Getting Started With Traefik Proxy and HashiCorp Consul

Getting Started With Traefik Proxy and HashiCorp Consul

Douglas De Toni Machado
Douglas De Toni Machado
·
Product News
·
February, 2022

This tutorial demonstrates how to integrate Traefik Proxy with HCP Consul, leveraging the recently added namespace support on both the Consul and Consul Catalog Traefik providers.

How to use Traefik Proxy and HTTP/3 on AWS EKS

How to use Traefik Proxy and HTTP/3 on AWS EKS

Michael Matur
Michael Matur
·
Kubernetes
·
February, 2022

Here's how to successfully switch to a NodePort Service to deploy a Network Load Balancer (NLB) in AWS and allow TCP and UDP on the same port.

Traefik Proxy 2.6 and HTTP: Trust, Verification, and the Future

Traefik Proxy 2.6 and HTTP: Trust, Verification, and the Future

Adrian Goins
Adrian Goins
·
Product News
·
February, 2022

Let's explore how Traefik Proxy 2.6, makes it possible to configure the advertised UDP port of an HTTP/3-enabled entrypoint.

How to Force-update Let’s Encrypt Certificates

How to Force-update Let’s Encrypt Certificates

Adrian Goins
Adrian Goins
·
#traefik-related-resource
·
January, 2022

Read step-by-step instructions to determine if your Let's Encrypt certificates will be revoked, and how to update them for Traefik Proxy and Traefik Enterprise if so.

Announcing Traefik Proxy 2.6

Announcing Traefik Proxy 2.6

Douglas De Toni Machado
Douglas De Toni Machado
·
Product News
·
January, 2022

We are very happy to announce the general availability of Traefik Proxy 2.6, the latest update to our cloud native edge router and application proxy solution.

Pets vs. Cattle: The Future of Kubernetes in 2022

Pets vs. Cattle: The Future of Kubernetes in 2022

Manuel Zapf
Manuel Zapf
·
Kubernetes
·
January, 2022

How is the perception of infrastructure as cattle directing trends in the Kubernetes and cloud native ecosystem?

Improve Your Application Security Using a Reverse Proxy

Improve Your Application Security Using a Reverse Proxy

Manuel Zapf
Manuel Zapf
·
Access Control
·
January, 2022

In widely deployed libraries, tracking down every use is a lot of work. Let’s explore how a reverse proxy can help you protect against attacks and why imple­menting one should be part of your security best practices.

How to Deploy Traefik Proxy Using Flux and GitOps Principles

How to Deploy Traefik Proxy Using Flux and GitOps Principles

Jakub Hajek
Jakub Hajek
·
#traefik-related-resource
·
January, 2022

Read step-by-step instructions for deploying Traefik Proxy using Flux to embrace GitOps principles.

How Traefik Plugins Protect Your Apps Against the Log4j Vulnerability

How Traefik Plugins Protect Your Apps Against the Log4j Vulnerability

Manuel Zapf
Manuel Zapf
·
#traefik-related-resource
·
December, 2021

The recently-published Log4j vulnerability introduces a critical security risk. In this article, we’ll show you how Traefik helps mitigate the issue using our plugin system.