host: feniks.domain.netserver: 192.168.10.1response: A feniks.domain.net. 3600 IN A 192.168.10.200 192.168.10.1 0 msec
# /usr/sbin/traceroute -w 2 -n -m '18' 'feniks.domain.net'traceroute to feniks.domain.net (192.168.10.200), 18 hops max, 40 byte packets 1 192.168.10.200 0.787 ms 0.462 ms 0.475 ms
Pinging feniks.domain.net [192.168.10.200] with 32 bytes of data:Reply from 192.168.10.200: bytes=32 time<1ms TTL=64
Tracing route to feniks.domain.net [192.168.10.200]over a maximum of 30 hops: 1 <1 ms <1 ms <1 ms FENIKS.domain.net [192.168.10.200]Trace complete.
Some extra troubleshooting.Interfaces: Diagnostics: DNS Lookuphost: feniks.domain.netserver: 192.168.10.1response: A feniks.domain.net. 3600 IN A 192.168.10.200 192.168.10.1 0 msecso now i'm lost i'll try to find/set-up another internal website to test with.
I am unable to help here. Please ask the people that already did the things you mentioned.
How can we load balance TCP traffic that we don't want to get SSL offloaded, f.e. OpenVPN over TCP?In my tutorial I only explain how to "redirect+load balance SSL offloaded traffic".This is because I myself don't have (yet) the need to actually load balance any non SSL traffic.However balancing non SSL traffic is pretty much the same as balancing SSL traffic.You only have to make sure that your "NOSSLservice_rule" or "NOSSLservices_map-file_rule" is placed on the "SNI_frontend" instead of the "HTTPS_frontend" and that the backend that belongs to your
## Automatically generated configuration.# Do not edit this file manually.#global uid 80 gid 80 chroot /var/haproxy daemon stats socket /var/run/haproxy.socket group proxy mode 775 level admin nbthread 4 hard-stop-after 60s no strict-limits maxconn 10000 tune.ssl.default-dh-param 4096 spread-checks 2 tune.bufsize 16384 tune.lua.maxmem 0 log /var/run/log local0 info lua-prepend-path /tmp/haproxy/lua/?.luadefaults log global option redispatch -1 maxconn 5000 timeout client 30s timeout connect 30s timeout server 30s retries 3 default-server init-addr last,libc# autogenerated entries for ACLs# autogenerated entries for config in backends/frontends# autogenerated entries for stats# Frontend: 1_HTTP_Frontend (Listening on 127.4.4.3:80)frontend 1_HTTP_Frontend bind 127.4.4.3:80 name 127.4.4.3:80 accept-proxy mode http option http-keep-alive option forwardfor # logging options # ACL: NoSSL_condition acl acl_63de5470175f22.54470191 ssl_fc # ACTION: HTTPtoHTTPS_rule http-request redirect scheme https code 301 if !acl_63de5470175f22.54470191# Frontend: 0_SNI_Frontend (Listening on 0.0.0.0:80, 0.0.0.0:443)frontend 0_SNI_Frontend bind 0.0.0.0:443 name 0.0.0.0:443 bind 0.0.0.0:80 name 0.0.0.0:80 mode tcp default_backend SSL_Backend # logging options# Frontend: 1_HTTPS_Frontend (Listening on 127.4.4.3:443)frontend 1_HTTPS_Frontend http-response set-header Strict-Transport-Security "max-age=63072000; includeSubDomains; preload" bind 127.4.4.3:443 name 127.4.4.3:443 accept-proxy ssl curves secp384r1 no-sslv3 no-tlsv10 no-tlsv11 no-tls-tickets ciphers ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES256-GCM-SHA384 ciphersuites TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256 alpn h2,http/1.1 crt-list /tmp/haproxy/ssl/63de597c094f01.72503480.certlist mode http option http-keep-alive option forwardfor timeout client 15m # logging options # ACTION: PUBLIC_SUBDOMAINS_map-rule # NOTE: actions with no ACLs/conditions will always match use_backend %[req.hdr(host),lower,map_dom(/tmp/haproxy/mapfiles/63de5520a92049.75714996.txt)] # Backend: SSL_Backend ()backend SSL_Backend # health checking is DISABLED mode tcp balance source # stickiness stick-table type ip size 50k expire 30m stick on src server SSL_server 127.4.4.3 send-proxy-v2 check-send-proxy# Backend: BITWARDEN_backend ()backend BITWARDEN_backend # health checking is DISABLED mode http balance source # stickiness stick-table type ip size 50k expire 30m stick on src http-reuse safe server BITWARDEN 192.168.2.55:80 ssl verify none# Backend: CALIBRE_backend ()backend CALIBRE_backend # health checking is DISABLED mode http balance source # stickiness stick-table type ip size 50k expire 30m stick on src http-reuse safe server CALIBRE 192.168.2.40:8083 ssl verify none# statistics are DISABLED
Thx you @TheHellSite for this tutorial. Unfortunately I cannot get it to work. I always get a "503 service unavaible status"If I use the internal addresses of the websites (192.168.2.40:8083 for example) I can login. But using the website.domain.com I get a 503 error. In the logs I see that the client is accessing the public Ip on port 443.