ea2557bc7c2ca36ee7a4db9126e29c5b796360cc12505cc3b5c From:mcfatem/rootstalk:latest Type:container Action:start Actor:{ID:05f7be8337a48ea2557bc7c2ca36ee7a4db9126e29c5b796360cc12505cc3b5c Attributes:map[authors:Mark A. McFate <[email protected]>, Jeremy Sparagon '20 com.centurylinklabs.watchtower.enable:true com.docker.compose.config-hash:5cefc7f4b3742a172da66877fad1d2c40d1492fb3e9cf9b7980f6afe617e45b1 com.docker.compose.container-number:1 com.docker.compose.oneoff:False com.docker.compose.project:rootstalk com.docker.compose.service:rootstalk com.docker.compose.slug:7c449c13e33f4b209abf2fc879766be46281323b935e38c9495430c278deea1 com.docker.compose.version:1.23.1 image:mcfatem/rootstalk:latest maintainer:NGINX Docker Maintainers <[email protected]> name:rootstalk-static traefik.docker.network:proxy traefik.enable:true traefik.http.routers.rootstalk-static-secure.entrypoints:https traefik.http.routers.rootstalk-static-secure.rule:Host(`rootstalk-static.grinnell.edu`) traefik.http.routers.rootstalk-static-secure.service:rootstalk-rootstalk traefik.http.routers.rootstalk-static-secure.tls:true traefik.http.routers.rootstalk-static-secure.tls.certresolver:http]} Scope:local Time:1589824362 TimeNano:1589824362936183414}" providerName=docker | |
time="2020-05-18T12:52:42-05:00" level=debug msg="Filtering disabled container" providerName=docker container=watchtower-watchtower-0bd42516b8f2c6c29b732f42955ffc643cd7fd1d6f2f2200d475a26b9e031dec | |
time="2020-05-18T12:52:42-05:00" level=debug msg="Configuration received from provider docker: {\"http\":{\"routers\":{\"http-catchall\":{\"entryPoints\":[\"http\"],\"middlewares\":[\"redirect-to-https\"],\"service\":\"traefik-traefik\",\"rule\":\"hostregexp(`{host:[a-z-.]+}`)\"},\"landing-secure\":{\"entryPoints\":[\"https\"],\"service\":\"landing-landing\",\"rule\":\"Host(`static.grinnell.edu`)\",\"tls\":{\"certResolver\":\"http\"}},\"portainer-secure\":{\"entryPoints\":[\"https\"],\"middlewares\":[\"portainer-stripprefix\"],\"service\":\"portainer\",\"rule\":\"Host(`static.grinnell.edu`) \\u0026\\u0026 PathPrefix(`/portainer`)\",\"tls\":{\"certResolver\":\"http\"}},\"rootstalk-static-secure\":{\"entryPoints\":[\"https\"],\"service\":\"rootstalk-rootstalk\",\"rule\":\"Host(`rootstalk-static.grinnell.edu`)\",\"tls\":{\"certResolver\":\"http\"}},\"traefik-secure\":{\"entryPoints\":[\"https\"],\"middlewares\":[\"traefik-auth\"],\"service\":\"api@internal\",\"rule\":\"Host(`static.grinnell.edu`) \\u0026\\u0026 (PathPrefix(`/api`) || PathPrefix(`/dashboard`))\",\"tls\":{\"certResolver\":\"http\"}}},\"services\":{\"landing-landing\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://172.18.0.4:80\"}],\"passHostHeader\":true}},\"portainer\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://172.18.0.3:9000\"}],\"passHostHeader\":true}},\"rootstalk-rootstalk\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://172.18.0.5:80\"}],\"passHostHeader\":true}},\"traefik-traefik\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://172.18.0.2:80\"}],\"passHostHeader\":true}}},\"middlewares\":{\"portainer-auth\":{\"basicAuth\":{\"users\":[\"admin:$2y$05$pJEzHJBzfoYYS7/hGAedcOP8XdsqNXE7j.LHFBVjueASOqOvvjGOy\"]}},\"portainer-stripprefix\":{\"stripPrefix\":{\"prefixes\":[\"/portainer\"],\"forceSlash\":true}},\"redirect-to-https\":{\"redirectScheme\":{\"scheme\":\"https\"}},\"traefik-auth\":{\"basicAuth\":{\"users\":[\"admin:$2y$05$pJEzHJBzfoYYS7/hGAedcOP8XdsqNXE7j.LHFBVjueASOqOvvjGOy\"]}}}},\"tcp\":{},\"udp\":{}}" providerName=docker | |
time="2020-05-18T12:52:42-05:00" level=debug msg="Adding certificate for domain(s) static.grinnell.edu" | |
time="2020-05-18T12:52:42-05:00" level=debug msg="No default certificate, generating one" | |
time="2020-05-18T12:52:43-05:00" level=debug msg="Creating middleware" serviceName=traefik-traefik middlewareName=pipelining middlewareType=Pipelining entryPointName=http routerName=http-catchall@docker | |
time="2020-05-18T12:52:43-05:00" level=debug msg="Creating load-balancer" entryPointName=http routerName=http-catchall@docker serviceName=traefik-traefik | |
time="2020-05-18T12:52:43-05:00" level=debug msg="Creating server 0 http://172.18.0.2:80" entryPointName=http routerName=http-catchall@docker serverName=0 serviceName=traefik-traefik | |
time="2020-05-18T12:52:43-05:00" level=debug msg="Added outgoing tracing middleware traefik-traefik" routerName=http-catchall@docker entryPointName=http middlewareType=TracingForwarder middlewareName=tracing | |
