- html - 出于某种原因,IE8 对我的 Sass 文件中继承的 html5 CSS 不友好?
- JMeter 在响应断言中使用 span 标签的问题
- html - 在 :hover and :active? 上具有不同效果的 CSS 动画
- html - 相对于居中的 html 内容固定的 CSS 重复背景?
我在使用 stable/traefik Helm 图时遇到问题。 traefik.example.org(仪表板)的 DNS 记录正在运行,但我的 Let's Encrypt 证书无效。我使用 DNS-01 进行挑战。
这是我的 values.yml:
ssl:
enabled: true
enforced: true
acme:
enabled: true
challengeType: "dns-01"
dnsProvider:
name: ovh
existingSecretName: ""
ovh:
OVH_ENDPOINT: "ovh-eu"
OVH_APPLICATION_KEY: "<key>"
OVH_APPLICATION_SECRET: "<secret-key>"
OVH_CONSUMER_KEY: "<consumer-key>"
email: contact@example.org
onHostRule: true
staging: true
logging: true
# Configure a Let's Encrypt certificate to be managed by default.
# This is the only way to request wildcard certificates (works only with dns challenge).
domains:
enabled: true
# List of sets of main and (optional) SANs to generate for
# for wildcard certificates see https://docs.traefik.io/configuration/acme/#wildcard-domains
domainsList:
- main: "*.example.org"
- sans:
- "example.org"
helm install stable/traefik --name traefik -f values.yml --set dashboard.enabled=true,dashboard.domain=traefik.example.org --set rbac.enabled=true --set ssl.enabled=true,ssl.enforced=true,acme.enabled=true,acme.email=contact@example.org
{"level":"info","msg":"Using TOML configuration file /config/traefik.toml","time":"2019-04-21T12:52:09Z"}
{"level":"info","msg":"No tls.defaultCertificate given for https: using the first item in tls.certificates as a fallback.","time":"2019-04-21T12:52:09Z"}
{"level":"info","msg":"Traefik version v1.7.9 built on 2019-02-11_11:36:32AM","time":"2019-04-21T12:52:09Z"}
{"level":"debug","msg":"Global configuration loaded {"LifeCycle":{"RequestAcceptGraceTimeout":0,"GraceTimeOut":10000000000},"GraceTimeOut":0,"Debug":true,"CheckNewVersion":true,"SendAnonymousUsage":false,"AccessLogsFile":"","AccessLog":null,"TraefikLogsFile":"","TraefikLog":{"format":"json"},"Tracing":null,"LogLevel":"","EntryPoints":{"http":{"Address":":80","TLS":null,"Redirect":{"regex":"^http://(.*)","replacement":"https://$1"},"Auth":null,"WhitelistSourceRange":null,"WhiteList":null,"Compress":true,"ProxyProtocol":null,"ForwardedHeaders":{"Insecure":true,"TrustedIPs":null}},"https":{"Address":":443","TLS":{"MinVersion":"","CipherSuites":null,"Certificates":[{"CertFile":"/ssl/tls.crt","KeyFile":"/ssl/tls.key"}],"ClientCAFiles":null,"ClientCA":{"Files":null,"Optional":false},"DefaultCertificate":{"CertFile":"/ssl/tls.crt","KeyFile":"/ssl/tls.key"},"SniStrict":false},"Redirect":null,"Auth":null,"WhitelistSourceRange":null,"WhiteList":null,"Compress":true,"ProxyProtocol":null,"ForwardedHeaders":{"Insecure":true,"TrustedIPs":null}},"traefik":{"Address":":8080","TLS":null,"Redirect":null,"Auth":{"basic":{"users":["traefik:$apr1$WJ9uAGz0$eQEQP39N8Z95G6ZEUCR3m."]}},"WhitelistSourceRange":null,"WhiteList":null,"Compress":false,"ProxyProtocol":null,"ForwardedHeaders":{"Insecure":true,"TrustedIPs":null}}},"Cluster":null,"Constraints":[],"ACME":{"Email":"support@example.org","Domains":[{"Main":"*.example.org","SANs":["example.org"]}],"Storage":"/acme/acme.json","StorageFile":"","OnDemand":false,"OnHostRule":true,"CAServer":"https://acme-staging-v02.api.letsencrypt.org/directory","EntryPoint":"https","KeyType":"","DNSChallenge":{"Provider":"ovh","DelayBeforeCheck":0,"Resolvers":null,"DisablePropagationCheck":false},"HTTPChallenge":null,"TLSChallenge":null,"DNSProvider":"","DelayDontCheckDNS":0,"ACMELogging":true,"OverrideCertificates":false,"TLSConfig":null},"DefaultEntryPoints":["http","https"],"ProvidersThrottleDuration":2000000000,"MaxIdleConnsPerHost":200,"IdleTimeout":0,"InsecureSkipVerify":false,"RootCAs":null,"Retry":null,"HealthCheck":{"Interval":30000000000},"RespondingTimeouts":null,"ForwardingTimeouts":null,"AllowMinWeightZero":false,"KeepTrailingSlash":false,"Web":null,"Docker":null,"File":null,"Marathon":null,"Consul":null,"ConsulCatalog":null,"Etcd":null,"Zookeeper":null,"Boltdb":null,"Kubernetes":{"Watch":true,"Filename":"","Constraints":[],"Trace":false,"TemplateVersion":0,"DebugLogGeneratedTemplate":false,"Endpoint":"","Token":"","CertAuthFilePath":"","DisablePassHostHeaders":false,"EnablePassTLSCert":false,"Namespaces":null,"LabelSelector":"","IngressClass":"","IngressEndpoint":null},"Mesos":null,"Eureka":null,"ECS":null,"Rancher":null,"DynamoDB":null,"ServiceFabric":null,"Rest":null,"API":{"EntryPoint":"traefik","Dashboard":true,"Debug":true,"CurrentConfigurations":null,"Statistics":null},"Metrics":null,"Ping":null,"HostResolver":null}","time":"2019-04-21T12:52:09Z"}
{"level":"info","msg":"
Stats collection is disabled.
