zaunist commented on issue #2318:
URL: 
https://github.com/apache/apisix-dashboard/issues/2318#issuecomment-1039931979


   Hi, @CraxGrix. Please check your docker network, I follow your description, 
but I can't reproduce this issue.
   
   <img width="850" alt="image" 
src="https://user-images.githubusercontent.com/38528079/154010870-c322340b-ad93-45a9-8fbc-199f42945ba8.png";>
   
   conf.yaml
   
   ```
   #
   # Licensed to the Apache Software Foundation (ASF) under one or more
   # contributor license agreements.  See the NOTICE file distributed with
   # this work for additional information regarding copyright ownership.
   # The ASF licenses this file to You under the Apache License, Version 2.0
   # (the "License"); you may not use this file except in compliance with
   # the License.  You may obtain a copy of the License at
   #
   #     http://www.apache.org/licenses/LICENSE-2.0
   #
   # Unless required by applicable law or agreed to in writing, software
   # distributed under the License is distributed on an "AS IS" BASIS,
   # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
   # See the License for the specific language governing permissions and
   # limitations under the License.
   #
   
   conf:
     listen:               # yamllint disable rule:comments-indentation
       # host: 127.0.0.1     # `manager api` listening ip or host name
       port: 9002          # `manager api` listening port
   
     # ssl:
     #   enable: true        # Whether to enable SSL verification
     #   host: 127.0.0.1     # The address on which the `Manager API` should 
listen for HTTPS.
     #                       # The default value is 0.0.0.0, if want to 
specify, please enable it.
     #   port: 9001          # The port on which the `Manager API` should 
listen for HTTPS.
     #   cert: "/tmp/cert/example.crt"              # Path of your SSL cert.
     #   key:  "/tmp/cert/example.key"              # Path of your SSL key.
     #   client_cert_auth: false                    # When this is set Manager 
API will check all incoming HTTPS requests for a client certificate signed by 
the trusted CA.
     #                                              # Requests that don’t 
supply a valid client certificate will fail.
     #   trusted_ca: "/tmp/cert/trusted_ca.pem"     # Trusted certificate 
authority, verify certificates of HTTPS-enabled servers using this CA bundle.
                                                    # The default verify depth 
is 100, we can add a new config item like "client_cert_verify_depth" to specify 
the depth in the future.
     trusted_proxies:      # List of network origins from which to trust 
request's headers that contain alternative client IP.
       # - 127.0.0.0/8     # Note: This configuration affects the acquisition 
of client IP. If your Dashboard is proxied by APISIX or other proxy servers, 
please set for it.
   
     allow_list:            # IP allowed list for every users. If we don't set 
any IP list, then any IP access is allowed by default.
       - 0.0.0.0/0
     allow_admin:           # IP allowed list for root admin. If we don't set 
any IP list, then any IP access is allowed by default.
       - 0.0.0.0/0        # allow admin
   
     # default etcd cluster
     etcd:
       name: "default"
       endpoints:
         - host.docker.internal:2379
       mtls:
         enable: false         # whether to enable etcd mTLS, the default is 
false
         key_file: ""          # Path of your self-signed client side key
         cert_file: ""         # Path of your self-signed client side cert
         ca_file: ""           # Path of your self-signed ca cert, the CA is 
used to sign callers' certificates
   
     log:
       error_log:
         level: warn       # supports levels, lower to higher: debug, info, 
warn, error, panic, fatal
         file_path:
           logs/error.log  # supports relative path, absolute path, standard 
output
                           # such as: logs/error.log, /tmp/logs/error.log, 
/dev/stdout, /dev/stderr
       access_log:
         file_path:
           logs/access.log  # supports relative path, absolute path, standard 
output
                            # such as: logs/access.log, /tmp/logs/access.log, 
/dev/stdout, /dev/stderr
   
   
   plugins:                          # plugin list (sorted in alphabetical 
order)
     - api-breaker
     - authz-keycloak
     - basic-auth
     - batch-requests
     - consumer-restriction
     - cors
     # - dubbo-proxy
     - echo
     # - error-log-logger
     # - example-plugin
     - fault-injection
     - grpc-transcode
     - hmac-auth
     - http-logger
     - ip-restriction
     - jwt-auth
     - kafka-logger
     - key-auth
     - limit-conn
     - limit-count
     - limit-req
     # - log-rotate
     # - node-status
     - openid-connect
     - prometheus
     - proxy-cache
     - proxy-mirror
     - proxy-rewrite
     - redirect
     - referer-restriction
     - request-id
     - request-validation
     - response-rewrite
     - serverless-post-function
     - serverless-pre-function
     # - skywalking
     - sls-logger
     - syslog
     - tcp-logger
     - udp-logger
     - uri-blocker
     - wolf-rbac
     - zipkin
     - server-info
     - traffic-split
   
   ```


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]


Reply via email to