How is the perception of infrastructure as cattle directing trends in the Kubernetes and cloud native ecosystem?
In widely deployed libraries, tracking down every use is a lot of work. Let’s explore how a reverse proxy can help you protect against attacks and why implementing one should be part of your security best practices.
The recently-published Log4j vulnerability introduces a critical security risk. In this article, we’ll show you how Traefik helps mitigate the issue using our plugin system.
GitOps enforces declarative descriptions of infrastructure and allows Kubernetes platforms to be automated at scale.
If you're looking for the most efficient process of configuring HTTPS for your applications, you're in the right place. Here, I cover various Traefik Proxy configurations for serving HTTPS on Kubernetes.
Today, companies rely on distributed systems to answer the growing demand for cloud-based services. But these systems are innate complex to manage.
In this post, I will walk you through the process of working with Traefik Proxy 2.x on Kubernetes and I’ll discuss common application deployment scenarios along with the involved Traefik Proxy 2.x concepts.