Help us improve Traefik by turning this feature on :)
More details on: https://docs.traefik.io/basics/#collected-data
","time":"2019-04-21T12:52:09Z"}
{"level":"debug","msg":"Setting Acme Certificate store from Entrypoint: https","time":"2019-04-21T12:52:09Z"}
{"level":"debug","msg":"Add certificate for domains *.example.com","time":"2019-04-21T12:52:09Z"}
{"level":"info","msg":"Preparing server traefik &{Address::8080 TLS:<nil> Redirect:<nil> Auth:0xc000534360 WhitelistSourceRange:[] WhiteList:<nil> Compress:false ProxyProtocol:<nil> ForwardedHeaders:0xc00042e4c0} with readTimeout=0s writeTimeout=0s idleTimeout=3m0s","time":"2019-04-21T12:52:09Z"}
{"level":"debug","msg":"Creating regex redirect http -> ^http://(.*) -> https://$1","time":"2019-04-21T12:52:09Z"}
{"level":"info","msg":"Preparing server http &{Address::80 TLS:<nil> Redirect:0xc0002438c0 Auth:<nil> WhitelistSourceRange:[] WhiteList:<nil> Compress:true ProxyProtocol:<nil> ForwardedHeaders:0xc00042e4e0} with readTimeout=0s writeTimeout=0s idleTimeout=3m0s","time":"2019-04-21T12:52:09Z"}
{"level":"info","msg":"Preparing server https &{Address::443 TLS:0xc0002b30e0 Redirect:<nil> Auth:<nil> WhitelistSourceRange:[] WhiteList:<nil> Compress:true ProxyProtocol:<nil> ForwardedHeaders:0xc00042e480} with readTimeout=0s writeTimeout=0s idleTimeout=3m0s","time":"2019-04-21T12:52:09Z"}
{"level":"debug","msg":"Add certificate for domains *.example.com","time":"2019-04-21T12:52:09Z"}
{"level":"info","msg":"Starting provider configuration.ProviderAggregator {}","time":"2019-04-21T12:52:09Z"}
{"level":"info","msg":"Starting server on :8080","time":"2019-04-21T12:52:09Z"}
{"level":"info","msg":"Starting server on :80","time":"2019-04-21T12:52:09Z"}
{"level":"info","msg":"Starting server on :443","time":"2019-04-21T12:52:09Z"}
{"level":"info","msg":"Starting provider *kubernetes.Provider {"Watch":true,"Filename":"","Constraints":[],"Trace":false,"TemplateVersion":0,"DebugLogGeneratedTemplate":false,"Endpoint":"","Token":"","CertAuthFilePath":"","DisablePassHostHeaders":false,"EnablePassTLSCert":false,"Namespaces":null,"LabelSelector":"","IngressClass":"","IngressEndpoint":null}","time":"2019-04-21T12:52:09Z"}
{"level":"info","msg":"Starting provider *acme.Provider {"Email":"support@example.org","ACMELogging":true,"CAServer":"https://acme-staging-v02.api.letsencrypt.org/directory","Storage":"/acme/acme.json","EntryPoint":"https","KeyType":"","OnHostRule":true,"OnDemand":false,"DNSChallenge":{"Provider":"ovh","DelayBeforeCheck":0,"Resolvers":null,"DisablePropagationCheck":false},"HTTPChallenge":null,"TLSChallenge":null,"Domains":[{"Main":"*.example.org","SANs":["example.org"]}],"Store":{}}","time":"2019-04-21T12:52:09Z"}
{"level":"info","msg":"Testing certificate renew...","time":"2019-04-21T12:52:09Z"}
{"level":"debug","msg":"Using Ingress label selector: ""","time":"2019-04-21T12:52:09Z"}
{"level":"info","msg":"ingress label selector is: ""","time":"2019-04-21T12:52:09Z"}
{"level":"info","msg":"Creating in-cluster Provider client","time":"2019-04-21T12:52:09Z"}
{"level":"debug","msg":"Configuration received from provider ACME: {}","time":"2019-04-21T12:52:09Z"}
{"level":"debug","msg":"Looking for provided certificate(s) to validate ["*.example.org" "example.org"]...","time":"2019-04-21T12:52:09Z"}
{"level":"debug","msg":"Domains ["*.example.org" "example.org"] need ACME certificates generation for domains "*.example.org,example.org".","time":"2019-04-21T12:52:09Z"}
{"level":"debug","msg":"Loading ACME certificates [*.example.org example.org]...","time":"2019-04-21T12:52:09Z"}
{"level":"info","msg":"The key type is empty. Use default key type 4096.","time":"2019-04-21T12:52:09Z"}
{"level":"debug","msg":"Add certificate for domains *.example.com","time":"2019-04-21T12:52:09Z"}
{"level":"info","msg":"Server configuration reloaded on :443","time":"2019-04-21T12:52:09Z"}
{"level":"info","msg":"Server configuration reloaded on :8080","time":"2019-04-21T12:52:09Z"}
