Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Traefik is ignoring routers from file completely (Docker) #5418

Closed
mrvnklm opened this issue Sep 18, 2019 · 2 comments
Closed

Traefik is ignoring routers from file completely (Docker) #5418

mrvnklm opened this issue Sep 18, 2019 · 2 comments

Comments

@mrvnklm
Copy link

mrvnklm commented Sep 18, 2019

I am using a file providing routers in a docker-only environment and everything works fine as long I am using lables. When I try to define my routers in a file, they are ignored.
Besides that neither (routers / middlewares) added in the traefik.yml are recognized and applied, but that could be on purpose?

Config

## traefik.yml
log:
  level: DEBUG
# Docker configuration backend
providers:
  docker:
    defaultRule: "Host(`{{ trimPrefix `/` .Name }}.local`)"
  file:
    filename: "/etc/traefik/middlewares.yml"

entryPoints:
  web:
    address: ":80"
  web-secure:
    address: ":443"

certificatesResolvers:
  lets-encrypt:
    acme:
      email: user@mydomain.de
      storage: /etc/traefik/acme.json
      httpChallenge:
        entryPoint: web

# API and dashboard configuration
api:
  insecure: true
## middlewares.yml
http:
  routers:
    hello-test:
      rule: "Host(`cloud.mydomain.de`)"
      service: hello
  middlewares:
    redirect:
      redirectScheme:
        scheme: https

Log

time="2019-09-18T17:37:36Z" level=info msg="Configuration loaded from file: /etc/traefik/traefik.yml"
time="2019-09-18T17:37:36Z" level=info msg="Traefik version 2.0.0 built on 2019-09-16T17:35:17Z"
time="2019-09-18T17:37:36Z" level=debug msg="Static configuration loaded {\"global\":{\"checkNewVersion\":true},\"serversTransport\":{\"maxIdleConnsPerHost\":200},\"entryPoints\":{\"traefik\":{\"address\":\":8080\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":10000000000},\"respondingTimeouts\":{\"idleTimeout\":180000000000}},\"forwardedHeaders\":{}},\"web\":{\"address\":\":80\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":10000000000},\"respondingTimeouts\":{\"idleTimeout\":180000000000}},\"forwardedHeaders\":{}},\"web-secure\":{\"address\":\":443\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":10000000000},\"respondingTimeouts\":{\"idleTimeout\":180000000000}},\"forwardedHeaders\":{}}},\"providers\":{\"providersThrottleDuration\":2000000000,\"docker\":{\"watch\":true,\"endpoint\":\"unix:///var/run/docker.sock\",\"defaultRule\":\"Host(`{{ trimPrefix `/` .Name }}.local`)\",\"exposedByDefault\":true,\"swarmModeRefreshSeconds\":15000000000},\"file\":{\"watch\":true,\"filename\":\"/etc/traefik/middlewares.yml\"}},\"api\":{\"insecure\":true,\"dashboard\":true},\"log\":{\"level\":\"DEBUG\",\"format\":\"common\"},\"certificatesResolvers\":{\"lets-encrypt\":{\"acme\":{\"email\":\"user@mydomain.de\",\"caServer\":\"https://acme-v02.api.letsencrypt.org/directory\",\"storage\":\"/etc/traefik/acme.json\",\"keyType\":\"RSA4096\",\"httpChallenge\":{\"entryPoint\":\"web\"}}}}}"
time="2019-09-18T17:37:36Z" level=info msg="\nStats collection is disabled.\nHelp us improve Traefik by turning this feature on :)\nMore details on: https://docs.traefik.io/v2.0/contributing/data-collection/\n"
time="2019-09-18T17:37:36Z" level=debug msg="No default certificate, generating one"
time="2019-09-18T17:37:36Z" level=info msg="Starting provider aggregator.ProviderAggregator {}"
time="2019-09-18T17:37:36Z" level=debug msg="Start TCP Server" entryPointName=traefik
time="2019-09-18T17:37:36Z" level=info msg="Starting provider *file.Provider {\"watch\":true,\"filename\":\"/etc/traefik/middlewares.yml\"}"
time="2019-09-18T17:37:36Z" level=debug msg="Start TCP Server" entryPointName=web
time="2019-09-18T17:37:36Z" level=debug msg="Start TCP Server" entryPointName=web-secure
time="2019-09-18T17:37:36Z" level=info msg="Starting provider *acme.Provider {\"email\":\"user@mydomain.de\",\"caServer\":\"https://acme-v02.api.letsencrypt.org/directory\",\"storage\":\"/etc/traefik/acme.json\",\"keyType\":\"RSA4096\",\"httpChallenge\":{\"entryPoint\":\"web\"},\"ResolverName\":\"lets-encrypt\",\"store\":{},\"ChallengeStore\":{}}"
time="2019-09-18T17:37:36Z" level=info msg="Testing certificate renew..." providerName=lets-encrypt.acme
time="2019-09-18T17:37:36Z" level=info msg="Starting provider *docker.Provider {\"watch\":true,\"endpoint\":\"unix:///var/run/docker.sock\",\"defaultRule\":\"Host(`{{ trimPrefix `/` .Name }}.local`)\",\"exposedByDefault\":true,\"swarmModeRefreshSeconds\":15000000000}"
time="2019-09-18T17:37:36Z" level=debug msg="Configuration received from provider file: {\"http\":{\"middlewares\":{\"redirect\":{\"redirectScheme\":{\"scheme\":\"https\"}}}},\"tcp\":{},\"tls\":{}}" providerName=file
time="2019-09-18T17:37:36Z" level=debug msg="Configuration received from provider lets-encrypt.acme: {\"http\":{},\"tls\":{}}" providerName=lets-encrypt.acme
time="2019-09-18T17:37:36Z" level=debug msg="Provider connection established with docker 17.05.0-ce (API 1.29)" providerName=docker
time="2019-09-18T17:37:36Z" level=debug msg="No default certificate, generating one"
time="2019-09-18T17:37:36Z" level=error msg="port is missing" container=/watchtower-edc6e2769299e33a59a03e30db4a0b109a1ad3d9470ef055abd9ee0c99d70407 providerName=docker
time="2019-09-18T17:37:36Z" level=debug msg="Configuration received from provider docker: {\"http\":{\"routers\":{\"/openvpn\":{\"service\":\"/openvpn\",\"rule\":\"Host(`openvpn.local`)\"},\"/portainer\":{\"service\":\"/portainer\",\"rule\":\"Hst(`portainer.local`)\"},\"/traefik\":{\"service\":\"/traefik\",\"rule\":\"Host(`traefik.local`)\"},\"hello\":{\"entryPoints\":[\"web-secure\"],\"service\":\"/hello\",\"rule\":\"Host(`cloud.mydomain.de`)\",\"tls\":{\"certResolver\":\"lets-encrypt\"}},\"hellotest\":{\"entryPoints\":[\"web\"],\"middlewares\":[\"redirect@file\"],\"service\":\"/hello\",\"rule\":\"Host(`cloud.mydomain.de`)\"}},\"services\":{\"/hello\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://172.17.0.6:80\"}],\"passHostHeader\":true}},\"/openvpn\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://172.17.0.4:943\"}],\"passHostHeader\":true}},\"/portainer\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://172.17.0.2:8000\"}],\"passHostHeader\":true}},\"/traefik\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://172.17.0.5:80\"}],\"passHostHeader\":true}}}},\"tcp\":{}}"providerName=docker
time="2019-09-18T17:37:37Z" level=debug msg="Adding certificate for domain(s) cloud.mydomain.de"
time="2019-09-18T17:37:37Z" level=debug msg="No default certificate, generating one"
time="2019-09-18T17:37:37Z" level=debug msg="Adding certificate for domain(s) cloud.mydomain.de"
time="2019-09-18T17:37:37Z" level=debug msg="No default certificate, generating one"
time="2019-09-18T17:37:37Z" level=debug msg="No entryPoint defined for this router, using the default one(s) instead: [traefik web web-secure]" routerName=/openvpn@docker
time="2019-09-18T17:37:37Z" level=debug msg="No entryPoint defined for this router, using the default one(s) instead: [traefik web web-secure]" routerName=/portainer@docker
time="2019-09-18T17:37:37Z" level=debug msg="No entryPoint defined for this router, using the default one(s) instead: [traefik web web-secure]" routerName=/traefik@docker
time="2019-09-18T17:37:37Z" level=debug msg="Creating middleware" entryPointName=web routerName=hellotest@docker serviceName=/hello middlewareName=pipelining middlewareType=Pipelining
time="2019-09-18T17:37:37Z" level=debug msg="Creating load-balancer" entryPointName=web routerName=hellotest@docker serviceName=/hello
time="2019-09-18T17:37:37Z" level=debug msg="Creating server 0 http://172.17.0.6:80" routerName=hellotest@docker serviceName=/hello entryPointName=web serverName=0
time="2019-09-18T17:37:37Z" level=debug msg="Added outgoing tracing middleware /hello" middlewareName=tracing middlewareType=TracingForwarder entryPointName=web routerName=hellotest@docker
time="2019-09-18T17:37:37Z" level=debug msg="Creating middleware" middlewareName=redirect@file middlewareType=RedirectScheme routerName=hellotest@docker entryPointName=web
time="2019-09-18T17:37:37Z" level=debug msg="Setting up redirection to https " middlewareName=redirect@file middlewareType=RedirectScheme routerName=hellotest@docker entryPointName=web
time="2019-09-18T17:37:37Z" level=debug msg="Adding tracing to middleware" routerName=hellotest@docker entryPointName=web middlewareName=redirect@file
time="2019-09-18T17:37:37Z" level=debug msg="Creating middleware" routerName=/openvpn@docker serviceName=/openvpn middlewareName=pipelining middlewareType=Pipelining entryPointName=web
time="2019-09-18T17:37:37Z" level=debug msg="Creating load-balancer" routerName=/openvpn@docker serviceName=/openvpn entryPointName=web
time="2019-09-18T17:37:37Z" level=debug msg="Creating server 0 http://172.17.0.4:943" serviceName=/openvpn entryPointName=web serverName=0 routerName=/openvpn@docker
time="2019-09-18T17:37:37Z" level=debug msg="Added outgoing tracing middleware /openvpn" entryPointName=web routerName=/openvpn@docker middlewareName=tracing middlewareType=TracingForwarder
time="2019-09-18T17:37:37Z" level=debug msg="Creating middleware" routerName=/portainer@docker serviceName=/portainer middlewareName=pipelining middlewareType=Pipelining entryPointName=web
time="2019-09-18T17:37:37Z" level=debug msg="Creating load-balancer" entryPointName=web routerName=/portainer@docker serviceName=/portainer
time="2019-09-18T17:37:37Z" level=debug msg="Creating server 0 http://172.17.0.2:8000" serviceName=/portainer entryPointName=web serverName=0 routerName=/portainer@docker
time="2019-09-18T17:37:37Z" level=debug msg="Added outgoing tracing middleware /portainer" middlewareType=TracingForwarder entryPointName=web routerName=/portainer@docker middlewareName=tracing
time="2019-09-18T17:37:37Z" level=debug msg="Creating middleware" entryPointName=web routerName=/traefik@docker serviceName=/traefik middlewareName=pipelining middlewareType=Pipelining
time="2019-09-18T17:37:37Z" level=debug msg="Creating load-balancer" entryPointName=web routerName=/traefik@docker serviceName=/traefik
time="2019-09-18T17:37:37Z" level=debug msg="Creating server 0 http://172.17.0.5:80" serverName=0 entryPointName=web routerName=/traefik@docker serviceName=/traefik
time="2019-09-18T17:37:37Z" level=debug msg="Added outgoing tracing middleware /traefik" entryPointName=web routerName=/traefik@docker middlewareName=tracing middlewareType=TracingForwarder
time="2019-09-18T17:37:37Z" level=debug msg="Creating middleware" middlewareName=traefik-internal-recovery middlewareType=Recovery entryPointName=web
time="2019-09-18T17:37:37Z" level=debug msg="Creating middleware" middlewareType=Recovery middlewareName=traefik-internal-recovery entryPointName=traefik
time="2019-09-18T17:37:37Z" level=debug msg="Creating middleware" entryPointName=web-secure middlewareType=Recovery middlewareName=traefik-internal-recovery
time="2019-09-18T17:37:37Z" level=debug msg="Creating middleware" middlewareName=pipelining entryPointName=web-secure routerName=hello@docker serviceName=/hello middlewareType=Pipelining
time="2019-09-18T17:37:37Z" level=debug msg="Creating load-balancer" serviceName=/hello entryPointName=web-secure routerName=hello@docker
time="2019-09-18T17:37:37Z" level=debug msg="Creating server 0 http://172.17.0.6:80" entryPointName=web-secure routerName=hello@docker serviceName=/hello serverName=0
time="2019-09-18T17:37:37Z" level=debug msg="Added outgoing tracing middleware /hello" entryPointName=web-secure routerName=hello@docker middlewareName=tracing middlewareType=TracingForwarder
time="2019-09-18T17:37:37Z" level=debug msg="Creating middleware" entryPointName=web-secure middlewareName=traefik-internal-recovery middlewareType=Recovery
time="2019-09-18T17:37:37Z" level=debug msg="Try to challenge certificate for domain [cloud.mydomain.de] founded in HostSNI rule" rule="Host(`cloud.mydomain.de`)" providerName=lets-encrypt.acme routerName=hello
time="2019-09-18T17:37:37Z" level=debug msg="Looking for provided certificate(s) to validate [\"cloud.mydomain.de\"]..." routerName=hello rule="Host(`cloud.mydomain.de`)" providerName=lets-encrypt.acme
time="2019-09-18T17:37:37Z" level=debug msg="No ACME certificate generation required for domains [\"cloud.mydomain.de\"]." providerName=lets-encrypt.acme routerName=hello rule="Host(`cloud.mydomain.de`)"
@traefiker
Copy link
Contributor

Hi! I'm Træfiker 🤖 the bot in charge of communication regulation.

Thanks for your interest in Traefik!

We dedicate the issue tracker to bug reports and feature requests only. My advanced AI has spotted that your issue might be a configuration problem or relates to something that doesn't look like a bug.

To confirm this, please join our Community Forum and reach out to us on the Traefik section.

In case I'm wrong (well, that would be embarrassing 😅), my developers will re-open the issue and fix me!

In the meantime, you can double check Traefik's documentation.

@dduportal
Copy link
Contributor

Hi @mrvnklm , when you enable the "file provider", it means you are enabling the dynamic configuration to be retrieved from a file, while traefik.yml is the file containing the static configuration. Reference: https://docs.traefik.io/v2.0/getting-started/configuration-overview/#the-static-configuration.

Try to define routers and services in the file specified by providers.file.filename and let us know in the community forum (as it's not a Traefik bug but a configuration issue :) ). Thanks a lot!

If you feel that the documentation did not point you to the right element:

  • Let's first solve your problem in the forum
  • Then feel free to open an issue (or a PR) describing how the documentation could be improved

@traefik traefik locked and limited conversation to collaborators Oct 20, 2019
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

3 participants