Skip to content

Latest commit

 

History

History
233 lines (168 loc) · 13.7 KB

README.md

File metadata and controls

233 lines (168 loc) · 13.7 KB

build-and-push

WAT

  • Implements a ENV-Var based configuration for your Traefik server running as a docker-image.
  • Easier to configure then classic Treafik 2.x due to high-level settings like "enable dashboard" or "always redirect"

The amd64 image is published on

WAT: Detailed

Starting with Traefik v2 the configuration using the ENV vars here can be considerably easier, since let high level features like "enabled dashboard" or "redirect all to https" can be setup using one ENV vars, being fairly complexing in the original configuration thouugh.

The configuration here is rather macro driven, high level. So if you set TRAEFIK_HTTPS_ENABLE=only you will get the redirect configured automatically. TRAEFIK_HTTPS_ENABLE=true will configure a TLS endoint and so on. Similar storry for enable the API backend / Dashboard - just do TRAEFIK_ADMIN_ENABLE=true

WAT: Official image

It bases on top of the official stable release of Traefik and just adds a bootstrap to generate the traefik.toml file from your ENV variables you pass to the container.

WAT its not

Even though this image will make it a lot easier bootstrapping and running your Traefik server in production with various providers, this is not a beginners-boilerplate. That said, all your Traefik questions should go to the forum and before that, read the Traefik Documentation i suppose. I will not consider answering "how to do this in Traefik" questions in the issue queue. Thanks!

Migration to 2.0

  1. rename TRAEFIK_DOCKER_DOMAIN to TRAEFIK_DOCKER_DEFAULT_RULE and use the new syntax https://docs.traefik.io/providers/docker/#defaultrule
  2. rename TRAEFIK_RANCHER_DOMAIN to env_TRAEFIK_RANCHER_DEFAULT_RULE and use the syntax from https://docs.traefik.io/providers/rancher/#defaultrule
  3. optionally (but strongly encouraged ) add TRAEFIK_ADMIN_DOMAIN env variable and set it to the domain you want to use for your dashboard like traefik.company.tld - you can access the dasboard undert https://traefik.company.tld/dashboard/ then ( trailing slash is mandatory )
  4. Be sure to migrate all your old .toml files for frontends/backends to the new routers/services syntax, see this reference

Hint: If you do not set TRAEFIK_ADMIN_DOMAIN, on every router the path /dashboard/ and /api/ will be matched to the dashboard .. crazy.

Configuration

To get an idea what you can configure using ENV var, see the listing below - the ENV variables should (hopefully) be self explanatory. In case they are not, check the configuration template where you can see where they are used and can look those up in the Traefik Documentation Be aware - even though the variables are named env_XXX in the traefik.toml.erb you use them as XXX in env - thats a tiller internal

For every variable you find in that listing like TRAEFIK_DOCKER_ENABLE, you add an en ENV variable to your image

docker run -e TRAEFIK_DOCKER_ENABLE=true eugenamyer/traefik
version: '3'

services:
  traefik:
    image: eugenmayer/traefik
    environment:
      TRAEFIK_DOCKER_ENABLE: 'true'

I guess you get the idea.

Configuration Features

  • TLS support
  • ACME dns-01 and http-01 support
  • Rancher support
  • Docker support (also remote swarm + tls)
  • File support
  • Metrics
  • Basic auth
  • Trusted IPs
  • Admin Backend / TLS
  • Combine several backends, e.g. Docker and File (the latter for your custom stuff / off docker things )

Build

make build

Configuration Options ( ENV vars)

Those are the avaiable env vars and their default. This should not replace the official Traefik Documentation. Use this as a starting point / what you can do with this configuration, read the docs in any way.

