-
To Reproduce
Current vs. Expected behaviorCurrent Expected Provide environment informationOperating System:
Ubuntu 24.04.1 LTS (GNU/Linux 6.8.0-84-generic x86_64)
Dokploy version: v0.25.3
VPS Provider: My own machine in my local network.
What Applications/services:
Any application that exposes a domain with traefikWhich area(s) are affected? (Select all that apply)Traefik Are you deploying the applications where Dokploy is installed or on a remote server?Same server where Dokploy is installed Additional contextI'm running it on my local network in a mini server. Will you send a PR to fix it?No |
Beta Was this translation helpful? Give feedback.
Replies: 3 comments 2 replies
-
|
@alamadorm if you want to use https in a tunnel you need to add the origin domain to the tunnel entry and either add the cf origin cert to traefik or add a dns challenge, otherwise you will get a 404, if you are using strict mode, since the handshake from the tunnel to traefik will not be a valid ca cert. Also be aware that the tunnel is just an ordered pattern match so the first entry that matches is used, named domains should be first and one wildcard at the bottom, do not use two wildcards, 80/443 as only the first one would be used. |
Beta Was this translation helpful? Give feedback.
-
|
I am not an expert on Cloudflare tunnels, so I will transfer this issue to discussions since it is not a dokploy bug. |
Beta Was this translation helpful? Give feedback.
-
|
I fixed this issue by editing the docker:
exposedByDefault: false
watch: true
# network: dokploy-networkBy default, traefik can only reach containers on the |
Beta Was this translation helpful? Give feedback.
I fixed this issue by editing the
traefik.ymlconfig file in the Traefik File System tab:By default, traefik can only reach containers on the
dokploy-networknetwork, which I think is not assigned by default. My containers only had the project-specific network attached to them. Commenting this line allows traefik to read any network with thetraefik.enablelabel.