diff --git a/docs/configuration/backends/boltdb.md b/docs/configuration/backends/boltdb.md index 70db84362..cc9dfc1ce 100644 --- a/docs/configuration/backends/boltdb.md +++ b/docs/configuration/backends/boltdb.md @@ -1,13 +1,13 @@ -# BoltDB Backend +# BoltDB Provider -Træfik can be configured to use BoltDB as a backend configuration. +Træfik can be configured to use BoltDB as a provider. ```toml ################################################################ -# BoltDB configuration backend +# BoltDB Provider ################################################################ -# Enable BoltDB configuration backend. +# Enable BoltDB Provider. [boltdb] # BoltDB file. @@ -56,4 +56,4 @@ filename = "boltdb.tmpl" # insecureSkipVerify = true ``` -To enable constraints see [backend-specific constraints section](/configuration/commons/#backend-specific). +To enable constraints see [provider-specific constraints section](/configuration/commons/#provider-specific). diff --git a/docs/configuration/backends/consul.md b/docs/configuration/backends/consul.md index 816813fd1..46ec56ea9 100644 --- a/docs/configuration/backends/consul.md +++ b/docs/configuration/backends/consul.md @@ -1,13 +1,13 @@ -# Consul Key-Value Backend +# Consul Key-Value Provider -Træfik can be configured to use Consul as a backend configuration. +Træfik can be configured to use Consul as a provider. ```toml ################################################################ -# Consul KV configuration backend +# Consul KV Provider ################################################################ -# Enable Consul KV configuration backend. +# Enable Consul KV Provider. [consul] # Consul server endpoint. @@ -56,6 +56,6 @@ prefix = "traefik" # insecureSkipVerify = true ``` -To enable constraints see [backend-specific constraints section](/configuration/commons/#backend-specific). +To enable constraints see [provider-specific constraints section](/configuration/commons/#provider-specific). Please refer to the [Key Value storage structure](/user-guide/kv-config/#key-value-storage-structure) section to get documentation on Traefik KV structure. diff --git a/docs/configuration/backends/consulcatalog.md b/docs/configuration/backends/consulcatalog.md index 8c3fe5726..0b77f9f08 100644 --- a/docs/configuration/backends/consulcatalog.md +++ b/docs/configuration/backends/consulcatalog.md @@ -1,13 +1,13 @@ -# Consul Catalog backend +# Consul Catalog Provider -Træfik can be configured to use service discovery catalog of Consul as a backend configuration. +Træfik can be configured to use service discovery catalog of Consul as a provider. ```toml ################################################################ -# Consul Catalog configuration backend +# Consul Catalog Provider ################################################################ -# Enable Consul Catalog configuration backend. +# Enable Consul Catalog Provider. [consulCatalog] # Consul server endpoint. @@ -76,9 +76,9 @@ prefix = "traefik" # templateVersion = 2 ``` -This backend will create routes matching on hostname based on the service name used in Consul. +This provider will create routes matching on hostname based on the service name used in Consul. -To enable constraints see [backend-specific constraints section](/configuration/commons/#backend-specific). +To enable constraints see [provider-specific constraints section](/configuration/commons/#provider-specific). ## Tags diff --git a/docs/configuration/backends/docker.md b/docs/configuration/backends/docker.md index da9ef6d4c..28a4f57c9 100644 --- a/docs/configuration/backends/docker.md +++ b/docs/configuration/backends/docker.md @@ -1,16 +1,16 @@ -# Docker Backend +# Docker Provider -Træfik can be configured to use Docker as a backend configuration. +Træfik can be configured to use Docker as a provider. ## Docker ```toml ################################################################ -# Docker configuration backend +# Docker Provider ################################################################ -# Enable Docker configuration backend. +# Enable Docker Provider. [docker] # Docker server endpoint. Can be a tcp or a unix socket endpoint. @@ -82,17 +82,17 @@ swarmMode = false # insecureSkipVerify = true ``` -To enable constraints see [backend-specific constraints section](/configuration/commons/#backend-specific). +To enable constraints see [provider-specific constraints section](/configuration/commons/#provider-specific). ## Docker Swarm Mode ```toml ################################################################ -# Docker Swarm Mode configuration backend +# Docker Swarm Mode Provider ################################################################ -# Enable Docker configuration backend. +# Enable Docker Provider. [docker] # Docker server endpoint. @@ -159,7 +159,7 @@ exposedByDefault = false # insecureSkipVerify = true ``` -To enable constraints see [backend-specific constraints section](/configuration/commons/#backend-specific). +To enable constraints see [provider-specific constraints section](/configuration/commons/#provider-specific). ## Labels: overriding default behavior diff --git a/docs/configuration/backends/dynamodb.md b/docs/configuration/backends/dynamodb.md index 269f2a688..3eb09131f 100644 --- a/docs/configuration/backends/dynamodb.md +++ b/docs/configuration/backends/dynamodb.md @@ -1,15 +1,15 @@ -# DynamoDB Backend +# DynamoDB Provider -Træfik can be configured to use Amazon DynamoDB as a backend configuration. +Træfik can be configured to use Amazon DynamoDB as a provider. ## Configuration ```toml ################################################################ -# DynamoDB configuration backend +# DynamoDB Provider ################################################################ -# Enable DynamoDB configuration backend. +# Enable DynamoDB Provider. [dynamodb] # Region to use when connecting to AWS. @@ -68,4 +68,3 @@ Items in the `dynamodb` table must have three attributes: See `types/types.go` for details. The presence or absence of this attribute determines its type. So an item should never have both a `frontend` and a `backend` attribute. - diff --git a/docs/configuration/backends/ecs.md b/docs/configuration/backends/ecs.md index 3a37daa07..8016e4939 100644 --- a/docs/configuration/backends/ecs.md +++ b/docs/configuration/backends/ecs.md @@ -1,15 +1,15 @@ -# ECS Backend +# ECS Provider -Træfik can be configured to use Amazon ECS as a backend configuration. +Træfik can be configured to use Amazon ECS as a provider. ## Configuration ```toml ################################################################ -# ECS configuration backend +# ECS Provider ################################################################ -# Enable ECS configuration backend. +# Enable ECS Provider. [ecs] # ECS Cluster Name. diff --git a/docs/configuration/backends/etcd.md b/docs/configuration/backends/etcd.md index 1defc4a6b..eaa09f3f2 100644 --- a/docs/configuration/backends/etcd.md +++ b/docs/configuration/backends/etcd.md @@ -1,13 +1,13 @@ -# Etcd Backend +# Etcd Provider -Træfik can be configured to use Etcd as a backend configuration. +Træfik can be configured to use Etcd as a provider. ```toml ################################################################ -# Etcd configuration backend +# Etcd Provider ################################################################ -# Enable Etcd configuration backend. +# Enable Etcd Provider. [etcd] # Etcd server endpoint. @@ -66,7 +66,7 @@ useAPIV3 = true # insecureSkipVerify = true ``` -To enable constraints see [backend-specific constraints section](/configuration/commons/#backend-specific). +To enable constraints see [provider-specific constraints section](/configuration/commons/#provider-specific). Please refer to the [Key Value storage structure](/user-guide/kv-config/#key-value-storage-structure) section to get documentation on Traefik KV structure. diff --git a/docs/configuration/backends/eureka.md b/docs/configuration/backends/eureka.md index 5eb57edcc..c5c330a15 100644 --- a/docs/configuration/backends/eureka.md +++ b/docs/configuration/backends/eureka.md @@ -1,13 +1,13 @@ -# Eureka Backend +# Eureka Provider -Træfik can be configured to use Eureka as a backend configuration. +Træfik can be configured to use Eureka as