Simplify microservice discovery, routing, & load balancing.
Enhance security & centralize control of your APIs and microservices.
Simplify & accelerate API lifecycle management in Kubernetes.
Learn
Open Source
Documentation
Exploring Traefik’s WAF Integration and How to Make it 23x Faster
Announcing Traefik Enterprise 2.10 with OIDC access token claims inspection, Kubernetes secrets for storing Authentication Sources credentials, and more.
Explore how to configure the Traefik API gateway to enable a production-ready, self-hosted deployment of the Supabase Platform on Kubernetes.
Explore hybrid cloud, multi-cloud, and multi-orchestrator architectures for your networking strategy and the differences between their basic and unified forms.
In the third part of this blog series, we explore the open source project Jaeger, and how to perform request tracing for applications on Kubernetes.
This is the first part of our blog series on Traefik Proxy and SRE techniques that explores how Traefik's built-in logging features can help to provide visibility.
Let's dig into how you can use cert-manager to extend Traefik Proxy’s capabilities as a Kubernetes ingress controller to secure your web applications.
Here, we highlight why the environment's location makes a massive difference in how load balancing is done and how to tackle it in the easiest way possible.
Why is cloud native networking so complex? Here, we discuss service publishing, the complexity that comes with it, and how Traefik Hub streamlines the process.
Distributed systems require a strategic approach to authentication and authorization. Here, we walk through three configurations in which Traefik Enterprise is used to enforce access control via OIDC.
Traefik Labs uses cookies to improve your experience. By continuing to browse the site you are agreeing to our use of cookies. Find out more in the Cookie Policy.