Replace markdown-include dependency with mkdocs-include-markdown-plugin
This commit is contained in:
parent
d054299ed0
commit
5a9f3e6999
91 changed files with 98 additions and 99 deletions
|
|
@ -57,4 +57,4 @@ You no longer need to create and synchronize configuration files cluttered with
|
||||||
Traefik is able to use your cluster API to discover the services and read the attached information.
|
Traefik is able to use your cluster API to discover the services and read the attached information.
|
||||||
In Traefik, these connectors are called [providers](../providers/overview.md "Link to overview about Traefik providers") because they *provide* the configuration to Traefik.
|
In Traefik, these connectors are called [providers](../providers/overview.md "Link to overview about Traefik providers") because they *provide* the configuration to Traefik.
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -92,4 +92,4 @@ All the configuration options are documented in their related section.
|
||||||
|
|
||||||
You can browse the available features in the menu, the [providers](../providers/overview.md), or the [routing section](../routing/overview.md) to see them in action.
|
You can browse the available features in the menu, the [providers](../providers/overview.md), or the [routing section](../routing/overview.md) to see them in action.
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -159,4 +159,4 @@ That's it! You've successfully deployed Traefik and configured routing in Docker
|
||||||
- [Enable Metrics](../reference/install-configuration/observability/metrics.md)
|
- [Enable Metrics](../reference/install-configuration/observability/metrics.md)
|
||||||
- [Learn more about Docker provider](../reference/install-configuration/providers/docker.md)
|
- [Learn more about Docker provider](../reference/install-configuration/providers/docker.md)
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -252,4 +252,4 @@ In which case, you should make sure your infrastructure is properly set up for a
|
||||||
LEGO_DISABLE_CNAME_SUPPORT=true
|
LEGO_DISABLE_CNAME_SUPPORT=true
|
||||||
```
|
```
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -144,4 +144,4 @@ And run it:
|
||||||
|
|
||||||
All the details are available in the [Contributing Guide](../contributing/building-testing.md)
|
All the details are available in the [Contributing Guide](../contributing/building-testing.md)
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -331,4 +331,4 @@ That's it! You've successfully deployed Traefik and configured routing in a Kube
|
||||||
- [Learn more about Kubernetes CRD provider](../reference/install-configuration/providers/kubernetes/kubernetes-crd.md)
|
- [Learn more about Kubernetes CRD provider](../reference/install-configuration/providers/kubernetes/kubernetes-crd.md)
|
||||||
- [Learn more about Kubernetes Gateway API provider](../reference/install-configuration/providers/kubernetes/kubernetes-gateway.md)
|
- [Learn more about Kubernetes Gateway API provider](../reference/install-configuration/providers/kubernetes/kubernetes-gateway.md)
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -1211,4 +1211,4 @@ If Let's Encrypt is not reachable, the following certificates will apply:
|
||||||
!!! important
|
!!! important
|
||||||
For new (sub)domains which need Let's Encrypt authentication, the default Traefik certificate will be used until Traefik is restarted.
|
For new (sub)domains which need Let's Encrypt authentication, the default Traefik certificate will be used until Traefik is restarted.
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -20,4 +20,4 @@ That is to say, how to obtain [TLS certificates](./tls.md#certificates-definitio
|
||||||
either through a definition in the dynamic configuration, or through [Let's Encrypt](./acme.md) (ACME).
|
either through a definition in the dynamic configuration, or through [Let's Encrypt](./acme.md) (ACME).
|
||||||
And how to configure [TLS options](./tls.md#tls-options), and [certificates stores](./tls.md#certificates-stores).
|
And how to configure [TLS options](./tls.md#tls-options), and [certificates stores](./tls.md#certificates-stores).
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -587,4 +587,4 @@ spec:
|
||||||
disableSessionTickets: true
|
disableSessionTickets: true
|
||||||
```
|
```
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -340,4 +340,4 @@ http:
|
||||||
removeHeader = true
|
removeHeader = true
|
||||||
```
|
```
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -785,4 +785,4 @@ http:
|
||||||
preserveRequestMethod = true
|
preserveRequestMethod = true
|
||||||
```
|
```
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -422,4 +422,4 @@ Set `isDevelopment` to `true` when developing to mitigate the unwanted effects o
|
||||||
Usually testing takes place using HTTP, not HTTPS, and on `localhost`, not your production domain.
|
Usually testing takes place using HTTP, not HTTPS, and on `localhost`, not your production domain.
|
||||||
If you would like your development environment to mimic production with complete Host blocking, SSL redirects, and STS headers, leave this as `false`.
|
If you would like your development environment to mimic production with complete Host blocking, SSL redirects, and STS headers, leave this as `false`.
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -127,4 +127,4 @@ http:
|
||||||
|
|
||||||
Please take a look at the community-contributed plugins in the [plugin catalog](https://plugins.traefik.io/plugins).
|
Please take a look at the community-contributed plugins in the [plugin catalog](https://plugins.traefik.io/plugins).