a provider. ```toml ################################################################ -# Eureka configuration backend +# Eureka Provider ################################################################ -# Enable Eureka configuration backend. +# Enable Eureka Provider. [eureka] # Eureka server endpoint. diff --git a/docs/configuration/backends/file.md b/docs/configuration/backends/file.md index 58e950651..77b5f90f6 100644 --- a/docs/configuration/backends/file.md +++ b/docs/configuration/backends/file.md @@ -1,4 +1,4 @@ -# File Backends +# File Provider Træfik can be configured with a file. diff --git a/docs/configuration/backends/kubernetes.md b/docs/configuration/backends/kubernetes.md index f54f84317..fd932e23e 100644 --- a/docs/configuration/backends/kubernetes.md +++ b/docs/configuration/backends/kubernetes.md @@ -1,6 +1,6 @@ -# Kubernetes Ingress Backend +# Kubernetes Ingress Provider -Træfik can be configured to use Kubernetes Ingress as a backend configuration. +Træfik can be configured to use Kubernetes Ingress as a provider. See also [Kubernetes user guide](/user-guide/kubernetes). @@ -8,10 +8,10 @@ See also [Kubernetes user guide](/user-guide/kubernetes). ```toml ################################################################ -# Kubernetes Ingress configuration backend +# Kubernetes Ingress Provider ################################################################ -# Enable Kubernetes Ingress configuration backend. +# Enable Kubernetes Ingress Provider. [kubernetes] # Kubernetes server endpoint. diff --git a/docs/configuration/backends/marathon.md b/docs/configuration/backends/marathon.md index 84ba2c5f6..09e23defd 100644 --- a/docs/configuration/backends/marathon.md +++ b/docs/configuration/backends/marathon.md @@ -1,6 +1,6 @@ -# Marathon Backend +# Marathon Provider -Træfik can be configured to use Marathon as a backend configuration. +Træfik can be configured to use Marathon as a provider. See also [Marathon user guide](/user-guide/marathon). @@ -9,10 +9,10 @@ See also [Marathon user guide](/user-guide/marathon). ```toml ################################################################ -# Mesos/Marathon configuration backend +# Mesos/Marathon Provider ################################################################ -# Enable Marathon configuration backend. +# Enable Marathon Provider. [marathon] # Marathon server endpoint. @@ -157,7 +157,7 @@ domain = "marathon.localhost" # respectReadinessChecks = true ``` -To enable constraints see [backend-specific constraints section](/configuration/commons/#backend-specific). +To enable constraints see [provider-specific constraints section](/configuration/commons/#provider-specific). ## Labels: overriding default behavior diff --git a/docs/configuration/backends/mesos.md b/docs/configuration/backends/mesos.md index 3ff855ba6..512a94826 100644 --- a/docs/configuration/backends/mesos.md +++ b/docs/configuration/backends/mesos.md @@ -1,13 +1,13 @@ -# Mesos Generic Backend +# Mesos Generic Provider -Træfik can be configured to use Mesos as a backend configuration. +Træfik can be configured to use Mesos as a provider. ```toml ################################################################ -# Mesos configuration backend +# Mesos Provider ################################################################ -# Enable Mesos configuration backend. +# Enable Mesos Provider. [mesos] # Mesos server endpoint. diff --git a/docs/configuration/backends/rancher.md b/docs/configuration/backends/rancher.md index e9e566ead..bfb43e976 100644 --- a/docs/configuration/backends/rancher.md +++ b/docs/configuration/backends/rancher.md @@ -1,15 +1,15 @@ -# Rancher Backend +# Rancher Provider -Træfik can be configured to use Rancher as a backend configuration. +Træfik can be configured to use Rancher as a provider. ## Global Configuration ```toml ################################################################ -# Rancher configuration backend +# Rancher Provider ################################################################ -# Enable Rancher configuration backend. +# Enable Rancher Provider. [rancher] # Default domain used. @@ -64,13 +64,13 @@ enableServiceHealthFilter = true # templateVersion = 2 ``` -To enable constraints see [backend-specific constraints section](/configuration/commons/#backend-specific). +To enable constraints see [provider-specific constraints section](/configuration/commons/#provider-specific). ## Rancher Metadata Service ```toml -# Enable Rancher metadata service configuration backend instead of the API -# configuration backend. +# Enable Rancher metadata service provider instead of the API +# provider. # # Optional # Default: false @@ -97,7 +97,7 @@ prefix = "/2016-07-29" ## Rancher API ```toml -# Enable Rancher API configuration backend. +# Enable Rancher API provider. # # Optional # Default: true diff --git a/docs/configuration/backends/rest.md b/docs/configuration/backends/rest.md index b8821d45e..fba802c8f 100644 --- a/docs/configuration/backends/rest.md +++ b/docs/configuration/backends/rest.md @@ -1,4 +1,4 @@ -# Rest Backend +# Rest Provider Træfik can be configured: @@ -7,7 +7,7 @@ Træfik can be configured: ## Configuration ```toml -# Enable rest backend. +# Enable REST Provider. [rest] # Name of the related entry point # diff --git a/docs/configuration/backends/servicefabric.md b/docs/configuration/backends/servicefabric.md index 86943e99f..d404116dd 100644 --- a/docs/configuration/backends/servicefabric.md +++ b/docs/configuration/backends/servicefabric.md @@ -1,6 +1,6 @@ -# Azure Service Fabric Backend +# Azure Service Fabric Provider -Træfik can be configured to use Azure Service Fabric as a backend configuration. +Træfik can be configured to use Azure Service Fabric as a provider. See [this repository for an example deployment package and further documentation.](https://aka.ms/traefikonsf) @@ -8,10 +8,10 @@ See [this repository for an example deployment package and further documentation ```toml ################################################################ -# Azure Service Fabric provider +# Azure Service Fabric Provider ################################################################ -# Enable Azure Service Fabric configuration backend +# Enable Azure Service Fabric Provider [serviceFabric] # Azure Service Fabric Management Endpoint @@ -61,7 +61,7 @@ Here is an example of an extension setting Træfik labels: - + diff --git a/docs/configuration/backends/web.md b/docs/configuration/backends/web.md index cb27d9e04..0347bddf9 100644 --- a/docs/configuration/backends/web.md +++ b/docs/configuration/backends/web.md @@ -1,4 +1,4 @@ -# Web Backend +# Web Provider !!! danger "DEPRECATED" The web provider is deprecated, please use the [api](/configuration/api.md), the [ping](/configuration/ping.md), the [metrics](/configuration/metrics) and the [rest](/configuration/backends/rest.md) provider. @@ -12,7 +12,7 @@ Træfik can be configured: ## Configuration ```toml -# Enable web backend. +# Enable Web Provider. [web] # Web administration port. diff --git a/docs/configuration/backends/zookeeper.md b/docs/configuration/backends/zookeeper.md index 36f3ac773..2ef55b3af 100644 --- a/docs/configuration/backends/zookeeper.md +++ b/docs/configuration/backends/zookeeper.md @@ -1,13 +1,13 @@ -# Zookeeper Backend +# Zookeeper Provider -Træfik can be configured to use Zookeeper as a backend configuration. +Træfik can be configured to use Zookeeper as a provider. ```toml ################################################################ -# Zookeeper configuration backend +# Zookeeper Provider ################################################################ -# Enable Zookeeperconfiguration backend. +# Enable Zookeeper Provider. [zookeeper] # Zookeeper server endpoint. @@ -56,6 +56,6 @@ prefix = "traefik" # insecureSkipVerify = true ``` -To enable constraints see [backend-specific constraints section](/configuration/commons/#backend-specific). +To enable constraints see [provider-specific constraints section](/configuration/commons/#provider-specific). Please refer to the [Key Value storage structure](/user-guide/kv-config/#key-value-storage-structure) section to get documentation on Traefik KV structure. diff --git a/docs/configuration/commons.md b/docs/configuration/commons.md index 860aecb9c..481843362 100644 --- a/docs/configuration/commons.md +++ b/docs/configuration/commons.md @@ -33,7 +33,7 @@ # # checkNewVersion = false -# Backends throttle duration. +# Providers throttle duration. # # Optional # Default: "2s" @@ -85,7 +85,7 @@ Can be provided in a format supported by [time.ParseDuration](https://golang.org If no units are provided, the value is parsed assuming seconds. **Note:** in this time frame no new requests are accepted. -- `providersThrottleDuration`: Backends throttle duration: minimum duration in seconds between 2 events from providers before applying a new configuration. +- `providersThrottleDuration`: Providers throttle duration: minimum duration in seconds between 2 events from providers before applying a new configuration. It avoids unnecessary reloads if multiples events are sent in a short amount of time. Can be provided in a format supported by [time.ParseDuration](https://golang.org/pkg/time/#ParseDuration) or as raw values (digits). If no units are provided, the value is parsed assuming seconds. @@ -108,7 +108,7 @@ Each frontend can specify its own entrypoints. In a micro-service architecture, with a central service discovery, setting constraints limits Træfik scope to a smaller number of routes. -Træfik filters services according to service attributes/tags set in your configuration backends. +Træfik filters services according to service attributes/tags set in your providers. Supported filters: @@ -136,9 +136,9 @@ constraints = ["tag==us-*"] constraints = ["tag!=us-*", "tag!=asia-*"] ``` -### Backend-specific +### provider-specific -Supported backends: +Supported Providers: - Docker - Consul K/V @@ -151,12 +151,12 @@ Supported backends: - Kubernetes (using a provider-specific mechanism based on label selectors) ```toml -# Backend-specific constraint +# Provider-specific constraint [consulCatalog] # ... constraints = ["tag==api"] -# Backend-specific constraint +# Provider-specific constraint [marathon] # ... constraints = ["tag==api", "tag!=v*-beta"] @@ -421,12 +421,12 @@ idleTimeout = "360s" !!! warning For advanced users only. -Supported by all backends except: File backend, Web backend and DynamoDB backend. +Supported by all providers except: File Provider, Web Provider and DynamoDB Provider. ```toml -[backend_name] +[provider_name] -# Override default configuration template. For advanced users :) +# Override default provider configuration template. For advanced users :) # # Optional # Default: "" diff --git a/docs/configuration/tracing.md b/docs/configuration/tracing.md index 60ca7aba2..9b18fef13 100644 --- a/docs/configuration/tracing.md +++ b/docs/configuration/tracing.md @@ -54,7 +54,7 @@ Træfik supports two backends: Jaeger and Zipkin. ``` !!! warning - Træfik is only able to send data over compact thrift protocol to the [Jaeger agent](https://www.jaegertracing.io/docs/deployment/#agent). + Træfik is only able to send data over compact thrift protocol to the [Jaeger agent](https://www.jaegertracing.io/docs/deployment/#agent). ## Zipkin diff --git a/docs/index.md b/docs/index.md index 5d07831e9..dfd37fd98 100644 --- a/docs/index.md +++ b/docs/index.md @@ -47,7 +47,7 @@ _(But if you'd rather configure some of your routes manually, Træfik supports t - Packaged as a single binary file (made with :heart: with go) and available as a [tiny](https://microbadger.com/images/traefik) [official](https://hub.docker.com/r/_/traefik/) docker image -## Supported backends +## Supported Providers - [Docker](/configuration/backends/docker/) / [Swarm mode](/configuration/backends/docker/#docker-swarm-mode) - [Kubernetes](/configuration/backends/kubernetes/) @@ -166,7 +166,7 @@ IP: 172.27.0.4 ### 4 — Enjoy Træfik's Magic Now that you have a basic understanding of how Træfik can automatically create the routes to your services and load balance them, it might be time to dive into [the documentation](/) and let Træfik work for you! -Whatever your infrastructure is, there is probably [an available Træfik backend](/#supported-backends) that will do the job. +Whatever your infrastructure is, there is probably [an available Træfik