time="2020-05-18T12:52:43-05:00" level=debug msg="Creating middleware" entryPointName=http routerName=http-catchall@docker middlewareName=redirect-to-https@docker middlewareType=RedirectScheme | |
time="2020-05-18T12:52:43-05:00" level=debug msg="Setting up redirection to https " entryPointName=http routerName=http-catchall@docker middlewareName=redirect-to-https@docker middlewareType=RedirectScheme | |
time="2020-05-18T12:52:43-05:00" level=debug msg="Adding tracing to middleware" middlewareName=redirect-to-https@docker entryPointName=http routerName=http-catchall@docker | |
time="2020-05-18T12:52:43-05:00" level=debug msg="Creating middleware" middlewareType=Recovery entryPointName=http middlewareName=traefik-internal-recovery | |
time="2020-05-18T12:52:43-05:00" level=debug msg="Creating middleware" entryPointName=https serviceName=rootstalk-rootstalk middlewareName=pipelining middlewareType=Pipelining routerName=rootstalk-static-secure@docker | |
time="2020-05-18T12:52:43-05:00" level=debug msg="Creating load-balancer" routerName=rootstalk-static-secure@docker entryPointName=https serviceName=rootstalk-rootstalk | |
time="2020-05-18T12:52:43-05:00" level=debug msg="Creating server 0 http://172.18.0.5:80" routerName=rootstalk-static-secure@docker entryPointName=https serviceName=rootstalk-rootstalk serverName=0 | |
time="2020-05-18T12:52:43-05:00" level=debug msg="Added outgoing tracing middleware rootstalk-rootstalk" entryPointName=https routerName=rootstalk-static-secure@docker middlewareName=tracing middlewareType=TracingForwarder | |
time="2020-05-18T12:52:43-05:00" level=debug msg="Added outgoing tracing middleware api@internal" routerName=traefik-secure@docker middlewareName=tracing middlewareType=TracingForwarder entryPointName=https | |
time="2020-05-18T12:52:43-05:00" level=debug msg="Creating middleware" entryPointName=https routerName=traefik-secure@docker middlewareName=traefik-auth@docker middlewareType=BasicAuth | |
time="2020-05-18T12:52:43-05:00" level=debug msg="Adding tracing to middleware" entryPointName=https routerName=traefik-secure@docker middlewareName=traefik-auth@docker | |
time="2020-05-18T12:52:43-05:00" level=debug msg="Creating middleware" middlewareName=pipelining middlewareType=Pipelining entryPointName=https routerName=landing-secure@docker serviceName=landing-landing | |
time="2020-05-18T12:52:43-05:00" level=debug msg="Creating load-balancer" routerName=landing-secure@docker serviceName=landing-landing entryPointName=https | |
time="2020-05-18T12:52:43-05:00" level=debug msg="Creating server 0 http://172.18.0.4:80" serviceName=landing-landing serverName=0 entryPointName=https routerName=landing-secure@docker | |
time="2020-05-18T12:52:43-05:00" level=debug msg="Added outgoing tracing middleware landing-landing" entryPointName=https routerName=landing-secure@docker middlewareName=tracing middlewareType=TracingForwarder | |
time="2020-05-18T12:52:43-05:00" level=debug msg="Creating middleware" entryPointName=https routerName=portainer-secure@docker serviceName=portainer middlewareType=Pipelining middlewareName=pipelining | |
time="2020-05-18T12:52:43-05:00" level=debug msg="Creating load-balancer" serviceName=portainer entryPointName=https routerName=portainer-secure@docker | |
time="2020-05-18T12:52:43-05:00" level=debug msg="Creating server 0 http://172.18.0.3:9000" routerName=portainer-secure@docker serviceName=portainer entryPointName=https serverName=0 | |
time="2020-05-18T12:52:43-05:00" level=debug msg="Added outgoing tracing middleware portainer" entryPointName=https routerName=portainer-secure@docker middlewareName=tracing middlewareType=TracingForwarder | |
time="2020-05-18T12:52:43-05:00" level=debug msg="Creating middleware" entryPointName=https routerName=portainer-secure@docker middlewareName=portainer-stripprefix@docker middlewareType=StripPrefix | |
time="2020-05-18T12:52:43-05:00" level=debug msg="Adding tracing to middleware" entryPointName=https routerName=portainer-secure@docker middlewareName=portainer-stripprefix@docker | |
time="2020-05-18T12:52:43-05:00" level=debug msg="Creating middleware" middlewareType=Recovery entryPointName=https middlewareName=traefik-internal-recovery | |