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -85,4 +85,4 @@ The `replacement` option defines how to modify the URL to have the new target UR
|
||||||
|
|
||||||
Care should be taken when defining replacement expand variables: `$1x` is equivalent to `${1x}`, not `${1}x` (see [Regexp.Expand](https://golang.org/pkg/regexp/#Regexp.Expand)), so use `${1}` syntax.
|
Care should be taken when defining replacement expand variables: `$1x` is equivalent to `${1x}`, not `${1}x` (see [Regexp.Expand](https://golang.org/pkg/regexp/#Regexp.Expand)), so use `${1}` syntax.
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -146,4 +146,4 @@ http:
|
||||||
forceSlash = false
|
forceSlash = false
|
||||||
```
|
```
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -112,4 +112,4 @@ A list of HTTP middlewares can be found [here](http/overview.md).
|
||||||
|
|
||||||
A list of TCP middlewares can be found [here](tcp/overview.md).
|
A list of TCP middlewares can be found [here](tcp/overview.md).
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -158,4 +158,4 @@ core:
|
||||||
- ✅ All applications functioning correctly
|
- ✅ All applications functioning correctly
|
||||||
- ✅ Performance metrics stable
|
- ✅ Performance metrics stable
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -780,4 +780,4 @@ accesslog:
|
||||||
--accesslog.otlp.grpc.tls.insecureSkipVerify=true
|
--accesslog.otlp.grpc.tls.insecureSkipVerify=true
|
||||||
```
|
```
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -644,4 +644,4 @@ log:
|
||||||
--log.otlp.grpc.tls.insecureSkipVerify=true
|
--log.otlp.grpc.tls.insecureSkipVerify=true
|
||||||
```
|
```
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -77,4 +77,4 @@ additionalArguments:
|
||||||
!!! note
|
!!! note
|
||||||
A router with its own observability configuration will override the global default.
|
A router with its own observability configuration will override the global default.
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -176,4 +176,4 @@ All the following endpoints must be accessed with a `GET` HTTP request.
|
||||||
| `/debug/pprof/symbol` | See the [pprof Symbol](https://golang.org/pkg/net/http/pprof/#Symbol) Go documentation. |
|
| `/debug/pprof/symbol` | See the [pprof Symbol](https://golang.org/pkg/net/http/pprof/#Symbol) Go documentation. |
|
||||||
| `/debug/pprof/trace` | See the [pprof Trace](https://golang.org/pkg/net/http/pprof/#Trace) Go documentation. |
|
| `/debug/pprof/trace` | See the [pprof Trace](https://golang.org/pkg/net/http/pprof/#Trace) Go documentation. |
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -168,4 +168,4 @@ api:
|
||||||
--api.dashboard=false
|
--api.dashboard=false
|
||||||
```
|
```
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -31,4 +31,4 @@ The experience of implementing a Traefik plugin is comparable to writing a web b
|
||||||
|
|
||||||
To learn more about Traefik plugin creation, please refer to the [developer documentation](https://plugins.traefik.io/create).
|
To learn more about Traefik plugin creation, please refer to the [developer documentation](https://plugins.traefik.io/create).
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -702,4 +702,4 @@ providers:
|
||||||
--providers.docker.allowEmptyServices=true
|
--providers.docker.allowEmptyServices=true
|
||||||
```
|
```
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -292,4 +292,4 @@ To illustrate, it is possible to easily define multiple routers, services, and T
|
||||||
{{ end }}
|
{{ end }}
|
||||||
```
|
```
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -16,7 +16,7 @@ the Traefik engineering team developed a [Custom Resource Definition](https://ku
|
||||||
|
|
||||||
## Requirements
|
## Requirements
|
||||||
|
|
||||||
{!kubernetes-requirements.md!}
|
{% include-markdown "includes/kubernetes-requirements.md" %}
|
||||||
|
|
||||||
!!! tip "All Steps for a Successful Deployment"
|
!!! tip "All Steps for a Successful Deployment"
|
||||||
|
|
||||||
|
|
@ -365,4 +365,4 @@ providers:
|
||||||
|
|
||||||
For additional information, refer to the [full example](../user-guides/crd-acme/index.md) with Let's Encrypt.
|
For additional information, refer to the [full example](../user-guides/crd-acme/index.md) with Let's Encrypt.
