1148 lines
32 KiB
Markdown
1148 lines
32 KiB
Markdown
# Migration Guide: From v1 to v2
|
|
|
|
How to Migrate from Traefik v1 to Traefik v2.
|
|
{: .subtitle }
|
|
|
|
The version 2 of Traefik introduces a number of breaking changes,
|
|
which require one to update their configuration when they migrate from v1 to v2.
|
|
The goal of this page is to recapitulate all of these changes, and in particular to give examples,
|
|
feature by feature, of how the configuration looked like in v1, and how it now looks like in v2.
|
|
|
|
!!! info "Migration Helper"
|
|
|
|
We created a tool to help during the migration: [traefik-migration-tool](https://github.com/containous/traefik-migration-tool)
|
|
|
|
This tool allows to:
|
|
|
|
- convert `Ingress` to Traefik `IngressRoute` resources.
|
|
- convert `acme.json` file from v1 to v2 format.
|
|
- migrate the static configuration contained in the file `traefik.toml` to a Traefik v2 file.
|
|
|
|
## Frontends and Backends Are Dead... <br/>... Long Live Routers, Middlewares, and Services
|
|
|
|
During the transition from v1 to v2, a number of internal pieces and components of Traefik were rewritten and reorganized.
|
|
As such, the combination of core notions such as frontends and backends has been replaced with the combination of [routers](../routing/routers/index.md), [services](../routing/services/index.md), and [middlewares](../middlewares/overview.md).
|
|
|
|
Typically, a router replaces a frontend, and a service assumes the role of a backend, with each router referring to a service.
|
|
However, even though a backend was in charge of applying any desired modification on the fly to the incoming request,
|
|
the router defers that responsibility to another component.
|
|
Instead, a dedicated middleware is now defined for each kind of such modification.
|
|
Then any router can refer to an instance of the wanted middleware.
|
|
|
|
!!! example "One frontend with basic auth and one backend, become one router, one service, and one basic auth middleware."
|
|
|
|
!!! info "v1"
|
|
|
|
```yaml tab="Docker"
|
|
labels:
|
|
- "traefik.frontend.rule=Host:test.localhost;PathPrefix:/test"
|
|
- "traefik.frontend.auth.basic.users=test:$$apr1$$H6uskkkW$$IgXLP6ewTrSuBkTrqE8wj/,test2:$$apr1$$d9hr9HBB$$4HxwgUir3HP4EsggP/QNo0"
|
|
```
|
|
|
|
```yaml tab="K8s Ingress"
|
|
apiVersion: networking.k8s.io/v1beta1
|
|
kind: Ingress
|
|
metadata:
|
|
name: traefik
|
|
namespace: kube-system
|
|
annotations:
|
|
kubernetes.io/ingress.class: traefik
|
|
traefik.ingress.kubernetes.io/rule-type: PathPrefix
|
|
spec:
|
|
rules:
|
|
- host: test.localhost
|
|
http:
|
|
paths:
|
|
- path: /test
|
|
backend:
|
|
serviceName: server0
|
|
servicePort: 80
|
|
- path: /test
|
|
backend:
|
|
serviceName: server1
|
|
servicePort: 80
|
|
```
|
|
|
|
```toml tab="File (TOML)"
|
|
[frontends]
|
|
[frontends.frontend1]
|
|
entryPoints = ["http"]
|
|
backend = "backend1"
|
|
|
|
[frontends.frontend1.routes]
|
|
[frontends.frontend1.routes.route0]
|
|
rule = "Host:test.localhost"
|
|
[frontends.frontend1.routes.route0]
|
|
rule = "PathPrefix:/test"
|
|
|
|
[frontends.frontend1.auth]
|
|
[frontends.frontend1.auth.basic]
|
|
users = [
|
|
"test:$apr1$H6uskkkW$IgXLP6ewTrSuBkTrqE8wj/",
|
|
"test2:$apr1$d9hr9HBB$4HxwgUir3HP4EsggP/QNo0",
|
|
]
|
|
|
|
[backends]
|
|
[backends.backend1]
|
|
[backends.backend1.servers.server0]
|
|
url = "http://10.10.10.1:80"
|
|
[backends.backend1.servers.server1]
|
|
url = "http://10.10.10.2:80"
|
|
|
|
[backends.backend1.loadBalancer]
|
|
method = "wrr"
|
|
```
|
|
|
|
!!! info "v2"
|
|
|
|
```yaml tab="Docker"
|
|
labels:
|
|
- "traefik.http.routers.router0.rule=Host(`example.com`) && PathPrefix(`/test`)"
|
|
- "traefik.http.routers.router0.middlewares=auth"
|
|
- "traefik.http.middlewares.auth.basicauth.users=test:$$apr1$$H6uskkkW$$IgXLP6ewTrSuBkTrqE8wj/,test2:$$apr1$$d9hr9HBB$$4HxwgUir3HP4EsggP/QNo0"
|
|
```
|
|
|
|
```yaml tab="K8s IngressRoute"