time="2020-05-18T12:52:43-05:00" level=debug msg="Try to challenge certificate for domain [static.grinnell.edu] found in HostSNI rule" routerName=landing-secure@docker rule="Host(`static.grinnell.edu`)" providerName=http.acme | |
time="2020-05-18T12:52:43-05:00" level=debug msg="Try to challenge certificate for domain [static.grinnell.edu] found in HostSNI rule" routerName=portainer-secure@docker rule="Host(`static.grinnell.edu`) && PathPrefix(`/portainer`)" providerName=http.acme | |
time="2020-05-18T12:52:43-05:00" level=debug msg="Try to challenge certificate for domain [rootstalk-static.grinnell.edu] found in HostSNI rule" providerName=http.acme routerName=rootstalk-static-secure@docker rule="Host(`rootstalk-static.grinnell.edu`)" | |
time="2020-05-18T12:52:43-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"static.grinnell.edu\"]..." providerName=http.acme routerName=landing-secure@docker rule="Host(`static.grinnell.edu`)" | |
time="2020-05-18T12:52:43-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"rootstalk-static.grinnell.edu\"]..." providerName=http.acme routerName=rootstalk-static-secure@docker rule="Host(`rootstalk-static.grinnell.edu`)" | |
time="2020-05-18T12:52:43-05:00" level=debug msg="No ACME certificate generation required for domains [\"static.grinnell.edu\"]." providerName=http.acme routerName=landing-secure@docker rule="Host(`static.grinnell.edu`)" | |
time="2020-05-18T12:52:43-05:00" level=debug msg="Domains [\"rootstalk-static.grinnell.edu\"] need ACME certificates generation for domains \"rootstalk-static.grinnell.edu\"." rule="Host(`rootstalk-static.grinnell.edu`)" providerName=http.acme routerName=rootstalk-static-secure@docker | |
time="2020-05-18T12:52:43-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"static.grinnell.edu\"]..." routerName=portainer-secure@docker rule="Host(`static.grinnell.edu`) && PathPrefix(`/portainer`)" providerName=http.acme | |
time="2020-05-18T12:52:43-05:00" level=debug msg="No ACME certificate generation required for domains [\"static.grinnell.edu\"]." rule="Host(`static.grinnell.edu`) && PathPrefix(`/portainer`)" providerName=http.acme routerName=portainer-secure@docker | |
time="2020-05-18T12:52:43-05:00" level=debug msg="Loading ACME certificates [rootstalk-static.grinnell.edu]..." providerName=http.acme routerName=rootstalk-static-secure@docker rule="Host(`rootstalk-static.grinnell.edu`)" | |
time="2020-05-18T12:52:43-05:00" level=debug msg="legolog: [INFO] [rootstalk-static.grinnell.edu] acme: Obtaining bundled SAN certificate" | |
time="2020-05-18T12:52:43-05:00" level=debug msg="Try to challenge certificate for domain [static.grinnell.edu] found in HostSNI rule" rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" providerName=http.acme routerName=traefik-secure@docker | |
time="2020-05-18T12:52:43-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"static.grinnell.edu\"]..." providerName=http.acme routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" | |
time="2020-05-18T12:52:43-05:00" level=debug msg="No ACME certificate generation required for domains [\"static.grinnell.edu\"]." providerName=http.acme routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" | |
time="2020-05-18T12:52:43-05:00" level=debug msg="legolog: [INFO] [rootstalk-static.grinnell.edu] AuthURL: https://acme-v02.api.letsencrypt.org/acme/authz-v3/4663824934" | |
time="2020-05-18T12:52:43-05:00" level=debug msg="legolog: [INFO] [rootstalk-static.grinnell.edu] acme: Could not find solver for: tls-alpn-01" | |
time="2020-05-18T12:52:43-05:00" level=debug msg="legolog: [INFO] [rootstalk-static.grinnell.edu] acme: use http-01 solver" | |
time="2020-05-18T12:52:43-05:00" level=debug msg="legolog: [INFO] [rootstalk-static.grinnell.edu] acme: Trying to solve HTTP-01" | |
time="2020-05-18T12:52:43-05:00" level=debug msg="Authentication succeeded" middlewareType=BasicAuth middlewareName=traefik-auth@docker | |
time="2020-05-18T12:52:43-05:00" level=debug msg="Unable to split host and port: address rootstalk-static.grinnell.edu: missing port in address. Fallback to request host." providerName=http.acme | |
time="2020-05-18T12:52:43-05:00" level=debug msg="Retrieving the ACME challenge for token IM6uKoGSaH1OtYdBc-zmq2T2tOhw2zA9DGhivYbXmDQ..." providerName=http.acme | |
time="2020-05-18T12:52:44-05:00" level=debug msg="Unable to split host and port: address rootstalk-static.grinnell.edu: missing port in address. Fallback to request host." providerName=http.acme | |