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -16,7 +16,7 @@ For more details, check out the conformance [report](https://github.com/kubernet
|
||||||
|
|
||||||
## Requirements
|
## Requirements
|
||||||
|
|
||||||
{!kubernetes-requirements.md!}
|
{% include-markdown "includes/kubernetes-requirements.md" %}
|
||||||
|
|
||||||
!!! info "Helm Chart"
|
!!! info "Helm Chart"
|
||||||
|
|
||||||
|
|
@ -357,4 +357,4 @@ providers:
|
||||||
--providers.kubernetesgateway.throttleDuration=10s
|
--providers.kubernetesgateway.throttleDuration=10s
|
||||||
```
|
```
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -13,7 +13,7 @@ it manages access to cluster services by supporting the [Ingress](https://kubern
|
||||||
|
|
||||||
## Requirements
|
## Requirements
|
||||||
|
|
||||||
{!kubernetes-requirements.md!}
|
{% include-markdown "includes/kubernetes-requirements.md" %}
|
||||||
|
|
||||||
## Routing Configuration
|
## Routing Configuration
|
||||||
|
|
||||||
|
|
@ -557,4 +557,4 @@ providers:
|
||||||
To learn more about the various aspects of the Ingress specification that Traefik supports,
|
To learn more about the various aspects of the Ingress specification that Traefik supports,
|
||||||
many examples of Ingresses definitions are located in the test [examples](https://github.com/traefik/traefik/tree/v3.6/pkg/provider/kubernetes/ingress/fixtures) of the Traefik repository.
|
many examples of Ingresses definitions are located in the test [examples](https://github.com/traefik/traefik/tree/v3.6/pkg/provider/kubernetes/ingress/fixtures) of the Traefik repository.
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -227,4 +227,4 @@ List of providers that support constraints:
|
||||||
- [Kubernetes Ingress](./kubernetes-ingress.md#labelselector)
|
- [Kubernetes Ingress](./kubernetes-ingress.md#labelselector)
|
||||||
- [Kubernetes Gateway](./kubernetes-gateway.md#labelselector)
|
- [Kubernetes Gateway](./kubernetes-gateway.md#labelselector)
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -769,4 +769,4 @@ providers:
|
||||||
--providers.swarm.allowEmptyServices=true
|
--providers.swarm.allowEmptyServices=true
|
||||||
```
|
```
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -26,4 +26,4 @@ Dynamic configuration with Kubernetes Custom Resource
|
||||||
--8<-- "content/reference/dynamic-configuration/kubernetes-crd-rbac.yml"
|
--8<-- "content/reference/dynamic-configuration/kubernetes-crd-rbac.yml"
|
||||||
```
|
```
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -255,4 +255,4 @@ rule = "PathPrefix(`/api`) || PathPrefix(`/dashboard`)"
|
||||||
rule = "Host(`traefik.example.com`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))"
|
rule = "Host(`traefik.example.com`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))"
|
||||||
```
|
```
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -409,4 +409,4 @@ services:
|
||||||
- /var/run/docker.sock:/var/run/docker.sock
|
- /var/run/docker.sock:/var/run/docker.sock
|
||||||
```
|
```
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -427,4 +427,4 @@ You can specify which Docker API Endpoint to use with the directive [`endpoint`]
|
||||||
- [Letting Traefik run on Worker Nodes](https://blog.mikesir87.io/2018/07/letting-traefik-run-on-worker-nodes/)
|
- [Letting Traefik run on Worker Nodes](https://blog.mikesir87.io/2018/07/letting-traefik-run-on-worker-nodes/)
|
||||||
- [Docker Socket Proxy from Tecnativa](https://github.com/Tecnativa/docker-socket-proxy)
|
- [Docker Socket Proxy from Tecnativa](https://github.com/Tecnativa/docker-socket-proxy)
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -15,7 +15,7 @@ enabling seamless integration between Traefik's networking capabilities and Knat
|
||||||
|
|
||||||
## Requirements
|
## Requirements
|
||||||
|
|
||||||
{!kubernetes-requirements.md!}
|
{% include-markdown "includes/kubernetes-requirements.md" %}
|
||||||
|
|
||||||
1. Install/update the Knative CRDs.
|
1. Install/update the Knative CRDs.
|
||||||
|
|
||||||
|
|
@ -139,4 +139,4 @@ providers:
|
||||||
|
|
||||||
See the dedicated section in [routing](../../../routing-configuration/kubernetes/knative.md).
|
See the dedicated section in [routing](../../../routing-configuration/kubernetes/knative.md).
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -130,4 +130,4 @@ See the dedicated section in [routing](../../../../routing/providers/kubernetes-
|
||||||
|
|
||||||
For additional information, refer to the [full example](../../../../user-guides/crd-acme/index.md) with Let's Encrypt.
|
For additional information, refer to the [full example](../../../../user-guides/crd-acme/index.md) with Let's Encrypt.
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -21,7 +21,7 @@ For more details, check out the conformance [report](https://github.com/kubernet
|
||||||
|
|
||||||
## Requirements
|
## Requirements
|
||||||
|
|
||||||
{!kubernetes-requirements.md!}
|
{% include-markdown "includes/kubernetes-requirements.md" %}
|
||||||
|
|
||||||
1. Install/update the Kubernetes Gateway API CRDs.
|
1. Install/update the Kubernetes Gateway API CRDs.
|
||||||
|
|
||||||
|
|
@ -137,4 +137,4 @@ See the dedicated section in [routing](../../../../routing/providers/kubernetes-
|
||||||
and the dedicated [routing section](../../../../routing/providers/kubernetes-gateway.md)
|
and the dedicated [routing section](../../../../routing/providers/kubernetes-gateway.md)
|
||||||
in the Traefik documentation.
|
in the Traefik documentation.
