# Do not edit this file manually.#global uid 80 gid 80 chroot /var/haproxy daemon stats socket /var/run/haproxy.socket group proxy mode 775 level admin nbthread 6 hard-stop-after 60s no strict-limits tune.ssl.ocsp-update.mindelay 300 tune.ssl.ocsp-update.maxdelay 3600 httpclient.resolvers.prefer ipv4 tune.ssl.default-dh-param 2048 spread-checks 2 tune.bufsize 16384 tune.lua.maxmem 0 log /var/run/log local0 info lua-prepend-path /tmp/haproxy/lua/?.luadefaults log global option redispatch -1 timeout client 60s timeout connect 60s timeout server 60s retries 3 default-server init-addr last,libc# autogenerated entries for ACLs# autogenerated entries for config in backends/frontends# autogenerated entries for stats# Frontend: Letsencrypt_80 ()frontend Letsencrypt_80 bind 192.168.252.253:80 name 192.168.252.253:80 mode tcp default_backend acme_challenge_backend # logging options # ACL: find_acme_challenge acl acl_6546b7f7e92430.59551874 path_beg -i /.well-known/acme-challenge/ # ACTION: redirect_acme_challenges use_backend acme_challenge_backend if acl_6546b7f7e92430.59551874# Frontend: LetsEncrypt_service.de (LetsEncrypt_service.de)frontend LetsEncrypt_service.de http-response set-header Strict-Transport-Security "max-age=15768000; includeSubDomains; preload" bind 192.168.252.253:443 name 192.168.252.253:443 ssl prefer-client-ciphers ssl-min-ver TLSv1.2 ciphers ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256 ciphersuites TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256 alpn h2,http/1.1 crt-list /tmp/haproxy/ssl/657480646e0916.14570670.certlist mode http option http-keep-alive # logging options # ACL: Cloud acl acl_6574814183df20.44437889 ssl_fc_sni c.service.de # ACL: Bitwarden acl acl_6574821b797e36.16475695 hdr(host) -i v.service.de # ACL: BItwarden Archiv acl acl_6574823ea51b23.44386971 hdr(host) -i archiv.service.de # ACL: invoice1 acl acl_657481f7177426.76902867 hdr(host) -i invoice.service.de # ACL: find_acme_challenge acl acl_6546b7f7e92430.59551874 path_beg -i /.well-known/acme-challenge/ # ACL: telefon acl acl_65ae234d52eaa2.85527754 hdr(host) -i telefon.service.de # ACL: Grommunino1 acl acl_664c906453f702.68929731 hdr(host) -i mail.service.de # ACL: Keycloak acl acl_668a627a78cb38.48749184 path_beg -i /auth # ACL: Autodiscover acl acl_657481df6faa20.35926111 hdr(host) -i autodiscover.service.de # ACL: Grommunino2 acl acl_66aa0b17cdf2b9.22616028 hdr(host) -i mail.service.de # ACTION: Cloud use_backend Cloud if acl_6574814183df20.44437889 # ACTION: Bitwarden use_backend Bitwarden if acl_6574821b797e36.16475695 # ACTION: BitwardenArchiv use_backend BitwardenArchiv if acl_6574823ea51b23.44386971 # ACTION: invoice1 use_backend invoice if acl_657481f7177426.76902867 # ACTION: redirect_acme_challenges use_backend acme_challenge_backend if acl_6546b7f7e92430.59551874 # ACTION: telefon use_backend telefon if acl_65ae234d52eaa2.85527754 # ACTION: Mailserver use_backend Mail1 if acl_664c906453f702.68929731 # ACTION: Keycloak use_backend Keycloak if acl_668a627a78cb38.48749184 # ACTION: Mail2 use_backend Mail2 if acl_657481df6faa20.35926111 || acl_66aa0b17cdf2b9.22616028 # WARNING: pass through options below this line redirect scheme https code 301 if !{ ssl_fc }# Frontend: telefon_5222 ()frontend telefon_5222 bind 192.168.252.253:5222 name 192.168.252.253:5222 mode tcp default_backend telefon5222 # logging options# Frontend: telefon_5060 ()frontend telefon_5060 bind 192.168.252.253:5060 name 192.168.252.253:5060 mode tcp default_backend telefon5060 # logging options# Frontend: telefon_5061 ()frontend telefon_5061 bind 192.168.252.253:5061 name 192.168.252.253:5061 mode tcp default_backend telefon5061 # logging options# Frontend: Mailserver_8443 ()frontend Mailserver_8443 bind 192.168.252.253:8443 name 192.168.252.253:8443 mode tcp default_backend