Traefik Runtime Platform
Learn
Open Source
Documentation
Compare Traefik Hub
New!
Monitoring Kubernetes ingress traffic is a critical part of an effective strategy for detecting and managing potential issues in real-time.
In this article, we’ll delve into the question of migrating legacy applications by discussing the specific challenges these workloads pose and outlining a strategy to overcome them.
With Traefik plugins, you can now easily build, use, and share your own custom extensions to Traefik’s functionality, with minimal development overhead.
Here is the story about the personalization of a large-scale book reading service and building the infrastructure to evaluate new models utilizing Traefik.
External reverse proxy and load balancing software like Traefik offer networking features and control that Docker Swarm cannot provide on its own.
When adopting microservices, Kubernetes alone may not be enough to handle more complex networking challenges that arise. This is the job of a service mesh.
Kubernetes is often used to manage external-facing applications, so the need for protecting applications from harmful external traffic is nearly universal.
The Ingress Object itself already has a long history with K8s. It is still considered beta, which is kinda surprising for something that has been so long present in K8s. But why is that? And when will that change?
How should developers implement access control, particularly authentication, within the context of k8s?
Traefik Labs uses cookies to improve your experience. By continuing to browse the site you are agreeing to our use of cookies. Find out more in the Cookie Policy.