{"level":"info","msg":"Server configuration reloaded on :80","time":"2019-04-21T12:52:09Z"}
{"level":"debug","msg":"Received Kubernetes event kind *v1.Service","time":"2019-04-21T12:52:09Z"}
{"level":"error","msg":"Service not found for kube-system/traefik-web-ui","time":"2019-04-21T12:52:09Z"}
{"level":"warning","msg":"Endpoints not available for default/traefik-dashboard","time":"2019-04-21T12:52:09Z"}
{"level":"debug","msg":"Configuration received from provider kubernetes: {"backends":{"traefik-ui.minikube/":{"loadBalancer":{"method":"wrr"}},"traefik.example.org":{"loadBalancer":{"method":"wrr"}}},"frontends":{"traefik.example.org":{"entryPoints":["http","https"],"backend":"traefik.example.org","routes":{"traefik.example.org":{"rule":"Host:traefik.example.org"}},"passHostHeader":true,"priority":0,"basicAuth":null}}}","time":"2019-04-21T12:52:09Z"}
{"level":"debug","msg":"Add certificate for domains *.example.com","time":"2019-04-21T12:52:09Z"}
{"level":"debug","msg":"Wiring frontend traefik.example.org to entryPoint http","time":"2019-04-21T12:52:09Z"}
{"level":"debug","msg":"Creating backend traefik.example.org","time":"2019-04-21T12:52:09Z"}
{"level":"debug","msg":"Adding TLSClientHeaders middleware for frontend traefik.example.org","time":"2019-04-21T12:52:09Z"}
{"level":"debug","msg":"Creating load-balancer wrr","time":"2019-04-21T12:52:09Z"}
{"level":"debug","msg":"Creating route traefik.example.org Host:traefik.example.org","time":"2019-04-21T12:52:09Z"}
{"level":"debug","msg":"Wiring frontend traefik.example.org to entryPoint https","time":"2019-04-21T12:52:09Z"}
{"level":"debug","msg":"Creating backend traefik.example.org","time":"2019-04-21T12:52:09Z"}
{"level":"debug","msg":"Adding TLSClientHeaders middleware for frontend traefik.example.org","time":"2019-04-21T12:52:09Z"}
{"level":"debug","msg":"Creating load-balancer wrr","time":"2019-04-21T12:52:09Z"}
{"level":"debug","msg":"Creating route traefik.example.org Host:traefik.example.org","time":"2019-04-21T12:52:09Z"}
{"level":"info","msg":"Server configuration reloaded on :443","time":"2019-04-21T12:52:09Z"}
{"level":"info","msg":"Server configuration reloaded on :8080","time":"2019-04-21T12:52:09Z"}
{"level":"info","msg":"Server configuration reloaded on :80","time":"2019-04-21T12:52:09Z"}
{"level":"debug","msg":"Try to challenge certificate for domain [traefik.example.org] founded in Host rule","time":"2019-04-21T12:52:09Z"}
{"level":"debug","msg":"Looking for provided certificate(s) to validate ["traefik.example.org"]...","time":"2019-04-21T12:52:09Z"}
{"level":"debug","msg":"No ACME certificate generation required for domains ["traefik.example.org"].","time":"2019-04-21T12:52:09Z"}
{"level":"debug","msg":"Received Kubernetes event kind *v1.Secret","time":"2019-04-21T12:52:09Z"}
{"level":"error","msg":"Service not found for kube-system/traefik-web-ui","time":"2019-04-21T12:52:09Z"}
{"level":"warning","msg":"Endpoints not available for default/traefik-dashboard","time":"2019-04-21T12:52:09Z"}
{"level":"debug","msg":"Skipping Kubernetes event kind *v1.Secret","time":"2019-04-21T12:52:09Z"}
{"level":"debug","msg":"Received Kubernetes event kind *v1.Secret","time":"2019-04-21T12:52:09Z"}
{"level":"error","msg":"Service not found for kube-system/traefik-web-ui","time":"2019-04-21T12:52:09Z"}
{"level":"warning","msg":"Endpoints not available for default/traefik-dashboard","time":"2019-04-21T12:52:09Z"}
{"level":"debug","msg":"Skipping Kubernetes event kind *v1.Secret","time":"2019-04-21T12:52:09Z"}
{"level":"debug","msg":"Received Kubernetes event kind *v1.Endpoints","time":"2019-04-21T12:52:09Z"}
{"level":"error","msg":"Service not found for kube-system/traefik-web-ui","time":"2019-04-21T12:52:09Z"}
{"level":"debug","msg":"Skipping Kubernetes event kind *v1.Endpoints","time":"2019-04-21T12:52:09Z"}
{"level":"debug","msg":"Received Kubernetes event kind *v1.Endpoints","time":"2019-04-21T12:52:09Z"}
{"level":"error","msg":"Service not found for kube-system/traefik-web-ui","time":"2019-04-21T12:52:09Z"}
