GitOps enforces declarative descriptions of infrastructure and allows Kubernetes platforms to be automated at scale.
If you're looking for the most efficient process of configuring HTTPS for your applications, you're in the right place. Here, I cover various Traefik Proxy configurations for serving HTTPS on Kubernetes.
In this post, I will walk you through the process of working with Traefik Proxy 2.x on Kubernetes and I’ll discuss common application deployment scenarios along with the involved Traefik Proxy 2.x concepts.
If you're already using Kubernetes and you're looking to get a better understanding of rate limiting you're in the right place.
We’re pleased to announce the new release of Traefik Enterprise 2.5 that not only integrates Traefik Proxy 2.5 but also brings its own set of customer-centric features.
Traefik Proxy is a modular router by design, allowing you to place middleware into your routes, and to modify requests before they reach their intended backend service destinations. Traefik has many such middlewares built-in, and also allows you to load your own, in the form of plugins.
This article demonstrates how to install Consul and Traefik Proxy 2.5, on a fresh Kubernetes cluster, first in a development environment, and then moved to production.