No description
Find a file
Emile Vauge 4ad4b8e0b8
Add ACME account to storeconfig command
Signed-off-by: Emile Vauge <emile@vauge.com>
2016-09-30 12:29:39 +02:00
.github Update docs for current install 2016-09-20 09:13:52 -06:00
.travis Fix SSH key, I hope... 2016-04-06 15:28:25 +02:00
acme Add ACME account to storeconfig command 2016-09-30 12:29:39 +02:00
autogen Refactor traefik with package 2015-11-02 18:35:55 +01:00
cluster Add ACME account to storeconfig command 2016-09-30 12:29:39 +02:00
contrib/systemd Make systemd unit installable 2016-08-16 14:50:20 +02:00
docs Add documentation 2016-09-30 12:29:39 +02:00
examples Update marathon 2016-09-20 16:01:45 +02:00
integration Challenge certs PEM encoding 2016-09-30 11:26:25 +02:00
job Move jobs backoff back into traefik 2016-09-27 21:45:29 +02:00
log Challenge certs PEM encoding 2016-09-30 11:26:25 +02:00
middlewares Challenge certs PEM encoding 2016-09-30 11:26:25 +02:00
mocks Fix marathon tests 2016-06-22 13:56:28 +02:00
provider Challenge certs PEM encoding 2016-09-30 11:26:25 +02:00
safe Add ACME store 2016-09-30 11:26:17 +02:00
script Fixed binary script so traefik version command doesn't just print default values 2016-08-05 09:19:45 -04:00
templates Fix Docker & KV templates for sticky 2016-09-30 10:57:55 +02:00
types Add ACME store 2016-09-30 11:26:17 +02:00
version Move version.go in its own package… 2016-07-21 16:33:49 +02:00
webui Upgrade directives name since we use angular-ui-bootstrap (#578) 2016-08-05 11:49:34 +02:00
.dockerignore Add **/*.test to .dockerignore 2016-04-07 16:48:35 +02:00
.gitattributes Add ACME account to storeconfig command 2016-09-30 12:29:39 +02:00
.gitignore Challenge certs PEM encoding 2016-09-30 11:26:25 +02:00
.pre-commit-config.yaml add errcheck validation 2016-03-23 16:39:09 +01:00
.travis.yml Add codename 2016-07-05 21:03:37 +02:00
adapters.go Add ACME store 2016-09-30 11:26:17 +02:00
build.Dockerfile Bump go v1.7 2016-08-16 11:11:47 +02:00
CHANGELOG.md Prepare release v1.0.2 2016-09-19 16:49:21 +02:00
circle.yml Fixing circleci builds 2015-10-29 14:41:32 +01:00
CODE_OF_CONDUCT.md Adopt the Code Of Coduct from http://contributor-covenant.org 2016-08-26 10:26:41 +01:00
configuration.go Add ACME store 2016-09-30 11:26:17 +02:00
Dockerfile Adding expose for default port 2015-12-03 17:15:01 +01:00
generate.go Move version.go in its own package… 2016-07-21 16:33:49 +02:00
glide.lock Add ACME account to storeconfig command 2016-09-30 12:29:39 +02:00
glide.yaml Challenge certs PEM encoding 2016-09-30 11:26:25 +02:00
LICENSE.md Transfer emilevauge/traefik to containous/traefik 2016-02-24 17:38:36 +01:00
Makefile Move webui to FountainJS with Webpack 2016-07-27 16:16:02 +02:00
mkdocs.yml Add documentation 2016-09-30 12:29:39 +02:00
README.md Add Katacoda in docs 2016-09-27 21:45:29 +02:00
requirements.txt Add requirements.txt for netlify (#567) 2016-08-05 12:32:49 +02:00
rules.go Challenge certs PEM encoding 2016-09-30 11:26:25 +02:00
rules_test.go Add Host cert ACME generation 2016-08-18 14:20:55 +02:00
server.go Challenge certs PEM encoding 2016-09-30 11:26:25 +02:00
traefik.go Add ACME account to storeconfig command 2016-09-30 12:29:39 +02:00
traefik.sample.toml Add documentation 2016-09-30 12:29:39 +02:00
web.go Challenge certs PEM encoding 2016-09-30 11:26:25 +02:00

Træfɪk

Build Status Docs Go Report Card License Join the chat at https://traefik.herokuapp.com Twitter

Træfɪk is a modern HTTP reverse proxy and load balancer made to deploy microservices with ease. It supports several backends (Docker, Swarm, Mesos/Marathon, Mesos, Kubernetes, Consul, Etcd, Zookeeper, BoltDB, Rest API, file...) to manage its configuration automatically and dynamically.

