Please fill out the fields below so we can help you better. Note: you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. crt.sh | skgo.org ), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.
My domain is:skgo.org ,www.skgo,org, diferent server elearning.skgo.org the problem is that when i cjeck sertificates with ssl chekre it kinda rotates answers of thee ssl sertificate which has has been made with Lets Enrypt terminated in backend and frontend
Ii have setuo ha proxy with this conf
cat /etc/haproxy/haproxy.cfg
global
maxconn 4096
user haproxy
group haproxy
daemon
log 127.0.0.1 local0
log 127.0.0.1 local1 notice
stats socket /var/run/haproxy.stat mode 600 level operator
ssl-server-verify none
ssl-default-bind-options no-sslv3 no-tlsv10 no-tlsv11 no-tls-tickets
ssl-default-bind-ciphers ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384
defaults
log global
mode http
option httplog
option dontlognull
option forwardfor
timeout connect 10s
timeout client 60s
timeout server 60s
timeout http-request 15s
timeout http-keep-alive 15s
# Enable statistics and monitoring
stats enable
stats uri /stats
stats realm "HAProxy Statistics"
stats auth redacted:redacted
monitor-uri /monitor
# Rate limiting for DDoS protection
frontend http_frontend
bind *:80
stick-table type ip size 1m expire 600s store gpc0,http_req_rate(10s)
tcp-request connection accept if { src -f /etc/haproxy/whitelist.lst }
tcp-request connection track-sc1 src if ! { src_get_gpc0 gt 40 }
tcp-request connection reject if { src_get_gpc0 gt 40 }
http-request add-header X-Forwarded-Proto http
# Routing rules for HTTP
acl skgoapp hdr_end(host) -i php52-test.skgo.local php53-test.skgo.local skgo.hostts.net exchange.org.rs skgo.org skgo.rs ivanjica.rs vladicinhan.org.rs becej.rs tutin.rs cuprija.rs knjazevac.rs vlasotince.org.rs kovin.rs kanjiza.rs bajinabasta.rs kontrolafinansija.skgo.org upitnici.mos.gov.rs kalkulator.doprinosa.skgo.org fotografije.skgo.org upitnik.skgo.org
use_backend backend if skgoapp
acl elearapp hdr_end(host) -i elearning.skgo.org
use_backend elear if elearapp
acl kandidatureapp hdr_end(host) -i e-izbori.skgo.org
use_backend kandidature if kandidatureapp
acl pifls hdr_end(host) -i pifls.skgo.org
use_backend pifls if pifls
acl is_secure hdr(host) -i www.skgo.org skgo.org
acl is_elearning hdr(host) -i elearning.skgo.org
http-request redirect scheme https if is_secure
use_backend local_app if !is_secure
default_backend default_backend
frontend httpswww_skgofrontend
#bind *:443 ssl crt /etc/haproxy/certs/skgo.org.pem
bind *:443 ssl crt /etc/haproxy/certs/skgo.org.pem ca-file /etc/haproxy/ca/skgo.org.ca.pem verify optional
http-request add-header X-Forwarded-Proto https
http-response set-header Strict-Transport-Security "max-age=31536000; includeSubDomains; preload"
# Routing rules for HTTPS www.skgo.org
acl is_skgo hdr_dom(host) -i skgo.org www.skgo.org
use_backend backend_skgo if is_skgo
default_backend default_backend
frontend elearninghttps_frontend
bind *:443 ssl crt /etc/haproxy/certs/elearning.skgo.org.pem ca-file /etc/haproxy/ca/elearning.skgo.org.ca.pem verify optional
http-request add-header X-Forwarded-Proto https
http-response set-header Strict-Transport-Security "max-age=31536000; includeSubDomains; preload"
# Routing rules for HTTPS elearning.skgo.org
acl is_elearning hdr_dom(host) -i elearning.skgo.org
use_backend backend_elearning if is_elearning
default_backend default_backend
# Backends for applications
backend local_app
mode http
server local 127.0.0.1:8080 check
backend backend
mode http
balance roundrobin
option httpchk GET /
http-check expect status 200
server app1 app1:80 cookie LB01 check inter 5000 fastinter 1000 fall 3 rise 2 weight 2 observe layer7
backend elear
mode http
balance roundrobin
option httpchk GET /
http-check expect status 200
server app1 192.168.40.86:80 cookie LB01 check inter 5000 fastinter 1000 fall 3 rise 2 weight 2 observe layer7
backend kandidature
mode http
balance roundrobin
option httpchk GET /
http-check expect status 200
server 192.168.40.224 192.168.40.224:80 cookie LB01 check inter 5000 fastinter 1000 fall 3 rise 2 weight 2 observe layer7
backend pifls
mode http
balance roundrobin
option httpchk GET /
#http-check expect status 200
server 192.168.40.129 192.168.40.129:80 cookie LB01 check inter 5000 fastinter 1000 fall 3 rise 2 weight 2 observe layer7
backend backend_skgo
mode http
balance roundrobin
option httpchk GET /
http-check expect status 200
cookie SERVERID insert indirect nocache
server skgo1 192.168.40.209:443 ssl verify none check
backend backend_elearning
mode http
balance roundrobin
option httpchk GET /
http-check expect status 200
cookie SERVERID insert indirect nocache
server elearning1 192.168.40.86:443 ssl verify none check
# server elearning 192.168.40.86:80 cookie LB01 check inter 5000 fastinter 1000 fall 3 rise 2 weight 2 observe layer7
backend default_backend
mode http
balance roundrobin
option httpchk GET /
http-check expect status 200
server default 127.0.0.1:8080 check
# Error handling for DDoS and maintenance
backend limit_ddos
mode http
errorfile 503 /etc/haproxy/errors/503rate.http
backend maintenance
mode http
errorfile 503 /etc/haproxy/errors/503main.http
# SSH Listeners for Applications
listen app_ssh
bind *:2201-2204
mode tcp
option tcpka
timeout connect 5s
timeout client 1h
timeout server 1h
option tcplog
server app1_ssh app1:22 check
server app2_ssh app2:22 check
server app3_ssh 192.168.40.209:22 check
server app4_ssh 192.168.40.138:22 check