Fix missing serverstransport documentation
This commit is contained in:
parent
96a3468791
commit
73cea2d303
8 changed files with 20 additions and 3 deletions
|
@ -159,6 +159,7 @@
|
||||||
- "traefik.http.services.service01.loadbalancer.sticky.cookie.secure=true"
|
- "traefik.http.services.service01.loadbalancer.sticky.cookie.secure=true"
|
||||||
- "traefik.http.services.service01.loadbalancer.server.port=foobar"
|
- "traefik.http.services.service01.loadbalancer.server.port=foobar"
|
||||||
- "traefik.http.services.service01.loadbalancer.server.scheme=foobar"
|
- "traefik.http.services.service01.loadbalancer.server.scheme=foobar"
|
||||||
|
- "traefik.http.services.service01.loadbalancer.serverstransport=foobar"
|
||||||
- "traefik.tcp.routers.tcprouter0.entrypoints=foobar, foobar"
|
- "traefik.tcp.routers.tcprouter0.entrypoints=foobar, foobar"
|
||||||
- "traefik.tcp.routers.tcprouter0.rule=foobar"
|
- "traefik.tcp.routers.tcprouter0.rule=foobar"
|
||||||
- "traefik.tcp.routers.tcprouter0.service=foobar"
|
- "traefik.tcp.routers.tcprouter0.service=foobar"
|
||||||
|
|
|
@ -96,6 +96,7 @@ spec:
|
||||||
strategy: RoundRobin
|
strategy: RoundRobin
|
||||||
- name: s2
|
- name: s2
|
||||||
port: 433
|
port: 433
|
||||||
|
serversTransport: mytransport
|
||||||
- match: PathPrefix(`/misc`)
|
- match: PathPrefix(`/misc`)
|
||||||
services:
|
services:
|
||||||
- name: s3
|
- name: s3
|
||||||
|
|
|
@ -37,6 +37,7 @@
|
||||||
"traefik.http.middlewares.middleware10.headers.accesscontrolallowmethods": "foobar, foobar",
|
"traefik.http.middlewares.middleware10.headers.accesscontrolallowmethods": "foobar, foobar",
|
||||||
"traefik.http.middlewares.middleware10.headers.accesscontrolalloworigin": "foobar",
|
"traefik.http.middlewares.middleware10.headers.accesscontrolalloworigin": "foobar",
|
||||||
"traefik.http.middlewares.middleware10.headers.accesscontrolalloworiginlist": "foobar, foobar",
|
"traefik.http.middlewares.middleware10.headers.accesscontrolalloworiginlist": "foobar, foobar",
|
||||||
|
"traefik.http.middlewares.middleware10.headers.accesscontrolalloworiginlistregex": "foobar, foobar",
|
||||||
"traefik.http.middlewares.middleware10.headers.accesscontrolexposeheaders": "foobar, foobar",
|
"traefik.http.middlewares.middleware10.headers.accesscontrolexposeheaders": "foobar, foobar",
|
||||||
"traefik.http.middlewares.middleware10.headers.accesscontrolmaxage": "42",
|
"traefik.http.middlewares.middleware10.headers.accesscontrolmaxage": "42",
|
||||||
"traefik.http.middlewares.middleware10.headers.addvaryheader": "true",
|
"traefik.http.middlewares.middleware10.headers.addvaryheader": "true",
|
||||||
|
@ -120,6 +121,7 @@
|
||||||
"traefik.http.routers.router0.priority": "42",
|
"traefik.http.routers.router0.priority": "42",
|
||||||
"traefik.http.routers.router0.rule": "foobar",
|
"traefik.http.routers.router0.rule": "foobar",
|
||||||
"traefik.http.routers.router0.service": "foobar",
|
"traefik.http.routers.router0.service": "foobar",
|
||||||
|
"traefik.http.routers.router0.tls": "true",
|
||||||
"traefik.http.routers.router0.tls.certresolver": "foobar",
|
"traefik.http.routers.router0.tls.certresolver": "foobar",
|
||||||
"traefik.http.routers.router0.tls.domains[0].main": "foobar",
|
