Traefik is a HTTP reverse proxy and load balancer for microservices. It integrates with popular orchestration systems, such as Kubernetes, to provide seamless and automatic service discovery, load balancing, and proxying for your applications. Traefik is designed to be fast, efficient, and easy to use, making it a good solution for home lab environments. With Traefik, you can expose your applications to the internet with ease, providing remote access to your services from anywhere. Whether you're looking to host a personal website, run a web-based service, or simply provide external access to your applications.
traefik from helm.traefik is more popular with 27 repositories.
Install with:
helm repo add traefik https://traefik.github.io/charts/
helm install traefik traefik/traefik -f values.yaml
See examples from other people.
Name | Repo | Stars | Version | Timestamp |
---|---|---|---|---|
traefik | pascaliske/infrastructure | 66 | 33.1.0 | 4 days ago |
See the most popular values for this chart:
Key | Types |
---|---|
additionalArguments[] (5) - --providers.kubernetescrd.allowexternalnameservices=true | string |
boolean | |
string | |
string | |
string | |
string | |
number | |
boolean | |
deployment.kind (2) Deployment | string |
number | |
boolean | |
boolean | |
boolean | |
boolean | |
providers.kubernetesCRD.ingressClass (1) traefik-external | string |
boolean | |
boolean | |
boolean | |
boolean | |
boolean | |
boolean | |
string | |
service.spec.loadBalancerIP (2) ${TRAEFIK_EXTERNAL_IP} | string |
service.type (4) LoadBalancer | string |
service.annotations."external-dns.alpha.kubernetes.io/hostname" (2) external.${SECRET_DOMAIN_DIVING}, external.${SECRET_DOMAIN_WIFE} | string |
service.annotations."lbipam.cilium.io/ips" (2) ${EXTERNAL_TRAEFIK_VIP_GATEWAY} | string |
service.ipFamilyPolicy (1) PreferDualStack | string |
tlsOptions.default.minVersion (4) VersionTLS12 | string |
boolean | |
tlsOptions.default.maxVersion (3) VersionTLS13 | string |
tlsStore.default.defaultCertificate.secretName (4) ${SECRET_DOMAIN_DIVING/./-}-production-tls | string |
boolean | |
gateway.listeners.websecure.mode (3) Passthrough | string |
number | |
string | |
string | |
gateway.listeners.websecure.certificateRefs[].name (1) ${PUBLIC_DOMAIN0/./-}-production-tls | string |
gateway.listeners.websecure.hostname (1) ${PUBLIC_DOMAIN0} | string |
string | |
number | |
string | |
gateway.name (2) traefik-gateway | string |
gateway.namespace (2) network | string |
globalArguments[] (3) - --global.sendanonymoususage=false | string |
boolean | |
boolean | |
boolean | |
boolean | |
string | |
string | |
string | |
metrics.prometheus.serviceMonitor.metricRelabelings[].regex (1) ^fluentd_output_status_buffer_(oldest|newest)_.+ | string |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
metrics.prometheus.serviceMonitor.relabelings[].sourceLabels[] (1) - __meta_kubernetes_pod_node_name | string |
string | |
string | |
boolean | |
string | |
string | |
metrics.prometheus.prometheusRule.rules[].annotations.description (1) {{ $labels.pod }} on {{ $labels.nodename }} is down | string |
string | |
metrics.prometheus.prometheusRule.rules[].expr (1) up{job="traefik"} == 0 | string |
string | |
string | |
string | |
boolean | |
boolean | |
ports.web.redirectTo.port (3) websecure | string |
number | |
boolean | |
number | |
number | |
string | |
number | |
boolean | |
string | |
boolean | |
boolean | |
ports.websecure.forwardedHeaders.trustedIPs[] (1) - "173.245.48.0/20" | string |
boolean | |
number | |
string | |
ports.websecure.proxyProtocol.trustedIPs[] (1) - "173.245.48.0/20" | string |
boolean | |
number | |
number | |
number | |
boolean | |
boolean | |
number | |
string | |
boolean | |
number | |
number | |
string | |
boolean | |
number | |
number | |
rbac.enabled (3) true | boolean |
string | |
env[].value (2) America/Chicago | string |
boolean | |
boolean | |
gatewayClass.name (2) traefik | string |
image.repository (2) docker/library/traefik | string |
image.tag (2) 2.11.0 | string |
image.registry (1) public.ecr.aws | string |
boolean | |
boolean | |
string | |
string | |
string | |
string | |
string | |
dnsPolicy (1) ClusterFirst | string |
instanceLabelOverride (1) traefik | string |
pilot.enabled (1) false | boolean |
tolerations[].effect (1) NoSchedule | string |
tolerations[].key (1) node-role.kubernetes.io/control-plane | string |
tolerations[].operator (1) Exists | string |
tolerations[].value (1) public | string |