SNI TLS extension contains (TCP request content inspection)
tcp-request inspect-delay 5stcp-request content accept if { req_ssl_hello_type 1 }
Hi,Thanks for your post and explanation. It did not work out really for me. A one-on-one "copy" of your config is functioning, but I think it is mainly driven by assigning a dedicated backpool in step 5. As I tested it, this does not make it possible to have to HTTPS backends - as you override it.Where I want to end is: managed by haproxy{--------------------------------------}https://www.domain1.com -----| |https://sub1.domain1.com -----|---> server1 (running multiple dockers SSL and proxy managed by traefik) |https://sub2.domain1.com -----| managed by haproxy{--------------------------------------}https://www.domain2.com -----| |---> server2 (running multiple dockers SSL and proxy managed by traefik)https://sub1.domain2.com -----|I was hoping that:Code: [Select]SNI TLS extension contains (TCP request content inspection)In the conditions section combined with the addtion in the public service of:Code: [Select]tcp-request inspect-delay 5stcp-request content accept if { req_ssl_hello_type 1 }would do the trick. Unfortunately, this did not work out.Any ideas/pointers?
Oh... sorry... I was to blind..Solution: Edit Server --> advanced mode --> Option pass-through "send-proxy".
# Frontend: http ()frontend http bind 0.0.0.0:80 name 0.0.0.0:80 mode http option http-keep-alive option forwardfor # tuning options timeout client 30s # logging options # ACL: xxx_ACL_httpacl acl_625d3134619400.72128715 hdr_sub(host) -i xxx.xxxx.deuse_backend xxx_http_proxy-protocol_backend if acl acl_625d3134619400.72128715# Frontend: https ()frontend https bind 0.0.0.0:443 name 0.0.0.0:443 mode tcp # tuning options timeout client 30s # logging options # ACL: xxx_ACL_https acl acl_625d3134619400.72128715 req.ssl_sni -m sub -i xx.xxxx.de # ACTION: xxx_https_rule use_backend xxx_https_proxy-protocol_backend if acl_625d3134619400.72128715# Backend: xxx_http_proxy-protocol_backend ()backend xxx_http_proxy-protocol_backend # health checking is DISABLED mode http balance source # stickiness stick-table type ip size 50k expire 30m stick on src # tuning options timeout connect 30s timeout server 30s http-reuse safe server xxx_http IP:80 send-proxy-v2 check-send-proxy send-proxy# Backend: xxx_https_proxy-protocol_backend ()backend xxx_https_proxy-protocol_backend # health checking is DISABLED mode tcp balance source # stickiness stick-table type ip size 50k expire 30m stick on src # tuning options timeout connect 30s timeout server 30s server xxx_https IP:443 send-proxy check-send-proxy send-proxy