{"level":"debug","msg":"Skipping Kubernetes event kind *v1.Endpoints","time":"2019-04-21T12:52:09Z"}
{"level":"debug","msg":"Received Kubernetes event kind *v1.Endpoints","time":"2019-04-21T12:52:10Z"}
{"level":"error","msg":"Service not found for kube-system/traefik-web-ui","time":"2019-04-21T12:52:10Z"}
{"level":"debug","msg":"Skipping Kubernetes event kind *v1.Endpoints","time":"2019-04-21T12:52:10Z"}
{"level":"debug","msg":"Received Kubernetes event kind *v1.Endpoints","time":"2019-04-21T12:52:11Z"}
{"level":"error","msg":"Service not found for kube-system/traefik-web-ui","time":"2019-04-21T12:52:11Z"}
{"level":"debug","msg":"Skipping Kubernetes event kind *v1.Endpoints","time":"2019-04-21T12:52:11Z"}
{"level":"debug","msg":"Received Kubernetes event kind *v1.Service","time":"2019-04-21T12:52:11Z"}
{"level":"error","msg":"Service not found for kube-system/traefik-web-ui","time":"2019-04-21T12:52:11Z"}
{"level":"debug","msg":"Skipping Kubernetes event kind *v1.Service","time":"2019-04-21T12:52:11Z"}
{"level":"debug","msg":"Building ACME client...","time":"2019-04-21T12:52:11Z"}
{"level":"debug","msg":"https://acme-staging-v02.api.letsencrypt.org/directory","time":"2019-04-21T12:52:11Z"}
{"level":"info","msg":"Register...","time":"2019-04-21T12:52:11Z"}
{"level":"info","msg":"legolog: [INFO] acme: Registering account for support@example.org","time":"2019-04-21T12:52:11Z"}
{"level":"debug","msg":"Received Kubernetes event kind *v1.Endpoints","time":"2019-04-21T12:52:12Z"}
{"level":"error","msg":"Service not found for kube-system/traefik-web-ui","time":"2019-04-21T12:52:12Z"}
{"level":"debug","msg":"Skipping Kubernetes event kind *v1.Endpoints","time":"2019-04-21T12:52:12Z"}
{"level":"debug","msg":"Using DNS Challenge provider: ovh","time":"2019-04-21T12:52:12Z"}
{"level":"info","msg":"legolog: [INFO] [*.example.org, example.org] acme: Obtaining bundled SAN certificate","time":"2019-04-21T12:52:12Z"}
{"level":"debug","msg":"Received Kubernetes event kind *v1.Endpoints","time":"2019-04-21T12:52:13Z"}
{"level":"error","msg":"Service not found for kube-system/traefik-web-ui","time":"2019-04-21T12:52:13Z"}
{"level":"debug","msg":"Skipping Kubernetes event kind *v1.Endpoints","time":"2019-04-21T12:52:13Z"}
{"level":"info","msg":"legolog: [INFO] [*.example.org] AuthURL: https://acme-staging-v02.api.letsencrypt.org/acme/authz/<code>","time":"2019-04-21T12:52:13Z"}
{"level":"info","msg":"legolog: [INFO] [example.org] AuthURL: https://acme-staging-v02.api.letsencrypt.org/acme/authz/<code>Y","time":"2019-04-21T12:52:13Z"}
{"level":"info","msg":"legolog: [INFO] [*.example.org] acme: use dns-01 solver","time":"2019-04-21T12:52:13Z"}
{"level":"info","msg":"legolog: [INFO] [example.org] acme: Could not find solver for: tls-alpn-01","time":"2019-04-21T12:52:13Z"}
{"level":"info","msg":"legolog: [INFO] [example.org] acme: Could not find solver for: http-01","time":"2019-04-21T12:52:13Z"}
{"level":"info","msg":"legolog: [INFO] [example.org] acme: use dns-01 solver","time":"2019-04-21T12:52:13Z"}
{"level":"info","msg":"legolog: [INFO] [*.example.org] acme: Preparing to solve DNS-01","time":"2019-04-21T12:52:13Z"}
{"level":"info","msg":"legolog: [INFO] [example.org] acme: Preparing to solve DNS-01","time":"2019-04-21T12:52:13Z"}
{"level":"info","msg":"legolog: [INFO] [*.example.org] acme: Trying to solve DNS-01","time":"2019-04-21T12:52:13Z"}
{"level":"info","msg":"legolog: [INFO] [*.example.org] acme: Checking DNS record propagation using [10.0.0.10:53]","time":"2019-04-21T12:52:13Z"}
{"level":"info","msg":"legolog: [INFO] Wait for propagation [timeout: 1m0s, interval: 2s]","time":"2019-04-21T12:52:13Z"}
{"level":"info","msg":"legolog: [INFO] [*.example.org] acme: Waiting for DNS record propagation.","time":"2019-04-21T12:52:13Z"}
{"level":"debug","msg":"Received Kubernetes event kind *v1.Endpoints","time":"2019-04-21T12:52:14Z"}
{"level":"error","msg":"Service not found for kube-system/traefik-web-ui","time":"2019-04-21T12:52:14Z"}