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -176,4 +176,4 @@ providers:
|
||||||
|
|
||||||
See the dedicated section in [routing](../../../routing-configuration/kubernetes/ingress-nginx.md).
|
See the dedicated section in [routing](../../../routing-configuration/kubernetes/ingress-nginx.md).
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -149,4 +149,4 @@ many examples of Ingresses definitions are located in the test
|
||||||
[examples](https://github.com/traefik/traefik/tree/v3.1/pkg/provider/kubernetes/ingress/fixtures)
|
[examples](https://github.com/traefik/traefik/tree/v3.1/pkg/provider/kubernetes/ingress/fixtures)
|
||||||
of the Traefik repository.
|
of the Traefik repository.
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -121,4 +121,4 @@ http:
|
||||||
As it is very difficult to listen to all file system notifications, Traefik uses [fsnotify](https://github.com/fsnotify/fsnotify).
|
As it is very difficult to listen to all file system notifications, Traefik uses [fsnotify](https://github.com/fsnotify/fsnotify).
|
||||||
If using a directory with a mounted directory does not fix your issue, please check your file system compatibility with fsnotify.
|
If using a directory with a mounted directory does not fix your issue, please check your file system compatibility with fsnotify.
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -160,4 +160,4 @@ List of providers that support constraints:
|
||||||
- [Consul Catalog](./hashicorp/consul-catalog.md#constraints)
|
- [Consul Catalog](./hashicorp/consul-catalog.md#constraints)
|
||||||
- [Nomad](./hashicorp/nomad.md#constraints)
|
- [Nomad](./hashicorp/nomad.md#constraints)
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -464,4 +464,4 @@ It allows different implementation levels of the [AAA (Authentication, Authoriza
|
||||||
- [Letting Traefik run on Worker Nodes](https://blog.mikesir87.io/2018/07/letting-traefik-run-on-worker-nodes/)
|
- [Letting Traefik run on Worker Nodes](https://blog.mikesir87.io/2018/07/letting-traefik-run-on-worker-nodes/)
|
||||||
- [Docker Socket Proxy from Tecnativa](https://github.com/Tecnativa/docker-socket-proxy)
|
- [Docker Socket Proxy from Tecnativa](https://github.com/Tecnativa/docker-socket-proxy)
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -330,4 +330,4 @@ If Let's Encrypt is not reachable, the following certificates will apply:
|
||||||
!!! important
|
!!! important
|
||||||
For new (sub)domains which need Let's Encrypt authentication, the default Traefik certificate will be used until Traefik is restarted.
|
For new (sub)domains which need Let's Encrypt authentication, the default Traefik certificate will be used until Traefik is restarted.
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -17,4 +17,4 @@ The Certificates resolvers are defined in the static configuration.
|
||||||
Defining a certificate resolver does not imply that routers are going to use it automatically.
|
Defining a certificate resolver does not imply that routers are going to use it automatically.
|
||||||
Each router or entrypoint that is meant to use the resolver must explicitly reference it.
|
Each router or entrypoint that is meant to use the resolver must explicitly reference it.
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -53,4 +53,4 @@ stringData:
|
||||||
| <a id="opt-secretNonBase64Encoded" href="#opt-secretNonBase64Encoded" title="#opt-secretNonBase64Encoded">`secretNonBase64Encoded`</a> | Defines whether the secret sent by the client is base64 encoded. | false | No |
|
| <a id="opt-secretNonBase64Encoded" href="#opt-secretNonBase64Encoded" title="#opt-secretNonBase64Encoded">`secretNonBase64Encoded`</a> | Defines whether the secret sent by the client is base64 encoded. | false | No |
|
||||||
| <a id="opt-secretValues" href="#opt-secretValues" title="#opt-secretValues">`secretValues`</a> | Contain the hash of the API keys. <br /> Supported hashing algorithms are Bcrypt, SHA1 and MD5. <br /> The hash should be generated using `htpasswd`.<br />Can reference a Kubernetes Secret using the URN format: `urn:k8s:secret:[name]:[valueKey]` | [] | Yes |
|
| <a id="opt-secretValues" href="#opt-secretValues" title="#opt-secretValues">`secretValues`</a> | Contain the hash of the API keys. <br /> Supported hashing algorithms are Bcrypt, SHA1 and MD5. <br /> The hash should be generated using `htpasswd`.<br />Can reference a Kubernetes Secret using the URN format: `urn:k8s:secret:[name]:[valueKey]` | [] | Yes |
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -92,4 +92,4 @@ The option `users` supports Kubernetes secrets.
|
||||||
Please note that these keys are not hashed or encrypted in any way, and therefore is less secure than other methods.
|
Please note that these keys are not hashed or encrypted in any way, and therefore is less secure than other methods.
