You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: docs/configuration/backends/kubernetes.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -114,7 +114,7 @@ If the service port defined in the ingress spec is 443, then the backend communi
114
114
!!! note
115
115
Please note that by enabling TLS communication between traefik and your pods, you will have to have trusted certificates that have the proper trust chain and IP subject name.
116
116
If this is not an option, you may need to skip TLS certificate verification.
117
-
See the [InsecureSkipVerify](/configuration/commons/#main-section) setting for more details.
117
+
See the [insecureSkipVerify](/configuration/commons/#main-section) setting for more details.
Copy file name to clipboardexpand all lines: docs/configuration/commons.md
+13-13
Original file line number
Diff line number
Diff line change
@@ -38,29 +38,29 @@
38
38
# Optional
39
39
# Default: "2s"
40
40
#
41
-
#ProvidersThrottleDuration = "2s"
41
+
#providersThrottleDuration = "2s"
42
42
43
43
# Controls the maximum idle (keep-alive) connections to keep per-host.
44
44
#
45
45
# Optional
46
46
# Default: 200
47
47
#
48
-
#MaxIdleConnsPerHost = 200
48
+
#maxIdleConnsPerHost = 200
49
49
50
50
# If set to true invalid SSL certificates are accepted for backends.
51
51
# This disables detection of man-in-the-middle attacks so should only be used on secure backend networks.
52
52
#
53
53
# Optional
54
54
# Default: false
55
55
#
56
-
#InsecureSkipVerify = true
56
+
#insecureSkipVerify = true
57
57
58
-
# Register Certificates in the RootCA.
58
+
# Register Certificates in the rootCA.
59
59
#
60
60
# Optional
61
61
# Default: []
62
62
#
63
-
#RootCAs = [ "/mycert.cert" ]
63
+
#rootCAs = [ "/mycert.cert" ]
64
64
65
65
# Entrypoints to be used by frontends that do not specify any entrypoint.
66
66
# Each frontend can specify its own entrypoints.
@@ -76,19 +76,19 @@ Can be provided in a format supported by [time.ParseDuration](https://golang.org
76
76
If no units are provided, the value is parsed assuming seconds.
77
77
**Note:** in this time frame no new requests are accepted.
78
78
79
-
-`ProvidersThrottleDuration`: Backends throttle duration: minimum duration in seconds between 2 events from providers before applying a new configuration.
79
+
-`providersThrottleDuration`: Backends throttle duration: minimum duration in seconds between 2 events from providers before applying a new configuration.
80
80
It avoids unnecessary reloads if multiples events are sent in a short amount of time.
81
81
Can be provided in a format supported by [time.ParseDuration](https://golang.org/pkg/time/#ParseDuration) or as raw values (digits).
82
82
If no units are provided, the value is parsed assuming seconds.
83
83
84
-
-`MaxIdleConnsPerHost`: Controls the maximum idle (keep-alive) connections to keep per-host.
84
+
-`maxIdleConnsPerHost`: Controls the maximum idle (keep-alive) connections to keep per-host.
85
85
If zero, `DefaultMaxIdleConnsPerHost` from the Go standard library net/http module is used.
86
86
If you encounter 'too many open files' errors, you can either increase this value or change the `ulimit`.
87
87
88
-
-`InsecureSkipVerify` : If set to true invalid SSL certificates are accepted for backends.
88
+
-`insecureSkipVerify` : If set to true invalid SSL certificates are accepted for backends.
89
89
**Note:** This disables detection of man-in-the-middle attacks so should only be used on secure backend networks.
90
90
91
-
-`RootCAs`: Register Certificates in the RootCA. This certificates will be use for backends calls.
91
+
-`rootCAs`: Register Certificates in the RootCA. This certificates will be use for backends calls.
92
92
**Note** You can use file path or cert content directly
93
93
94
94
-`defaultEntryPoints`: Entrypoints to be used by frontends that do not specify any entrypoint.
@@ -386,24 +386,24 @@ If no units are provided, the value is parsed assuming seconds.
386
386
387
387
### Idle Timeout (deprecated)
388
388
389
-
Use [respondingTimeouts](/configuration/commons/#responding-timeouts) instead of `IdleTimeout`.
389
+
Use [respondingTimeouts](/configuration/commons/#responding-timeouts) instead of `idleTimeout`.
390
390
In the case both settings are configured, the deprecated option will be overwritten.
391
391
392
-
`IdleTimeout` is the maximum amount of time an idle (keep-alive) connection will remain idle before closing itself.
392
+
`idleTimeout` is the maximum amount of time an idle (keep-alive) connection will remain idle before closing itself.
393
393
This is set to enforce closing of stale client connections.
394
394
395
395
Can be provided in a format supported by [time.ParseDuration](https://golang.org/pkg/time/#ParseDuration) or as raw values (digits).
396
396
If no units are provided, the value is parsed assuming seconds.
0 commit comments