Simplify microservice discovery, routing, & load balancing.
Enhance security & centralize control of your APIs and microservices.
Simplify & accelerate API lifecycle management in Kubernetes.
Learn
Open Source
Documentation
How to Keep Your Services Secure With Traefik’s Rate Limiting
The Traefik Proxy 2.9 release is here and it comes with canary deployments for Consul and Nomad, support for ECS Anywhere, default certificate with ACME, and much more!
Read step-by-step instructions to determine if your Let's Encrypt certificates will be revoked, and how to update them for Traefik Proxy and Traefik Enterprise if so.
Read step-by-step instructions for deploying Traefik Proxy using Flux to embrace GitOps principles.
The recently-published Log4j vulnerability introduces a critical security risk. In this article, we’ll show you how Traefik helps mitigate the issue using our plugin system.
In this post, I will walk you through the process of working with Traefik Proxy 2.x on Kubernetes and I’ll discuss common application deployment scenarios along with the involved Traefik Proxy 2.x concepts.
Traefik Labs uses cookies to improve your experience. By continuing to browse the site you are agreeing to our use of cookies. Find out more in the Cookie Policy.