|
|
# The definitions below require the definitions for the Middleware and IngressRoute kinds.
|
|
# https://docs.traefik.io/v2.2/reference/dynamic-configuration/kubernetes-crd/#definitions
|
|
apiVersion: traefik.containo.us/v1alpha1
|
|
kind: Middleware
|
|
metadata:
|
|
name: basicauth
|
|
namespace: foo
|
|
|
|
spec:
|
|
basicAuth:
|
|
users:
|
|
- test:$apr1$H6uskkkW$IgXLP6ewTrSuBkTrqE8wj/
|
|
- test2:$apr1$d9hr9HBB$4HxwgUir3HP4EsggP/QNo0
|
|
|
|
---
|
|
apiVersion: traefik.containo.us/v1alpha1
|
|
kind: IngressRoute
|
|
metadata:
|
|
name: ingressroutebar
|
|
|
|
spec:
|
|
entryPoints:
|
|
- http
|
|
routes:
|
|
- match: Host(`test.localhost`) && PathPrefix(`/test`)
|
|
kind: Rule
|
|
services:
|
|
- name: server0
|
|
port: 80
|
|
- name: server1
|
|
port: 80
|
|
middlewares:
|
|
- name: basicauth
|
|
namespace: foo
|
|
```
|
|
|
|
```toml tab="File (TOML)"
|
|
[http.routers]
|
|
[http.routers.router0]
|
|
rule = "Host(`test.localhost`) && PathPrefix(`/test`)"
|
|
middlewares = ["auth"]
|
|
service = "my-service"
|
|
|
|
[http.services]
|
|
[[http.services.my-service.loadBalancer.servers]]
|
|
url = "http://10.10.10.1:80"
|
|
[[http.services.my-service.loadBalancer.servers]]
|
|
url = "http://10.10.10.2:80"
|
|
|
|
[http.middlewares]
|
|
[http.middlewares.auth.basicAuth]
|
|
users = [
|
|
"test:$apr1$H6uskkkW$IgXLP6ewTrSuBkTrqE8wj/",
|
|
"test2:$apr1$d9hr9HBB$4HxwgUir3HP4EsggP/QNo0",
|
|
]
|
|
```
|
|
|
|
```yaml tab="File (YAML)"
|
|
http:
|
|
routers:
|
|
router0:
|
|
rule: "Host(`test.localhost`) && PathPrefix(`/test`)"
|
|
service: my-service
|
|
middlewares:
|
|
- auth
|
|
|
|
services:
|
|
my-service:
|
|
loadBalancer:
|
|
servers:
|
|
- url: http://10.10.10.1:80
|
|
- url: http://10.10.10.2:80
|
|
|
|
middlewares:
|
|
auth:
|
|
basicAuth:
|
|
users:
|
|
- "test:$apr1$H6uskkkW$IgXLP6ewTrSuBkTrqE8wj/"
|
|
- "test2:$apr1$d9hr9HBB$4HxwgUir3HP4EsggP/QNo0"
|
|
```
|
|
|
|
## TLS Configuration is Now Dynamic, per Router.
|
|
|
|
TLS parameters used to be specified in the static configuration, as an entryPoint field.
|
|
With Traefik v2, a new dynamic TLS section at the root contains all the desired TLS configurations.
|
|
Then, a [router's TLS field](../routing/routers/index.md#tls) can refer to one of the [TLS configurations](../https/tls.md) defined at the root, hence defining the [TLS configuration](../https/tls.md) for that router.
|
|
|
|
!!! example "TLS on websecure entryPoint becomes TLS option on Router-1"
|
|
|
|
!!! info "v1"
|
|
|
|
```toml tab="File (TOML)"
|
|
# static configuration
|
|
[entryPoints]
|
|
[entryPoints.websecure]
|
|
address = ":443"
|
|
|
|
[entryPoints.websecure.tls]
|
|
minVersion = "VersionTLS12"
|
|
cipherSuites = [
|
|
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256",
|
|
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384",
|
|
"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256",
|
|
"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256",
|
|
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256",
|
|
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256",
|
|
]
|
|
[[entryPoints.websecure.tls.certificates]]
|
|
certFile = "path/to/my.cert"
|
|
keyFile = "path/to/my.key"
|
|
```
|
|
|
|
```bash tab="CLI"
|
|
--entryPoints='Name:websecure Address::443 TLS:path/to/my.cert,path/to/my.key TLS.MinVersion:VersionTLS12 TLS.CipherSuites:TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256'
|
|
```
|
|
|
|
!!! info "v2"
|
|
|
|
```toml tab="File (TOML)"
|
|
# dynamic configuration
|
|
[http.routers]
|
|
[http.routers.Router-1]
|
|
rule = "Host(`example.com`)"
|
|
service = "service-id"
|
|
# will terminate the TLS request
|
|
[http.routers.Router-1.tls]
|
|
options = "myTLSOptions"
|
|
|
|
[[tls.certificates]]
|
|
certFile = "/path/to/domain.cert"
|
|
keyFile = "/path/to/domain.key"
|
|
|
|
[tls.options]
|
|
[tls.options.myTLSOptions]
|
|
minVersion = "VersionTLS12"
|
|
cipherSuites = [
|
|
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256",
|
|
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384",
|
|
"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256",
|
|
"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256",
|
|
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256",
|
|
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256",
|
|
]
|
|
```
|
|
|
|
```yaml tab="File (YAML)"
|
|
http:
|
|
routers:
|
|
Router-1:
|
|
rule: "Host(`example.com`)"
|
|
service: service-id
|
|
# will terminate the TLS request
|
|
tls:
|
|
options: myTLSOptions
|
|
|
|
tls:
|
|
certificates:
|
|
- certFile: /path/to/domain.cert
|
|
keyFile: /path/to/domain.key
|
|
options:
|
|
myTLSOptions:
|
|
minVersion: VersionTLS12
|
|
cipherSuites:
|
|
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
|
|
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
|
|
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
|
|
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
|
|
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
|
|
```
|
|
|
|
```yaml tab="K8s IngressRoute"