Mail2 # logging options# Frontend: LetsEncrypt_test-technik.de (LetsEncrypt_test-technik.de)frontend LetsEncrypt_test-technik.de http-response set-header Strict-Transport-Security "max-age=15768000; includeSubDomains; preload" bind 192.168.252.253:443 name 192.168.252.253:443 ssl prefer-client-ciphers ssl-min-ver TLSv1.2 ciphers ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256 ciphersuites TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256 alpn h2,http/1.1 crt-list /tmp/haproxy/ssl/66ad001d7bbba8.47335583.certlist mode http option http-keep-alive # logging options # ACL: find_acme_challenge acl acl_6546b7f7e92430.59551874 path_beg -i /.well-known/acme-challenge/ # ACL: invoice2 acl acl_66acf64f3d9ab6.26511269 hdr(host) -i www.test-technik.de # ACTION: redirect_acme_challenges use_backend acme_challenge_backend if acl_6546b7f7e92430.59551874 # ACTION: invoice2 use_backend invoice if acl_66acf64f3d9ab6.26511269 # WARNING: pass through options below this line redirect scheme https code 301 if !{ ssl_fc }# Backend: acme_challenge_backend (Added by ACME Client plugin)backend acme_challenge_backend # health checking is DISABLED mode http balance source # stickiness stick-table type ip size 50k expire 30m stick on src http-reuse safe server acme_challenge_host 127.0.0.1:43580 # Backend: Cloud ()backend Cloud # health checking is DISABLED mode http balance source # stickiness stick-table type ip size 50k expire 30m stick on src http-reuse safe server Cloud 192.168.211.32:80 # Backend: invoice ()backend invoice # health checking is DISABLED mode http balance source # stickiness stick-table type ip size 50k expire 30m stick on src # WARNING: pass through options below this line http-request set-header X-Real-IP %[src] http-reuse safe server invoice 192.168.211.30:443 ssl verify none# Backend: Bitwarden ()backend Bitwarden # health checking is DISABLED mode http balance source # stickiness stick-table type ip size 50k expire 30m stick on src retries 3 # WARNING: pass through options below this line http-request set-header X-Real-IP %[src] http-reuse safe server Bitwarden 192.168.211.31:8080 # Backend: BitwardenArchiv ()backend BitwardenArchiv # health checking is DISABLED mode http balance source # stickiness stick-table type ip size 50k expire 30m stick on src http-reuse safe server BitwardenArchiv 192.168.211.73:443 ssl verify none# Backend: telefon ()backend telefon # health checking is DISABLED mode http balance source # stickiness stick-table type ip size 50k expire 30m stick on src http-reuse safe server telefon443 192.168.211.5:443 ssl verify none# Backend: Mail1 ()backend Mail1 # health checking is DISABLED mode http balance source # stickiness stick-table type ip size 50k expire 30m cookie KC_ROUTE insert indirect nocache # WARNING: pass through options below this line http-request set-header X-Forwarded-Proto https if { ssl_fc } http-request set-header X-Forwarded-Port 443 http-request set-header X-Forwarded-For %[src] option forwardfor http-reuse safe option forwardfor server Mailserver 192.168.211.33:443 ssl alpn h2,http/1.1 verify none cookie 6607c74887063778516557# Backend: telefon5222 ()backend telefon5222 # health checking is DISABLED mode tcp balance source # stickiness stick-table type ip size 50k expire 30m stick on src server telefon5222 192.168.211.5:5222 # Backend: telefon5060 ()backend telefon5060 # health checking is DISABLED mode tcp balance source # stickiness stick-table type ip size 50k expire 30m stick on src server telefon5060 192.168.211.5:5060 # Backend: telefon5061 ()backend telefon5061 # health checking is DISABLED mode tcp balance source # stickiness stick-table type ip size 50k expire 30m stick on src server telefon5061 192.168.211.5:5061 # Backend: Keycloak ()backend Keycloak # health checking is DISABLED mode http