whoami
traefik
whoami | traefik | |
---|---|---|
10 | 184 | |
923 | 47,814 | |
2.5% | 0.8% | |
4.8 | 9.4 | |
5 months ago | 7 days ago | |
Go | Go | |
Apache License 2.0 | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
whoami
-
Analyzing HTTPS traffic between traefik and services
What do you want to see? If it's about the request and the headers, you could run a whoami service as target to see the headers.
-
Authentik Plex SSO
Testing the expression in the linked GH issue it definitely works when using a whoami type backend (https://github.com/traefik/whoami) which just shows all the headers that are being sent.
-
AWS Lightsail Container Services with Reverse Proxy
An app called whoami. This is a dead simple go app that spits back header and IP information.
-
What's the best beginners guide to self hosting Nextcloud?
Example ``` FROM golang:1-alpine as builder
-
Forwarding real IP when running as a container
Use whoami to check yourself.
-
Unable to attach services to traefik with docker swarm
Launch a simple test container with the labels to see if traefik picks it up and routes according to the domain.
-
UDM NAT/Port-Forward not showing source IP
Unfortunately still doesn't work, even bypassing NGINX and just using a simple whoami go web server (https://github.com/traefik/whoami) directly running on linux (no docker) it's still reporting the RemoteAddr as 192.168.100.1:52061, this should be the IP address of the client.
-
trying to get traefik to work.
version: '3.9' services: traefik: image: traefik:v2.6 command: - --providers.docker - --entrypoints.web.address=:80 - --entrypoints.websecure.address=:443 ports: - "80:80" - "443:443" volumes: - /var/run/docker.sock:/var/run/docker.sock whoami: image: traefik/whoami # https://github.com/traefik/whoami command: -name whoami labels: traefik.http.routers.whoami.rule: Host(`whoami.localhost`)
-
Basic Traefik configuration tutorial
version: "3.7" services: traefik: image: traefik:v2.6 command: # Entrypoints configuration - --entrypoints.web.address=:80 # Docker provider configuration - --providers.docker=true # Makes sure that services have to explicitly direct Traefik to expose them - --providers.docker.exposedbydefault=false # Use the secure docker socket proxy - --providers.docker.endpoint=tcp://socket_proxy:2375 # Default docker network to use for connections to all containers - --providers.docker.network=traefik_public # Logging levels are DEBUG, PANIC, FATAL, ERROR, WARN, and INFO. - --log.level=info ports: - 80:80 networks: - traefik_public - socket_proxy restart: unless-stopped depends_on: - socket_proxy # https://github.com/traefik/whoami whoami: image: traefik/whoami:v1.7.1 labels: # Explicitly instruct Traefik to expose this service - traefik.enable=true # Router configuration ## Listen to the `web` entrypoint - traefik.http.routers.whoami_route.entrypoints=web ## Rule based on the Host of the request - traefik.http.routers.whoami_route.rule=Host(`whoami.karvounis.tutorial`) - traefik.http.routers.whoami_route.service=whoami_service # Service configuration ## 80 is the port that the whoami container is listening to - traefik.http.services.whoami_service.loadbalancer.server.port=80 networks: - traefik_public # https://github.com/Tecnativa/docker-socket-proxy # Security-enhanced proxy for the Docker Socket socket_proxy: image: tecnativa/docker-socket-proxy:latest restart: unless-stopped environment: NETWORKS: 1 SERVICES: 1 CONTAINERS: 1 TASKS: 1 volumes: - /var/run/docker.sock:/var/run/docker.sock:ro networks: - socket_proxy networks: traefik_public: external: true socket_proxy: external: true
-
How to Bake A Python Package Cake🐍+📦=🎂
Pywhoami is inspired by the whoami Go server by Traefik Labs. Send a request to one of the endpoints to get back details from your HTTP request. With pywhoami you can help answer questions like, what headers were added to my original request by a proxy server.
traefik
- Traefik Proxy v3.0.0 Released
-
How to securely reverse-proxy ASP.NET Core web apps
However, it's very unlikely that .NET developers will directly expose their Kestrel-based web apps to the internet. Typically, we use other popular web servers like Nginx, Traefik, and Caddy to act as a reverse-proxy in front of Kestrel for various reasons:
-
Deploying Web Apps with Caddy: A Beginner's Guide Caddy
Not as good though. Case in point: https://github.com/traefik/traefik/issues/5472#issuecomment-... (that's just from this morning)
I'm speak objectively here. Of course, any built-in auto HTTPS that works (more or less) is better than none. Traefik uses an ACME library that was originally written for Caddy. After the original author left that project, Traefik team started maintaining it. Caddy's users' requirements exceeded what the library was capable of, but unfortunately there was friction in getting it to achieve our requirements. So I ended up writing a new ACME client library in Go and, together with upgrades in CertMagic (Caddy's auto-TLS lib), Caddy has the more flexible, robust, and capable auto-HTTPS functionality.
That is to say, not all auto-HTTPS functionalities are the same.
-
Security Workshop Part 1 - Put up a gate
We'll use Traefik, an open source cloud native gateway that can plug into a Kubernetes cluster. It has the concept of "middleware" that can process API requests before passing them through to a backend. We can configuring a rate limit for all of our API endpoints by matching on the request path:
-
Install plugin in k8s cluster running in Kind
I did the same question here and here
- The Tailscale Universal Docker Mod
-
Set Default Config in traefik.toml and overwrite with specific container config
Sadly there is currently no way of doing so. https://github.com/traefik/traefik/issues/6999
- Istio moved to CNCF Graduation stage
-
Docker Services question
Traefik is another widely used system that has automatic configuration and offers support for more things like swarm/kubernetes/etc.
-
nginx alternatives
I have a webapp which I currently have deployed by running nginx in a container. Works as it should, however I am intersted in adding more observability to the webapp and found this reverse-proxy https://github.com/traefik/traefik which seems to expose some nice metrics which can be useful for observability.
What are some alternatives?
traefik-tutorial-docker-compose-files
Nginx Proxy Manager - Docker container for managing Nginx proxy hosts with a simple, powerful interface
docker-socket-proxy - Proxy over your Docker socket to restrict which requests it accepts
Caddy - Fast and extensible multi-platform HTTP/1-2-3 web server with automatic HTTPS
make-my-server - Docker Compose with Traefik and lots of services
ingress-nginx - Ingress-NGINX Controller for Kubernetes
sampleproject - A sample project that exists for PyPUG's "Tutorial on Packaging and Distributing Projects"
Squid - Squid Web Proxy Cache
pywhoami - A Simple HTTP Request Analysis Server
envoy - Cloud-native high-performance edge/middle/service proxy
maisonneux - Personal collection of stacks for a home server
socks5-proxy-server - SOCKS5 proxy server