Blog

Announcing Traefik Proxy 2.10

Announcing Traefik Proxy 2.10

Nicolas Mengin
·
Kubernetes
·
April, 2023

Traefik Proxy 2.10 improves your ability to use service mesh with Traefik Proxy, enhances Prometheus metrics, and simplifies your Nomad configuration.

Announcing Traefik Enterprise 2.10

Announcing Traefik Enterprise 2.10

Nicolas Mengin
·
API Management
·
April, 2023

Announcing Traefik Enterprise 2.10 with OIDC access token claims inspection, Kubernetes secrets for storing Authentication Sources credentials, and more.

Production-Ready Kubernetes Deployments with the Traefik API Gateway and Supabase

Production-Ready Kubernetes Deployments with the Traefik API Gateway and Supabase

Colin Wilson
·
Access Control
·
April, 2023

Explore how to configure the Traefik API gateway to enable a production-ready, self-hosted deployment of the Supabase Platform on Kubernetes.

Axione Selects Traefik Enterprise’s API Gateway to Simplify and Secure Deployments of Critical Applications

Axione Selects Traefik Enterprise’s API Gateway to Simplify and Secure Deployments of Critical Applications

Kate Mikula
·
Case Studies
·
March, 2023

Learn how Axione leverages the Traefik Enterprise API gateway to simplify and secure deployments for their critical applications.

Reducing Your Infrastructure Costs by Consolidating Networking Tools

Reducing Your Infrastructure Costs by Consolidating Networking Tools

Christian Turnipseed
·
API Management
·
March, 2023

Need to cut business costs? Consider your networking stack. This article shows you how to consolidate networking tools and reduce infrastructure costs.

Building Your Networking Strategy Using Multi-Cloud, Hybrid Cloud or Multi-Orchestrator Architectures

Building Your Networking Strategy Using Multi-Cloud, Hybrid Cloud or Multi-Orchestrator Architectures

Kate Mikula
·
Microservices
·
March, 2023

Explore hybrid cloud, multi-cloud, and multi-orchestrator architectures for your networking strategy and the differences between their basic and unified forms.

Unlock the Potential of Data APIs with Strong Authentication and Traefik Enterprise

Unlock the Potential of Data APIs with Strong Authentication and Traefik Enterprise

Matt Elgin
·
Access Control
·
February, 2023

Exposing data held within legacy systems in a controlled way through APIs, microservices, etc., is often a challenge. Here's how strong authentication can help.

Achieve Zero Downtime Access Control for Your Applications

Achieve Zero Downtime Access Control for Your Applications

Julien Salleyron
·
Access Control
·
February, 2023

Learn how to implement access control for all applications, including legacy, in just a few clicks, with zero downtime, and no changes to the original app.

The History and Evolution of APIs

The History and Evolution of APIs

Kate Mikula
·
API Management
·
February, 2023

Let's explore the history of APIs to understand how and why they have become such an integral part of modern software development.

Traefik Labs uses cookies to improve your experience. By continuing to browse the site you are agreeing to our use of cookies. Find out more in the Cookie Policy.