balance source # stickiness stick-table type ip size 50k expire 30m cookie KC_ROUTE insert indirect nocache # WARNING: pass through options below this line http-request set-header X-Forwarded-Proto https if { ssl_fc } http-request set-header X-Forwarded-Port 443 http-request set-header X-Forwarded-For %[src] option forwardfor http-reuse safe option forwardfor server Keycloak 192.168.211.33:8080 cookie 668a62bcb6c3f299187837# Backend: Mail2 ()backend Mail2 # health checking is DISABLED mode http balance source # stickiness stick-table type ip size 50k expire 30m cookie KC_ROUTE insert indirect nocache # WARNING: pass through options below this line http-request set-header X-Forwarded-Proto https if { ssl_fc } http-request set-header X-Forwarded-Port 443 http-request set-header X-Forwarded-For %[src] option forwardfor http-reuse safe option forwardfor server Mail2 192.168.211.83:443 ssl alpn h2,http/1.1 verify none cookie 66aa0aef4fe2c713022817 server Mail21 192.168.211.83:8443 ssl alpn h2,http/1.1 verify none cookie 66aa2aaf5fe7c129653610# statistics are DISABLED
# ACTION: redirect_acme_challenges use_backend acme_challenge_backend if acl_6546b7f7e92430.59551874 # ACTION: telefon use_backend telefon if acl_65ae234d52eaa2.85527754 # Frontend: telefon_5222 ()frontend telefon_5222 bind 192.168.252.253:5222 name 192.168.252.253:5222 mode tcp default_backend telefon5222 # logging options# Frontend: telefon_5060 ()frontend telefon_5060 bind 192.168.252.253:5060 name 192.168.252.253:5060 mode tcp default_backend telefon5060 # logging options# Frontend: telefon_5061 ()frontend telefon_5061 bind 192.168.252.253:5061 name 192.168.252.253:5061 mode tcp default_backend telefon5061 # logging options# Frontend: LetsEncrypt_test-technik.de (LetsEncrypt_test-technik.de)frontend LetsEncrypt_test-technik.de http-response set-header Strict-Transport-Security "max-age=15768000; includeSubDomains; preload" bind 192.168.252.253:443 name 192.168.252.253:443 ssl prefer-client-ciphers ssl-min-ver TLSv1.2 ciphers ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256 ciphersuites TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256 alpn h2,http/1.1 crt-list /tmp/haproxy/ssl/66ad001d7bbba8.47335583.certlist mode http option http-keep-alive # logging options # ACL: find_acme_challenge acl acl_6546b7f7e92430.59551874 path_beg -i /.well-known/acme-challenge/ # ACL: invoice2 acl acl_66acf64f3d9ab6.26511269 hdr(host) -i www.test-technik.de # ACTION: redirect_acme_challenges use_backend acme_challenge_backend if acl_6546b7f7e92430.59551874 # ACTION: invoice2 use_backend invoice if acl_66acf64f3d9ab6.26511269 # WARNING: pass through options below this line redirect scheme https code 301 if !{ ssl_fc }# Backend: acme_challenge_backend (Added by ACME Client plugin)backend acme_challenge_backend # health checking is DISABLED mode http balance source # stickiness stick-table type ip size 50k expire 30m stick on src http-reuse safe server acme_challenge_host 127.0.0.1:43580 # Backend: telefon ()backend telefon # health checking is DISABLED mode http balance source # stickiness stick-table type ip size 50k expire 30m stick on src http-reuse safe server telefon443 192.168.211.5:443 ssl verify none# Backend: telefon5222 ()backend telefon5222 # health checking is DISABLED mode tcp balance source # stickiness stick-table type ip size 50k expire 30m stick on src server telefon5222 192.168.211.5:5222 # Backend: telefon5060 ()backend telefon5060 # health checking is DISABLED mode tcp balance source # stickiness stick-table type ip size 50k expire 30m stick on src server telefon5060 192.168.211.5:5060 # Backend: telefon5061 ()backend telefon5061 # health checking is DISABLED mode tcp balance source # stickiness stick-table type ip size 50k expire 30m stick on src server telefon5061 192.168.211.5:5061