provider](/#supported-providers) that will do the job. Our recommendation would be to see for yourself how simple it is to enable HTTPS with [Træfik's let's encrypt integration](/user-guide/examples/#lets-encrypt-support) using the dedicated [user guide](/user-guide/docker-and-lets-encrypt/). diff --git a/docs/user-guide/docker-and-lets-encrypt.md b/docs/user-guide/docker-and-lets-encrypt.md index 364b43fe1..1813aa693 100644 --- a/docs/user-guide/docker-and-lets-encrypt.md +++ b/docs/user-guide/docker-and-lets-encrypt.md @@ -113,7 +113,7 @@ This is the minimum configuration required to do the following: - Log `ERROR`-level messages (or more severe) to the console, but silence `DEBUG`-level messages - Check for new versions of Træfik periodically - Create two entry points, namely an `HTTP` endpoint on port `80`, and an `HTTPS` endpoint on port `443` where all incoming traffic on port `80` will immediately get redirected to `HTTPS`. -- Enable the Docker configuration backend and listen for container events on the Docker unix socket we've mounted earlier. However, **new containers will not be exposed by Træfik by default, we'll get into this in a bit!** +- Enable the Docker provider and listen for container events on the Docker unix socket we've mounted earlier. However, **new containers will not be exposed by Træfik by default, we'll get into this in a bit!** - Enable automatic request and configuration of SSL certificates using Let's Encrypt. These certificates will be stored in the `acme.json` file, which you can back-up yourself and store off-premises. @@ -123,7 +123,7 @@ Alright, let's boot the container. From the `/opt/traefik` directory, run `docke Now that we've fully configured and started Træfik, it's time to get our applications running! -Let's take a simple example of a micro-service project consisting of various services, where some will be exposed to the outside world and some will not. +Let's take a simple example of a micro-service project consisting of various services, where some will be exposed to the outside world and some will not. The `docker-compose.yml` of our project looks like this: @@ -221,11 +221,11 @@ We use both `container labels` and `service labels`. First, we specify the `backend` name which corresponds to the actual service we're routing **to**. -We also tell Træfik to use the `web` network to route HTTP traffic to this container. +We also tell Træfik to use the `web` network to route HTTP traffic to this container. With the `traefik.enable` label, we tell Træfik to include this container in its internal configuration. With the `frontend.rule` label, we tell Træfik that we want to route to this container if the incoming HTTP request contains the `Host` `app.my-awesome-app.org`. -Essentially, this is the actual rule used for Layer-7 load balancing. +Essentially, this is the actual rule used for Layer-7 load balancing. Finally but not unimportantly, we tell Træfik to route **to** port `9000`, since that is the actual TCP/IP port the container actually listens on. diff --git a/docs/user-guide/kv-config.md b/docs/user-guide/kv-config.md index c2d0878f0..615d4af2a 100644 --- a/docs/user-guide/kv-config.md +++ b/docs/user-guide/kv-config.md @@ -76,7 +76,7 @@ defaultEntryPoints = ["http", "https"] address = ":80" [entryPoints.https] address = ":443" - + [entryPoints.https.tls] [[entryPoints.https.tls.certificates]] certFile = "integration/fixtures/https/snitest.com.cert" @@ -164,7 +164,7 @@ If a Consul ACL is used to restrict Træfik read/write access, one of the follow key "traefik" { policy = "write" }, - + session "" { policy = "write" } @@ -422,7 +422,7 @@ Træfik will not start but the [static configuration](/basics/#static-trfik-conf If you configured ACME (Let's Encrypt), your registration account and your certificates will also be uploaded. -If you configured a file backend `[file]`, all your dynamic configuration (backends, frontends...) will be uploaded to the Key-value store. +If you configured a file provider `[file]`, all your dynamic configuration (backends, frontends...) will be uploaded to the Key-value store. To upload