"traefik.http.routers.router0.tls.domains[0].main": "foobar",
|
||||||
"traefik.http.routers.router0.tls.domains[0].sans": "foobar, foobar",
|
"traefik.http.routers.router0.tls.domains[0].sans": "foobar, foobar",
|
||||||
|
@ -131,6 +133,7 @@
|
||||||
"traefik.http.routers.router1.priority": "42",
|
"traefik.http.routers.router1.priority": "42",
|
||||||
"traefik.http.routers.router1.rule": "foobar",
|
"traefik.http.routers.router1.rule": "foobar",
|
||||||
"traefik.http.routers.router1.service": "foobar",
|
"traefik.http.routers.router1.service": "foobar",
|
||||||
|
"traefik.http.routers.router1.tls": "true",
|
||||||
"traefik.http.routers.router1.tls.certresolver": "foobar",
|
"traefik.http.routers.router1.tls.certresolver": "foobar",
|
||||||
"traefik.http.routers.router1.tls.domains[0].main": "foobar",
|
"traefik.http.routers.router1.tls.domains[0].main": "foobar",
|
||||||
"traefik.http.routers.router1.tls.domains[0].sans": "foobar, foobar",
|
"traefik.http.routers.router1.tls.domains[0].sans": "foobar, foobar",
|
||||||
|
@ -156,9 +159,11 @@
|
||||||
"traefik.http.services.service01.loadbalancer.sticky.cookie.secure": "true",
|
"traefik.http.services.service01.loadbalancer.sticky.cookie.secure": "true",
|
||||||
"traefik.http.services.service01.loadbalancer.server.port": "foobar",
|
"traefik.http.services.service01.loadbalancer.server.port": "foobar",
|
||||||
"traefik.http.services.service01.loadbalancer.server.scheme": "foobar",
|
"traefik.http.services.service01.loadbalancer.server.scheme": "foobar",
|
||||||
|
"traefik.http.services.service01.loadbalancer.serverstransport": "foobar",
|
||||||
"traefik.tcp.routers.tcprouter0.entrypoints": "foobar, foobar",
|
"traefik.tcp.routers.tcprouter0.entrypoints": "foobar, foobar",
|
||||||
"traefik.tcp.routers.tcprouter0.rule": "foobar",
|
"traefik.tcp.routers.tcprouter0.rule": "foobar",
|
||||||
"traefik.tcp.routers.tcprouter0.service": "foobar",
|
"traefik.tcp.routers.tcprouter0.service": "foobar",
|
||||||
|
"traefik.tcp.routers.tcprouter0.tls": "true",
|
||||||
"traefik.tcp.routers.tcprouter0.tls.certresolver": "foobar",
|
"traefik.tcp.routers.tcprouter0.tls.certresolver": "foobar",
|
||||||
"traefik.tcp.routers.tcprouter0.tls.domains[0].main": "foobar",
|
"traefik.tcp.routers.tcprouter0.tls.domains[0].main": "foobar",
|
||||||
"traefik.tcp.routers.tcprouter0.tls.domains[0].sans": "foobar, foobar",
|
"traefik.tcp.routers.tcprouter0.tls.domains[0].sans": "foobar, foobar",
|
||||||
|
@ -169,6 +174,7 @@
|
||||||
"traefik.tcp.routers.tcprouter1.entrypoints": "foobar, foobar",
|
"traefik.tcp.routers.tcprouter1.entrypoints": "foobar, foobar",
|
||||||
"traefik.tcp.routers.tcprouter1.rule": "foobar",
|
"traefik.tcp.routers.tcprouter1.rule": "foobar",
|
||||||
"traefik.tcp.routers.tcprouter1.service": "foobar",
|
"traefik.tcp.routers.tcprouter1.service": "foobar",
|
||||||
|
"traefik.tcp.routers.tcprouter1.tls": "true",
|
||||||
"traefik.tcp.routers.tcprouter1.tls.certresolver": "foobar",
|
"traefik.tcp.routers.tcprouter1.tls.certresolver": "foobar",
|
||||||
"traefik.tcp.routers.tcprouter1.tls.domains[0].main": "foobar",
|
"traefik.tcp.routers.tcprouter1.tls.domains[0].main": "foobar",
|
||||||
"traefik.tcp.routers.tcprouter1.tls.domains[0].sans": "foobar, foobar",
|
