diff --git a/docs/content/reference/dynamic-configuration/docker-labels.yml b/docs/content/reference/dynamic-configuration/docker-labels.yml index 885706a0f..1523f7227 100644 --- a/docs/content/reference/dynamic-configuration/docker-labels.yml +++ b/docs/content/reference/dynamic-configuration/docker-labels.yml @@ -159,6 +159,7 @@ - "traefik.http.services.service01.loadbalancer.sticky.cookie.secure=true" - "traefik.http.services.service01.loadbalancer.server.port=foobar" - "traefik.http.services.service01.loadbalancer.server.scheme=foobar" +- "traefik.http.services.service01.loadbalancer.serverstransport=foobar" - "traefik.tcp.routers.tcprouter0.entrypoints=foobar, foobar" - "traefik.tcp.routers.tcprouter0.rule=foobar" - "traefik.tcp.routers.tcprouter0.service=foobar" diff --git a/docs/content/reference/dynamic-configuration/kubernetes-crd-resource.yml b/docs/content/reference/dynamic-configuration/kubernetes-crd-resource.yml index eb6294556..cbe4b3e34 100644 --- a/docs/content/reference/dynamic-configuration/kubernetes-crd-resource.yml +++ b/docs/content/reference/dynamic-configuration/kubernetes-crd-resource.yml @@ -96,6 +96,7 @@ spec: strategy: RoundRobin - name: s2 port: 433 + serversTransport: mytransport - match: PathPrefix(`/misc`) services: - name: s3 diff --git a/docs/content/reference/dynamic-configuration/marathon-labels.json b/docs/content/reference/dynamic-configuration/marathon-labels.json index 3e9644840..f2771f34b 100644 --- a/docs/content/reference/dynamic-configuration/marathon-labels.json +++ b/docs/content/reference/dynamic-configuration/marathon-labels.json @@ -37,6 +37,7 @@ "traefik.http.middlewares.middleware10.headers.accesscontrolallowmethods": "foobar, foobar", "traefik.http.middlewares.middleware10.headers.accesscontrolalloworigin": "foobar", "traefik.http.middlewares.middleware10.headers.accesscontrolalloworiginlist": "foobar, foobar", +"traefik.http.middlewares.middleware10.headers.accesscontrolalloworiginlistregex": "foobar, foobar", "traefik.http.middlewares.middleware10.headers.accesscontrolexposeheaders": "foobar, foobar", "traefik.http.middlewares.middleware10.headers.accesscontrolmaxage": "42", "traefik.http.middlewares.middleware10.headers.addvaryheader": "true", @@ -120,6 +121,7 @@ "traefik.http.routers.router0.priority": "42", "traefik.http.routers.router0.rule": "foobar", "traefik.http.routers.router0.service": "foobar", +"traefik.http.routers.router0.tls": "true", "traefik.http.routers.router0.tls.certresolver": "foobar", "traefik.http.routers.router0.tls.domains[0].main": "foobar", "traefik.http.routers.router0.tls.domains[0].sans": "foobar, foobar", @@ -131,6 +133,7 @@ "traefik.http.routers.router1.priority": "42", "traefik.http.routers.router1.rule": "foobar", "traefik.http.routers.router1.service": "foobar", +"traefik.http.routers.router1.tls": "true", "traefik.http.routers.router1.tls.certresolver": "foobar", "traefik.http.routers.router1.tls.domains[0].main": "foobar", "traefik.http.routers.router1.tls.domains[0].sans": "foobar, foobar", @@ -156,9 +159,11 @@ "traefik.http.services.service01.loadbalancer.sticky.cookie.secure": "true", "traefik.http.services.service01.loadbalancer.server.port": "foobar", "traefik.http.services.service01.loadbalancer.server.scheme": "foobar", +"traefik.http.services.service01.loadbalancer.serverstransport": "foobar", "traefik.tcp.routers.tcprouter0.entrypoints": "foobar, foobar", "traefik.tcp.routers.tcprouter0.rule": "foobar", "traefik.tcp.routers.tcprouter0.service": "foobar", +"traefik.tcp.routers.tcprouter0.tls": "true", "traefik.tcp.routers.tcprouter0.tls.certresolver": "foobar", "traefik.tcp.routers.tcprouter0.tls.domains[0].main": "foobar", "traefik.tcp.routers.tcprouter0.tls.domains[0].sans": "foobar, foobar", @@ -169,6 +174,7 @@ "traefik.tcp.routers.tcprouter1.entrypoints": "foobar, foobar", "traefik.tcp.routers.tcprouter1.rule": "foobar", "traefik.tcp.routers.tcprouter1.service": "foobar", +"traefik.tcp.routers.tcprouter1.tls": "true", "traefik.tcp.routers.tcprouter1.tls.certresolver": "foobar", "traefik.tcp.routers.tcprouter1.tls.domains[0].main": "foobar", "traefik.tcp.routers.tcprouter1.tls.domains[0].sans": "foobar, foobar", diff --git a/docs/content/reference/static-configuration/file.toml b/docs/content/reference/static-configuration/file.toml index ceacd0198..d54b7d356 100644 --- a/docs/content/reference/static-configuration/file.toml +++ b/docs/content/reference/static-configuration/file.toml @@ -380,6 +380,7 @@ token = "foobar" [experimental] + kubernetesGateway = true [experimental.plugins] [experimental.plugins.Descriptor0] moduleName = "foobar" @@ -390,4 +391,3 @@ [experimental.devPlugin] goPath = "foobar" moduleName = "foobar" - kubernetesGateway = true diff --git a/docs/content/reference/static-configuration/file.yaml b/docs/content/reference/static-configuration/file.yaml index e2011bc1a..5f4749ade 100644 --- a/docs/content/reference/static-configuration/file.yaml +++ b/docs/content/reference/static-configuration/file.yaml @@ -400,6 +400,7 @@ certificatesResolvers: pilot: token: foobar experimental: + kubernetesGateway: true plugins: Descriptor0: moduleName: foobar @@ -410,5 +411,4 @@ experimental: devPlugin: goPath: foobar moduleName: foobar - kubernetesGateway: true diff --git a/docs/content/routing/providers/docker.md b/docs/content/routing/providers/docker.md index 21f986a56..ed39ba823 100644 --- a/docs/content/routing/providers/docker.md +++ b/docs/content/routing/providers/docker.md @@ -285,6 +285,14 @@ you'd add the label `traefik.http.services..loadbalancer.pa - "traefik.http.services.myservice.loadbalancer.server.scheme=http" ``` +??? info "`traefik.http.services..loadbalancer.serverstransport`" + + See [serverstransport](../services/index.md#serverstransport) for more information. + + ```yaml + - "traefik.http.services..loadbalancer.serverstransport=foobar" + ``` + ??? info "`traefik.http.services..loadbalancer.passhostheader`" See [pass Host header](../services/index.md#pass-host-header) for more information. diff --git a/docs/content/routing/providers/kubernetes-crd.md b/docs/content/routing/providers/kubernetes-crd.md index 2a1cb3862..dcf795f27 100644 --- a/docs/content/routing/providers/kubernetes-crd.md +++ b/docs/content/routing/providers/kubernetes-crd.md @@ -335,6 +335,7 @@ Register the `IngressRoute` [kind](../../reference/dynamic-configuration/kuberne responseForwarding: flushInterval: 1ms scheme: https + serversTransport: transport sticky: cookie: httpOnly: true diff --git a/docs/content/routing/services/index.md b/docs/content/routing/services/index.md index 9c59e4a1d..b2e0287ab 100644 --- a/docs/content/routing/services/index.md +++ b/docs/content/routing/services/index.md @@ -462,7 +462,7 @@ By default, `passHostHeader` is true. #### ServersTransport -`serversTransport` allows to reference a ServersTransport configuration for the communication between Traefik and your servers. +`serversTransport` allows to reference a [ServersTransport](./index.md#serverstransport_1) configuration for the communication between Traefik and your servers. ??? example "Specify a transport -- Using the [File Provider](../../providers/file.md)"