No description
Find a file
nmengin 631079a12f feature: Add provided certificates check before to generate ACME certificate when OnHostRule is activated
- ADD TI to check the new behaviour with onHostRule and provided certificates
- ADD TU on the getProvidedCertificate method
2017-06-26 18:32:55 +02:00
.github refactor: fix for PR with master branch. 2017-05-03 15:54:43 +02:00
.semaphoreci added retry function to validate script 2017-05-16 14:33:06 +02:00
.travis Fix SSH key, I hope... 2016-04-06 15:28:25 +02:00
acme feature: Add provided certificates check before to generate ACME certificate when OnHostRule is activated 2017-06-26 18:32:55 +02:00
autogen Merge pull request #1464 from vdemeester/vendor-autogen 2017-05-03 10:02:14 +02:00
cluster Fix panic in k8s loadIngresses 2017-02-03 09:46:27 +01:00
cmd/traefik Create log folder if not present 2017-05-19 15:49:02 +02:00
contrib/systemd Add systemd watchdog feature 2017-02-04 19:06:24 +01:00
docs Fix capitalization of PathPrefixStrip in kubernetes doc 2017-06-01 20:40:28 +02:00
examples Fix capitalization of PathPrefixStrip in kubernetes doc 2017-06-01 20:40:28 +02:00
healthcheck Add global health check interval parameter. 2017-04-28 20:51:29 +02:00
integration feature: Add provided certificates check before to generate ACME certificate when OnHostRule is activated 2017-06-26 18:32:55 +02:00
job Import order as goimports does 2016-12-30 19:04:02 +01:00
log Import order as goimports does 2016-12-30 19:04:02 +01:00
middlewares fix: Double GZIP. 2017-06-14 21:13:38 +02:00
mocks IP-per-task: (#841) 2017-01-06 16:26:50 +01:00
provider refactor(eureka): Use Traefik Logger. 2017-06-14 19:49:45 +02:00
safe Add unit tests for package safe 2017-05-01 16:21:26 +02:00
script Fix deploy script, removes Docker version check 2017-05-16 17:24:08 +02:00
server Turn configureBackends into method. 2017-05-16 00:06:42 +02:00
templates [k8s] Ignore Ingresses with empty Endpoint subsets. 2017-05-23 21:15:06 +02:00
testhelpers Fixed ReplacePath rule executing out of order, when combined with PathPrefixStrip #1569 2017-05-15 10:08:18 -05:00
types Maintain sticky flag on LB method validation failure. 2017-05-16 00:06:42 +02:00
vendor fix: websocket when the connection upgrade failed. 2017-06-26 18:00:03 +02:00
version Merge v1.2.1-master 2017-04-11 22:36:56 +02:00
webui fix(webui): don't fail when backend or frontend are empty. 2017-06-16 10:38:58 +02:00
.dockerignore Re-exclude /dist/traefik from .dockerignore. 2017-04-26 10:01:43 +02:00
.gitignore Merge pull request #1464 from vdemeester/vendor-autogen 2017-05-03 10:02:14 +02:00
.pre-commit-config.yaml add errcheck validation 2016-03-23 16:39:09 +01:00
.travis.yml removed unit and integration tests from travis 2017-05-16 14:33:06 +02:00
build.Dockerfile Bump go 1.8 2017-03-23 22:39:53 +01:00
CHANGELOG.md Prepare release v1.3.1 2017-06-16 12:53:26 +02:00
CODE_OF_CONDUCT.md Adopt the Code Of Coduct from http://contributor-covenant.org 2016-08-26 10:26:41 +01:00
Dockerfile Adding expose for default port 2015-12-03 17:15:01 +01:00
generate.go Move version.go in its own package… 2016-07-21 16:33:49 +02:00
glide.lock fix: websocket when the connection upgrade failed. 2017-06-26 18:00:03 +02:00
glide.yaml fix: websocket when the connection upgrade failed. 2017-06-26 18:00:03 +02:00
LICENSE.md License 2017, Træfɪk => Træfik 2017-04-24 15:12:44 +02:00
Makefile crossbinary default is now executed before deploy using multiple make jobs in parallel 2017-05-04 20:23:48 +02:00
mkdocs.yml Add Marathon guide 2017-05-17 14:59:28 +02:00
README.md Traefik logo license 2017-04-24 15:34:12 +02:00
requirements.txt Fix docs build and add missing benchmarks page (#1017) 2017-01-09 15:12:11 +01:00
traefik.sample.toml feat(rancher): added constraint management for rancher provider 2017-05-03 13:48:44 +02:00

