Hi,
Thanks for your post and explanation. It did not work out really for me. A one-on-one "copy" of your config is functioning, but I think it is mainly driven by assigning a dedicated backpool in step 5. As I tested it, this does not make it possible to have to HTTPS backends - as you override it.
Where I want to end is:
managed by haproxy
{--------------------------------------}
https://www.domain1.com -----|
|
https://sub1.domain1.com -----|---> server1 (running multiple dockers SSL and proxy managed by traefik)
|
https://sub2.domain1.com -----|
managed by haproxy
{--------------------------------------}
https://www.domain2.com -----|
|---> server2 (running multiple dockers SSL and proxy managed by traefik)
https://sub1.domain2.com -----|
I was hoping that:
In the conditions section combined with the addtion in the public service of:
would do the trick. Unfortunately, this did not work out.
Any ideas/pointers?
Thanks for your post and explanation. It did not work out really for me. A one-on-one "copy" of your config is functioning, but I think it is mainly driven by assigning a dedicated backpool in step 5. As I tested it, this does not make it possible to have to HTTPS backends - as you override it.
Where I want to end is:
managed by haproxy
{--------------------------------------}
https://www.domain1.com -----|
|
https://sub1.domain1.com -----|---> server1 (running multiple dockers SSL and proxy managed by traefik)
|
https://sub2.domain1.com -----|
managed by haproxy
{--------------------------------------}
https://www.domain2.com -----|
|---> server2 (running multiple dockers SSL and proxy managed by traefik)
https://sub1.domain2.com -----|
I was hoping that:
Code Select
SNI TLS extension contains (TCP request content inspection)
In the conditions section combined with the addtion in the public service of:
Code Select
tcp-request inspect-delay 5s
tcp-request content accept if { req_ssl_hello_type 1 }
would do the trick. Unfortunately, this did not work out.
Any ideas/pointers?