Hi,
It seems like you are trying to use HAProxy to route incoming HTTPS traffic to the Odoo server running on port 8069. Here are some steps you can follow to troubleshoot the issue:
Verify that the firewall on the VM is allowing incoming HTTPS traffic on port 443.
Check the Odoo server configuration to ensure it is listening on port 8069 and allowing incoming traffic from the HAProxy server.
Verify that the SSL certificate configured in HAProxy is valid and matches the domain name used to access the Odoo portal.
Check the HAProxy logs for any errors or warnings that might indicate a problem with the configuration.
Test the configuration by accessing the Odoo portal from a browser on the same network as the VM to ensure that it is working correctly.
Here's an updated HAProxy configuration that you can use as a reference:
frontend odoo-fe
bind *:443 ssl crt /path/to/certificate.pem
mode tcp
option tcplog
default_backend odoo-be
backend odoo-be
mode tcp
option tcplog
server odoo-server :8069 check
Make sure to replace with the actual IP address of your Odoo server. Also, replace /path/to/certificate.pem with the path to your SSL certificate file.
frontend odoo-fe
bind *:443 ssl crt /etc/letsencrypt/live/example.com/fullchain.pem
mode http
option forwardfor
reqadd X-Forwarded-Proto:\ https
default_backend odoo-be
backend odoo-be
mode http
option forwardfor
server odoo :8069 check
HAProxy configuration that includes SSL encryption:
frontend odoo-fe
bind *:443 ssl crt /etc/letsencrypt/live/example.com/fullchain.pem
mode http
option forwardfor
reqadd X-Forwarded-Proto:\ https
default_backend odoo-be
backend odoo-be
mode http
option forwardfor
server odoo :8069 check
In this configuration:
- bind *:443 ssl crt sets up the frontend to bind to port 443 and use SSL encryption. You should replace example.com with your domain name, and ensure that the Let's Encrypt certificate is installed on the server.
- option forwardfor adds the client IP address to the HTTP headers so that Odoo can see the original IP address of the client.
- reqadd X-Forwarded-Proto:\ https adds an X-Forwarded-Proto header to the HTTP request to indicate that the original request was made over HTTPS.
- default_backend odoo-be specifies that requests should be forwarded to the odoo-be backend by default.
- server odoo :8069 check specifies that the odoo server should handle requests, and checks that it is available.
Make sure to replace with the actual IP address of your Odoo server.
Hope this will help you
Thanks
Hey,
Thanks for responding but this doesn't cover SSL related configuration. I am already done with Port 80 configuration without exposing credentials like suggested in the link you have shared.