Traefik Alternatives
-
go
The Go programming language
-
Moby
Moby Project - a collaborative project for the container ecosystem to assemble container-based systems
-
Scout
Get performance insights in less than 4 minutes. Scout APM uses tracing logic that ties bottlenecks to source code so you know the exact line of code causing performance issues and can get back to building a great product faster.
-
Protobuf
Protocol Buffers - Google's data interchange format
-
gRPC
The C based gRPC (C++, Python, Ruby, Objective-C, PHP, C#)
-
terraform
Terraform enables you to safely and predictably create, change, and improve infrastructure. It is an open source tool that codifies APIs into declarative configuration files that can be shared amongst team members, treated as code, edited, reviewed, and versioned.
-
lighthouse
Automated auditing, performance metrics, and best practices for the web.
-
ingress-nginx
NGINX Ingress Controller for Kubernetes
-
bocker
Docker implemented in around 100 lines of bash
-
goprotobuf
Go support for Google's protocol buffers (by golang)
-
pgx
PostgreSQL driver and toolkit for Go
-
yaegi
Yaegi is Another Elegant Go Interpreter
-
trillian
A transparent, highly scalable and cryptographically verifiable data store.
-
immudb
immudb - world’s fastest immutable database
-
gatekeeper
Gatekeeper - Policy Controller for Kubernetes
-
docker-socket-proxy
Proxy over your Docker socket to restrict which requests it accepts
-
kubernetes-ingress
HAProxy ingress controller for K8s (by haproxytech)
-
awesome-container-security
Awesome list of resources related to container security
-
vcn
vChain CodeNotary
-
stellar_testing
Testing Stellar cryptocurrency.
-
container-security
Posts
-
Traefik and Boreale for auth in Docker. Help needed.
Hi, just trying to set up Boreale with Traffik, for auth.
- Which ingress-controller do you use?
-
The State of Go Plugins
Terraform, Protocol Buffers, Waypoint or Traefik have build a flourishing ecosystem by using the Go programming language and providing pluggable interfaces. But, not all pluggable interfaces in Go are created equal. There is more than one solution to the problem.
-
Threat Actors Now Target Docker via Container Escape Features
https://docs.docker.com/engine/swarm/how-swarm-mode-works/pk... :
> Run docker swarm ca --rotate to generate a new CA certificate and key. If you prefer, you can pass the --ca-cert and --external-ca flags to specify the root certificate and to use a root CA external to the swarm. Alternately, you can pass the --ca-cert and --ca-key flags to specify the exact certificate and key you would like the swarm to use.
Docker ("moby") and podman v3 socket security could be improved:
> From "ENH,SEC: Create additional sockets with limited permissions" [moby/moby#38879](https://github.com/moby/moby/issues/38879) ::
> > An example use case: securing the Traefik docker driver:
> > "Docker integration: Exposing Docker socket to Traefik container is a serious security risk" https://github.com/traefik/traefik/issues/4174#issuecomment-...
> > > It seems it only require (read) operations : ServerVersion, ContainerList, ContainerInspect, ServiceList, NetworkList, TaskList & Events.
> > https://github.com/liquidat/ansible-role-traefik
> > > This role does exactly that: it launches two containers, a traefik one and another to securely provide limited access to the docker socket. It also provides the necessary configuration.
> > https://github.com/Tecnativa/docker-socket-proxy/issues/13
-
How I put my demo into production with Docker compose and Traefik
I would have thought my docker-compose.yml file to be an ordinary one, but I must admit that I had some trouble creating it and especially the stuff involving Traefik was a challenge. It seems to me that configuring Traefik has evolved a bit and this must be considered when looking at examples. I chose to set up redirection from port 80->443 and connecting middleware for compression to the frontend. This seems to be considered best practice for frontends. At least Lighthouse gives you credit for implementing these things.
-
Free timestamping service for developers built on open source
and to keep all DoS free and avoid misuse, there is traefik in front:https://github.com/traefik/traefik
-
Top Considerations when Evaluating an Ingress Controller for Kubernetes
This week we were hit by https://github.com/traefik/traefik/issues/3376. My options here are fuck with the acme.json or drop the built in let’s encrypt support for cert-manager. Or drop Traefik.
- Add Query string to URL
Stats
traefik/traefik is an open source project licensed under MIT License which is an OSI approved license.