Distributed systems require a strategic approach to authentication and authorization. Here, we walk through three configurations in which Traefik Enterprise is used to enforce access control via OIDC.
In this article, we walk you through how we tried and successfully switched our platform tooling to a GitOps approach with the help of Flux and Cluster API.
Plugins for Traefik Proxy offer a way to extend Traefik's capabilities with custom features and behaviors. Learn more and explore the Plugin Catalog in this article.
In this article, the Traefik Ambassador, Ruan Bekker, shows you how to publish and secure your applications using Traefik Hub.
Hosting a web application is often a hassle. In this article, I want to show you how to deliver your application to your targeted audience in a matter of seconds.
In this blog post, I will walk you through how to perform some basic bench testing in a sandbox environment to compare the effects of Redis, cookies, and no authentication on their latency.
Docker friends — Welcome! Today, we decided to dedicate some time to walk you through several changes that were introduced in Traefik Proxy 2.x versions, using practical & common scenarios.
In this hands-on tutorial, we show you how to use Traefik Enterprise in ECS and how to configure it dynamically for each service you want to publish.