|
|
# The definitions below require the definitions for the TLSOption and IngressRoute kinds.
|
|
# https://docs.traefik.io/v2.2/reference/dynamic-configuration/kubernetes-crd/#definitions
|
|
apiVersion: traefik.containo.us/v1alpha1
|
|
kind: TLSOption
|
|
metadata:
|
|
name: mytlsoption
|
|
namespace: default
|
|
|
|
spec:
|
|
minVersion: VersionTLS12
|
|
cipherSuites:
|
|
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
|
|
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
|
|
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
|
|
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
|
|
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
|
|
|
|
---
|
|
apiVersion: traefik.containo.us/v1alpha1
|
|
kind: IngressRoute
|
|
metadata:
|
|
name: ingressroutebar
|
|
|
|
spec:
|
|
entryPoints:
|
|
- web
|
|
routes:
|
|
- match: Host(`example.com`)
|
|
kind: Rule
|
|
services:
|
|
- name: whoami
|
|
port: 80
|
|
tls:
|
|
options:
|
|
name: mytlsoption
|
|
namespace: default
|
|
```
|
|
|
|
```yaml tab="Docker"
|
|
labels:
|
|
# myTLSOptions must be defined by another provider, in this instance in the File Provider.
|
|
# see the cross provider section
|
|
- "traefik.http.routers.router0.tls.options=myTLSOptions@file"
|
|
```
|
|
|
|
## HTTP to HTTPS Redirection is Now Configured on Routers
|
|
|
|
Previously on Traefik v1, the redirection was applied on an entry point or on a frontend.
|
|
With Traefik v2 it is applied on an entry point or a [Router](../routing/routers/index.md).
|
|
|
|
To apply a redirection:
|
|
|
|
- on an entry point, the [HTTP redirection](../routing/entrypoints.md#redirection) has to be configured.
|
|
- on a router, one of the redirect middlewares, [RedirectRegex](../middlewares/redirectregex.md) or [RedirectScheme](../middlewares/redirectscheme.md), has to be configured and added to the router middlewares list.
|
|
|
|
!!! example "Global HTTP to HTTPS redirection"
|
|
|
|
!!! info "v1"
|
|
|
|
```toml tab="File (TOML)"
|
|
# static configuration
|
|
defaultEntryPoints = ["web", "websecure"]
|
|
|
|
[entryPoints]
|
|
[entryPoints.web]
|
|
address = ":80"
|
|
[entryPoints.web.redirect]
|
|
entryPoint = "websecure"
|
|
|
|
[entryPoints.websecure]
|
|
address = ":443"
|
|
[entryPoints.websecure.tls]
|
|
```
|
|
|
|
```bash tab="CLI"
|
|
--entrypoints=Name:web Address::80 Redirect.EntryPoint:websecure
|
|
--entryPoints='Name:websecure Address::443 TLS'
|
|
```
|
|
|
|
!!! info "v2"
|
|
|
|
```bash tab="CLI"
|
|
## static configuration
|
|
|
|
--entrypoints.web.address=:80
|
|
--entrypoints.web.http.redirections.entrypoint.to=websecure
|
|
--entrypoints.web.http.redirections.entrypoint.scheme=https
|
|
--entrypoints.websecure.address=:443
|
|
--providers.docker=true
|
|
```
|
|
|
|
```toml tab="File (TOML)"
|
|
# traefik.toml
|
|
## static configuration
|
|
|
|
[entryPoints.web]
|
|
address = ":80"
|
|
[entryPoints.web.http.redirections.entryPoint]
|
|
to = "websecure"
|
|
scheme = "https"
|
|
|
|
[entryPoints.websecure]
|
|
address = ":443"
|
|
```
|
|
|
|
```yaml tab="File (YAML)"
|
|
# traefik.yaml
|
|
## static configuration
|
|
|
|
entryPoints:
|
|
web:
|
|
address: 80
|
|
http:
|
|
redirections:
|
|
entrypoint:
|
|
to: websecure
|
|
scheme: https
|
|
|
|
websecure:
|
|
address: 443
|
|
```
|
|
|
|
!!! example "HTTP to HTTPS redirection per domain"
|
|
|
|
!!! info "v1"
|
|
|
|
```toml tab="File (TOML)"
|
|
[entryPoints]
|
|
[entryPoints.web]
|
|
address = ":80"
|
|
|
|
[entryPoints.websecure]
|
|
address = ":443"
|
|
[entryPoints.websecure.tls]
|
|
|
|
[file]
|
|
|
|
[frontends]
|
|
[frontends.frontend1]