{"level":"debug","msg":"Skipping Kubernetes event kind *v1.Endpoints","time":"2019-04-21T12:52:14Z"}
{"level":"debug","msg":"Received Kubernetes event kind *v1.Endpoints","time":"2019-04-21T12:52:15Z"}
{"level":"error","msg":"Service not found for kube-system/traefik-web-ui","time":"2019-04-21T12:52:15Z"}
{"level":"debug","msg":"Skipping Kubernetes event kind *v1.Endpoints","time":"2019-04-21T12:52:15Z"}
{"level":"debug","msg":"Received Kubernetes event kind *v1.Endpoints","time":"2019-04-21T12:52:16Z"}
{"level":"error","msg":"Service not found for kube-system/traefik-web-ui","time":"2019-04-21T12:52:16Z"}
{"level":"debug","msg":"Skipping Kubernetes event kind *v1.Endpoints","time":"2019-04-21T12:52:16Z"}
{"level":"debug","msg":"Received Kubernetes event kind *v1.Endpoints","time":"2019-04-21T12:52:17Z"}
{"level":"error","msg":"Service not found for kube-system/traefik-web-ui","time":"2019-04-21T12:52:17Z"}
{"level":"debug","msg":"Skipping Kubernetes event kind *v1.Endpoints","time":"2019-04-21T12:52:17Z"}
{"level":"debug","msg":"Received Kubernetes event kind *v1.Endpoints","time":"2019-04-21T12:52:18Z"}
{"level":"error","msg":"Service not found for kube-system/traefik-web-ui","time":"2019-04-21T12:52:18Z"}
{"level":"debug","msg":"Skipping Kubernetes event kind *v1.Endpoints","time":"2019-04-21T12:52:18Z"}
{"level":"debug","msg":"Received Kubernetes event kind *v1.Endpoints","time":"2019-04-21T12:52:19Z"}
{"level":"error","msg":"Service not found for kube-system/traefik-web-ui","time":"2019-04-21T12:52:19Z"}
{"level":"debug","msg":"Skipping Kubernetes event kind *v1.Endpoints","time":"2019-04-21T12:52:19Z"}
{"level":"debug","msg":"Received Kubernetes event kind *v1.Endpoints","time":"2019-04-21T12:52:20Z"}
{"level":"error","msg":"Service not found for kube-system/traefik-web-ui","time":"2019-04-21T12:52:20Z"}
{"level":"debug","msg":"Skipping Kubernetes event kind *v1.Endpoints","time":"2019-04-21T12:52:20Z"}
{"level":"debug","msg":"Received Kubernetes event kind *v1.Endpoints","time":"2019-04-21T12:52:21Z"}
{"level":"error","msg":"Service not found for kube-system/traefik-web-ui","time":"2019-04-21T12:52:21Z"}
{"level":"debug","msg":"Skipping Kubernetes event kind *v1.Endpoints","time":"2019-04-21T12:52:21Z"}
{"level":"debug","msg":"Received Kubernetes event kind *v1.Endpoints","time":"2019-04-21T12:52:22Z"}
{"level":"error","msg":"Service not found for kube-system/traefik-web-ui","time":"2019-04-21T12:52:22Z"}
{"level":"debug","msg":"Skipping Kubernetes event kind *v1.Endpoints","time":"2019-04-21T12:52:22Z"}
{"level":"info","msg":"legolog: [INFO] [*.example.org] The server validated our request","time":"2019-04-21T12:52:22Z"}
{"level":"info","msg":"legolog: [INFO] [example.org] acme: Trying to solve DNS-01","time":"2019-04-21T12:52:22Z"}
{"level":"info","msg":"legolog: [INFO] [example.org] acme: Checking DNS record propagation using [10.0.0.10:53]","time":"2019-04-21T12:52:22Z"}
{"level":"info","msg":"legolog: [INFO] Wait for propagation [timeout: 1m0s, interval: 2s]","time":"2019-04-21T12:52:22Z"}
{"level":"debug","msg":"Received Kubernetes event kind *v1.Endpoints","time":"2019-04-21T12:52:23Z"}
{"level":"error","msg":"Service not found for kube-system/traefik-web-ui","time":"2019-04-21T12:52:23Z"}
{"level":"debug","msg":"Skipping Kubernetes event kind *v1.Endpoints","time":"2019-04-21T12:52:23Z"}
{"level":"debug","msg":"Received Kubernetes event kind *v1.Endpoints","time":"2019-04-21T12:52:24Z"}
{"level":"error","msg":"Service not found for kube-system/traefik-web-ui","time":"2019-04-21T12:52:24Z"}
{"level":"debug","msg":"Skipping Kubernetes event kind *v1.Endpoints","time":"2019-04-21T12:52:24Z"}
{"level":"debug","msg":"Received Kubernetes event kind *v1.Endpoints","time":"2019-04-21T12:52:25Z"}
{"level":"error","msg":"Service not found for kube-system/traefik-web-ui","time":"2019-04-21T12:52:25Z"}
{"level":"debug","msg":"Skipping Kubernetes event kind *v1.Endpoints","time":"2019-04-21T12:52:25Z"}
{"level":"debug","msg":"Received Kubernetes event kind *v1.Endpoints","time":"2019-04-21T12:52:25Z"}
