DevOps Enterprise Transformation: Easy Routing for Your Applications

Damien DUPORTAL:
Træfik's Developer 🥑 Advocate @ Containous

We Believe in Open Source
We Deliver Traefik and Traefik Enterprise Edition
Commercial Support
30 people distributed, 90% tech


Why, Mr Anderson?




















That You Don’t Have to Write This Configuration File…?

MIT License
Written in Go
24,000+ ⭐ 1B+ ⬇️ 400+ 👷
Created in 2015, 4Y 🎂
Current stable branch: v2.0
Single Binary
Docker Image
Runs nearly everywhere, VM’s, Cloud, Hybrid…
Revamped Documentation
Clarified Concepts
Expressive Routing Rule Syntax
Middlewares
TCP Support
Canary / Mirroring
And so Much More…

…sits at the edge of your infra, and dynamically discovers services:



version: '3'
services:
reverse-proxy:
image: traefik:v2.0
command: --providers.docker.endpoint="tcp://proxy-docker.svc.local:2376"
ports:
- "80:80"
corporate-webapp:
image: company/corporate-webapp:1.2.3
labels:
- "traefik.http.routers.webapp.rule=Host(`company.com`)"
admin-webapp:
image: company/admin-webapp:15.2.2
labels:
- "traefik.http.routers.admin-webapp.rule=Host(`company.com`) && PathPrefix(`/admin`)"
- "traefik.http.routers.admin-webapp.service=admin-svc"
- "traefik.http.services.admin-svc.LoadBalancer.server.Port=9999"
apiVersion: networking.k8s.io/v1beta1
kind: Ingress
metadata:
name: corporate-webapp
annotations:
kubernetes.io/ingress.class: 'traefik'
spec:
rules:
- host: localhost
http:
paths:
- backend:
serviceName: corporate-webapp
servicePort: 80

# File "webapp.yaml"
apiVersion: traefik.containo.us/v1alpha1
kind: IngressRoute
metadata:
name: simpleingressroute
spec:
entryPoints:
- web
routes:
- match: Host(`localhost`) && PathPrefix(`/whoami`)
kind: Rule
services:
- name: webapp
port: 80
$ kubectl apply -f webapp.yaml
$ kubectl get ingressrouteapiVersion: traefik.containo.us/v1alpha1
kind: IngressRouteTCP
metadata:
name: ingressroutetcpmongo.crd
spec:
entryPoints:
- mongotcp
routes:
- match: HostSNI(`mongo-prod`)
services:
- name: mongo-prod
port: 27017
Menu:
Install Traefik v2 in Kubernetes cluster
Deploy and expose an HTTP application
Deploy and expose a TCP application
🛠 Custom Resource Definitions
👮 Configure RBAC
To allow watching the Kubernetes API
📦 Install Traefik as a Deployment
🚪 Expose and 📣 publish Traefik with the right Service type
LoadBalancer, NodePort?
✅ Configure Traefik and its features
📦 Install the web application as a Deployment
🚪 Expose the web application with a Service of type ClusterIP
Internal access only
📣 Publish the web application with an IngressRoute
Example with MongoDB:
📦 Install MongoDB as a Deployment
🚪 Expose MongoDB with a Service of type ClusterIP
Internal access only
📣 Publish MongoDB with an IngressRouteTCP
KV Store
UDP
Canary and Mirroring With K8s CRD
And More…



Install it:
# Cluster Installation
traefikeectl install \
--licensekey="SuperSecretLicence" \
--dashboard \
--kubernetes # Or --swarm
Configure it:
# Routing Configuration, same as Traefik's
traefikeectl deploy \
--acme.email=ssl-admin@mycompany.org
--acme.tlsChallenge
...

Maesh is a lightweight, easy to configure, and non-invasive service mesh that allows visibility and management of the traffic flows inside any Kubernetes cluster.


Built on top of Traefik,
SMI (Service Mesh Interface specification) compliant,
Opt-in by default.