time="2020-05-18T12:52:44-05:00" level=debug msg="Retrieving the ACME challenge for token IM6uKoGSaH1OtYdBc-zmq2T2tOhw2zA9DGhivYbXmDQ..." providerName=http.acme | |
time="2020-05-18T12:52:44-05:00" level=debug msg="Unable to split host and port: address rootstalk-static.grinnell.edu: missing port in address. Fallback to request host." providerName=http.acme | |
time="2020-05-18T12:52:44-05:00" level=debug msg="Retrieving the ACME challenge for token IM6uKoGSaH1OtYdBc-zmq2T2tOhw2zA9DGhivYbXmDQ..." providerName=http.acme | |
time="2020-05-18T12:52:44-05:00" level=debug msg="Unable to split host and port: address rootstalk-static.grinnell.edu: missing port in address. Fallback to request host." providerName=http.acme | |
time="2020-05-18T12:52:44-05:00" level=debug msg="Retrieving the ACME challenge for token IM6uKoGSaH1OtYdBc-zmq2T2tOhw2zA9DGhivYbXmDQ..." providerName=http.acme | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Provider event received {Status:start ID:77f583ff8a72f66f031b592760d680bfbc8c80a94247dc44d381ea5177742705 From:mcfatem/vaf:latest Type:container Action:start Actor:{ID:77f583ff8a72f66f031b592760d680bfbc8c80a94247dc44d381ea5177742705 Attributes:map[com.centurylinklabs.watchtower.enable:true com.docker.compose.config-hash:b999951403fea9466289148824ba40444c2ac3529d0e547d8142b5a64ad4b4f3 com.docker.compose.container-number:1 com.docker.compose.oneoff:False com.docker.compose.project:vaf com.docker.compose.service:vaf com.docker.compose.slug:4a286274d2237280ed5e10c2b87be8fb1024dda9f04979b8f91af3143fb575 com.docker.compose.version:1.23.1 image:mcfatem/vaf:latest maintainer:NGINX Docker Maintainers <[email protected]> name:vaf traefik.docker.network:proxy traefik.enable:true traefik.http.routers.vaf-secure.entrypoints:https traefik.http.routers.vaf-secure.rule:Host(`vaf.grinnell.edu`) traefik.http.routers.vaf-secure.service:vaf-vaf traefik.http.routers.vaf-secure.tls:true traefik.http.routers.vaf-secure.tls.certresolver:http]} Scope:local Time:1589824368 TimeNano:1589824368498076086}" providerName=docker | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Filtering disabled container" providerName=docker container=watchtower-watchtower-0bd42516b8f2c6c29b732f42955ffc643cd7fd1d6f2f2200d475a26b9e031dec | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Configuration received from provider docker: {\"http\":{\"routers\":{\"http-catchall\":{\"entryPoints\":[\"http\"],\"middlewares\":[\"redirect-to-https\"],\"service\":\"traefik-traefik\",\"rule\":\"hostregexp(`{host:[a-z-.]+}`)\"},\"landing-secure\":{\"entryPoints\":[\"https\"],\"service\":\"landing-landing\",\"rule\":\"Host(`static.grinnell.edu`)\",\"tls\":{\"certResolver\":\"http\"}},\"portainer-secure\":{\"entryPoints\":[\"https\"],\"middlewares\":[\"portainer-stripprefix\"],\"service\":\"portainer\",\"rule\":\"Host(`static.grinnell.edu`) \\u0026\\u0026 PathPrefix(`/portainer`)\",\"tls\":{\"certResolver\":\"http\"}},\"rootstalk-static-secure\":{\"entryPoints\":[\"https\"],\"service\":\"rootstalk-rootstalk\",\"rule\":\"Host(`rootstalk-static.grinnell.edu`)\",\"tls\":{\"certResolver\":\"http\"}},\"traefik-secure\":{\"entryPoints\":[\"https\"],\"middlewares\":[\"traefik-auth\"],\"service\":\"api@internal\",\"rule\":\"Host(`static.grinnell.edu`) \\u0026\\u0026 (PathPrefix(`/api`) || PathPrefix(`/dashboard`))\",\"tls\":{\"certResolver\":\"http\"}},\"vaf-secure\":{\"entryPoints\":[\"https\"],\"service\":\"vaf-vaf\",\"rule\":\"Host(`vaf.grinnell.edu`)\",\"tls\":{\"certResolver\":\"http\"}}},\"services\":{\"landing-landing\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://172.18.0.4:80\"}],\"passHostHeader\":true}},\"portainer\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://172.18.0.3:9000\"}],\"passHostHeader\":true}},\"rootstalk-rootstalk\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://172.18.0.5:80\"}],\"passHostHeader\":true}},\"traefik-traefik\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://172.18.0.2:80\"}],\"passHostHeader\":true}},\"vaf-vaf\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://172.18.0.6:80\"}],\"passHostHeader\":true}}},\"middlewares\":{\"portainer-auth\":{\"basicAuth\":{\"users\":[\"admin:$2y$05$pJEzHJBzfoYYS7/hGAedcOP8XdsqNXE7j.LHFBVjueASOqOvvjGOy\"]}},\"portainer-stripprefix\":{\"stripPrefix\":{\"prefixes\":[\"/portainer\"],\"forceSlash\":true}},\"redirect-to-https\":{\"redirectScheme\":{\"scheme\":\"https\"}},\"traefik-auth\":{\"basicAuth\":{\"users\":[\"admin:$2y$05$pJEzHJBzfoYYS7/hGAedcOP8XdsqNXE7j.LHFBVjueASOqOvvjGOy\"]}}}},\"tcp\":{},\"udp\":{}}" providerName=docker | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Adding certificate for domain(s) static.grinnell.edu" | |
