Traefik v2Let's EncryptTraefik + Portainer for Wildcard CertificatesTechno Tim·EnglishThis video shows how to set up a reverse proxy using Traefik, Portainer, and use that to get wildcard certificates from Let's Encrypt.
Traefik v2KubernetesSelf-Hosting Your Homelab Services with SSL -- Let's Encrypt, MetalLB, Traefik, Rancher, KubernetesTechno Tim·EnglishThis tutorial walks through setting up Rancher, Kubernetes, Traefik and more.
DockerTraefik v2Deploy multiple applications on the same VPS with Docker and Traefik 2Li Yang·EnglishIn this video tutorial, you'll learn how to deploy multiple sites or different applications on the same VPS.
DockerKubernetesTraefik v2Getting started with Traefik, the Edge Router & Reverse ProxyNOVALUG with Phil Fenstermacher and Michael Irwin·EnglishThis session was held by the Northern Virginia Linux Users Group and features Traefik Ambassadors, Phil Fenstermacher and Michael Irwin.
Let's EncryptLAN-only applications with TLSJake Howard·EnglishThis post shows how to set up LAN-only applications with TLS, using a custom DNS server, for those times you'd like to keep your applications internal.Read
K3sLet's EncryptManaging multiple clusters with ArgoCD on k3s running in Azure and secured by Traefik and Let’s EncryptAlessandro Vozza·EnglishThis blog teaches how to manage multiple clusters with ArgoCD on k3s, running on a virtual machine in Azure, secured by Traefik and Let’s Encrypt.Read
DockerHow to setup TeslaMate on your own cloud and domainJayanth·EnglishThis post shows how to track and log your Tesla data using TeslaMate, Traefik, and Docker. Read
DockerDeploying Secure and Scalable Streamlit Apps on AWS with Docker Swarm, Traefik and KeycloakYihui Fan·EnglishThis tutorial offers a relatively straightforward deployment solution leveraging Docker Swarm and Traefik, with an option of adding user authentication with Keycloak. Read
DockerComo crear un CTF con Owasp Juice Shop y TraefikElzer Pineda·SpanishThis post talks about using Traefik in front of a CTF (capture the flag) app, which is used by security teams to try and out-hack each other.Read
DockerLockdown WordPress with Traefik proxy – No pluginsScaleUp·EnglishThis author deployed a honeytrap to better understand how Wordpress systems get hacked, then secured it with Traefik. Read
DockerStargazer's Energy Shift ProjectChris Davis·EnglishThis is a daily journal for an epic project powered by Traefik, Influx DB, and Grafana, called the Stargazer's Energy Shift Project.Read
Traefik v2How to Install Traefik 2 on Raspberry PiDavid Burgess·EnglishThis is a tutorial on how to install Traefik 2 on Raspberry Pi.
Traefik v2DockerTraefik 2.0 + Docker — a Simple Step by Step GuideContaineroo·EnglishThis is a simple step by step guide to securely exposing Portainer to the net using Docker Swarm and Traefik 2.0 with Let's Encrypt.Read
Traefik v2Kubernetes, Wordpress et TraefikLoïc Fache·FrenchThis post is an in depth guide to setting up Wordpress with Traefik, Kubernetes CRDs, and the implementation of IP filtering for access to the administration interface.Read
DockerDocker, Traefik and dnsmasqGuewen Baconnier·EnglishLearn how to set up Docker, Traefik and dnsmasq—great if you need more than one local HTTP service running on your local machine and reachable with a DNS.Read