{"level":"error","msg":"Service not found for kube-system/traefik-web-ui","time":"2019-04-21T12:52:25Z"}
{"level":"debug","msg":"Configuration received from provider kubernetes: {"backends":{"traefik-ui.minikube/":{"loadBalancer":{"method":"wrr"}},"traefik.example.org":{"servers":{"traefik-7f5b8bdf9c-gb8sk":{"url":"http://10.244.1.118:8080","weight":1}},"loadBalancer":{"method":"wrr"}}},"frontends":{"traefik.example.org":{"entryPoints":["http","https"],"backend":"traefik.example.org","routes":{"traefik.example.org":{"rule":"Host:traefik.example.org"}},"passHostHeader":true,"priority":0,"basicAuth":null}}}","time":"2019-04-21T12:52:25Z"}
{"level":"debug","msg":"Add certificate for domains *.example.com","time":"2019-04-21T12:52:25Z"}
{"level":"debug","msg":"Received Kubernetes event kind *v1.Endpoints","time":"2019-04-21T12:52:25Z"}
{"level":"error","msg":"Service not found for kube-system/traefik-web-ui","time":"2019-04-21T12:52:25Z"}
{"level":"debug","msg":"Skipping Kubernetes event kind *v1.Endpoints","time":"2019-04-21T12:52:25Z"}
{"level":"debug","msg":"Wiring frontend traefik.example.org to entryPoint http","time":"2019-04-21T12:52:25Z"}
{"level":"debug","msg":"Creating backend traefik.example.org","time":"2019-04-21T12:52:25Z"}
{"level":"debug","msg":"Adding TLSClientHeaders middleware for frontend traefik.example.org","time":"2019-04-21T12:52:25Z"}
{"level":"debug","msg":"Creating load-balancer wrr","time":"2019-04-21T12:52:25Z"}
{"level":"debug","msg":"Creating server traefik-7f5b8bdf9c-gb8sk at http://10.244.1.118:8080 with weight 1","time":"2019-04-21T12:52:25Z"}
{"level":"debug","msg":"Creating route traefik.example.org Host:traefik.example.org","time":"2019-04-21T12:52:25Z"}
{"level":"debug","msg":"Wiring frontend traefik.example.org to entryPoint https","time":"2019-04-21T12:52:25Z"}
{"level":"debug","msg":"Creating backend traefik.example.org","time":"2019-04-21T12:52:25Z"}
{"level":"debug","msg":"Adding TLSClientHeaders middleware for frontend traefik.example.org","time":"2019-04-21T12:52:25Z"}
{"level":"debug","msg":"Creating load-balancer wrr","time":"2019-04-21T12:52:25Z"}
{"level":"debug","msg":"Creating server traefik-7f5b8bdf9c-gb8sk at http://10.244.1.118:8080 with weight 1","time":"2019-04-21T12:52:25Z"}
{"level":"debug","msg":"Creating route traefik.example.org Host:traefik.example.org","time":"2019-04-21T12:52:25Z"}
{"level":"info","msg":"Server configuration reloaded on :443","time":"2019-04-21T12:52:25Z"}
{"level":"info","msg":"Server configuration reloaded on :8080","time":"2019-04-21T12:52:25Z"}
{"level":"info","msg":"Server configuration reloaded on :80","time":"2019-04-21T12:52:25Z"}
{"level":"debug","msg":"Try to challenge certificate for domain [traefik.example.org] founded in Host rule","time":"2019-04-21T12:52:25Z"}
{"level":"debug","msg":"Looking for provided certificate(s) to validate ["traefik.example.org"]...","time":"2019-04-21T12:52:25Z"}
{"level":"debug","msg":"No ACME certificate generation required for domains ["traefik.example.org"].","time":"2019-04-21T12:52:25Z"}
{"level":"error","msg":"Service not found for kube-system/traefik-web-ui","time":"2019-04-21T12:52:27Z"}
{"level":"error","msg":"Service not found for kube-system/traefik-web-ui","time":"2019-04-21T12:52:28Z"}
{"level":"error","msg":"Service not found for kube-system/traefik-web-ui","time":"2019-04-21T12:52:29Z"}
{"level":"debug","msg":"Skipping Kubernetes event kind *v1.Endpoints","time":"2019-04-21T12:52:29Z"}
{"level":"info","msg":"legolog: [INFO] [example.org] The server validated our request","time":"2019-04-21T12:52:30Z"}
{"level":"info","msg":"legolog: [INFO] [*.example.org] acme: Cleaning DNS-01 challenge","time":"2019-04-21T12:52:30Z"}
{"level":"debug","msg":"Received Kubernetes event kind *v1.Endpoints","time":"2019-04-21T12:52:30Z"}
{"level":"error","msg":"Service not found for kube-system/traefik-web-ui","time":"2019-04-21T12:52:30Z"}
