Production-Ready Kubernetes Deployments with the Traefik API Gateway and Supabase

Production-Ready Kubernetes Deployments with the Traefik API Gateway and Supabase

Colin Wilson
·
Access Control
·
April, 2023

Explore how to configure the Traefik API gateway to enable a production-ready, self-hosted deployment of the Supabase Platform on Kubernetes.

Axione Selects Traefik Enterprise’s API Gateway to Simplify and Secure Deployments of Critical Applications

Axione Selects Traefik Enterprise’s API Gateway to Simplify and Secure Deployments of Critical Applications

Kate Mikula
·
Case Studies
·
March, 2023

Learn how Axione leverages the Traefik Enterprise API gateway to simplify and secure deployments for their critical applications.

Reducing Your Infrastructure Costs by Consolidating Networking Tools

Reducing Your Infrastructure Costs by Consolidating Networking Tools

Christian Turnipseed
·
API Management
·
March, 2023

Need to cut business costs? Consider your networking stack. This article shows you how to consolidate networking tools and reduce infrastructure costs.

Building Your Networking Strategy Using Multi-Cloud, Hybrid Cloud or Multi-Orchestrator Architectures

Building Your Networking Strategy Using Multi-Cloud, Hybrid Cloud or Multi-Orchestrator Architectures

Kate Mikula
·
Microservices
·
March, 2023

Explore hybrid cloud, multi-cloud, and multi-orchestrator architectures for your networking strategy and the differences between their basic and unified forms.

Unlock the Potential of Data APIs with Strong Authentication and Traefik Enterprise

Unlock the Potential of Data APIs with Strong Authentication and Traefik Enterprise

Matt Elgin
·
Access Control
·
February, 2023

Exposing data held within legacy systems in a controlled way through APIs, microservices, etc., is often a challenge. Here's how strong authentication can help.

Achieve Zero Downtime Access Control for Your Applications

Achieve Zero Downtime Access Control for Your Applications

Julien Salleyron
·
Access Control
·
February, 2023

Learn how to implement access control for all applications, including legacy, in just a few clicks, with zero downtime, and no changes to the original app.

The History and Evolution of APIs

The History and Evolution of APIs

Kate Mikula
·
API Management
·
February, 2023

Let's explore the history of APIs to understand how and why they have become such an integral part of modern software development.

Reverse Proxy vs. Ingress Controller vs. API Gateway: Understanding the Differences and When to Use Them

Reverse Proxy vs. Ingress Controller vs. API Gateway: Understanding the Differences and When to Use Them

Eirini Eleni Papadopoulou
·
Microservices
·
January, 2023

Learn everything you need to know about the reverse proxy, ingress controller, and API gateway, their differences, and when you need to use them.

Exploring the Tailscale-Traefik Proxy Integration

Exploring the Tailscale-Traefik Proxy Integration

Mathieu Lonjaret
·
Access Control
·
January, 2023

In this article, we explore two main ways Traefik Proxy uses Tailscale — one based on the utilization of the TLS management feature and one bonus story for nerds!

Traefik Labs uses cookies to improve your experience. By continuing to browse the site you are agreeing to our use of cookies. Find out more in the Cookie Policy.