Okay buckle up, hope this is what you asked for:
{"log":"{\"level\":\"debug\",\"ts\":1677058979.0520873,\"logger\":\"http\",\"msg\":\"servers shutting down with eternal grace period\"}\n","stream":"stderr","time":"2023-02-22T09:42:59.054984274Z"}
{"log":"{\"level\":\"info\",\"ts\":1677058979.155359,\"logger\":\"tls.cache.maintenance\",\"msg\":\"stopped background certificate maintenance\",\"cache\":\"0xc000253260\"}\n","stream":"stderr","time":"2023-02-22T09:42:59.155444419Z"}
{"log":"{\"level\":\"info\",\"ts\":1677058979.162771,\"logger\":\"admin\",\"msg\":\"stopped previous server\",\"address\":\"localhost:2019\"}\n","stream":"stderr","time":"2023-02-22T09:42:59.167766682Z"}
{"log":"{\"level\":\"info\",\"ts\":1677058979.1627858,\"msg\":\"shutdown complete\",\"signal\":\"SIGTERM\",\"exit_code\":0}\n","stream":"stderr","time":"2023-02-22T09:42:59.167783063Z"}
{"log":"{\"level\":\"info\",\"ts\":1677059132.1840496,\"msg\":\"using provided configuration\",\"config_file\":\"/etc/caddy/Caddyfile\",\"config_adapter\":\"caddyfile\"}\n","stream":"stderr","time":"2023-02-22T09:45:32.189575522Z"}
{"log":"{\"level\":\"warn\",\"ts\":1677059132.29415,\"msg\":\"Caddyfile input is not formatted; run the 'caddy fmt' command to fix inconsistencies\",\"adapter\":\"caddyfile\",\"file\":\"/etc/caddy/Caddyfile\",\"line\":7}\n","stream":"stderr","time":"2023-02-22T09:45:32.294446741Z"}
{"log":"{\"level\":\"info\",\"ts\":1677059132.3005822,\"logger\":\"admin\",\"msg\":\"admin endpoint started\",\"address\":\"localhost:2019\",\"enforce_origin\":false,\"origins\":[\"//localhost:2019\",\"//[::1]:2019\",\"//127.0.0.1:2019\"]}\n","stream":"stderr","time":"2023-02-22T09:45:32.30074699Z"}
{"log":"{\"level\":\"info\",\"ts\":1677059132.301415,\"logger\":\"http\",\"msg\":\"server is listening only on the HTTPS port but has no TLS connection policies; adding one to enable TLS\",\"server_name\":\"srv0\",\"https_port\":443}\n","stream":"stderr","time":"2023-02-22T09:45:32.301469904Z"}
{"log":"{\"level\":\"info\",\"ts\":1677059132.3014975,\"logger\":\"http\",\"msg\":\"enabling automatic HTTP-\u003eHTTPS redirects\",\"server_name\":\"srv0\"}\n","stream":"stderr","time":"2023-02-22T09:45:32.301562635Z"}
{"log":"{\"level\":\"info\",\"ts\":1677059132.3062236,\"logger\":\"http\",\"msg\":\"enabling HTTP/3 listener\",\"addr\":\":443\"}\n","stream":"stderr","time":"2023-02-22T09:45:32.306282456Z"}
{"log":"{\"level\":\"info\",\"ts\":1677059132.3066757,\"msg\":\"failed to sufficiently increase receive buffer size (was: 208 kiB, wanted: 2048 kiB, got: 416 kiB). See https://github.com/lucas-clemente/quic-go/wiki/UDP-Receive-Buffer-Size for details.\"}\n","stream":"stderr","time":"2023-02-22T09:45:32.306716401Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059132.3072681,\"logger\":\"http\",\"msg\":\"starting server loop\",\"address\":\"[::]:443\",\"tls\":true,\"http3\":true}\n","stream":"stderr","time":"2023-02-22T09:45:32.307321481Z"}
{"log":"{\"level\":\"info\",\"ts\":1677059132.3073382,\"logger\":\"http.log\",\"msg\":\"server running\",\"name\":\"srv0\",\"protocols\":[\"h1\",\"h2\",\"h3\"]}\n","stream":"stderr","time":"2023-02-22T09:45:32.307446334Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059132.3075013,\"logger\":\"http\",\"msg\":\"starting server loop\",\"address\":\"[::]:80\",\"tls\":false,\"http3\":false}\n","stream":"stderr","time":"2023-02-22T09:45:32.307543903Z"}
{"log":"{\"level\":\"info\",\"ts\":1677059132.3075564,\"logger\":\"http.log\",\"msg\":\"server running\",\"name\":\"remaining_auto_https_redirects\",\"protocols\":[\"h1\",\"h2\",\"h3\"]}\n","stream":"stderr","time":"2023-02-22T09:45:32.307577033Z"}
{"log":"{\"level\":\"info\",\"ts\":1677059132.3075886,\"logger\":\"http\",\"msg\":\"enabling automatic TLS certificate management\",\"domains\":[\"192.168.0.29\",\"vaultwarden.mine.duckdns.org\"]}\n","stream":"stderr","time":"2023-02-22T09:45:32.307637032Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059132.3132415,\"logger\":\"tls\",\"msg\":\"loading managed certificate\",\"domain\":\"vaultwarden.mine.duckdns.org\",\"expiration\":1683831527,\"issuer_key\":\"acme-v02.api.letsencrypt.org-directory\",\"storage\":\"FileStorage:/data/caddy\"}\n","stream":"stderr","time":"2023-02-22T09:45:32.313280847Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059132.3143437,\"logger\":\"tls.cache\",\"msg\":\"added certificate to cache\",\"subjects\":[\"vaultwarden.mine.duckdns.org\"],\"expiration\":1683831527,\"managed\":true,\"issuer_key\":\"acme-v02.api.letsencrypt.org-directory\",\"hash\":\"00fcbd725aa3114c1c71a396c9e72bf0c8c9a806911f934df97cdbfc27a136b5\",\"cache_size\":1,\"cache_capacity\":10000}\n","stream":"stderr","time":"2023-02-22T09:45:32.314382279Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059132.314418,\"logger\":\"events\",\"msg\":\"event\",\"name\":\"cached_managed_cert\",\"id\":\"aa6894b0-a339-4f67-a108-abf27a5947f8\",\"origin\":\"tls\",\"data\":{\"sans\":[\"vaultwarden.mine.duckdns.org\"]}}\n","stream":"stderr","time":"2023-02-22T09:45:32.314491263Z"}
{"log":"{\"level\":\"info\",\"ts\":1677059132.314596,\"msg\":\"autosaved config (load with --resume flag)\",\"file\":\"/config/caddy/autosave.json\"}\n","stream":"stderr","time":"2023-02-22T09:45:32.314625934Z"}
{"log":"{\"level\":\"info\",\"ts\":1677059132.3146365,\"msg\":\"serving initial configuration\"}\n","stream":"stderr","time":"2023-02-22T09:45:32.314654394Z"}
{"log":"{\"level\":\"info\",\"ts\":1677059132.3158987,\"logger\":\"tls.cache.maintenance\",\"msg\":\"started background certificate maintenance\",\"cache\":\"0xc000189260\"}\n","stream":"stderr","time":"2023-02-22T09:45:32.315934968Z"}
{"log":"{\"level\":\"info\",\"ts\":1677059132.3160758,\"logger\":\"tls\",\"msg\":\"cleaning storage unit\",\"description\":\"FileStorage:/data/caddy\"}\n","stream":"stderr","time":"2023-02-22T09:45:32.316125184Z"}
{"log":"{\"level\":\"info\",\"ts\":1677059132.322642,\"logger\":\"tls\",\"msg\":\"finished cleaning storage units\"}\n","stream":"stderr","time":"2023-02-22T09:45:32.322678377Z"}
{"log":"{\"level\":\"info\",\"ts\":1677059132.3232944,\"logger\":\"tls.obtain\",\"msg\":\"acquiring lock\",\"identifier\":\"192.168.0.29\"}\n","stream":"stderr","time":"2023-02-22T09:45:32.323331104Z"}
{"log":"{\"level\":\"info\",\"ts\":1677059132.330896,\"logger\":\"tls.obtain\",\"msg\":\"lock acquired\",\"identifier\":\"192.168.0.29\"}\n","stream":"stderr","time":"2023-02-22T09:45:32.330990968Z"}
{"log":"{\"level\":\"info\",\"ts\":1677059132.331086,\"logger\":\"tls.obtain\",\"msg\":\"obtaining certificate\",\"identifier\":\"192.168.0.29\"}\n","stream":"stderr","time":"2023-02-22T09:45:32.331117298Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059132.331241,\"logger\":\"events\",\"msg\":\"event\",\"name\":\"cert_obtaining\",\"id\":\"9dfef911-5c53-47c1-a270-36772eb21f05\",\"origin\":\"tls\",\"data\":{\"identifier\":\"192.168.0.29\"}}\n","stream":"stderr","time":"2023-02-22T09:45:32.331277205Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059132.3317316,\"logger\":\"tls.obtain\",\"msg\":\"trying issuer 1/2\",\"issuer\":\"acme-v02.api.letsencrypt.org-directory\"}\n","stream":"stderr","time":"2023-02-22T09:45:32.331766447Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059132.331857,\"logger\":\"tls.obtain\",\"msg\":\"trying issuer 2/2\",\"issuer\":\"acme.zerossl.com-v2-DV90\"}\n","stream":"stderr","time":"2023-02-22T09:45:32.331887573Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059132.331906,\"logger\":\"events\",\"msg\":\"event\",\"name\":\"cert_failed\",\"id\":\"58eb1daf-1023-4c52-90f3-7615fce78cb4\",\"origin\":\"tls\",\"data\":{\"error\":{},\"identifier\":\"192.168.0.29\",\"issuers\":[\"acme-v02.api.letsencrypt.org-directory\",\"acme.zerossl.com-v2-DV90\"],\"renewal\":false}}\n","stream":"stderr","time":"2023-02-22T09:45:32.331940415Z"}
{"log":"{\"level\":\"error\",\"ts\":1677059132.331966,\"logger\":\"tls.obtain\",\"msg\":\"will retry\",\"error\":\"[192.168.0.29] Obtain: subject does not qualify for a public certificate: 192.168.0.29\",\"attempt\":1,\"retrying_in\":60,\"elapsed\":0.000960624,\"max_duration\":2592000}\n","stream":"stderr","time":"2023-02-22T09:45:32.331991512Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059137.1446986,\"logger\":\"events\",\"msg\":\"event\",\"name\":\"tls_get_certificate\",\"id\":\"b489289a-0a10-45b7-b596-9eb4b3e56d6c\",\"origin\":\"tls\",\"data\":{\"client_hello\":{\"CipherSuites\":[19018,4865,4866,4867,49196,49195,52393,49200,49199,52392,49162,49161,49172,49171,157,156,53,47,49160,49170,10],\"ServerName\":\"\",\"SupportedCurves\":[6682,29,23,24,25],\"SupportedPoints\":\"AA==\",\"SignatureSchemes\":[1027,2052,1025,1283,515,2053,2053,1281,2054,1537,513],\"SupportedProtos\":[\"h2\",\"http/1.1\"],\"SupportedVersions\":[43690,772,771,770,769],\"Conn\":{}}}}\n","stream":"stderr","time":"2023-02-22T09:45:37.144842853Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059137.1448948,\"logger\":\"tls.handshake\",\"msg\":\"no matching certificates and no custom selection logic\",\"identifier\":\"172.22.0.3\"}\n","stream":"stderr","time":"2023-02-22T09:45:37.144917753Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059137.1449301,\"logger\":\"tls.handshake\",\"msg\":\"all external certificate managers yielded no certificates and no errors\",\"remote_ip\":\"192.168.0.27\",\"remote_port\":\"50066\",\"sni\":\"\"}\n","stream":"stderr","time":"2023-02-22T09:45:37.144955156Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059137.1449718,\"logger\":\"tls.handshake\",\"msg\":\"no certificate matching TLS ClientHello\",\"remote_ip\":\"192.168.0.27\",\"remote_port\":\"50066\",\"server_name\":\"\",\"remote\":\"192.168.0.27:50066\",\"identifier\":\"172.22.0.3\",\"cipher_suites\":[19018,4865,4866,4867,49196,49195,52393,49200,49199,52392,49162,49161,49172,49171,157,156,53,47,49160,49170,10],\"cert_cache_fill\":0.0001,\"load_if_necessary\":true,\"obtain_if_necessary\":true,\"on_demand\":false}\n","stream":"stderr","time":"2023-02-22T09:45:37.144996454Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059137.1450963,\"logger\":\"http.stdlib\",\"msg\":\"http: TLS handshake error from 192.168.0.27:50066: no certificate available for '172.22.0.3'\"}\n","stream":"stderr","time":"2023-02-22T09:45:37.145126409Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059137.20787,\"logger\":\"events\",\"msg\":\"event\",\"name\":\"tls_get_certificate\",\"id\":\"2ea92ea7-ea0a-454a-aff9-045c22df94ac\",\"origin\":\"tls\",\"data\":{\"client_hello\":{\"CipherSuites\":[2570,4865,4866,4867,49196,49195,52393,49200,49199,52392,49162,49161,49172,49171,157,156,53,47,49160,49170,10,22016],\"ServerName\":\"\",\"SupportedCurves\":[2570,29,23,24,25],\"SupportedPoints\":\"AA==\",\"SignatureSchemes\":[1027,2052,1025,1283,515,2053,2053,1281,2054,1537,513],\"SupportedProtos\":[\"h2\",\"http/1.1\"],\"SupportedVersions\":[23130,772,771,770,769],\"Conn\":{}}}}\n","stream":"stderr","time":"2023-02-22T09:45:37.207966645Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059137.2080138,\"logger\":\"tls.handshake\",\"msg\":\"no matching certificates and no custom selection logic\",\"identifier\":\"172.22.0.3\"}\n","stream":"stderr","time":"2023-02-22T09:45:37.208045366Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059137.2080572,\"logger\":\"tls.handshake\",\"msg\":\"all external certificate managers yielded no certificates and no errors\",\"remote_ip\":\"192.168.0.27\",\"remote_port\":\"50067\",\"sni\":\"\"}\n","stream":"stderr","time":"2023-02-22T09:45:37.208092614Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059137.208107,\"logger\":\"tls.handshake\",\"msg\":\"no certificate matching TLS ClientHello\",\"remote_ip\":\"192.168.0.27\",\"remote_port\":\"50067\",\"server_name\":\"\",\"remote\":\"192.168.0.27:50067\",\"identifier\":\"172.22.0.3\",\"cipher_suites\":[2570,4865,4866,4867,49196,49195,52393,49200,49199,52392,49162,49161,49172,49171,157,156,53,47,49160,49170,10,22016],\"cert_cache_fill\":0.0001,\"load_if_necessary\":true,\"obtain_if_necessary\":true,\"on_demand\":false}\n","stream":"stderr","time":"2023-02-22T09:45:37.208129177Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059137.2082105,\"logger\":\"http.stdlib\",\"msg\":\"http: TLS handshake error from 192.168.0.27:50067: no certificate available for '172.22.0.3'\"}\n","stream":"stderr","time":"2023-02-22T09:45:37.208248379Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059137.2683475,\"logger\":\"http.stdlib\",\"msg\":\"http: TLS handshake error from 192.168.0.27:50068: tls: client offered only unsupported versions: [301]\"}\n","stream":"stderr","time":"2023-02-22T09:45:37.268439891Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059137.3376715,\"logger\":\"events\",\"msg\":\"event\",\"name\":\"tls_get_certificate\",\"id\":\"4ead83a5-8290-43e5-9a5b-77ab3377ba97\",\"origin\":\"tls\",\"data\":{\"client_hello\":{\"CipherSuites\":[19018,4865,4866,4867,49196,49195,52393,49200,49199,52392,49162,49161,49172,49171,157,156,53,47,49160,49170,10],\"ServerName\":\"\",\"SupportedCurves\":[35466,29,23,24,25],\"SupportedPoints\":\"AA==\",\"SignatureSchemes\":[1027,2052,1025,1283,515,2053,2053,1281,2054,1537,513],\"SupportedProtos\":[\"h2\",\"http/1.1\"],\"SupportedVersions\":[35466,772,771,770,769],\"Conn\":{}}}}\n","stream":"stderr","time":"2023-02-22T09:45:37.337768057Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059137.3382668,\"logger\":\"tls.handshake\",\"msg\":\"no matching certificates and no custom selection logic\",\"identifier\":\"172.22.0.3\"}\n","stream":"stderr","time":"2023-02-22T09:45:37.338292388Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059137.338305,\"logger\":\"tls.handshake\",\"msg\":\"all external certificate managers yielded no certificates and no errors\",\"remote_ip\":\"192.168.0.27\",\"remote_port\":\"50069\",\"sni\":\"\"}\n","stream":"stderr","time":"2023-02-22T09:45:37.338330244Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059137.3383467,\"logger\":\"tls.handshake\",\"msg\":\"no certificate matching TLS ClientHello\",\"remote_ip\":\"192.168.0.27\",\"remote_port\":\"50069\",\"server_name\":\"\",\"remote\":\"192.168.0.27:50069\",\"identifier\":\"172.22.0.3\",\"cipher_suites\":[19018,4865,4866,4867,49196,49195,52393,49200,49199,52392,49162,49161,49172,49171,157,156,53,47,49160,49170,10],\"cert_cache_fill\":0.0001,\"load_if_necessary\":true,\"obtain_if_necessary\":true,\"on_demand\":false}\n","stream":"stderr","time":"2023-02-22T09:45:37.338373375Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059137.3384376,\"logger\":\"http.stdlib\",\"msg\":\"http: TLS handshake error from 192.168.0.27:50069: no certificate available for '172.22.0.3'\"}\n","stream":"stderr","time":"2023-02-22T09:45:37.33846226Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059137.3989325,\"logger\":\"events\",\"msg\":\"event\",\"name\":\"tls_get_certificate\",\"id\":\"36ba6ced-2d04-4327-83aa-d7161faa6f84\",\"origin\":\"tls\",\"data\":{\"client_hello\":{\"CipherSuites\":[35466,4865,4866,4867,49196,49195,52393,49200,49199,52392,49162,49161,49172,49171,157,156,53,47,49160,49170,10,22016],\"ServerName\":\"\",\"SupportedCurves\":[6682,29,23,24,25],\"SupportedPoints\":\"AA==\",\"SignatureSchemes\":[1027,2052,1025,1283,515,2053,2053,1281,2054,1537,513],\"SupportedProtos\":[\"h2\",\"http/1.1\"],\"SupportedVersions\":[23130,772,771,770,769],\"Conn\":{}}}}\n","stream":"stderr","time":"2023-02-22T09:45:37.399023146Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059137.3990743,\"logger\":\"tls.handshake\",\"msg\":\"no matching certificates and no custom selection logic\",\"identifier\":\"172.22.0.3\"}\n","stream":"stderr","time":"2023-02-22T09:45:37.399099539Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059137.3991122,\"logger\":\"tls.handshake\",\"msg\":\"all external certificate managers yielded no certificates and no errors\",\"remote_ip\":\"192.168.0.27\",\"remote_port\":\"50070\",\"sni\":\"\"}\n","stream":"stderr","time":"2023-02-22T09:45:37.399136616Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059137.3991537,\"logger\":\"tls.handshake\",\"msg\":\"no certificate matching TLS ClientHello\",\"remote_ip\":\"192.168.0.27\",\"remote_port\":\"50070\",\"server_name\":\"\",\"remote\":\"192.168.0.27:50070\",\"identifier\":\"172.22.0.3\",\"cipher_suites\":[35466,4865,4866,4867,49196,49195,52393,49200,49199,52392,49162,49161,49172,49171,157,156,53,47,49160,49170,10,22016],\"cert_cache_fill\":0.0001,\"load_if_necessary\":true,\"obtain_if_necessary\":true,\"on_demand\":false}\n","stream":"stderr","time":"2023-02-22T09:45:37.399180046Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059137.3992646,\"logger\":\"http.stdlib\",\"msg\":\"http: TLS handshake error from 192.168.0.27:50070: no certificate available for '172.22.0.3'\"}\n","stream":"stderr","time":"2023-02-22T09:45:37.399291734Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059137.448711,\"logger\":\"http.stdlib\",\"msg\":\"http: TLS handshake error from 192.168.0.27:50071: tls: client offered only unsupported versions: [301]\"}\n","stream":"stderr","time":"2023-02-22T09:45:37.448776654Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059142.039904,\"logger\":\"events\",\"msg\":\"event\",\"name\":\"tls_get_certificate\",\"id\":\"bd2ce583-2e4f-4752-bbf6-34b58cb16fc1\",\"origin\":\"tls\",\"data\":{\"client_hello\":{\"CipherSuites\":[39578,4865,4866,4867,49196,49195,52393,49200,49199,52392,49162,49161,49172,49171,157,156,53,47,49160,49170,10],\"ServerName\":\"\",\"SupportedCurves\":[19018,29,23,24,25],\"SupportedPoints\":\"AA==\",\"SignatureSchemes\":[1027,2052,1025,1283,515,2053,2053,1281,2054,1537,513],\"SupportedProtos\":[\"h2\",\"http/1.1\"],\"SupportedVersions\":[47802,772,771,770,769],\"Conn\":{}}}}\n","stream":"stderr","time":"2023-02-22T09:45:42.040160924Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059142.0399787,\"logger\":\"tls.handshake\",\"msg\":\"no matching certificates and no custom selection logic\",\"identifier\":\"172.22.0.3\"}\n","stream":"stderr","time":"2023-02-22T09:45:42.040179336Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059142.0400074,\"logger\":\"tls.handshake\",\"msg\":\"all external certificate managers yielded no certificates and no errors\",\"remote_ip\":\"192.168.0.27\",\"remote_port\":\"50072\",\"sni\":\"\"}\n","stream":"stderr","time":"2023-02-22T09:45:42.04018212Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059142.0400217,\"logger\":\"tls.handshake\",\"msg\":\"no certificate matching TLS ClientHello\",\"remote_ip\":\"192.168.0.27\",\"remote_port\":\"50072\",\"server_name\":\"\",\"remote\":\"192.168.0.27:50072\",\"identifier\":\"172.22.0.3\",\"cipher_suites\":[39578,4865,4866,4867,49196,49195,52393,49200,49199,52392,49162,49161,49172,49171,157,156,53,47,49160,49170,10],\"cert_cache_fill\":0.0001,\"load_if_necessary\":true,\"obtain_if_necessary\":true,\"on_demand\":false}\n","stream":"stderr","time":"2023-02-22T09:45:42.040184573Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059142.0400803,\"logger\":\"http.stdlib\",\"msg\":\"http: TLS handshake error from 192.168.0.27:50072: no certificate available for '172.22.0.3'\"}\n","stream":"stderr","time":"2023-02-22T09:45:42.040213608Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059142.0966456,\"logger\":\"events\",\"msg\":\"event\",\"name\":\"tls_get_certificate\",\"id\":\"9f762051-da15-49f9-948d-3fdd91fd8a70\",\"origin\":\"tls\",\"data\":{\"client_hello\":{\"CipherSuites\":[64250,4865,4866,4867,49196,49195,52393,49200,49199,52392,49162,49161,49172,49171,157,156,53,47,49160,49170,10,22016],\"ServerName\":\"\",\"SupportedCurves\":[27242,29,23,24,25],\"SupportedPoints\":\"AA==\",\"SignatureSchemes\":[1027,2052,1025,1283,515,2053,2053,1281,2054,1537,513],\"SupportedProtos\":[\"h2\",\"http/1.1\"],\"SupportedVersions\":[56026,772,771,770,769],\"Conn\":{}}}}\n","stream":"stderr","time":"2023-02-22T09:45:42.0969186Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059142.0967317,\"logger\":\"tls.handshake\",\"msg\":\"no matching certificates and no custom selection logic\",\"identifier\":\"172.22.0.3\"}\n","stream":"stderr","time":"2023-02-22T09:45:42.096949674Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059142.0967484,\"logger\":\"tls.handshake\",\"msg\":\"all external certificate managers yielded no certificates and no errors\",\"remote_ip\":\"192.168.0.27\",\"remote_port\":\"50073\",\"sni\":\"\"}\n","stream":"stderr","time":"2023-02-22T09:45:42.096954011Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059142.0967624,\"logger\":\"tls.handshake\",\"msg\":\"no certificate matching TLS ClientHello\",\"remote_ip\":\"192.168.0.27\",\"remote_port\":\"50073\",\"server_name\":\"\",\"remote\":\"192.168.0.27:50073\",\"identifier\":\"172.22.0.3\",\"cipher_suites\":[64250,4865,4866,4867,49196,49195,52393,49200,49199,52392,49162,49161,49172,49171,157,156,53,47,49160,49170,10,22016],\"cert_cache_fill\":0.0001,\"load_if_necessary\":true,\"obtain_if_necessary\":true,\"on_demand\":false}\n","stream":"stderr","time":"2023-02-22T09:45:42.096956595Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059142.0968385,\"logger\":\"http.stdlib\",\"msg\":\"http: TLS handshake error from 192.168.0.27:50073: no certificate available for '172.22.0.3'\"}\n","stream":"stderr","time":"2023-02-22T09:45:42.096959573Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059142.152329,\"logger\":\"http.stdlib\",\"msg\":\"http: TLS handshake error from 192.168.0.27:50074: tls: client offered only unsupported versions: [301]\"}\n","stream":"stderr","time":"2023-02-22T09:45:42.152500761Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059142.2334807,\"logger\":\"events\",\"msg\":\"event\",\"name\":\"tls_get_certificate\",\"id\":\"e69c0beb-9b6f-45ce-b64f-35b1f8c46f75\",\"origin\":\"tls\",\"data\":{\"client_hello\":{\"CipherSuites\":[31354,4865,4866,4867,49196,49195,52393,49200,49199,52392,49162,49161,49172,49171,157,156,53,47,49160,49170,10],\"ServerName\":\"\",\"SupportedCurves\":[10794,29,23,24,25],\"SupportedPoints\":\"AA==\",\"SignatureSchemes\":[1027,2052,1025,1283,515,2053,2053,1281,2054,1537,513],\"SupportedProtos\":[\"h2\",\"http/1.1\"],\"SupportedVersions\":[56026,772,771,770,769],\"Conn\":{}}}}\n","stream":"stderr","time":"2023-02-22T09:45:42.23374523Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059142.2335653,\"logger\":\"tls.handshake\",\"msg\":\"no matching certificates and no custom selection logic\",\"identifier\":\"172.22.0.3\"}\n","stream":"stderr","time":"2023-02-22T09:45:42.233775547Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059142.2335823,\"logger\":\"tls.handshake\",\"msg\":\"all external certificate managers yielded no certificates and no errors\",\"remote_ip\":\"192.168.0.27\",\"remote_port\":\"50075\",\"sni\":\"\"}\n","stream":"stderr","time":"2023-02-22T09:45:42.233778406Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059142.2335992,\"logger\":\"tls.handshake\",\"msg\":\"no certificate matching TLS ClientHello\",\"remote_ip\":\"192.168.0.27\",\"remote_port\":\"50075\",\"server_name\":\"\",\"remote\":\"192.168.0.27:50075\",\"identifier\":\"172.22.0.3\",\"cipher_suites\":[31354,4865,4866,4867,49196,49195,52393,49200,49199,52392,49162,49161,49172,49171,157,156,53,47,49160,49170,10],\"cert_cache_fill\":0.0001,\"load_if_necessary\":true,\"obtain_if_necessary\":true,\"on_demand\":false}\n","stream":"stderr","time":"2023-02-22T09:45:42.233780791Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059142.2336621,\"logger\":\"http.stdlib\",\"msg\":\"http: TLS handshake error from 192.168.0.27:50075: no certificate available for '172.22.0.3'\"}\n","stream":"stderr","time":"2023-02-22T09:45:42.233783771Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059142.3090808,\"logger\":\"events\",\"msg\":\"event\",\"name\":\"tls_get_certificate\",\"id\":\"d192e3a1-aae1-4cef-9873-ff93187f11ff\",\"origin\":\"tls\",\"data\":{\"client_hello\":{\"CipherSuites\":[10794,4865,4866,4867,49196,49195,52393,49200,49199,52392,49162,49161,49172,49171,157,156,53,47,49160,49170,10,22016],\"ServerName\":\"\",\"SupportedCurves\":[56026,29,23,24,25],\"SupportedPoints\":\"AA==\",\"SignatureSchemes\":[1027,2052,1025,1283,515,2053,2053,1281,2054,1537,513],\"SupportedProtos\":[\"h2\",\"http/1.1\"],\"SupportedVersions\":[35466,772,771,770,769],\"Conn\":{}}}}\n","stream":"stderr","time":"2023-02-22T09:45:42.309385896Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059142.309175,\"logger\":\"tls.handshake\",\"msg\":\"no matching certificates and no custom selection logic\",\"identifier\":\"172.22.0.3\"}\n","stream":"stderr","time":"2023-02-22T09:45:42.309410441Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059142.3091924,\"logger\":\"tls.handshake\",\"msg\":\"all external certificate managers yielded no certificates and no errors\",\"remote_ip\":\"192.168.0.27\",\"remote_port\":\"50076\",\"sni\":\"\"}\n","stream":"stderr","time":"2023-02-22T09:45:42.309413684Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059142.309207,\"logger\":\"tls.handshake\",\"msg\":\"no certificate matching TLS ClientHello\",\"remote_ip\":\"192.168.0.27\",\"remote_port\":\"50076\",\"server_name\":\"\",\"remote\":\"192.168.0.27:50076\",\"identifier\":\"172.22.0.3\",\"cipher_suites\":[10794,4865,4866,4867,49196,49195,52393,49200,49199,52392,49162,49161,49172,49171,157,156,53,47,49160,49170,10,22016],\"cert_cache_fill\":0.0001,\"load_if_necessary\":true,\"obtain_if_necessary\":true,\"on_demand\":false}\n","stream":"stderr","time":"2023-02-22T09:45:42.309416516Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059142.309273,\"logger\":\"http.stdlib\",\"msg\":\"http: TLS handshake error from 192.168.0.27:50076: no certificate available for '172.22.0.3'\"}\n","stream":"stderr","time":"2023-02-22T09:45:42.309431166Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059142.3714428,\"logger\":\"http.stdlib\",\"msg\":\"http: TLS handshake error from 192.168.0.27:50077: tls: client offered only unsupported versions: [301]\"}\n","stream":"stderr","time":"2023-02-22T09:45:42.371576118Z"}
{"log":"{\"level\":\"info\",\"ts\":1677059146.902235,\"msg\":\"shutting down apps, then terminating\",\"signal\":\"SIGTERM\"}\n","stream":"stderr","time":"2023-02-22T09:45:46.902552596Z"}
{"log":"{\"level\":\"warn\",\"ts\":1677059146.9022613,\"msg\":\"exiting; byeee!! đ\",\"signal\":\"SIGTERM\"}\n","stream":"stderr","time":"2023-02-22T09:45:46.902576572Z"}
{"log":"{\"level\":\"debug\",\"ts\":1677059146.9022913,\"logger\":\"http\",\"msg\":\"servers shutting down with eternal grace period\"}\n","stream":"stderr","time":"2023-02-22T09:45:46.902579882Z"}