Guides

Distributed Tracing with Traefik and Jaeger on Kubernetes

Distributed Tracing with Traefik and Jaeger on Kubernetes

Michel Loiseleur
Michel Loiseleur
·
Kubernetes
·
January, 2023

In the third part of this blog series, we explore the open source project Jaeger, and how to perform request tracing for applications on Kubernetes.

Log Aggregation in Kubernetes with Traefik Proxy

Log Aggregation in Kubernetes with Traefik Proxy

Michel Loiseleur
Michel Loiseleur
·
Kubernetes
·
January, 2023

This is the first part of our blog series on Traefik Proxy and SRE techniques that explores how Traefik's built-in logging features can help to provide visibility.

Secure Web Applications with Traefik Proxy, cert-manager, and Let’s Encrypt

Secure Web Applications with Traefik Proxy, cert-manager, and Let’s Encrypt

Richard Hillmann
Richard Hillmann
·
Kubernetes
·
January, 2023

Let's dig into how you can use cert-manager to extend Traefik Proxy’s capabilities as a Kubernetes ingress controller to secure your web applications.

Mocktail: The Mock Generator for Strongly-Typed Mocks You’ve Been Looking For

Mocktail: The Mock Generator for Strongly-Typed Mocks You’ve Been Looking For

Ludovic Fernandez
Ludovic Fernandez
·
Community
·
January, 2023

Mocktail, a mock generator for strongly-typed mocks, is a nifty little tool that can save you hours of frustration manually creating mocks.

3 OIDC Configurations with Traefik Enterprise, from Basic to Advanced

3 OIDC Configurations with Traefik Enterprise, from Basic to Advanced

Matt Elgin
Matt Elgin
·
Access Control
·
November, 2022

Distributed systems require a strategic approach to authentication and authorization. Here, we walk through three configurations in which Traefik Enterprise is used to enforce access control via OIDC.

Traefik Hub in a World of GitOps

Traefik Hub in a World of GitOps

Gerald Croes
Gerald Croes
·
GitOps
·
November, 2022

Code is at the center of everything, from source code files or API calls. A headless, programmatic approach lets you reap the benefits of GitOps.

The Configuration of an Encryption Key — Post-Modern Evolution

The Configuration of an Encryption Key — Post-Modern Evolution

Jean-Baptiste Doumenjou
Jean-Baptiste Doumenjou
·
Access Control
·
November, 2022

This is the third and last part of our journey through time to discover the art of cryptography and the configuration of an encryption key, from ancient times until today.

The Evolution of Cryptography in Modern History

The Evolution of Cryptography in Modern History

Jean-Baptiste Doumenjou
Jean-Baptiste Doumenjou
·
Access Control
·
November, 2022

Jump into our time machine and join us on a journey to explore the evolution of cryptography, the art of making a message secret through history.

The Art of Cryptography in Ancient and Medieval History

The Art of Cryptography in Ancient and Medieval History

Jean-Baptiste Doumenjou
Jean-Baptiste Doumenjou
·
Access Control
·
November, 2022

We invite you to jump into a time machine and join us on a journey to discover cryptography, the art of making a message secret through history.