Manuelle HAProxy Konfiguration: Unterschied zwischen den Versionen

Aus Xinux Wiki
Zur Navigation springen Zur Suche springen
Zeile 7: Zeile 7:
 
<pre>
 
<pre>
 
global
 
global
  1        log /dev/log   local0
+
log /dev/log local0  
  2        log /dev/log   local1 notice
+
log /dev/log local1 notice
  3        chroot /var/lib/haproxy
+
chroot /var/lib/haproxy
  4        stats socket /run/haproxy/admin.sock mode 660 level admin expose-fd listeners
+
stats socket /run/haproxy/admin.sock mode 660 level admin expose-fd listeners
  5        stats timeout 30s
+
stats timeout 30s
  6        user haproxy
+
user haproxy
  7        group haproxy
+
group haproxy
  8        daemon
+
daemon
  9
+
 
10        # Default SSL material locations
+
# Default SSL material locations
11        ca-base /etc/ssl/certs
+
ca-base /etc/ssl/certs
12        crt-base /etc/ssl/private
+
crt-base /etc/ssl/private
13
+
 
14        # See: https://ssl-config.mozilla.org/#server=haproxy&server-version=2.0.3&config=intermediate
+
# See: https://ssl-config.mozilla.org/#server=haproxy&server-version=2.0.3&config=intermediate
15         ssl-default-bind-ciphers ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GC    M-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384
+
         ssl-default-bind-ciphers ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA
16         ssl-default-bind-ciphersuites TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256
+
-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384
17         ssl-default-bind-options ssl-min-ver TLSv1.2 no-tls-tickets
+
         ssl-default-bind-ciphersuites TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256
18
+
         ssl-default-bind-options ssl-min-ver TLSv1.2 no-tls-tickets
19 defaults
+
 
20        log     global
+
defaults
21        mode   http
+
log global
22        option httplog
+
mode http
23        option dontlognull
+
option httplog
24         timeout connect 5000
+
option dontlognull
25         timeout client  50000
+
         timeout connect 5000
26         timeout server  50000
+
         timeout client  50000
27        errorfile 400 /etc/haproxy/errors/400.http
+
         timeout server  50000
28        errorfile 403 /etc/haproxy/errors/403.http
+
errorfile 400 /etc/haproxy/errors/400.http
29        errorfile 408 /etc/haproxy/errors/408.http
+
errorfile 403 /etc/haproxy/errors/403.http
30        errorfile 500 /etc/haproxy/errors/500.http
+
errorfile 408 /etc/haproxy/errors/408.http
31        errorfile 502 /etc/haproxy/errors/502.http
+
errorfile 500 /etc/haproxy/errors/500.http
32        errorfile 503 /etc/haproxy/errors/503.http
+
errorfile 502 /etc/haproxy/errors/502.http
33        errorfile 504 /etc/haproxy/errors/504.http
+
errorfile 503 /etc/haproxy/errors/503.http
34
+
errorfile 504 /etc/haproxy/errors/504.http
35 # Frontend: Public-Service ()
+
 
36 frontend Public-Service
+
# Frontend: Public-Service ()
37     bind 194.59.156.165:443 name 194.59.156.165:443 ssl  crt /etc/haproxy/ssl/schmeich.pem
+
frontend Public-Service
38     mode http
+
     bind 194.59.156.165:443 name 194.59.156.165:443 ssl  crt /etc/haproxy/ssl/schmeich.pem
39     option http-keep-alive
+
     mode http
40     option forwardfor
+
     option http-keep-alive
41     timeout client 30s
+
     option forwardfor
42     acl acl_hertha hdr_beg(host)  -i hertha
+
     timeout client 30s
43     acl acl_maria hdr_beg(host)  -i maria
+
     acl acl_hertha hdr_beg(host)  -i hertha
44     use_backend hertha_backend if acl_hertha
+
     acl acl_maria hdr_beg(host)  -i maria
45     use_backend maria_backend  if acl_maria
+
     use_backend hertha_backend if acl_hertha
46
+
     use_backend maria_backend  if acl_maria
47 frontend Public-Service-Http
+
 