Træfik

Build Status Docs Go Report Card License Join the chat at https://traefik.herokuapp.com Twitter

Træfik (pronounced like traffic) is a modern HTTP reverse proxy and load balancer made to deploy microservices with ease. It supports several backends (Docker, Swarm, Kubernetes, Marathon, Mesos, Consul, Etcd, Zookeeper, BoltDB, Eureka, Amazon DynamoDB, Rest API, file...) to manage its configuration automatically and dynamically.

Overview

Imagine that you have deployed a bunch of microservices on your infrastructure. You probably used a service registry (like etcd or consul) and/or an orchestrator (swarm, Mesos/Marathon) to manage all these services. If you want your users to access some of your microservices from the Internet, you will have to use a reverse proxy and configure it using virtual hosts or prefix paths:

  • domain api.domain.com will point the microservice api in your private network
  • path domain.com/web will point the microservice web in your private network
  • domain backoffice.domain.com will point the microservices backoffice in your private network, load-balancing between your multiple instances

But a microservices architecture is dynamic... Services are added, removed, killed or upgraded often, eventually several times a day.

Traditional reverse-proxies are not natively dynamic. You can't change their configuration and hot-reload easily.

Here enters Træfik.

Architecture

Træfik can listen to your service registry/orchestrator API, and knows each time a microservice is added, removed, killed or upgraded, and can generate its configuration automatically. Routes to your services will be created instantly.

Run it and forget it!

Features

  • It's fast
  • No dependency hell, single binary made with go
  • Rest API
  • Multiple backends supported: Docker, Swarm, Kubernetes, Marathon, Mesos, Consul, Etcd, and more to come
  • Watchers for backends, can listen for changes in backends to apply a new configuration automatically
  • Hot-reloading of configuration. No need to restart the process
  • Graceful shutdown http connections
  • Circuit breakers on backends
  • Round Robin, rebalancer load-balancers
  • Rest Metrics
  • Tiny official docker image included
  • SSL backends support
  • SSL frontend support (with SNI)
  • Clean AngularJS Web UI
  • Websocket support
  • HTTP/2 support
  • Retry request if network error
  • Let's Encrypt support (Automatic HTTPS with renewal)
  • High Availability with cluster mode

Quickstart

You can have a quick look at Træfik in this Katacoda tutorial that shows how to load balance requests between multiple Docker containers.

Here is a talk given by Ed Robinson at the ContainerCamp UK conference. You will learn fundamental Træfik features and see some demos with Kubernetes.

Traefik ContainerCamp UK

Here is a talk (in French) given by Emile Vauge at the Devoxx France 2016 conference. You will learn fundamental Træfik features and see some demos with Docker, Mesos/Marathon and Let's Encrypt.

Traefik Devoxx France

Web UI

You can access the simple HTML frontend of Træfik.

Web UI Providers Web UI Health

Plumbing

Test it

./traefik --configFile=traefik.toml
  • Use the tiny Docker image:
docker run -d -p 8080:8080 -p 80:80 -v $PWD/traefik.toml:/etc/traefik/traefik.toml traefik
  • From sources:
git clone https://github.com/containous/traefik

Documentation

You can find the complete documentation here.

Contributing

Please refer to this section.

Code Of Conduct

Please note that this project is released with a Contributor Code of Conduct. By participating in this project you agree to abide by its terms.

Support

You can join Join the chat at https://traefik.herokuapp.com to get basic support. If you prefer commercial support, please contact containo.us by mail: mailto:support@containo.us.

Maintainers

Credits

Kudos to Peka for his awesome work on the logo logo. Traefik's logo licensed under the Creative Commons 3.0 Attributions license.

Traefik's logo was inspired by the gopher stickers made by Takuya Ueda (https://twitter.com/tenntenn). The original Go gopher was designed by Renee French (http://reneefrench.blogspot.com/).