Simplify microservice discovery, routing, & load balancing.
Enhance security & centralize control of your APIs and microservices.
Simplify & accelerate API lifecycle management in Kubernetes.
Learn
Open Source
Documentation
Traefik Proxy v3.3 - Nectaire of the Gods
New!
In widely deployed libraries, tracking down every use is a lot of work. Let’s explore how a reverse proxy can help you protect against attacks and why implementing one should be part of your security best practices.
Read step-by-step instructions for deploying Traefik Proxy using Flux to embrace GitOps principles.
The recently-published Log4j vulnerability introduces a critical security risk. In this article, we’ll show you how Traefik helps mitigate the issue using our plugin system.
GitOps enforces declarative descriptions of infrastructure and allows Kubernetes platforms to be automated at scale.
If you're looking for the most efficient process of configuring HTTPS for your applications, you're in the right place. Here, I cover various Traefik Proxy configurations for serving HTTPS on Kubernetes.
Today, companies rely on distributed systems to answer the growing demand for cloud-based services. But these systems are innate complex to manage.
In this post, I will walk you through the process of working with Traefik Proxy 2.x on Kubernetes and I’ll discuss common application deployment scenarios along with the involved Traefik Proxy 2.x concepts.
If you're already using Kubernetes and you're looking to get a better understanding of rate limiting you're in the right place.
We’re pleased to announce the new release of Traefik Enterprise 2.5 that not only integrates Traefik Proxy 2.5 but also brings its own set of customer-centric features.
Traefik Labs uses cookies to improve your experience. By continuing to browse the site you are agreeing to our use of cookies. Find out more in the Cookie Policy.