{"level":"debug","msg":"Skipping Kubernetes event kind *v1.Endpoints","time":"2019-04-21T12:52:30Z"}
{"level":"info","msg":"legolog: [INFO] [example.org] acme: Cleaning DNS-01 challenge","time":"2019-04-21T12:52:30Z"}
{"level":"info","msg":"legolog: [WARN] [example.org] acme: error cleaning up: ovh: unknown record ID for '_acme-challenge.example.org.' ","time":"2019-04-21T12:52:30Z"}
{"level":"info","msg":"legolog: [INFO] [*.example.org, example.org] acme: Validations succeeded; requesting certificates","time":"2019-04-21T12:52:30Z"}
{"level":"debug","msg":"Received Kubernetes event kind *v1.Endpoints","time":"2019-04-21T12:52:31Z"}
{"level":"error","msg":"Service not found for kube-system/traefik-web-ui","time":"2019-04-21T12:52:31Z"}
{"level":"debug","msg":"Skipping Kubernetes event kind *v1.Endpoints","time":"2019-04-21T12:52:31Z"}
{"level":"debug","msg":"http: TLS handshake error from 10.244.1.1:57949: EOF","time":"2019-04-21T12:52:31Z"}
{"level":"debug","msg":"http: TLS handshake error from 10.240.0.4:57060: EOF","time":"2019-04-21T12:52:31Z"}
{"level":"debug","msg":"Received Kubernetes event kind *v1.Endpoints","time":"2019-04-21T12:52:32Z"}
{"level":"error","msg":"Service not found for kube-system/traefik-web-ui","time":"2019-04-21T12:52:32Z"}
{"level":"debug","msg":"Skipping Kubernetes event kind *v1.Endpoints","time":"2019-04-21T12:52:32Z"}
{"level":"info","msg":"legolog: [INFO] [*.example.org] Server responded with a certificate.","time":"2019-04-21T12:52:32Z"}
{"level":"debug","msg":"Certificates obtained for domains [*.example.org example.org]","time":"2019-04-21T12:52:32Z"}
{"level":"debug","msg":"Configuration received from provider ACME: {}","time":"2019-04-21T12:52:32Z"}
{"level":"debug","msg":"Add certificate for domains *.example.com","time":"2019-04-21T12:52:32Z"}
{"level":"debug","msg":"Wiring frontend traefik.example.org to entryPoint http","time":"2019-04-21T12:52:32Z"}
{"level":"debug","msg":"Creating backend traefik.example.org","time":"2019-04-21T12:52:32Z"}
{"level":"debug","msg":"Adding TLSClientHeaders middleware for frontend traefik.example.org","time":"2019-04-21T12:52:32Z"}
{"level":"debug","msg":"Creating load-balancer wrr","time":"2019-04-21T12:52:32Z"}
{"level":"debug","msg":"Creating server traefik-7f5b8bdf9c-gb8sk at http://10.244.1.118:8080 with weight 1","time":"2019-04-21T12:52:32Z"}
{"level":"debug","msg":"Creating route traefik.example.org Host:traefik.example.org","time":"2019-04-21T12:52:32Z"}
{"level":"debug","msg":"Wiring frontend traefik.example.org to entryPoint https","time":"2019-04-21T12:52:32Z"}
{"level":"debug","msg":"Creating backend traefik.example.org","time":"2019-04-21T12:52:32Z"}
{"level":"debug","msg":"Adding TLSClientHeaders middleware for frontend traefik.example.org","time":"2019-04-21T12:52:32Z"}
{"level":"debug","msg":"Creating load-balancer wrr","time":"2019-04-21T12:52:32Z"}
{"level":"debug","msg":"Creating server traefik-7f5b8bdf9c-gb8sk at http://10.244.1.118:8080 with weight 1","time":"2019-04-21T12:52:32Z"}
{"level":"debug","msg":"Creating route traefik.example.org Host:traefik.example.org","time":"2019-04-21T12:52:32Z"}
{"level":"debug","msg":"Add certificate for domains *.example.org,example.org","time":"2019-04-21T12:52:32Z"}
{"level":"info","msg":"Server configuration reloaded on :443","time":"2019-04-21T12:52:32Z"}
{"level":"info","msg":"Server configuration reloaded on :8080","time":"2019-04-21T12:52:32Z"}
{"level":"info","msg":"Server configuration reloaded on :80","time":"2019-04-21T12:52:32Z"}
{"level":"debug","msg":"Skipping Kubernetes event kind *v1.Secret","time":"2019-04-21T12:52:09Z"}
{"level":"debug","msg":"Received Kubernetes event kind *v1.Secret","time":"2019-04-21T12:52:09Z"}
{"level":"error","msg":"Service not found for kube-system/traefik-web-ui","time":"2019-04-21T12:52:34Z"}
{"level":"info","msg":"legolog: [WARN] [example.org] acme: error cleaning up: ovh: unknown record ID for '_acme-challenge.example.org.' ","time":"2019-04-21T12:52:30Z"}
最佳答案
如评论中所述,Let's Encrypt 端点配置为 staging
.