48     bind 194.59.156.165:80 name 194.59.156.165:80
+
frontend Public-Service-Http
49     mode http
+
     bind 194.59.156.165:80 name 194.59.156.165:80
50     option http-keep-alive
+
     mode http
51     option forwardfor
+
     option http-keep-alive
52     timeout client 30s
+
     option forwardfor
17     timeout server 30s
+
     timeout client 30s
16     http-reuse safe
+
  acl acl_http req.proto_http
15     #server hertha 10.82.228.11:443 ssl verify none
+
    http-request redirect code 301 scheme https if acl_http
14     server hertha 10.82.228.11:80
+
 
13
+
backend hertha_backend
12
+
    mode http
11 backend maria_backend
+
    balance source
10     mode http
+
    stick-table type ip size 50k expire 30m
  9     balance source
+
    stick on src
  8     stick-table type ip size 50k expire 30m
+
    timeout connect 30s
  7     stick on src
+
     timeout server 30s
  6     timeout connect 30s
+
     http-reuse safe
  4     http-reuse safe
+
     #server hertha 10.82.228.11:443 ssl verify none
  3     #server maria 10.82.228.12:443 ssl verify none
+
     server hertha 10.82.228.11:80
  2    server maria 10.82.228.12:80
+
 
 +
 
 +
backend maria_backend
 +
     mode http
 +
     balance source
 +
     stick-table type ip size 50k expire 30m
 +
     stick on src
 +
     timeout connect 30s
 +
    timeout server 30s
 +
     http-reuse safe
 +
     #server maria 10.82.228.12:443
 
</pre>
 
</pre>
  

Version vom 6. September 2022, 18:02 Uhr

Domaine

  • Letscrypt Wildcard Zertifikate ist vorhanden
  • schmeich.de


HTTPS Proxy mit mehren Webservern

global
	log /dev/log	local0 
	log /dev/log	local1 notice
	chroot /var/lib/haproxy
	stats socket /run/haproxy/admin.sock mode 660 level admin expose-fd listeners
	stats timeout 30s
	user haproxy
	group haproxy
	daemon

	# Default SSL material locations
	ca-base /etc/ssl/certs
	crt-base /etc/ssl/private

	# See: https://ssl-config.mozilla.org/#server=haproxy&server-version=2.0.3&config=intermediate
        ssl-default-bind-ciphers ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA
-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384
        ssl-default-bind-ciphersuites TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256
        ssl-default-bind-options ssl-min-ver TLSv1.2 no-tls-tickets

defaults
	log	global
	mode	http
	option	httplog
	option	dontlognull
        timeout connect 5000
        timeout client  50000
        timeout server  50000
	errorfile 400 /etc/haproxy/errors/400.http
	errorfile 403 /etc/haproxy/errors/403.http
	errorfile 408 /etc/haproxy/errors/408.http
	errorfile 500 /etc/haproxy/errors/500.http
	errorfile 502 /etc/haproxy/errors/502.http
	errorfile 503 /etc/haproxy/errors/503.http
	errorfile 504 /etc/haproxy/errors/504.http

# Frontend: Public-Service ()
frontend Public-Service
    bind 194.59.156.165:443 name 194.59.156.165:443 ssl  crt /etc/haproxy/ssl/schmeich.pem
    mode http
    option http-keep-alive
    option forwardfor
    timeout client 30s
    acl acl_hertha hdr_beg(host)  -i hertha
    acl acl_maria hdr_beg(host)  -i maria
    use_backend hertha_backend if acl_hertha
    use_backend maria_backend  if acl_maria

frontend Public-Service-Http
    bind 194.59.156.165:80 name 194.59.156.165:80
    mode http
    option http-keep-alive
    option forwardfor
    timeout client 30s
   acl acl_http req.proto_http
    http-request redirect code 301 scheme https if acl_http

backend hertha_backend
    mode http
    balance source
    stick-table type ip size 50k expire 30m
    stick on src
    timeout connect 30s
    timeout server 30s
    http-reuse safe
    #server hertha 10.82.228.11:443 ssl verify none
    server hertha 10.82.228.11:80


backend maria_backend
    mode http
    balance source
    stick-table type ip size 50k expire 30m
    stick on src
    timeout connect 30s
    timeout server 30s
    http-reuse safe
    #server maria 10.82.228.12:443

pem layout

  • cat certificate.crt intermediates.pem private.key > ssl-certs.pem

bind *:443 ssl crt /path/to/cert/ssl-certs.pem

letsencrypt cert

Works a bit differently as seen in https://gridscale.io/community/tutorials/haproxy-ssl/

sources