Encryption for network security is a non-trivial matter, particularly in complex environments. Traefik and Let’s Encrypt can make the process of securing Kubernetes clusters simpler, speedier, and more resilient.
You can start experimenting with Kubernetes and Traefik in minutes and in your choice of environment, which can even be the laptop in front of you.
Learn how Elkjøp uses Traefik with Kubernetes to manage modern microservice architecture at the center of their customer facing transactions.
Case Study: Rocket.Chat Deploys Traefik to Manage Unified Communications at Scale. Learn how Rocket.Chat offers dependable services and fast response times to their large customer base using Traefik.
Traefik Enterprise 2.3 introduces new features for developers and DevOps engineers, including support for GitOps practices and OpenAPI.
What if it was possible to achieve true high availability using only Traefik Proxy, Traefik Enterprise, and a few other, easy-to-deploy open-source networking tools?
Traefik Enterprise 2.3 now supports Vault for certificate management in two ways: as a key-value store for certificates, and as a certificate resolver.
As an insurance company, security and service uptime are two of Vaudoise's highest requirements. Traefik Enterprise provides high availability and encryption capabilities necessary for Vaudoise, in a single, easy-to-use solution.
Containers and Kubernetes have revolutionized software delivery. Releasing apps and services as stateless container images makes it easy to create and destroy container instances as demand requires.
With Traefik plugins, you can now easily build, use, and share your own custom extensions to Traefik’s functionality, with minimal development overhead.
External reverse proxy and load balancing software like Traefik offer networking features and control that Docker Swarm cannot provide on its own.
When adopting microservices, Kubernetes alone may not be enough to handle more complex networking challenges that arise. This is the job of a service mesh.