acme:
staging: false
关于kubernetes - '_acme-challenge.example.org.' 的未知记录 ID,我们在Stack Overflow上找到一个类似的问题: https://stackoverflow.com/questions/55826289/
core@core-1-94 ~ $ kubectl exec -it busybox -- nslookup kubernetesServer: 10.100.0.10Address 1: 1
我有一个节点错误地注册在集群 B 上,而它实际上为集群 A 服务。 这里“在集群 B 上注册”意味着我可以从 kubectl get node 看到节点来自集群 B。 我想从集群 B 中取消注册这个节
据我所知,Kubernetes 是一个用于部署和管理容器的编排框架。另一方面,Kubernetes Engine 负责集群的伸缩,以及管理容器镜像。 从上面看,它们似乎是同一件事或非常相似。从上面的定
我正在学习 Kubernetes 和 Docker,以启动一个简单的 Python 网络应用程序。我对上述所有技术都不熟悉。 下面是我计划的方法: 安装 Kubernetes。 在本地启动并运行集群。
我了解如何在 kubernetes 中设置就绪探测器,但是是否有任何关于在调用就绪探测器时微服务应实际检查哪些内容的最佳实践?两个具体例子: 一个面向数据库的微服务,如果没有有效的数据库连接,几乎所有
Kubernetes 调度程序是仅根据请求的资源和节点在服务器当前快照中的可用资源将 Pod 放置在节点上,还是同时考虑节点的历史资源利用率? 最佳答案 在官方Kubernetes documenta
我们有多个环境,如 dev、qa、prepod 等。我们有基于环境的命名空间。现在我们将服务命名为 environment 作为后缀。例如。, apiVersion: apps/v1
我有一个关于命名空间的问题,并寻求您的专业知识来消除我的疑虑。 我对命名空间的理解是,它们用于在团队和项目之间引入逻辑边界。 当然,我在某处读到命名空间可用于在同一集群中引入/定义不同的环境。 例如测
我知道角色用于授予用户或服务帐户在特定命名空间中执行操作的权限。 一个典型的角色定义可能是这样的 kind: Role apiVersion: rbac.authorization.k8s.io/v1
我正在学习 Kubernetes,目前正在深入研究高可用性,虽然我知道我可以使用本地(或远程)etcd 以及一组高可用性的控制平面(API 服务器、 Controller 、调度程序)来设置minio
两者之间有什么实际区别?我什么时候应该选择一个? 例如,如果我想让我的项目中的开发人员仅查看 pod 的日志。似乎可以通过 RoleBinding 为服务帐户或上下文分配这些权限。 最佳答案 什么是服
根据基于时间的计划执行容器或 Pod 的推荐方法是什么?例如,每天凌晨 2 点运行 10 分钟的任务。 在传统的 linux 服务器上,crontab 很容易工作,而且显然在容器内部仍然是可能的。然而
有人可以帮助我了解服务网格本身是否是一种入口,或者服务网格和入口之间是否有任何区别? 最佳答案 “入口”负责将流量路由到集群中(来自 Docs:管理对集群中服务的外部访问的 API 对象,通常是 HT
我是 kubernetes 集群的新手。我有一个简单的问题。 我在多个 kubernetes 集群中。 kubernetes 中似乎有多个集群可用。所以 kubernetes 中的“多集群”意味着:
我目前正在使用Deployments管理我的K8S集群中的Pod。 我的某些部署需要2个Pod /副本,一些部署需要3个Pod /副本,而有些部署只需要1个Pod /副本。我遇到的问题是只有一个 po
我看过官方文档:https://kubernetes.io/docs/tasks/setup-konnectivity/setup-konnectivity/但我还是没明白它的意思。 我有几个问题:
这里的任何人都有在 kubernetes 上进行批处理(例如 spring 批处理)的经验?这是个好主意吗?如果我们使用 kubernetes 自动缩放功能,如何防止批处理处理相同的数据?谢谢你。 最
我有一个具有 4 个节点和一个主节点的 Kubernetes 集群。我正在尝试在所有节点中运行 5 个 nginx pod。目前,调度程序有时在一台机器上运行所有 pod,有时在不同的机器上运行。 如
我在运行 Raspbian Stretch 的 Raspberry PI 3 上使用以下命令安装最新版本的 Kubernetes。 $ curl -s https://packages.cloud.g
container port 与 Kubernetes 容器中的 targetports 有何不同? 它们是否可以互换使用,如果可以,为什么? 我遇到了下面的代码片段,其中 containerPort
我是一名优秀的程序员,十分优秀!