Read step-by-step instructions to determine if your Let's Encrypt certificates will be revoked, and how to update them for Traefik Proxy and Traefik Enterprise if so.
We are very happy to announce the general availability of Traefik Proxy 2.6, the latest update to our cloud native edge router and application proxy solution.
In widely deployed libraries, tracking down every use is a lot of work. Let’s explore how a reverse proxy can help you protect against attacks and why implementing one should be part of your security best practices.
Read step-by-step instructions for deploying Traefik Proxy using Flux to embrace GitOps principles.
The recently-published Log4j vulnerability introduces a critical security risk. In this article, we’ll show you how Traefik helps mitigate the issue using our plugin system.
GitOps enforces declarative descriptions of infrastructure and allows Kubernetes platforms to be automated at scale.
If you're looking for the most efficient process of configuring HTTPS for your applications, you're in the right place. Here, I cover various Traefik Proxy configurations for serving HTTPS on Kubernetes.