|
|
entryPoints = ["web", "websecure"]
|
|
[frontends.frontend1.routes]
|
|
[frontends.frontend1.routes.route0]
|
|
rule = "Host:example.net"
|
|
[frontends.frontend1.redirect]
|
|
entryPoint = "websecure"
|
|
```
|
|
|
|
!!! info "v2"
|
|
|
|
```yaml tab="Docker"
|
|
labels:
|
|
traefik.http.routers.app.rule: Host(`example.net`)
|
|
traefik.http.routers.app.entrypoints: web
|
|
traefik.http.routers.app.middlewares: https_redirect
|
|
|
|
traefik.http.routers.appsecured.rule: Host(`example.net`)
|
|
traefik.http.routers.appsecured.entrypoints: websecure
|
|
traefik.http.routers.appsecured.tls: true
|
|
|
|
traefik.http.middlewares.https_redirect.redirectscheme.scheme: https
|
|
traefik.http.middlewares.https_redirect.redirectscheme.permanent: true
|
|
```
|
|
|
|
```yaml tab="K8s IngressRoute"
|
|
apiVersion: traefik.containo.us/v1alpha1
|
|
kind: IngressRoute
|
|
metadata:
|
|
name: http-redirect-ingressRoute
|
|
|
|
spec:
|
|
entryPoints:
|
|
- web
|
|
routes:
|
|
- match: Host(`example.net`)
|
|
kind: Rule
|
|
services:
|
|
- name: whoami
|
|
port: 80
|
|
middlewares:
|
|
- name: https_redirect
|
|
|
|
---
|
|
apiVersion: traefik.containo.us/v1alpha1
|
|
kind: IngressRoute
|
|
metadata:
|
|
name: https-ingressRoute
|
|
|
|
spec:
|
|
entryPoints:
|
|
- websecure
|
|
routes:
|
|
- match: Host(`foo`)
|
|
kind: Rule
|
|
services:
|
|
- name: whoami
|
|
port: 80
|
|
tls: {}
|
|
|
|
---
|
|
apiVersion: traefik.containo.us/v1alpha1
|
|
kind: Middleware
|
|
metadata:
|
|
name: https_redirect
|
|
spec:
|
|
redirectScheme:
|
|
scheme: https
|
|
permanent: true
|
|
```
|
|
|
|
```toml tab="File (TOML)"
|
|
## dynamic configuration
|
|
# dynamic-conf.toml
|
|
|
|
[http.routers]
|
|
[http.routers.router0]
|
|
rule = "Host(`example.net`)"
|
|
service = "my-service"
|
|
entrypoints = ["web"]
|
|
middlewares = ["https_redirect"]
|
|
|
|
[http.routers.router1]
|
|
rule = "Host(`example.net`)"
|
|
service = "my-service"
|
|
entrypoints = ["websecure"]
|
|
[http.routers.router1.tls]
|
|
|
|
[http.middlewares]
|
|
[http.middlewares.https_redirect.redirectScheme]
|
|
scheme = "https"
|
|
permanent = true
|
|
```
|
|
|
|
```yaml tab="File (YAML)"
|
|
## dynamic configuration
|
|
# dynamic-conf.yml
|
|
|
|
http:
|
|
routers:
|
|
router0:
|
|
rule: "Host(`example.net`)"
|
|
entryPoints:
|
|
- web
|
|
middlewares:
|
|
- https_redirect
|
|
service: my-service
|
|
|
|
router1:
|
|
rule: "Host(`example.net`)"
|
|
entryPoints:
|
|
- websecure
|
|
service: my-service
|
|
tls: {}
|
|
|
|
middlewares:
|
|
https_redirect:
|
|
redirectScheme:
|
|
scheme: https
|
|
permanent: true
|
|
```
|
|
|
|
## Strip and Rewrite Path Prefixes
|
|
|
|
With the new core notions of v2 (introduced earlier in the section
|
|
["Frontends and Backends Are Dead... Long Live Routers, Middlewares, and Services"](#frontends-and-backends-are-dead-long-live-routers-middlewares-and-services)),
|
|
transforming the URL path prefix of incoming requests is configured with [middlewares](../middlewares/overview.md),
|
|
after the routing step with [router rule `PathPrefix`](../routing/routers/index.md#rule).
|
|
|
|
Use Case: Incoming requests to `http://example.org/admin` are forwarded to the webapplication "admin",
|
|
with the path `/admin` stripped, e.g. to `http://<IP>:<port>/`. In this case, you must:
|
|
|
|
- First, configure a router named `admin` with a rule matching at least the path prefix with the `PathPrefix` keyword,
|
|
- Then, define a middleware of type [`stripprefix`](../middlewares/stripprefix.md), which removes the prefix `/admin`, associated to the router `admin`.
|
|
|
|
!!! example "Strip Path Prefix When Forwarding to Backend"
|
|
|
|
!!! info "v1"
|
|
|
|
```yaml tab="Docker"
|
|
labels:
|
|
- "traefik.frontend.rule=Host:example.org;PathPrefixStrip:/admin"
|
|
```
|
|
|
|
```yaml tab="Kubernetes Ingress"
|
|
apiVersion: networking.k8s.io/v1beta1
|
|
kind: Ingress
|
|
metadata:
|
|
name: traefik
|
|
annotations:
|
|
kubernetes.io/ingress.class: traefik
|
|
traefik.ingress.kubernetes.io/rule-type: PathPrefixStrip
|
|
spec:
|
|
rules:
|
|
- host: example.org
|
|
http:
|
|
paths:
|
|
- path: /admin
|
|
backend:
|
|
serviceName: admin-svc
|
|
servicePort: admin
|
|
```
|
|
|
|
```toml tab="File (TOML)"
|
|
[frontends.admin]
|
|
[frontends.admin.routes.admin_1]
|
|
rule = "Host:example.org;PathPrefixStrip:/admin"
|
|
```
|
|
|
|
!!! info "v2"
|
|
|
|
```yaml tab="Docker"
|
|
labels:
|
|
- "traefik.http.routers.admin.rule=Host(`example.org`) && PathPrefix(`/admin`)"
|
|
- "traefik.http.routers.admin.middlewares=admin-stripprefix"
|
|
- "traefik.http.middlewares.admin-stripprefix.stripprefix.prefixes=/admin"
|
|
```
|
|
|
|
```yaml tab="Kubernetes IngressRoute"
|
|
---
|
|
apiVersion: traefik.containo.us/v1alpha1
|
|
kind: IngressRoute
|
|
metadata:
|
|
name: http-redirect-ingressRoute
|
|
namespace: admin-web
|
|
spec:
|
|
entryPoints:
|
|
- web
|
|
routes:
|
|
- match: Host(`example.org`) && PathPrefix(`/admin`)
|
|
kind: Rule
|
|
services:
|
|
- name: admin-svc
|
|
port: admin
|
|
middlewares:
|
|
- name: admin-stripprefix
|
|
---
|
|
apiVersion: traefik.containo.us/v1alpha1
|
|
kind: Middleware
|
|
metadata:
|
|
name: admin-stripprefix
|
|
spec:
|
|
stripPrefix:
|
|
prefixes:
|
|
- /admin
|
|
```
|
|
|
|
```toml tab="File (TOML)"
|
|
## Dynamic configuration
|
|
# dynamic-conf.toml
|
|
|
|
[http.routers.router1]
|
|
rule = "Host(`example.org`) && PathPrefix(`/admin`)"
|
|
service = "admin-svc"
|
|
entrypoints = ["web"]
|
|
middlewares = ["admin-stripprefix"]
|
|
|
|
[http.middlewares]
|
|
[http.middlewares.admin-stripprefix.stripPrefix]
|
|
prefixes = ["/admin"]
|
|
|
|
# ...
|
|
```
|
|
|
|
```yaml tab="File (YAML)"
|
|
## Dynamic Configuration
|
|
# dynamic-conf.yml
|
|
|
|
# As YAML Configuration File
|
|
http:
|
|
routers:
|
|
admin:
|
|
service: admin-svc
|
|
middlewares:
|
|
- "admin-stripprefix"
|
|
rule: "Host(`example.org`) && PathPrefix(`/admin`)"
|
|
|
|
middlewares:
|
|
admin-stripprefix:
|
|
stripPrefix:
|
|
prefixes:
|
|
- "/admin"
|
|
|
|
# ...
|
|
```
|
|
|
|
??? question "What About Other Path Transformations?"
|
|
|
|
Instead of removing the path prefix with the [`stripprefix` middleware](../../middlewares/stripprefix/), you can also:
|
|
|
|
- Add a path prefix with the [`addprefix` middleware](../../middlewares/addprefix/)
|
|
- Replace the complete path of the request with the [`replacepath` middleware](../../middlewares/replacepath/)
|
|
- ReplaceRewrite path using Regexp with the [`replacepathregex` middleware](../../middlewares/replacepathregex/)
|
|
- And a lot more on the [`middlewares` page](../../middlewares/overview/)
|
|
|
|
## ACME (LetsEncrypt)
|
|
|
|
[ACME](../https/acme.md) is now a certificate resolver (under a certificatesResolvers section) but remains in the static configuration.
|
|
|
|
!!! example "ACME from provider to a specific Certificate Resolver"
|
|
|
|
!!! info "v1"
|
|
|
|
```toml tab="File (TOML)"
|
|
# static configuration
|
|
defaultEntryPoints = ["websecure","web"]
|
|
|
|
[entryPoints.web]
|
|
address = ":80"
|
|
[entryPoints.web.redirect]
|
|
entryPoint = "webs"
|
|
[entryPoints.websecure]
|
|
address = ":443"
|
|
[entryPoints.websecure.tls]
|
|
|
|
[acme]
|
|
email = "your-email-here@example.com"
|
|
storage = "acme.json"
|
|
entryPoint = "websecure"
|
|
onHostRule = true
|
|
[acme.tlsChallenge]
|
|
```
|
|
|
|
```bash tab="CLI"
|
|
--defaultentrypoints=websecure,web
|
|
--entryPoints=Name:web Address::80 Redirect.EntryPoint:websecure
|
|
--entryPoints=Name:websecure Address::443 TLS
|
|
--acme.email=your-email-here@example.com
|
|
--acme.storage=acme.json
|
|
--acme.entryPoint=websecure
|
|
--acme.onHostRule=true
|
|
--acme.tlschallenge=true
|
|
```
|
|
|
|
!!! info "v2"
|
|
|
|
```toml tab="File (TOML)"
|
|
# static configuration
|
|
[entryPoints]
|
|
[entryPoints.web]
|
|
address = ":80"
|
|
|
|
[entryPoints.websecure]
|
|
address = ":443"
|
|
[entryPoints.websecure.http.tls]
|
|
certResolver = "myresolver"
|
|
|
|
[certificatesResolvers.myresolver.acme]
|
|
email = "your-email@example.com"
|
|
storage = "acme.json"
|
|
[certificatesResolvers.myresolver.acme.tlsChallenge]
|
|
```
|
|
|
|
```yaml tab="File (YAML)"
|
|
entryPoints:
|
|
web:
|
|
address: ":80"
|
|
|
|
websecure:
|
|
address: ":443"
|
|
http:
|
|
tls:
|
|
certResolver: myresolver
|
|
|
|
certificatesResolvers:
|
|
myresolver:
|
|
acme:
|
|
email: your-email@example.com
|
|
storage: acme.json
|
|
tlsChallenge: {}
|
|
```
|
|
|
|
```bash tab="CLI"
|
|
--entrypoints.web.address=:80
|
|
--entrypoints.websecure.address=:443
|
|
--certificatesresolvers.myresolver.acme.email=your-email@example.com
|
|
--certificatesresolvers.myresolver.acme.storage=acme.json
|
|
--certificatesresolvers.myresolver.acme.tlschallenge=true
|
|
```
|
|
|
|
## Traefik Logs
|
|
|
|
In the v2, all the [log configuration](../observability/logs.md) remains in the static part but are unified under a `log` section.
|
|
There is no more log configuration at the root level.
|
|
|
|
!!! example "Simple log configuration"
|
|
|
|
!!! info "v1"
|
|
|
|
```toml tab="File (TOML)"
|
|
# static configuration
|
|
logLevel = "DEBUG"
|
|
|
|
[traefikLog]
|
|
filePath = "/path/to/traefik.log"
|
|
format = "json"
|
|
```
|
|
|
|
```bash tab="CLI"
|
|
--logLevel=DEBUG
|
|
--traefikLog.filePath=/path/to/traefik.log
|
|
--traefikLog.format=json
|
|
```
|
|
|
|
!!! info "v2"
|
|
|
|
```toml tab="File (TOML)"
|
|
# static configuration
|
|
[log]
|
|
level = "DEBUG"
|
|
filePath = "/path/to/log-file.log"
|
|
format = "json"
|
|
```
|
|
|
|
```yaml tab="File (YAML)"
|
|
# static configuration
|
|
log:
|
|
level: DEBUG
|
|
filePath: /path/to/log-file.log
|
|
format: json
|
|
```
|
|
|
|
```bash tab="CLI"
|
|
--log.level=DEBUG
|
|
--log.filePath=/path/to/traefik.log
|
|
--log.format=json
|
|
```
|
|
|
|
## Access Logs
|
|
|
|
Access Logs are configured in the same way as before.
|
|
|
|
But all request headers are now filtered out by default in Traefik v2.
|
|
So during migration, you might want to consider enabling some needed fields (see [access log configuration](../observability/access-logs.md)).
|
|
|
|
## Tracing
|
|
|
|
Traefik v2 retains OpenTracing support. The `backend` root option from the v1 is gone, you just have to set your [tracing configuration](../observability/tracing/overview.md).
|
|
|
|
!!! example "Simple Jaeger tracing configuration"
|
|
|
|
!!! info "v1"
|
|
|
|
```toml tab="File (TOML)"
|
|
# static configuration
|
|
[tracing]
|
|
backend = "jaeger"
|
|
servicename = "tracing"
|
|
[tracing.jaeger]
|
|
samplingParam = 1.0
|
|
samplingServerURL = "http://12.0.0.1:5778/sampling"
|
|
samplingType = "const"
|
|
localAgentHostPort = "12.0.0.1:6831"
|
|
```
|
|
|
|
```bash tab="CLI"
|
|
--tracing.backend=jaeger
|
|
--tracing.servicename=tracing
|
|
--tracing.jaeger.localagenthostport=12.0.0.1:6831
|
|
--tracing.jaeger.samplingparam=1.0
|
|
--tracing.jaeger.samplingserverurl=http://12.0.0.1:5778/sampling
|
|
--tracing.jaeger.samplingtype=const
|
|
```
|
|
|
|
!!! info "v2"
|
|
|
|
```toml tab="File (TOML)"
|
|
# static configuration
|
|
[tracing]
|
|
servicename = "tracing"
|
|
[tracing.jaeger]
|
|
samplingParam = 1.0
|
|
samplingServerURL = "http://12.0.0.1:5778/sampling"
|
|
samplingType = "const"
|
|
localAgentHostPort = "12.0.0.1:6831"
|
|
```
|
|
|
|
```yaml tab="File (YAML)"
|
|
# static configuration
|
|
tracing:
|
|
servicename: tracing
|
|
jaeger:
|
|
samplingParam: 1
|
|
samplingServerURL: 'http://12.0.0.1:5778/sampling'
|
|
samplingType: const
|
|
localAgentHostPort: '12.0.0.1:6831'
|
|
```
|
|
|
|
```bash tab="CLI"
|
|
--tracing.servicename=tracing
|
|
--tracing.jaeger.localagenthostport=12.0.0.1:6831
|
|
--tracing.jaeger.samplingparam=1.0
|
|
--tracing.jaeger.samplingserverurl=http://12.0.0.1:5778/sampling
|
|
--tracing.jaeger.samplingtype=const
|
|
```
|
|
|
|
## Metrics
|
|
|
|
The v2 retains metrics tools and allows metrics to be configured for the entrypoints and/or services.
|
|
For a basic configuration, the [metrics configuration](../observability/metrics/overview.md) remains the same.
|
|
|
|
!!! example "Simple Prometheus metrics configuration"
|
|
|
|
!!! info "v1"
|
|
|
|
```toml tab="File (TOML)"
|
|
# static configuration
|
|
[metrics.prometheus]
|
|
buckets = [0.1,0.3,1.2,5.0]
|
|
entryPoint = "traefik"
|
|
```
|
|
|
|
```bash tab="CLI"
|
|
--metrics.prometheus.buckets=[0.1,0.3,1.2,5.0]
|
|
--metrics.prometheus.entrypoint=traefik
|
|
```
|
|
|
|
!!! info "v2"
|
|
|
|
```toml tab="File (TOML)"
|
|
# static configuration
|
|
[metrics.prometheus]
|
|
buckets = [0.1,0.3,1.2,5.0]
|
|
entryPoint = "metrics"
|
|
```
|
|
|
|
```yaml tab="File (YAML)"
|
|
# static configuration
|
|
metrics:
|
|
prometheus:
|
|
buckets:
|
|
- 0.1
|
|
- 0.3
|
|
- 1.2
|
|
- 5
|
|
entryPoint: metrics
|
|
```
|
|
|
|
```bash tab="CLI"
|
|
--metrics.prometheus.buckets=[0.1,0.3,1.2,5.0]
|
|
--metrics.prometheus.entrypoint=metrics
|
|
```
|
|
|
|
## No More Root Level Key/Values
|
|
|
|
To avoid any source of confusion, there are no more configuration at the root level.
|
|
Each root item has been moved to a related section or removed.
|
|
|
|
!!! example "From root to dedicated section"
|
|
|
|
!!! info "v1"
|
|
|
|
```toml tab="File (TOML)"
|
|
# static configuration
|
|
checkNewVersion = false
|
|
sendAnonymousUsage = true
|
|
logLevel = "DEBUG"
|
|
insecureSkipVerify = true
|
|
rootCAs = [ "/mycert.cert" ]
|
|
maxIdleConnsPerHost = 200
|
|
providersThrottleDuration = "2s"
|
|
AllowMinWeightZero = true
|
|
debug = true
|
|
defaultEntryPoints = ["web", "websecure"]
|
|
keepTrailingSlash = false
|
|
```
|
|
|
|
```bash tab="CLI"
|
|
--checknewversion=false
|
|
--sendanonymoususage=true
|
|
--loglevel=DEBUG
|
|
--insecureskipverify=true
|
|
--rootcas=/mycert.cert
|
|
--maxidleconnsperhost=200
|
|
--providersthrottleduration=2s
|
|
--allowminweightzero=true
|
|
--debug=true
|
|
--defaultentrypoints=web,websecure
|
|
--keeptrailingslash=true
|
|
```
|
|
|
|
!!! info "v2"
|
|
|
|
```toml tab="File (TOML)"
|
|
# static configuration
|
|
[global]
|
|
checkNewVersion = true
|
|
sendAnonymousUsage = true
|
|
|
|
[log]
|
|
level = "DEBUG"
|
|
|
|
[serversTransport]
|
|
insecureSkipVerify = true
|
|
rootCAs = [ "/mycert.cert" ]
|
|
maxIdleConnsPerHost = 42
|
|
|
|
[providers]
|
|
providersThrottleDuration = 42
|
|
```
|
|
|
|
```yaml tab="File (YAML)"
|
|
# static configuration
|
|
global:
|
|
checkNewVersion: true
|
|
sendAnonymousUsage: true
|
|
|
|
log:
|
|
level: DEBUG
|
|
|
|
serversTransport:
|
|
insecureSkipVerify: true
|
|
rootCAs:
|
|
- /mycert.cert
|
|
maxIdleConnsPerHost: 42
|
|
|
|
providers:
|
|
providersThrottleDuration: 42
|
|
```
|
|
|
|
```bash tab="CLI"
|
|
--global.checknewversion=true
|
|
--global.sendanonymoususage=true
|
|
--log.level=DEBUG
|
|
--serverstransport.insecureskipverify=true
|
|
--serverstransport.rootcas=/mycert.cert
|
|
--serverstransport.maxidleconnsperhost=42
|
|
--providers.providersthrottleduration=42
|
|
```
|
|
|
|
## Dashboard
|
|
|
|
You need to activate the API to access the [dashboard](../operations/dashboard.md).