|
||||||
You can find more information on the [Kubernetes Basic Authentication Secret Documentation](https://kubernetes.io/docs/concepts/configuration/secret/#basic-authentication-secret)
|
You can find more information on the [Kubernetes Basic Authentication Secret Documentation](https://kubernetes.io/docs/concepts/configuration/secret/#basic-authentication-secret)
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -82,4 +82,4 @@ On Kubernetes, you don’t use the `users` or `usersFile` fields. Instead, you r
|
||||||
- `kubernetes.io/basic-auth secret`: This secret type contains two keys—`username` and `password`—but is generally suited for a smaller number of users. Please note that these keys are not hashed or encrypted in any way, and therefore is less secure than the other method.
|
- `kubernetes.io/basic-auth secret`: This secret type contains two keys—`username` and `password`—but is generally suited for a smaller number of users. Please note that these keys are not hashed or encrypted in any way, and therefore is less secure than the other method.
|
||||||
- Opaque secret with a users field: Here, the secret contains a single string field (often called `users`) where each line represents a user. This approach allows you to store multiple users in one secret.
|
- Opaque secret with a users field: Here, the secret contains a single string field (often called `users`) where each line represents a user. This approach allows you to store multiple users in one secret.
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -127,4 +127,4 @@ The following request properties are provided to the forward-auth target endpoin
|
||||||
| <a id="opt-Request-URI" href="#opt-Request-URI" title="#opt-Request-URI">Request URI</a> | `X-Forwarded-Uri` |
|
| <a id="opt-Request-URI" href="#opt-Request-URI" title="#opt-Request-URI">Request URI</a> | `X-Forwarded-Uri` |
|
||||||
| <a id="opt-Source-IP-Address" href="#opt-Source-IP-Address" title="#opt-Source-IP-Address">Source IP-Address</a> | `X-Forwarded-For` |
|
| <a id="opt-Source-IP-Address" href="#opt-Source-IP-Address" title="#opt-Source-IP-Address">Source IP-Address</a> | `X-Forwarded-For` |
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -323,4 +323,4 @@ It allows all origins that contain any match of a regular expression in the `acc
|
||||||
|
|
||||||
When defining a regular expression within YAML, any escaped character needs to be escaped twice: `example\.com` needs to be written as `example\\.com`.
|
When defining a regular expression within YAML, any escaped character needs to be escaped twice: `example\.com` needs to be written as `example\\.com`.
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -204,4 +204,4 @@ Only SHA-256 and SHA-512 checksums are supported for checksum computation.
|
||||||
|
|
||||||
To disable this feature and only perform authentication, set the `validateDigest` option to `false` in the middleware configuration.
|
To disable this feature and only perform authentication, set the `validateDigest` option to `false` in the middleware configuration.
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -230,4 +230,4 @@ The reference to a Kubernetes secret takes the form of a URN:
|
||||||
urn:k8s:secret:[name]:[valueKey]
|
urn:k8s:secret:[name]:[valueKey]
|
||||||
```
|
```
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -102,4 +102,4 @@ and a `bindPassword`, then the middleware runs in search mode. In this mode, a s
|
||||||
issued to the LDAP server before trying to bind. If result of this search returns only 1 record,
|
issued to the LDAP server before trying to bind. If result of this search returns only 1 record,
|
||||||
it tries to issue a bind request with this record, otherwise it aborts a `401 Unauthorized` status code.
|
it tries to issue a bind request with this record, otherwise it aborts a `401 Unauthorized` status code.
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -252,4 +252,4 @@ The following Redis modes are supported:
|
||||||
|
|
||||||
For more information about Redis, we recommend the [official Redis documentation](https://redis.io/docs/ "Link to official Redis documentation").
|
For more information about Redis, we recommend the [official Redis documentation](https://redis.io/docs/ "Link to official Redis documentation").
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -206,4 +206,4 @@ stringData:
|
||||||
-----END EC PRIVATE KEY-----
|
-----END EC PRIVATE KEY-----
|
||||||
```
|
```
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -427,4 +427,4 @@ This means that a new CSRF token will be generated and sent to the client whenev
|
||||||
When a request is sent and uses a non-safe method (see [RFC7231#section-4.2.1](https://datatracker.ietf.org/doc/html/rfc7231.html#section-4.2.1)),
|
When a request is sent and uses a non-safe method (see [RFC7231#section-4.2.1](https://datatracker.ietf.org/doc/html/rfc7231.html#section-4.2.1)),
|
||||||
the CSRF token value (extracted from the cookie) have to be sent to the server in the header configured with the [headerName option](#configuration-options).
|
the CSRF token value (extracted from the cookie) have to be sent to the server in the header configured with the [headerName option](#configuration-options).
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -69,4 +69,4 @@ spec:
|
||||||
| <a id="opt-allow" href="#opt-allow" title="#opt-allow">`allow`</a> | The `allow` option sets the expression to evaluate that determines if the request should be authorized. | "" | No (one of `allow` or `forwardHeaders` must be set) |
|
| <a id="opt-allow" href="#opt-allow" title="#opt-allow">`allow`</a> | The `allow` option sets the expression to evaluate that determines if the request should be authorized. | "" | No (one of `allow` or `forwardHeaders` must be set) |
|
||||||
| <a id="opt-forwardHeaders" href="#opt-forwardHeaders" title="#opt-forwardHeaders">`forwardHeaders`</a> | The `forwardHeaders` option sets the HTTP headers to add to requests and populates them with the result of the given expression. | "" | No (one of `allow` or `forwardHeaders` must be set) |
|
| <a id="opt-forwardHeaders" href="#opt-forwardHeaders" title="#opt-forwardHeaders">`forwardHeaders`</a> | The `forwardHeaders` option sets the HTTP headers to add to requests and populates them with the result of the given expression. | "" | No (one of `allow` or `forwardHeaders` must be set) |
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -48,4 +48,4 @@ Middlewares that use the same protocol can be combined into chains to fit every
|
||||||
|
|
||||||
Please take a look at the community-contributed plugins in the [plugin catalog](https://plugins.traefik.io/plugins).
|
Please take a look at the community-contributed plugins in the [plugin catalog](https://plugins.traefik.io/plugins).
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -85,4 +85,4 @@ The `replacement` option defines how to modify the URL to have the new target UR
|
||||||
|
|
||||||
Care should be taken when defining replacement expand variables: `$1x` is equivalent to `${1x}`, not `${1}x` (see [Regexp.Expand](https://golang.org/pkg/regexp/#Regexp.Expand)), so use `${1}` syntax.
|
Care should be taken when defining replacement expand variables: `$1x` is equivalent to `${1x}`, not `${1}x` (see [Regexp.Expand](https://golang.org/pkg/regexp/#Regexp.Expand)), so use `${1}` syntax.
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -63,4 +63,4 @@ spec:
|
||||||
|:-----------------------------|:--------------------------------------------------------------|:--------|:---------|
|
|:-----------------------------|:--------------------------------------------------------------|:--------|:---------|
|
||||||
| <a id="opt-prefixes" href="#opt-prefixes" title="#opt-prefixes">`prefixes`</a> | List of prefixes to strip from the request URL.<br />If your backend is serving assets (for example, images or JavaScript files), it can use the `X-Forwarded-Prefix` header to construct relative URLs. | [] | No |
|
| <a id="opt-prefixes" href="#opt-prefixes" title="#opt-prefixes">`prefixes`</a> | List of prefixes to strip from the request URL.<br />If your backend is serving assets (for example, images or JavaScript files), it can use the `X-Forwarded-Prefix` header to construct relative URLs. | [] | No |
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -61,4 +61,4 @@ spec:
|
||||||
| <a id="opt-directives" href="#opt-directives" title="#opt-directives">`directives`</a> | List of WAF rules to enforce. | | Yes |
|
| <a id="opt-directives" href="#opt-directives" title="#opt-directives">`directives`</a> | List of WAF rules to enforce. | | Yes |
|
||||||
| <a id="opt-crsEnabled" href="#opt-crsEnabled" title="#opt-crsEnabled">`crsEnabled`</a> | Enable [CRS rulesets](https://github.com/corazawaf/coraza-coreruleset/tree/main/rules/%40owasp_crs).<br /> Once the ruleset is enabled, it can be used in the middleware. | false | False |
|
| <a id="opt-crsEnabled" href="#opt-crsEnabled" title="#opt-crsEnabled">`crsEnabled`</a> | Enable [CRS rulesets](https://github.com/corazawaf/coraza-coreruleset/tree/main/rules/%40owasp_crs).<br /> Once the ruleset is enabled, it can be used in the middleware. | false | False |
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -185,4 +185,4 @@ Request → EntryPoint → Parent Router → Middleware → Child Router A → S
|
||||||
4. If `X-User-Role: admin`, `api-admin` router matches and forwards to `admin-service`
|
4. If `X-User-Role: admin`, `api-admin` router matches and forwards to `admin-service`
|
||||||
5. If `X-User-Role: user`, `api-user` router matches and forwards to `user-service`
|
5. If `X-User-Role: user`, `api-user` router matches and forwards to `user-service`
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -118,4 +118,4 @@ labels:
|
||||||
- The character `@` is not authorized in the router name
|
- The character `@` is not authorized in the router name
|
||||||
- In provider-specific configurations (Docker, Kubernetes), router names are often auto-generated based on service names and rules
|
- In provider-specific configurations (Docker, Kubernetes), router names are often auto-generated based on service names and rules
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -100,4 +100,4 @@ This provides fine-grained control over certificate generation and takes precede
|
||||||
|
|
||||||
Every domain must have A/AAAA records pointing to Traefik.
|
Every domain must have A/AAAA records pointing to Traefik.