"traefik.tcp.routers.tcprouter1.tls.domains[0].sans": "foobar, foobar",
|
||||||
|
|
|
@ -380,6 +380,7 @@
|
||||||
token = "foobar"
|
token = "foobar"
|
||||||
|
|
||||||
[experimental]
|
[experimental]
|
||||||
|
kubernetesGateway = true
|
||||||
[experimental.plugins]
|
[experimental.plugins]
|
||||||
[experimental.plugins.Descriptor0]
|
[experimental.plugins.Descriptor0]
|
||||||
moduleName = "foobar"
|
moduleName = "foobar"
|
||||||
|
@ -390,4 +391,3 @@
|
||||||
[experimental.devPlugin]
|
[experimental.devPlugin]
|
||||||
goPath = "foobar"
|
goPath = "foobar"
|
||||||
moduleName = "foobar"
|
moduleName = "foobar"
|
||||||
kubernetesGateway = true
|
|
||||||
|
|
|
@ -400,6 +400,7 @@ certificatesResolvers:
|
||||||
pilot:
|
pilot:
|
||||||
token: foobar
|
token: foobar
|
||||||
experimental:
|
experimental:
|
||||||
|
kubernetesGateway: true
|
||||||
plugins:
|
plugins:
|
||||||
Descriptor0:
|
Descriptor0:
|
||||||
moduleName: foobar
|
moduleName: foobar
|
||||||
|
@ -410,5 +411,4 @@ experimental:
|
||||||
devPlugin:
|
devPlugin:
|
||||||
goPath: foobar
|
goPath: foobar
|
||||||
moduleName: foobar
|
moduleName: foobar
|
||||||
kubernetesGateway: true
|
|
||||||
|
|
||||||
|
|
|
@ -285,6 +285,14 @@ you'd add the label `traefik.http.services.<name-of-your-choice>.loadbalancer.pa
|
||||||
- "traefik.http.services.myservice.loadbalancer.server.scheme=http"
|
- "traefik.http.services.myservice.loadbalancer.server.scheme=http"
|
||||||
```
|
```
|
||||||
|
|
||||||
|
??? info "`traefik.http.services.<service_name>.loadbalancer.serverstransport`"
|
||||||
|
|
||||||
|
See [serverstransport](../services/index.md#serverstransport) for more information.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
- "traefik.http.services.<service_name>.loadbalancer.serverstransport=foobar"
|
||||||
|
```
|
||||||
|
|
||||||
??? info "`traefik.http.services.<service_name>.loadbalancer.passhostheader`"
|
??? info "`traefik.http.services.<service_name>.loadbalancer.passhostheader`"
|
||||||
|
|
||||||
See [pass Host header](../services/index.md#pass-host-header) for more information.
|
See [pass Host header](../services/index.md#pass-host-header) for more information.
|
||||||
|
|
|
@ -335,6 +335,7 @@ Register the `IngressRoute` [kind](../../reference/dynamic-configuration/kuberne
|
||||||
responseForwarding:
|
responseForwarding:
|
||||||
flushInterval: 1ms
|
flushInterval: 1ms
|
||||||
scheme: https
|
scheme: https
|
||||||
|
serversTransport: transport
|
||||||
sticky:
|
sticky:
|
||||||
cookie:
|
cookie:
|
||||||
httpOnly: true
|
httpOnly: true
|
||||||
|
|
|
@ -462,7 +462,7 @@ By default, `passHostHeader` is true.
|
||||||
|
|
||||||
#### ServersTransport
|
#### ServersTransport
|
||||||
|
|
||||||
`serversTransport` allows to reference a ServersTransport configuration for the communication between Traefik and your servers.
|
`serversTransport` allows to reference a [ServersTransport](./index.md#serverstransport_1) configuration for the communication between Traefik and your servers.
|
||||||
|
|
||||||
??? example "Specify a transport -- Using the [File Provider](../../providers/file.md)"
|
??? example "Specify a transport -- Using the [File Provider](../../providers/file.md)"
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue