Improve Your Application Security Using a Reverse Proxy

Improve Your Application Security Using a Reverse Proxy

Manuel Zapf
Manuel Zapf
·
Microservices
·
January, 2022

In widely deployed libraries, tracking down every use is a lot of work. Let’s explore how a reverse proxy can help you protect against attacks and why imple­menting one should be part of your security best practices.

How to Deploy Traefik Proxy Using Flux and GitOps Principles

How to Deploy Traefik Proxy Using Flux and GitOps Principles

Jakub Hajek
Jakub Hajek
·
Kubernetes
·
January, 2022

Read step-by-step instructions for deploying Traefik Proxy using Flux to embrace GitOps principles.

How Traefik Plugins Protect Your Apps Against the Log4j Vulnerability

How Traefik Plugins Protect Your Apps Against the Log4j Vulnerability

Manuel Zapf
Manuel Zapf
·
Security
·
December, 2021

The recently-published Log4j vulnerability introduces a critical security risk. In this article, we’ll show you how Traefik helps mitigate the issue using our plugin system.

Automating at Scale with GitOps and a Declarative Approach

Automating at Scale with GitOps and a Declarative Approach

Kate Mikula
Kate Mikula
·
Kubernetes
·
December, 2021

GitOps enforces declarative descriptions of infrastructure and allows Kubernetes platforms to be automated at scale.

HTTPS on Kubernetes Using Traefik Proxy

HTTPS on Kubernetes Using Traefik Proxy

Rahul Sharma
Rahul Sharma
·
Kubernetes
·
November, 2021

If you're looking for the most efficient process of configuring HTTPS for your applications, you're in the right place. Here, I cover various Traefik Proxy configurations for serving HTTPS on Kubernetes.

The Key Challenges of Multi-Cluster Networking

The Key Challenges of Multi-Cluster Networking

Kate Mikula
Kate Mikula
·
Kubernetes
·
November, 2021

Today, companies rely on distributed systems to answer the growing demand for cloud-based services. But these systems are innate complex to manage.