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -155,4 +155,4 @@ labels:
|
||||||
}
|
}
|
||||||
```
|
```
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -259,4 +259,4 @@ spec:
|
||||||
disableSessionTickets: true
|
disableSessionTickets: true
|
||||||
```
|
```
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -763,4 +763,4 @@ spec:
|
||||||
|
|
||||||
```
|
```
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -619,4 +619,4 @@ This will allow users to create a "default router" that will match all unmatched
|
||||||
|
|
||||||
To do this, use the `traefik.ingress.kubernetes.io/router.priority` annotation (as seen in [Annotations on Ingress](#on-ingress)) on your ingresses accordingly.
|
To do this, use the `traefik.ingress.kubernetes.io/router.priority` annotation (as seen in [Annotations on Ingress](#on-ingress)) on your ingresses accordingly.
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -93,4 +93,4 @@ Use the default URL to access percentage-based routing:
|
||||||
|
|
||||||
Check out the Knative documentation for [HTTP/HTTPS configuration](https://knative.dev/docs/serving/encryption/external-domain-tls/#configure-external-domain-encryption).
|
Check out the Knative documentation for [HTTP/HTTPS configuration](https://knative.dev/docs/serving/encryption/external-domain-tls/#configure-external-domain-encryption).
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -101,4 +101,4 @@ labels:
|
||||||
- Router names should be descriptive and follow your naming conventions
|
- Router names should be descriptive and follow your naming conventions
|
||||||
- In provider-specific configurations (Docker, Kubernetes), router names are often auto-generated based on service names and rules
|
- In provider-specific configurations (Docker, Kubernetes), router names are often auto-generated based on service names and rules
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -123,4 +123,4 @@ This provides fine-grained control over certificate generation and takes precede
|
||||||
|
|
||||||
Every domain must have A/AAAA records pointing to Traefik.
|
Every domain must have A/AAAA records pointing to Traefik.
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -109,4 +109,4 @@ labels:
|
||||||
There must be one (and only one) UDP [service](../service.md) referenced per UDP router.
|
There must be one (and only one) UDP [service](../service.md) referenced per UDP router.
|
||||||
Services are the target for the router.
|
Services are the target for the router.
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -41,4 +41,4 @@ udp:
|
||||||
address = "xx.xx.xx.xx:xx"
|
address = "xx.xx.xx.xx:xx"
|
||||||
```
|
```
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -1722,4 +1722,4 @@ entryPoints:
|
||||||
--entryPoints.foo.observability.tracing=false
|
--entryPoints.foo.observability.tracing=false
|
||||||
```
|
```
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -651,4 +651,4 @@ tcpServersTransport:
|
||||||
--tcpServersTransport.spiffe.trustDomain=spiffe://trust-domain
|
--tcpServersTransport.spiffe.trustDomain=spiffe://trust-domain
|
||||||
```
|
```
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -2039,4 +2039,4 @@ If the ServersTransportTCP CRD is defined in another provider the cross-provider
|
||||||
|
|
||||||
Also see the [full example](../../user-guides/crd-acme/index.md) with Let's Encrypt.
|
Also see the [full example](../../user-guides/crd-acme/index.md) with Let's Encrypt.
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -750,4 +750,4 @@ spec:
|
||||||
[...]
|
[...]
|
||||||
```
|
```
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -960,4 +960,4 @@ This will allow users to create a "default router" that will match all unmatched
|
||||||
|
|
||||||
To do this, use the `traefik.ingress.kubernetes.io/router.priority` annotation (as seen in [Annotations on Ingress](#on-ingress)) on your ingresses accordingly.
|
To do this, use the `traefik.ingress.kubernetes.io/router.priority` annotation (as seen in [Annotations on Ingress](#on-ingress)) on your ingresses accordingly.
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -1790,4 +1790,4 @@ Services are the target for the router.
|
||||||
|
|
||||||
!!! important "UDP routers can only target UDP services (and not HTTP or TCP services)."
|
!!! important "UDP routers can only target UDP services (and not HTTP or TCP services)."
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -2395,4 +2395,4 @@ udp:
|
||||||
address = "private-ip-server-2:8080/"
|
address = "private-ip-server-2:8080/"
|
||||||
```
|
```
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -201,4 +201,4 @@ spec:
|
||||||
For example, the metadata recovered from the Identity Provider can be used to restrict the access to the applications.
|
For example, the metadata recovered from the Identity Provider can be used to restrict the access to the applications.
|
||||||
To do so, you can use the `claims` option, more information in the [dedicated section](../reference/routing-configuration/http/middlewares/jwt.md#claims).
|
To do so, you can use the `claims` option, more information in the [dedicated section](../reference/routing-configuration/http/middlewares/jwt.md#claims).
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -107,4 +107,4 @@ spec:
|
||||||
- Using a cookie ([Options `session`](../reference/routing-configuration/http/middlewares/oidc.md#configuration-options) (default behavior))
|
- Using a cookie ([Options `session`](../reference/routing-configuration/http/middlewares/oidc.md#configuration-options) (default behavior))
|
||||||
- Using a [Redis store](../reference/routing-configuration/http/middlewares/oidc.md#sessionstore).
|
- Using a [Redis store](../reference/routing-configuration/http/middlewares/oidc.md#sessionstore).
