server jellyfin 10.0.0.10:8090 check inter 2s port 8090 ssl verify none
The error is not related to your dual WAN setup. I misread something in your HAProxy config... Code: [Select]server jellyfin 10.0.0.10:8090 check inter 2s port 8090 ssl verify noneYou see that "ssl" word in your server config? SSL and HTTP don't like each other! Since your services are NOT using HTTPS but only HTTP locally... you need to UNCHECK the SSL checkbox in the HAProxy real server config for both of your servers.
Quote from: Lip90 on September 14, 2021, 01:08:53 pm@TheHellSiteI think the problem is with the SNI frontend. Here the SSL backend is specified as the default backend. He doesn't even look at the MAP file. he forwards everything to the SSL backend. When I set the openvpn backend as default Backend for a test in the SNI frontend, openvpn work but the other things not. do you have an idea how I can solve this?I was just about to write you exactly this! Your reply confirmed my guess.Looking through the manual pages of HAProxy it seems that the "Default Backend" setting can only be overwritten by a "Use Backend" rule! Which a "Use map file" rule isn't able to.https://www.haproxy.com/de/blog/the-four-essential-sections-of-an-haproxy-configuration/But I can't imagine that this is the intended behaviour. Anyways... you simply need to create a VPN_condition "host starts with vpn" and a "use backend OPENVPN_backend if VPN_condition=true" rule.Add this rule to the SNI_frontend and set the default backend back to the SSL_backend.
@TheHellSiteI think the problem is with the SNI frontend. Here the SSL backend is specified as the default backend. He doesn't even look at the MAP file. he forwards everything to the SSL backend. When I set the openvpn backend as default Backend for a test in the SNI frontend, openvpn work but the other things not. do you have an idea how I can solve this?
Quote from: TheHellSite on September 14, 2021, 02:31:50 pmI was just about to write you exactly this! Your reply confirmed my guess.Looking through the manual pages of HAProxy it seems that the "Default Backend" setting can only be overwritten by a "Use Backend" rule! Which a "Use map file" rule isn't able to.https://www.haproxy.com/de/blog/the-four-essential-sections-of-an-haproxy-configuration/But I can't imagine that this is the intended behaviour. Anyways... you simply need to create a VPN_condition "host starts with vpn" and a "use backend OPENVPN_backend if VPN_condition=true" rule.Add this rule to the SNI_frontend and set the default backend back to the SSL_backend.Am I confused about this? It looks like the current set up on page one will not work due to "default backend"??
I was just about to write you exactly this! Your reply confirmed my guess.Looking through the manual pages of HAProxy it seems that the "Default Backend" setting can only be overwritten by a "Use Backend" rule! Which a "Use map file" rule isn't able to.https://www.haproxy.com/de/blog/the-four-essential-sections-of-an-haproxy-configuration/But I can't imagine that this is the intended behaviour. Anyways... you simply need to create a VPN_condition "host starts with vpn" and a "use backend OPENVPN_backend if VPN_condition=true" rule.Add this rule to the SNI_frontend and set the default backend back to the SSL_backend.
Hi everyoneFirst of all.. Awesome guide and even so, that you update it with new stuff as it comes along.Iv been kinda hitting my head for a day or two now and gotta throw in the towel, and put my troubles in here.im running a small test setup, where im gonna have a couple of web services running, but the thing is here, they are running traefik with there own LE ssl validation and so. but i cant get HAproxy to work propper.
I configured my Dyndns as suggested with dedyn.io and have now a domain.dedyn.io properly working. Your tutorial now assumes to create wildcard certificates for the *.domain.dedyn.io (in my case)I have a main domain registered with a poster somewhere else which is domain.com. Historically I reach my dyndns based subdomains via CNAME DNS entries at my main domain provider's DNS systems, eg home.domain.com points then to home.domain.dedyn.io.It is now possible to let the acme client generate wildcard certificates also for *.domain.com accordingly in addition/replacing the wildcard certs for *.domain.dedyn.io?
Hey @TheHellSite, Do you know a way I can add Basic Auth to one of the sub domains? I have a dashboard which just runs without login and I would really like it secured behind just basic auth if possible.I tried creating a condition and a rule and applying it to the sub domain but it doesnt seem to work. I also saw on the backend there is an option on the domain for basic auth checkbox, so I tried that but no dice either.Any chance you can add a section to the guide about securing singular domains with basic auth?