Endpoint HTTP

  • TRAEFIK_HTTP_PORT=8080 # http port > 1024 due to run as non privileged user
  • TRAEFIK_HTTP_COMPRESSION="true" # Enable http compression

Endpoint HTTPS /TLS

  • TRAEFIK_HTTPS_ENABLE="false" # "true" enables https and http endpoints. "Only" enables https endpoints and redirect http to https.
  • TRAEFIK_HTTPS_PORT=8443 # https port > 1024 due to run as non privileged user
  • TRAEFIK_HTTPS_MIN_TLS="VersionTLS12" # Minimal allowed tls version to accept connections from
  • TRAEFIK_HTTPS_COMPRESSION="true" # Enable https compression

Admin / Dashboard / API

Your admin dashboard will be accessible on either the http or the https enpoint, so http(s)://localhosts/dashboard/

  • TRAEFIK_ADMIN_ENABLE="false" # "true" enables api, rest, ping and dashboard
  • TRAEFIK_ADMIN_DOMAIN="traefik.company.tld # If you do not set TRAEFIK_ADMIN_DOMAIN, on every router the path /dashboard/ and /api/ will be matched to the dashboard .. crazy.
  • TRAEFIK_ADMIN_SSL=true # "true" enables https on /dashboard/, so https://localhosts/dashboard/
  • TRAEFIK_ADMIN_SSL_KEY_FILE="/mnt/certs/ssl.key" # Default admin backend key file - cert will be auto-generated. Use /mnt/certs/custom.key and put it on the volume to have your own
  • TRAEFIK_ADMIN_SSL_CRT_FILE="/mnt/certs/ssl.cert" # Default admin backend crt file - cert will be auto-generated. Use /mnt/certs/custom.cert and put it on the volume to have your own
  • TRAEFIK_ADMIN_AUTH_METHOD="basic" # Auth method to use on api, rest, ping and webui. basic | digest
  • TRAEFIK_ADMIN_AUTH_USERS="" # Basic or digest users created with htpasswd or htdigest.
  • TRAEFIK_ADMIN_GENERATE_RULE="false" # true by default, disables automatic rule generate if admin endpoint is enabled

ACME

For configuring your endpoints with SSL Certificates, ACME is one of the power features of Traefik The name of the resolve will be default - so this is what you will need to set your router to using routers.myroouter.tls.certresolver: default

  • TRAEFIK_ACME_ENABLE="false" # Enable/disable traefik ACME feature. acme - the resolver will be named default
  • TRAEFIK_ACME_CHALLENGE="http" # Set http | dns to activate traefik acme challenge mode.
  • TRAEFIK_ACME_CHALLENGE_HTTP_ENTRYPOINT="http" # Set traefik acme http challenge entrypoint. acme http challenge
  • TRAEFIK_ACME_CHALLENGE_DNS_PROVIDER="" # Set traefik acme dns challenge provider. You need to manually add configuration env variables accordingly the dns provider you use. acme dns provider
  • TRAEFIK_ACME_CHALLENGE_DNS_CREDENTIALS="" # Set you credentials needed for your DNS provider. Use a key1=value1;key2=value2 syntax, e.g. for Cloudflare CF_DNS_API_TOKEN=<token> - see the traefik documentation for the avaiable keys
  • TRAEFIK_ACME_CHALLENGE_DNS_DELAY="" # Set traefik acme dns challenge delayBeforeCheck. acme dns challenge
  • TRAEFIK_ACME_EMAIL="test@traefik.io" # Default email
  • TRAEFIK_ACME_CASERVER="https://acme-v02.api.letsencrypt.org/directory" # ACME caServer parameter
  • TRAEFIK_ACME_DNS_RESOLVERS="1.1.1.1:53,8.8.8.8:53" # add custom DNS servers for resolving DNS SOA request ("1.1.1.1:53,8.8.8.8:53" by default)
  • TRAEFIK_ACME_DISABLE_PROPAGATION_CHECK if set to true, disable propagation check for DNS01 challenges (false by default)

Provider: File backend

  • TRAEFIK_FILE_ENABLE="false" # Enable/disable file backend - this is mostly enabled anyway to offer https redirects, dashboard on such features
  • TRAEFIK_FILE_FOLDER="/mnt/filestorage" # where your custom rules will be located. Keep that path its a volume, create /mnt/filestorage/frontend1.toml .. /mnt/filestorage/frontend2.toml for reach of your frontend/backend combinations inside that folder. Its watched automatically

Provider: Kubernetes

Provider: Docker

  • TRAEFIK_DOCKER_ENABLE="false" # use true to enable the docker provider
  • TRAEFIK_DOCKER_ENDPOINT="unix:///var/run/docker.sock" # how to access your docker engine - mount this socket or define a tcp:// based connection
  • TRAEFIK_DOCKER_DEFAULT_RULE="Host({{ normalize .Name }})" # the default domain to generate frontends for
  • TRAEFIK_DOCKER_EXPOSEDBYDEFAULT="true" # should all docker-containers in the engine be parsed by their exposed ports see docs
  • TRAEFIK_DOCKER_SWARMMODE="false" # use tcp:// for accessing a swarm cluster. If you set this, put your TLS creds under /mnt/certs/docker.ca.crt, /mnt/certs/docker.crt, /mnt/certs/docker.ca.key
  • TRAEFIK_DOCKER_SKIP_VERIFY="false" # when set, the connection to the upstream swarm cluster is not verified ( TLS )
  • TRAEFIK_CONSTRAINTS="" # Traefik constraint param. EG: \"tag==api\" - see https://docs.traefik.io/configuration/commons/#constraints

Metrics

  • TRAEFIK_METRICS_STATISTICS=10 # Enable more detailed statistics
  • TRAEFIK_METRICS_ENABLE="false" # Enable/disable traefik metrics
  • TRAEFIK_METRICS_EXPORTER="" # Metrics exporter prometheus | datadog | statsd | influxdb
  • TRAEFIK_METRICS_PUSH="10" # Metrics exporter push interval (s). datadog | statsd | influxdb
  • TRAEFIK_METRICS_ADDRESS="" # Metrics exporter address. datadog | statsd | influxdb
  • TRAEFIK_METRICS_PROMETHEUS_BUCKETS="[0.1,0.3,1.2,5.0]" # Metrics buckets for prometheus

Examples

Docker Provider

docker-compose -f docker-compose.yml up

wget http://web1.docker-image-traefik.docker.lan
wget http://web2.docker-image-traefik.docker.lan

ACME DNS-01 for SSL with Lets Encrypt

Please set your TRAEFIK_ACME_CHALLENGE_DNS_PROVIDER and TRAEFIK_ACME_CHALLENGE_DNS_CREDENTIALS in .env and then run

You .env file should like like this, for other provider see the documentation

YOUR_DOMAIN=company.com
TRAEFIK_ACME_CHALLENGE_DNS_PROVIDER=cloudflare
TRAEFIK_ACME_CHALLENGE_DNS_CREDENTIALS=CF_DNS_API_TOKEN=token123

Then start the stack and wait for about 3 minutes for all certificates to get installed

docker-compose -f docker-compose-acme-dns.yml up


wget https://web1-docker-image-traefik.company.com
wget https://web2-docker-image-traefik.company.com
wget https://foo.company.com

Contributions / Development

Glad to merge what makes sense anytime!

To develop new stuff: if you need more conifugration or you find something missing, please just create a PR while adding

  • the section the template
  • adding the variable and the default value in the listing here
  • and add it to the README.md under Configuration

Start the container in dev mode:

docker-compose up
# connect to the container
docker compose exec traefik bash

# no modify whatever you need in tiller/templates/traefik.toml.erb or tiller/common.yaml locally, its mounted into the container
# add your new ENV var with _env on the fly
export TRAEFIK_YOURSTUFF_ENABLE=true
# then run this to regenerate the configuration
tiller -v -d
# check the result in /etc/traefik/traefik.toml
cat /etc/traefik/traefik.toml

Credits

Obviously most of the credits go to Traefik - cheer them up. And Once again to tiller for dealing with the configuration template.