time="2020-05-18T12:52:48-05:00" level=debug msg="No default certificate, generating one" | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Creating middleware" middlewareType=Pipelining entryPointName=http routerName=http-catchall@docker serviceName=traefik-traefik middlewareName=pipelining | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Creating load-balancer" entryPointName=http routerName=http-catchall@docker serviceName=traefik-traefik | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Creating server 0 http://172.18.0.2:80" routerName=http-catchall@docker serviceName=traefik-traefik serverName=0 entryPointName=http | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Added outgoing tracing middleware traefik-traefik" middlewareType=TracingForwarder entryPointName=http routerName=http-catchall@docker middlewareName=tracing | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Creating middleware" routerName=http-catchall@docker middlewareName=redirect-to-https@docker middlewareType=RedirectScheme entryPointName=http | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Setting up redirection to https " routerName=http-catchall@docker middlewareName=redirect-to-https@docker middlewareType=RedirectScheme entryPointName=http | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Adding tracing to middleware" middlewareName=redirect-to-https@docker entryPointName=http routerName=http-catchall@docker | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Creating middleware" middlewareName=traefik-internal-recovery middlewareType=Recovery entryPointName=http | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Creating middleware" entryPointName=https routerName=rootstalk-static-secure@docker serviceName=rootstalk-rootstalk middlewareName=pipelining middlewareType=Pipelining | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Creating load-balancer" entryPointName=https routerName=rootstalk-static-secure@docker serviceName=rootstalk-rootstalk | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Creating server 0 http://172.18.0.5:80" serverName=0 routerName=rootstalk-static-secure@docker serviceName=rootstalk-rootstalk entryPointName=https | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Added outgoing tracing middleware rootstalk-rootstalk" entryPointName=https routerName=rootstalk-static-secure@docker middlewareName=tracing middlewareType=TracingForwarder | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Added outgoing tracing middleware api@internal" routerName=traefik-secure@docker middlewareName=tracing middlewareType=TracingForwarder entryPointName=https | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Creating middleware" routerName=traefik-secure@docker entryPointName=https middlewareType=BasicAuth middlewareName=traefik-auth@docker | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Adding tracing to middleware" entryPointName=https routerName=traefik-secure@docker middlewareName=traefik-auth@docker | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Creating middleware" entryPointName=https middlewareType=Pipelining middlewareName=pipelining routerName=vaf-secure@docker serviceName=vaf-vaf | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Creating load-balancer" serviceName=vaf-vaf entryPointName=https routerName=vaf-secure@docker | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Creating server 0 http://172.18.0.6:80" entryPointName=https routerName=vaf-secure@docker serviceName=vaf-vaf serverName=0 | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Added outgoing tracing middleware vaf-vaf" routerName=vaf-secure@docker middlewareName=tracing middlewareType=TracingForwarder entryPointName=https | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Creating middleware" routerName=landing-secure@docker serviceName=landing-landing middlewareName=pipelining middlewareType=Pipelining entryPointName=https | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Creating load-balancer" entryPointName=https