your ACME certificates to the KV store, get your Traefik TOML file and add the new `storage` option in the `acme` section: diff --git a/docs/user-guide/swarm-mode.md b/docs/user-guide/swarm-mode.md index 9aef2b1d4..0c36d269b 100644 --- a/docs/user-guide/swarm-mode.md +++ b/docs/user-guide/swarm-mode.md @@ -101,7 +101,7 @@ Let's explain this command: | `--constraint=node.role==manager` | we ask docker to schedule Træfik on a manager node. | | `--mount type=bind,source=/var/run/docker.sock,target=/var/run/docker.sock` | we bind mount the docker socket where Træfik is scheduled to be able to speak to the daemon. | | `--network traefik-net` | we attach the Træfik service (and thus the underlying container) to the `traefik-net` network. | -| `--docker` | enable docker backend, and `--docker.swarmMode` to enable the swarm mode on Træfik. | +| `--docker` | enable docker provider, and `--docker.swarmMode` to enable the swarm mode on Træfik. | | `--api | activate the webUI on port 8080 | diff --git a/docs/user-guide/swarm.md b/docs/user-guide/swarm.md index 0cf7296e1..638a11300 100644 --- a/docs/user-guide/swarm.md +++ b/docs/user-guide/swarm.md @@ -104,7 +104,7 @@ Let's explain this command: | `--net=my-net` | run the container on the network my-net | | `-v /var/lib/boot2docker/:/ssl` | mount the ssl keys generated by docker-machine | | `-c /dev/null` | empty config file | -| `--docker` | enable docker backend | +| `--docker` | enable docker provider | | `--docker.endpoint=tcp://172.18.0.1:2376` | connect to the swarm master using the docker_gwbridge network | | `--docker.tls` | enable TLS using the docker-machine keys | | `--api` | activate the webUI on port 8080 | diff --git a/mkdocs.yml b/mkdocs.yml index 1379b428b..a1c499ca1 100644 --- a/mkdocs.yml +++ b/mkdocs.yml @@ -69,27 +69,27 @@ pages: - 'Logs': 'configuration/logs.md' - 'EntryPoints': 'configuration/entrypoints.md' - 'Let''s Encrypt': 'configuration/acme.md' - - 'Backend: Web': 'configuration/backends/web.md' - - 'Backend: BoltDB': 'configuration/backends/boltdb.md' - - 'Backend: Consul': 'configuration/backends/consul.md' - - 'Backend: Consul Catalog': 'configuration/backends/consulcatalog.md' - - 'Backend: Docker': 'configuration/backends/docker.md' - - 'Backend: DynamoDB': 'configuration/backends/dynamodb.md' - - 'Backend: ECS': 'configuration/backends/ecs.md' - - 'Backend: Etcd': 'configuration/backends/etcd.md' - - 'Backend: Eureka': 'configuration/backends/eureka.md' - - 'Backend: File': 'configuration/backends/file.md' - - 'Backend: Kubernetes Ingress': 'configuration/backends/kubernetes.md' - - 'Backend: Marathon': 'configuration/backends/marathon.md' - - 'Backend: Mesos': 'configuration/backends/mesos.md' - - 'Backend: Rancher': 'configuration/backends/rancher.md' - - 'Backend: Rest': 'configuration/backends/rest.md' - - 'Backend: Azure Service Fabric': 'configuration/backends/servicefabric.md' - - 'Backend: Zookeeper': 'configuration/backends/zookeeper.md' - 'API / Dashboard': 'configuration/api.md' + - 'BoltDB': 'configuration/backends/boltdb.md' + - 'Consul': 'configuration/backends/consul.md' + - 'Consul Catalog': 'configuration/backends/consulcatalog.md' + - 'Docker': 'configuration/backends/docker.md' + - 'DynamoDB': 'configuration/backends/dynamodb.md' + - 'ECS': 'configuration/backends/ecs.md' + - 'Etcd': 'configuration/backends/etcd.md' + - 'Eureka': 'configuration/backends/eureka.md' + - 'File': 'configuration/backends/file.md' + - 'Kubernetes Ingress': 'configuration/backends/kubernetes.md' + - 'Marathon': 'configuration/backends/marathon.md' + - 'Mesos': 'configuration/backends/mesos.md' + - 'Rancher': 'configuration/backends/rancher.md' + - 'Rest': 'configuration/backends/rest.md' + - 'Azure Service Fabric': 'configuration/backends/servicefabric.md' + - 'Zookeeper': 'configuration/backends/zookeeper.md' - 'Ping': 'configuration/ping.md' - 'Metrics': 'configuration/metrics.md' - 'Tracing': 'configuration/tracing.md' + - 'Web (Deprecated)': 'configuration/backends/web.md' - User Guides: - 'Configuration Examples': 'user-guide/examples.md' - 'Swarm Mode Cluster': 'user-guide/swarm-mode.md'