Overview

Imagine that you have deployed a bunch of microservices on your infrastructure. You probably used a service registry (like etcd or consul) and/or an orchestrator (swarm, Mesos/Marathon) to manage all these services. If you want your users to access some of your microservices from the Internet, you will have to use a reverse proxy and configure it using virtual hosts or prefix paths:

  • domain api.domain.com will point the microservice api in your private network
  • path domain.com/web will point the microservice web in your private network
  • domain backoffice.domain.com will point the microservices backoffice in your private network, load-balancing between your multiple instances

But a microservices architecture is dynamic... Services are added, removed, killed or upgraded often, eventually several times a day.

Traditional reverse-proxies are not natively dynamic. You can't change their configuration and hot-reload easily.

Here enters Træfɪk.

Architecture

Træfɪk can listen to your service registry/orchestrator API, and knows each time a microservice is added, removed, killed or upgraded, and can generate its configuration automatically. Routes to your services will be created instantly.

Run it and forget it!

Features

  • It's fast
  • No dependency hell, single binary made with go
  • Rest API
  • Multiple backends supported: Docker, Mesos/Marathon, Consul, Etcd, and more to come
  • Watchers for backends, can listen for changes in backends to apply a new configuration automatically
  • Hot-reloading of configuration. No need to restart the process
  • Graceful shutdown http connections
  • Circuit breakers on backends
  • Round Robin, rebalancer load-balancers
  • Rest Metrics
  • Tiny official docker image included
  • SSL backends support
  • SSL frontend support (with SNI)
  • Clean AngularJS Web UI
  • Websocket support
  • HTTP/2 support
  • Retry request if network error
  • Let's Encrypt support (Automatic HTTPS with renewal)

Quickstart

You can have a quick look at Træfɪk in this Katacoda tutorial that shows how to load balance requests between multiple Docker containers.

Here is a talk (in French) given by Emile Vauge at the Devoxx France 2016 conference. You will learn fundamental Træfɪk features and see some demos with Docker, Mesos/Marathon and Let's Encrypt.

Traefik Devoxx France

Web UI

You can access to a simple HTML frontend of Træfik.

Web UI Providers Web UI Health

Plumbing

Quick start

./traefik --configFile=traefik.toml
  • Use the tiny Docker image:
docker run -d -p 8080:8080 -p 80:80 -v $PWD/traefik.toml:/etc/traefik/traefik.toml traefik
  • From sources:
git clone https://github.com/containous/traefik

Documentation

You can find the complete documentation here.

Contributing

Please refer to this section.

Code Of Conduct

Please note that this project is released with a Contributor Code of Conduct. By participating in this project you agree to abide by its terms.

Support

You can join Join the chat at https://traefik.herokuapp.com to get basic support. If you prefer commercial support, please contact containo.us by mail: mailto:support@containo.us.

Træfɪk here and there

These projects use Træfɪk internally. If your company uses Træfɪk, we would be glad to get your feedback :) Contact us on Join the chat at https://traefik.herokuapp.com

  • Project Mantl from Cisco

Web UI Providers

Mantl is a modern platform for rapidly deploying globally distributed services. A container orchestrator, docker, a network stack, something to pool your logs, something to monitor health, a sprinkle of service discovery and some automation.

  • Project Apollo from Cap Gemini

Web UI Providers

Apollo is an open source project to aid with building and deploying IAAS and PAAS services. It is particularly geared towards managing containerized applications across multiple hosts, and big data type workloads. Apollo leverages other open source components to provide basic mechanisms for deployment, maintenance, and scaling of infrastructure and applications.

Partners

Zenika

Zenika is one of the leading providers of professional Open Source services and agile methodologies in Europe. We provide consulting, development, training and support for the worlds leading Open Source software products.

Asteris

Founded in 2014, Asteris creates next-generation infrastructure software for the modern datacenter. Asteris writes software that makes it easy for companies to implement continuous delivery and realtime data pipelines. We support the HashiCorp stack, along with Kubernetes, Apache Mesos, Spark and Kafka. We're core committers on mantl.io, consul-cli and mesos-consul.

Maintainers

Credits

Kudos to Peka for his awesome work on the logo logo