routerName=landing-secure@docker serviceName=landing-landing | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Creating server 0 http://172.18.0.4:80" serviceName=landing-landing entryPointName=https routerName=landing-secure@docker serverName=0 | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Added outgoing tracing middleware landing-landing" middlewareType=TracingForwarder middlewareName=tracing entryPointName=https routerName=landing-secure@docker | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Creating middleware" middlewareType=Pipelining entryPointName=https routerName=portainer-secure@docker serviceName=portainer middlewareName=pipelining | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Creating load-balancer" serviceName=portainer entryPointName=https routerName=portainer-secure@docker | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Creating server 0 http://172.18.0.3:9000" routerName=portainer-secure@docker serverName=0 serviceName=portainer entryPointName=https | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Added outgoing tracing middleware portainer" routerName=portainer-secure@docker middlewareName=tracing middlewareType=TracingForwarder entryPointName=https | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Creating middleware" routerName=portainer-secure@docker entryPointName=https middlewareName=portainer-stripprefix@docker middlewareType=StripPrefix | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Adding tracing to middleware" routerName=portainer-secure@docker middlewareName=portainer-stripprefix@docker entryPointName=https | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Creating middleware" middlewareName=traefik-internal-recovery middlewareType=Recovery entryPointName=https | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Try to challenge certificate for domain [static.grinnell.edu] found in HostSNI rule" routerName=landing-secure@docker rule="Host(`static.grinnell.edu`)" providerName=http.acme | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Try to challenge certificate for domain [static.grinnell.edu] found in HostSNI rule" rule="Host(`static.grinnell.edu`) && PathPrefix(`/portainer`)" providerName=http.acme routerName=portainer-secure@docker | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Try to challenge certificate for domain [rootstalk-static.grinnell.edu] found in HostSNI rule" routerName=rootstalk-static-secure@docker rule="Host(`rootstalk-static.grinnell.edu`)" providerName=http.acme | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Try to challenge certificate for domain [static.grinnell.edu] found in HostSNI rule" rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" providerName=http.acme routerName=traefik-secure@docker | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"static.grinnell.edu\"]..." providerName=http.acme routerName=portainer-secure@docker rule="Host(`static.grinnell.edu`) && PathPrefix(`/portainer`)" | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"static.grinnell.edu\"]..." rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" providerName=http.acme routerName=traefik-secure@docker | |
time="2020-05-18T12:52:48-05:00" level=debug msg="No ACME certificate generation required for domains [\"static.grinnell.edu\"]." providerName=http.acme routerName=traefik-secure@docker rule="Host(`static.grinnell.edu`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))" | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Try to challenge certificate for domain [vaf.grinnell.edu] found in HostSNI rule" routerName=vaf-secure@docker rule="Host(`vaf.grinnell.edu`)" providerName=http.acme | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"vaf.grinnell.edu\"]..." providerName=http.acme routerName=vaf-secure@docker rule="Host(`vaf.grinnell.edu`)" | |
time="2020-05-18T12:52:48-05:00" level=debug msg="No ACME certificate generation required for domains [\"static.grinnell.edu\"]." routerName=portainer-secure@docker rule="Host(`static.grinnell.edu`) && PathPrefix(`/portainer`)" providerName=http.acme | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"static.grinnell.edu\"]..." providerName=http.acme routerName=landing-secure@docker rule="Host(`static.grinnell.edu`)" | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Domains [\"vaf.grinnell.edu\"] need ACME certificates generation for domains \"vaf.grinnell.edu\"." rule="Host(`vaf.grinnell.edu`)" providerName=http.acme routerName=vaf-secure@docker | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Looking for provided certificate(s) to validate [\"rootstalk-static.grinnell.edu\"]..." providerName=http.acme routerName=rootstalk-static-secure@docker rule="Host(`rootstalk-static.grinnell.edu`)" | |
time="2020-05-18T12:52:48-05:00" level=debug msg="No ACME certificate generation required for domains [\"static.grinnell.edu\"]." routerName=landing-secure@docker rule="Host(`static.grinnell.edu`)" providerName=http.acme | |
time="2020-05-18T12:52:48-05:00" level=debug msg="No ACME certificate generation required for domains [\"rootstalk-static.grinnell.edu\"]." providerName=http.acme routerName=rootstalk-static-secure@docker rule="Host(`rootstalk-static.grinnell.edu`)" | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Loading ACME certificates [vaf.grinnell.edu]..." providerName=http.acme routerName=vaf-secure@docker rule="Host(`vaf.grinnell.edu`)" | |
time="2020-05-18T12:52:48-05:00" level=debug msg="legolog: [INFO] [vaf.grinnell.edu] acme: Obtaining bundled SAN certificate" | |
time="2020-05-18T12:52:48-05:00" level=debug msg="Authentication succeeded" middlewareName=traefik-auth@docker middlewareType=BasicAuth | |
time="2020-05-18T12:52:49-05:00" level=debug msg="legolog: [INFO] [vaf.grinnell.edu] AuthURL: https://acme-v02.api.letsencrypt.org/acme/authz-v3/4663826057" | |
time="2020-05-18T12:52:49-05:00" level=debug msg="legolog: [INFO] [vaf.grinnell.edu] acme: Could not find solver for: tls-alpn-01" | |
time="2020-05-18T12:52:49-05:00" level=debug msg="legolog: [INFO] [vaf.grinnell.edu] acme: use http-01 solver" | |
time="2020-05-18T12:52:49-05:00" level=debug msg="legolog: [INFO] [vaf.grinnell.edu] acme: Trying to solve HTTP-01" | |
time="2020-05-18T12:52:49-05:00" level=debug msg="Unable to split host and port: address vaf.grinnell.edu: missing port in address. Fallback to request host." providerName=http.acme | |
time="2020-05-18T12:52:49-05:00" level=debug msg="Retrieving the ACME challenge for token ArxW8IuOSx31fAi7iWVegRB1Aq6dEOtz-wansI4glYo..." providerName=http.acme | |
time="2020-05-18T12:52:49-05:00" level=debug msg="Unable to split host and port: address vaf.grinnell.edu: missing port in address. Fallback to request host." providerName=http.acme | |
time="2020-05-18T12:52:49-05:00" level=debug msg="Retrieving the ACME challenge for token ArxW8IuOSx31fAi7iWVegRB1Aq6dEOtz-wansI4glYo..." providerName=http.acme | |
time="2020-05-18T12:52:49-05:00" level=debug msg="Unable to split host and port: address vaf.grinnell.edu: missing port in address. Fallback to request host." providerName=http.acme | |
time="2020-05-18T12:52:49-05:00" level=debug msg="Retrieving the ACME challenge for token ArxW8IuOSx31fAi7iWVegRB1Aq6dEOtz-wansI4glYo..." providerName=http.acme | |
time="2020-05-18T12:52:49-05:00" level=debug msg="Unable to split host and port: address vaf.grinnell.edu: missing port in address. Fallback to request host." providerName=http.acme | |
time="2020-05-18T12:52:49-05:00" level=debug msg="Retrieving the ACME challenge for token ArxW8IuOSx31fAi7iWVegRB1Aq6dEOtz-wansI4glYo..." providerName=http.acme | |
time="2020-05-18T12:52:50-05:00" level=debug msg="legolog: [INFO] [rootstalk-static.grinnell.edu] The server validated our request" | |
time="2020-05-18T12:52:50-05:00" level=debug msg="legolog: [INFO] [rootstalk-static.grinnell.edu] acme: Validations succeeded; requesting certificates" | |
time="2020-05-18T12:52:53-05:00" level=debug msg="Authentication succeeded" middlewareName=traefik-auth@docker middlewareType=BasicAuth | |
time="2020-05-18T12:52:54-05:00" level=debug msg="legolog: [INFO] [vaf.grinnell.edu] The server validated our request" | |
time="2020-05-18T12:52:54-05:00" level=debug msg="legolog: [INFO] [vaf.grinnell.edu] acme: Validations succeeded; requesting certificates" | |
time="2020-05-18T12:52:54-05:00" level=debug msg="Provider event received {Status:start ID:952ed591c03f154f022e1fe930151f52f7e0f6f97d1140855aa776d899df6385 From:mcfatem/vaf-kiosk:latest Type:container Action:start Actor:{ID:952ed591c03f154f022e1fe930151f52f7e0f6f97d1140855aa776d899df6385 Attributes:map[com.centurylinklabs.watchtower.enable:true com.docker.compose.config-hash:f8b92f21b12ae8261664dca61308602f0cf8e2fe711665f4993eb2186c883c0c com.docker.compose.container-number:1 com.docker.compose.oneoff:False com.docker.compose.project:vaf com.docker.compose.service:kiosk com.docker.compose.slug:5d97166663cf22810d3fffe3a7b7811dd3f6fe282d7760530a8186dac916758 com.docker.compose.version:1.23.1 image:mcfatem/vaf-kiosk:latest maintainer:NGINX Docker Maintainers <[email protected]> name:vaf-kiosk traefik.docker.network:proxy traefik.enable:true traefik.http.routers.vaf-kiosk-secure.entrypoints:https traefik.http.routers.vaf-kiosk-secure.rule:Host(`vaf-kiosk.grinnell.edu`) traefik.http.routers.vaf-kiosk-secure.service:kiosk-vaf traefik.http.routers.vaf-kiosk-secure.tls:true traefik.http.routers.vaf-kiosk-secure.tls.certresolver:http]} Scope:local Time:1589824374 TimeNano:1589824374499466665}" providerName=docker | |
time="2020-05-18T12:52:54-05:00" level=debug msg="Filtering disabled container" providerName=docker container=watchtower-watchtower-0bd42516b8f2c6c29b732f42955ffc643cd7fd1d6f2f2200d475a26b9e031dec | |
time="2020-05-18T12:52:54-05:00" level=debug msg="Configuration received from provider docker: {\"http\":{\"routers\":{\"http-catchall\":{\"entryPoints\":[\"http\"],\"middlewares\":[\"redirect-to-https\"],\"service\":\"traefik-traefik\",\"rule\":\"hostregexp(`{host:[a-z-.]+}`)\"},\"landing-secure\":{\"entryPoints\":[\"https\"],\"service\":\"landing-landing\",\"rule\":\"Host(`static.grinnell.edu`)\",\"tls\":{\"certResolver\":\"http\"}},\"portainer-secure\":{\"entryPoints\":[\"https\"],\"middlewares\":[\"portainer-stripprefix\"],\"service\":\"portainer\",\"rule\":\"Host(`static.grinnell.edu`) \\u0026\\u0026 PathPrefix(`/portainer`)\",\"tls\":{\"certResolver\":\"http\"}},\"rootstalk-static-secure\":{\"entryPoints\":[\"https\"],\"service\":\"rootstalk-rootstalk\",\"rule\":\"Host(`rootstalk-static.grinnell.edu`)\",\"tls\":{\"certResolver\":\"http\"}},\"traefik-secure\":{\"entryPoints\":[\"https\"],\"middlewares\":[\"traefik-auth\"],\"service\":\"api@internal\",\"rule\":\"Host(`static.grinnell.edu`) \\u0026\\u0026 (PathPrefix(`/api`) || PathPrefix(`/dashboard`))\",\"tls\":{\"certResolver\":\"http\"}},\"vaf-kiosk-secure\":{\"entryPoints\":[\"https\"],\"service\":\"kiosk-vaf\",\"rule\":\"Host(`vaf-kiosk.grinnell.edu`)\",\"tls\":{\"certResolver\":\"http\"}},\"vaf-secure\":{\"entryPoints\":[\"https\"],\"service\":\"vaf-vaf\",\"rule\":\"Host(`vaf.grinnell.edu`)\",\"tls\":{\"certResolver\":\"http\"}}},\"services\":{\"kiosk-vaf\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://172.18.0.7:80\"}],\"passHostHeader\":true}},\"landing-landing\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://172.18.0.4:80\"}],\"passHostHeader\":true}},\"portainer\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://172.18.0.3:9000\"}],\"passHostHeader\":true}},\"rootstalk-rootstalk\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://172.18.0.5:80\"}],\"passHostHeader\":true}},\"traefik-traefik\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://172.18.0.2:80\"}],\"passHostHeader\":true}},\"vaf-vaf\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://172.18.0.6:80\"}],\"passHostHeader\":true}}},\"middlewares\":{\"portainer-auth\":{\"basicAuth\":{\"users\":[\"admin:$2y$05$pJEzHJBzfoYYS7/hGAedcOP8XdsqNXE7j.LHFBVjueASOqOvvjGOy\"]}},\"portainer-stripprefix\":{\"stripPrefix\":{\"prefixes\":[\"/portainer\"],\"forceSlash\":true}},\"redirect-to-https\":{\"redirectScheme\":{\"scheme\":\"https\"}},\"traefik-auth\":{\"basicAuth\":{\"users\":[\"admin:$2y$05$pJEzHJBzfoYYS7/hGAedcOP8XdsqNXE7j.LHFBVjueASOqOvvjGOy\"]}}}},\"tcp\":{},\"udp\":{}}" providerName=docker | |
time="2020-05-18T12:52:54-05:00" level=debug msg="Adding certificate for domain(s) static.grinnell.edu" | |
time="2020-05-18T12:52:54-05:00" level=debug msg="No default certificate, generating one" | |
...and printing acme.json... | |
{ | |
"http": { | |
"Account": { | |
"Email": "[email protected]", | |
"Registration": { | |
"body": { | |
"status": "valid", | |
"contact": [ | |
"mailto:[email protected]" | |
] | |
}, | |
"uri": "https://acme-v02.api.letsencrypt.org/acme/acct/86506247" | |
}, | |
"PrivateKey": "MIIJKA...sFgudEQklyZGBs=", | |
"KeyType": "4096" | |
}, | |
"Certificates": [ | |
{ | |
"domain": { | |
"main": "static.grinnell.edu" | |
}, | |
"certificate": "LS0tL...tLS0tLQo=", | |
"key": "LS0tLS1...LS0tLS0K", | |
"Store": "default" | |
} | |
] | |
} | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment