Traefik¶
Traefik is an open-source Edge Router for Docker, and Kubernetes that makes publishing your services a fun and easy experience. It receives requests on behalf of your system and finds out which components are responsible for handling them.
Installation¶
Docker¶
TODO: WIP
Kubernetes¶
Dashboard and API¶
WIP
EntryPoints¶
WIP
HTTP Redirection¶
WIP
HTTPS¶
WIP
Routers¶
traefik.http.routers.router.entrypoints
Specifies the Entrypoint for the Router. Setting this to traefik.http.routers.router.entrypoints: websecure
will expose the Container on the websecure
entrypoint.
*When using websecure, you should enable traefik.http.routers.router.tls
as well.
traefik.http.routers.router.rule
Specify the Rules for the Router.
This is an example for an FQDN: Host(subdomain.your-domain
)
traefik.http.routers.router.tls Will enable TLS protocol on the router.
traefik.http.routers.router.tls.certresolver Specifies the Certificate Resolver on the Router.
PathPrefix and StripPrefix¶
WIP
Add /api
prefix to any requets to myapidomain.com
Example:
- Request -> myapidomain.com
- Traefik translates this to myapidomain.com/api
without requestee seeing it
CertificatesResolvers¶
WIP
dnsChallenge¶
DNS Providers such as cloudflare
, digitalocean
, civo
, and more. To get a full list of supported providers, look up the Traefik ACME Documentation .
ServersTransport¶
InsecureSkipVerify¶
If you want to skip the TLS verification from Traefik to your Servers, you can add the following section to your traefik.yml
config file.
TLS Settings¶
Define TLS Settings in Traefik.
defaultCertificates¶
options¶
Define TLS Options like disabling insecure TLS1.0 and TLS 1.1.
Providers¶
WIP
File¶
WIP
Docker¶
With exposedByDefault: false
, Traefik won't automatically expose any containers by default. Setting traefik.enable: true
, will expose the Container.
Kubernetes¶
WIP
Ingress¶
WIP
Log¶
WIP
Global¶
WIP