|
|
|
|
To activate the dashboard, you can either:
|
|
|
|
- use the [secure mode](../operations/dashboard.md#secure-mode) with the `api@internal` service like in the following examples
|
|
- or use the [insecure mode](../operations/api.md#insecure)
|
|
|
|
!!! example "Activate and access the dashboard"
|
|
|
|
!!! info "v1"
|
|
|
|
```toml tab="File (TOML)"
|
|
## static configuration
|
|
# traefik.toml
|
|
|
|
[entryPoints.websecure]
|
|
address = ":443"
|
|
[entryPoints.websecure.tls]
|
|
[entryPoints.websecure.auth]
|
|
[entryPoints.websecure.auth.basic]
|
|
users = [
|
|
"test:$apr1$H6uskkkW$IgXLP6ewTrSuBkTrqE8wj/"
|
|
]
|
|
|
|
[api]
|
|
entryPoint = "websecure"
|
|
```
|
|
|
|
```bash tab="CLI"
|
|
--entryPoints='Name:websecure Address::443 TLS Auth.Basic.Users:test:$apr1$H6uskkkW$IgXLP6ewTrSuBkTrqE8wj/'
|
|
--api
|
|
```
|
|
|
|
!!! info "v2"
|
|
|
|
```yaml tab="Docker"
|
|
# dynamic configuration
|
|
labels:
|
|
- "traefik.http.routers.api.rule=Host(`traefik.docker.localhost`)"
|
|
- "traefik.http.routers.api.entrypoints=websecure"
|
|
- "traefik.http.routers.api.service=api@internal"
|
|
- "traefik.http.routers.api.middlewares=myAuth"
|
|
- "traefik.http.routers.api.tls"
|
|
- "traefik.http.middlewares.myAuth.basicauth.users=test:$$apr1$$H6uskkkW$$IgXLP6ewTrSuBkTrqE8wj/"
|
|
```
|
|
|
|
```toml tab="File (TOML)"
|
|
## static configuration
|
|
# traefik.toml
|
|
|
|
[entryPoints.websecure]
|
|
address = ":443"
|
|
|
|
[api]
|
|
|
|
[providers.file]
|
|
directory = "/path/to/dynamic/config"
|
|
|
|
##---------------------##
|
|
|
|
## dynamic configuration
|
|
# /path/to/dynamic/config/dynamic-conf.toml
|
|
|
|
[http.routers.api]
|
|
rule = "Host(`traefik.docker.localhost`)"
|
|
entrypoints = ["websecure"]
|
|
service = "api@internal"
|
|
middlewares = ["myAuth"]
|
|
[http.routers.api.tls]
|
|
|
|
[http.middlewares.myAuth.basicAuth]
|
|
users = [
|
|
"test:$apr1$H6uskkkW$IgXLP6ewTrSuBkTrqE8wj/"
|
|
]
|
|
```
|
|
|
|
```yaml tab="File (YAML)"
|
|
## static configuration
|
|
# traefik.yaml
|
|
|
|
entryPoints:
|
|
websecure:
|
|
address: ':443'
|
|
|
|
api: {}
|
|
|
|
providers:
|
|
file:
|
|
directory: /path/to/dynamic/config
|
|
|
|
##---------------------##
|
|
|
|
## dynamic configuration
|
|
# /path/to/dynamic/config/dynamic-conf.yaml
|
|
|
|
http:
|
|
routers:
|
|
api:
|
|
rule: Host(`traefik.docker.localhost`)
|
|
entrypoints:
|
|
- websecure
|
|
service: api@internal
|
|
middlewares:
|
|
- myAuth
|
|
tls: {}
|
|
|
|
middlewares:
|
|
myAuth:
|
|
basicAuth:
|
|
users:
|
|
- 'test:$apr1$H6uskkkW$IgXLP6ewTrSuBkTrqE8wj/'
|
|
```
|
|
|
|
## Providers
|
|
|
|
Supported [providers](../providers/overview.md), for now:
|
|
|
|
- [ ] Azure Service Fabric
|
|
- [x] Consul
|
|
- [x] Consul Catalog
|
|
- [x] Docker
|
|
- [ ] DynamoDB
|
|
- [ ] ECS
|
|
- [x] Etcd
|
|
- [ ] Eureka
|
|
- [x] File
|
|
- [x] Kubernetes Ingress
|
|
- [x] Kubernetes IngressRoute
|
|
- [x] Marathon
|
|
- [ ] Mesos
|
|
- [x] Rancher
|
|
- [x] Redis
|
|
- [x] Rest
|
|
- [x] Zookeeper
|
|
|
|
## Some Tips You Should Know
|
|
|
|
- Different sources of static configuration (file, CLI flags, ...) cannot be [mixed](../getting-started/configuration-overview.md#the-static-configuration).
|
|
- Now, configuration elements can be referenced between different providers by using the provider namespace notation: `@<provider>`.
|
|
For instance, a router named `myrouter` in a File Provider can refer to a service named `myservice` defined in Docker Provider with the following notation: `myservice@docker`.
|
|
- Middlewares are applied in the same order as their declaration in router.
|
|
- If you have any questions feel free to join our [community forum](https://community.containo.us).
|