2016-03-15 15:50:14 +00:00
< p align = "center" >
2016-03-22 16:25:57 +00:00
< img src = "img/traefik.logo.png" alt = "Træfɪ k" title = "Træfɪ k" / >
2016-03-15 15:50:14 +00:00
< / p >
2015-09-22 08:33:37 +00:00
2016-03-22 16:25:57 +00:00
[![Build Status ](https://travis-ci.org/containous/traefik.svg?branch=master )](https://travis-ci.org/containous/traefik)
[![Docs ](https://img.shields.io/badge/docs-current-brightgreen.svg )](https://docs.traefik.io)
[![Go Report Card ](https://goreportcard.com/badge/kubernetes/helm )](http://goreportcard.com/report/containous/traefik)
[![License ](https://img.shields.io/badge/license-MIT-blue.svg )](https://github.com/containous/traefik/blob/master/LICENSE.md)
[![Join the chat at https://traefik.herokuapp.com ](https://img.shields.io/badge/style-register-green.svg?style=social&label=Slack )](https://traefik.herokuapp.com)
[![Twitter ](https://img.shields.io/twitter/follow/traefikproxy.svg?style=social )](https://twitter.com/intent/follow?screen_name=traefikproxy)
2015-09-22 08:33:37 +00:00
Træfɪ k is a modern HTTP reverse proxy and load balancer made to deploy microservices with ease.
2016-03-22 16:25:57 +00:00
It supports several backends ([Docker](https://www.docker.com/), [Swarm ](https://docs.docker.com/swarm ), [Mesos/Marathon ](https://mesosphere.github.io/marathon/ ), [Consul ](https://www.consul.io/ ), [Etcd ](https://coreos.com/etcd/ ), [Zookeeper ](https://zookeeper.apache.org ), [BoltDB ](https://github.com/boltdb/bolt ), Rest API, file...) to manage its configuration automatically and dynamically.
2016-03-15 15:50:14 +00:00
2016-03-22 16:25:57 +00:00
## Overview
2016-03-15 15:50:14 +00:00
2016-03-22 16:25:57 +00:00
Imagine that you have deployed a bunch of microservices on your infrastructure. You probably used a service registry (like etcd or consul) and/or an orchestrator (swarm, Mesos/Marathon) to manage all these services.
If you want your users to access some of your microservices from the Internet, you will have to use a reverse proxy and configure it using virtual hosts or prefix paths:
2016-03-15 15:50:14 +00:00
2016-03-22 16:25:57 +00:00
- domain `api.domain.com` will point the microservice `api` in your private network
- path `domain.com/web` will point the microservice `web` in your private network
- domain `backoffice.domain.com` will point the microservices `backoffice` in your private network, load-balancing between your multiple instances
2016-03-29 20:25:32 +00:00
2016-03-22 16:25:57 +00:00
But a microservices architecture is dynamic... Services are added, removed, killed or upgraded often, eventually several times a day.
2016-03-29 20:25:32 +00:00
2016-03-22 16:25:57 +00:00
Traditional reverse-proxies are not natively dynamic. You can't change their configuration and hot-reload easily.
2016-03-15 15:50:14 +00:00
2016-03-22 16:25:57 +00:00
Here enters Træfɪ k.
2015-09-22 08:33:37 +00:00
2016-03-22 16:25:57 +00:00
![Architecture ](img/architecture.png )
2015-09-22 08:33:37 +00:00
2016-03-22 16:25:57 +00:00
Træfɪ k can listen to your service registry/orchestrator API, and knows each time a microservice is added, removed, killed or upgraded, and can generate its configuration automatically.
Routes to your services will be created instantly.
2015-09-22 08:33:37 +00:00
2016-03-22 16:25:57 +00:00
Run it and forget it!
2015-09-22 08:33:37 +00:00
2016-03-22 16:25:57 +00:00
## Demo
2015-09-22 08:33:37 +00:00
2016-05-13 15:32:39 +00:00
Here is a talk (in french) given by [Emile Vauge ](https://github.com/emilevauge ) at the [Devoxx France 2016 ](http://www.devoxx.fr ) conference.
You will learn fundamental Træfɪ k features and see some demos with Docker, Mesos/Marathon and Lets'Encrypt.
2015-09-22 08:33:37 +00:00
2016-05-13 15:32:39 +00:00
[![Traefik Devoxx France ](https://img.youtube.com/vi/QvAz9mVx5TI/0.jpg )](https://www.youtube.com/watch?v=QvAz9mVx5TI)
2015-09-25 09:44:19 +00:00
2016-03-22 16:25:57 +00:00
## Get it
2015-09-22 08:33:37 +00:00
2016-03-22 16:25:57 +00:00
### Binary
2015-09-22 08:33:37 +00:00
2016-03-22 16:25:57 +00:00
You can grab the latest binary from the [releases ](https://github.com/containous/traefik/releases ) page and just run it with the [sample configuration file ](https://raw.githubusercontent.com/containous/traefik/master/traefik.sample.toml ):
2015-09-22 08:33:37 +00:00
2016-03-22 16:25:57 +00:00
```shell
./traefik -c traefik.toml
2015-09-22 08:33:37 +00:00
```
2016-03-22 16:25:57 +00:00
### Docker
2015-09-22 08:33:37 +00:00
2016-03-22 16:25:57 +00:00
Using the tiny Docker image:
2015-09-22 08:33:37 +00:00
2016-03-22 16:25:57 +00:00
```shell
2016-04-07 13:36:48 +00:00
docker run -d -p 8080:8080 -p 80:80 -v $PWD/traefik.toml:/etc/traefik/traefik.toml traefik
2015-09-22 08:33:37 +00:00
```
2016-03-22 16:25:57 +00:00
## Test it
2015-09-22 19:00:29 +00:00
2016-03-22 16:25:57 +00:00
You can test Træfɪ k easily using [Docker compose ](https://docs.docker.com/compose ), with this `docker-compose.yml` file:
2015-09-22 08:33:37 +00:00
2016-03-22 16:25:57 +00:00
```yaml
traefik:
2016-04-07 13:36:48 +00:00
image: traefik
2016-03-22 16:25:57 +00:00
command: --web --docker --docker.domain=docker.localhost --logLevel=DEBUG
ports:
- "80:80"
- "8080:8080"
volumes:
- /var/run/docker.sock:/var/run/docker.sock
- /dev/null:/traefik.toml
2015-09-22 08:33:37 +00:00
2016-03-22 16:25:57 +00:00
whoami1:
image: emilevauge/whoami
labels:
- "traefik.backend=whoami"
- "traefik.frontend.rule=Host:whoami.docker.localhost"
2015-09-22 08:33:37 +00:00
2016-03-22 16:25:57 +00:00
whoami2:
image: emilevauge/whoami
labels:
- "traefik.backend=whoami"
- "traefik.frontend.rule=Host:whoami.docker.localhost"
2015-09-22 08:33:37 +00:00
```
2016-03-22 16:25:57 +00:00
Then, start it:
2015-09-22 08:33:37 +00:00
```
2016-03-22 16:25:57 +00:00
docker-compose up -d
2015-09-22 08:33:37 +00:00
```
2016-03-22 16:25:57 +00:00
Finally, test load-balancing between the two servers `whoami1` and `whoami2` :
2015-09-22 08:33:37 +00:00
2016-03-22 16:25:57 +00:00
```bash
$ curl -H Host:whoami.docker.localhost http://127.0.0.1
Hostname: ef194d07634a
IP: 127.0.0.1
IP: ::1
IP: 172.17.0.4
IP: fe80::42:acff:fe11:4
GET / HTTP/1.1
Host: 172.17.0.4:80
User-Agent: curl/7.35.0
Accept: */*
Accept-Encoding: gzip
X-Forwarded-For: 172.17.0.1
X-Forwarded-Host: 172.17.0.4:80
X-Forwarded-Proto: http
X-Forwarded-Server: dbb60406010d
$ curl -H Host:whoami.docker.localhost http://127.0.0.1
Hostname: 6c3c5df0c79a
IP: 127.0.0.1
IP: ::1
IP: 172.17.0.3
IP: fe80::42:acff:fe11:3
GET / HTTP/1.1
Host: 172.17.0.3:80
User-Agent: curl/7.35.0
Accept: */*
Accept-Encoding: gzip
X-Forwarded-For: 172.17.0.1
X-Forwarded-Host: 172.17.0.3:80
X-Forwarded-Proto: http
X-Forwarded-Server: dbb60406010d
2016-03-08 15:27:12 +00:00
```