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -187,4 +187,4 @@ spec:
|
||||||
|
|
||||||
The WAF middleware supports extensive customization through Coraza directives. You can create custom rules, tune detection thresholds, configure logging levels, and integrate with external threat intelligence feeds. For comprehensive rule writing guidance, consult the [Coraza documentation](https://coraza.io/docs/tutorials/introduction/) and [OWASP CRS documentation](https://coreruleset.org/docs/).
|
The WAF middleware supports extensive customization through Coraza directives. You can create custom rules, tune detection thresholds, configure logging levels, and integrate with external threat intelligence feeds. For comprehensive rule writing guidance, consult the [Coraza documentation](https://coraza.io/docs/tutorials/introduction/) and [OWASP CRS documentation](https://coreruleset.org/docs/).
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -296,4 +296,4 @@ This enables access logs to the container's standard output (viewable via `docke
|
||||||
|
|
||||||
You now have a basic Traefik setup in Docker with secure dashboard access and HTTP-to-HTTPS redirection.
|
You now have a basic Traefik setup in Docker with secure dashboard access and HTTP-to-HTTPS redirection.
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -397,4 +397,4 @@ This enables OTel tracing and specifies the collector endpoint. Consult the [Tra
|
||||||
|
|
||||||
This setup establishes Traefik with secure dashboard access and HTTPS redirection, along with pointers to enable observability & TLS.
|
This setup establishes Traefik with secure dashboard access and HTTPS redirection, along with pointers to enable observability & TLS.
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -327,4 +327,4 @@ command:
|
||||||
|
|
||||||
You now have Traefik running on Docker Swarm with HTTPS, a secured dashboard, automatic HTTP → HTTPS redirects, and foundational observability. Expand this stack with Let’s Encrypt, additional middlewares, or multiple Traefik replicas as your Swarm grows.
|
You now have Traefik running on Docker Swarm with HTTPS, a secured dashboard, automatic HTTP → HTTPS redirects, and foundational observability. Expand this stack with Let’s Encrypt, additional middlewares, or multiple Traefik replicas as your Swarm grows.
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -180,4 +180,4 @@ There are multiple event sources available to investigate when using cert-manage
|
||||||
|
|
||||||
cert-manager documentation provides a [detailed guide](https://cert-manager.io/docs/troubleshooting/) on how to troubleshoot a certificate request.
|
cert-manager documentation provides a [detailed guide](https://cert-manager.io/docs/troubleshooting/) on how to troubleshoot a certificate request.
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -187,4 +187,4 @@ environment:
|
||||||
- "OVH_CONSUMER_KEY_FILE=/run/secrets/ovh_consumer_key"
|
- "OVH_CONSUMER_KEY_FILE=/run/secrets/ovh_consumer_key"
|
||||||
```
|
```
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -83,4 +83,4 @@ labels:
|
||||||
- "traefik.http.routers.whoami.tls.certresolver=myresolver"
|
- "traefik.http.routers.whoami.tls.certresolver=myresolver"
|
||||||
```
|
```
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -131,4 +131,4 @@ whoami:
|
||||||
- "traefik.http.routers.whoami.entrypoints=web"
|
- "traefik.http.routers.whoami.entrypoints=web"
|
||||||
```
|
```
|
||||||
|
|
||||||
{!traefik-for-business-applications.md!}
|
{% include-markdown "includes/traefik-for-business-applications.md" %}
|
||||||
|
|
|
||||||
|
|
@ -45,6 +45,8 @@ plugins:
|
||||||
- exclude:
|
- exclude:
|
||||||
glob:
|
glob:
|
||||||
- "**/include-*.md"
|
- "**/include-*.md"
|
||||||
|
- include-markdown:
|
||||||
|
encoding: utf-8
|
||||||
- redirects:
|
- redirects:
|
||||||
redirect_maps:
|
redirect_maps:
|
||||||
# Providers
|
# Providers
|
||||||
|
|
@ -180,9 +182,6 @@ markdown_extensions:
|
||||||
- pymdownx.tasklist
|
- pymdownx.tasklist
|
||||||
- pymdownx.snippets:
|
- pymdownx.snippets:
|
||||||
check_paths: true
|
check_paths: true
|
||||||
- markdown_include.include:
|
|
||||||
base_path: content/includes/
|
|
||||||
encoding: utf-8
|
|
||||||
- toc:
|
- toc:
|
||||||
permalink: true
|
permalink: true
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -1,5 +1,5 @@
|
||||||
markdown-include==0.5.1
|
mkdocs==1.4.3
|
||||||
mkdocs==1.2.4
|
mkdocs-include-markdown-plugin==7.2.0
|
||||||
mkdocs-exclude==1.0.2
|
mkdocs-exclude==1.0.2
|
||||||
mkdocs-traefiklabs>=100.0.7
|
mkdocs-traefiklabs>=100.0.7
|
||||||
mkdocs-redirects==1.2.2
|
mkdocs-redirects==1.2.2
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue