Browse Source

traefik dengan ssh

  1. 1
  2. 162
  3. 2
  4. 37
  5. 32
  6. 23


@ -0,0 +1 @@


@ -0,0 +1,162 @@
<p align="center">
<img src="docs/content/assets/img/traefik.logo.png" alt="Traefik" title="Traefik" />
[![Build Status SemaphoreCI](](
[![Go Report Card](](
[![Join the community support forum at](](
Traefik (pronounced _traffic_) is a modern HTTP reverse proxy and load balancer that makes deploying microservices easy.
Traefik integrates with your existing infrastructure components ([Docker](, [Swarm mode](, [Kubernetes](, [Marathon](, [Consul](, [Etcd](, [Rancher](, [Amazon ECS](, ...) and configures itself automatically and dynamically.
Pointing Traefik at your orchestrator should be the _only_ configuration step you need.
. **[Overview](#overview)** .
**[Features](#features)** .
**[Supported backends](#supported-backends)** .
**[Quickstart](#quickstart)** .
**[Web UI](#web-ui)** .
**[Documentation](#documentation)** .
. **[Support](#support)** .
**[Release cycle](#release-cycle)** .
**[Contributing](#contributing)** .
**[Maintainers](#maintainers)** .
**[Credits](#credits)** .
:warning: Please be aware that the old configurations for Traefik v1.x are NOT compatible with the v2.x config as of now. If you're running v2, please ensure you are using a [v2 configuration](
## Overview
Imagine that you have deployed a bunch of microservices with the help of an orchestrator (like Swarm or Kubernetes) or a service registry (like etcd or consul).
Now you want users to access these microservices, and you need a reverse proxy.
Traditional reverse-proxies require that you configure _each_ route that will connect paths and subdomains to _each_ microservice.
In an environment where you add, remove, kill, upgrade, or scale your services _many_ times a day, the task of keeping the routes up to date becomes tedious.
**This is when Traefik can help you!**
Traefik listens to your service registry/orchestrator API and instantly generates the routes so your microservices are connected to the outside world -- without further intervention from your part.
**Run Traefik and let it do the work for you!**
_(But if you'd rather configure some of your routes manually, Traefik supports that too!)_
## Features
- Continuously updates its configuration (No restarts!)
- Supports multiple load balancing algorithms
- Provides HTTPS to your microservices by leveraging [Let's Encrypt]( (wildcard certificates support)
- Circuit breakers, retry
- See the magic through its clean web UI
- Websocket, HTTP/2, GRPC ready
- Provides metrics (Rest, Prometheus, Datadog, Statsd, InfluxDB)
- Keeps access logs (JSON, CLF)
- Fast
- Exposes a Rest API
- Packaged as a single binary file (made with :heart: with go) and available as a [tiny]( [official]( docker image
## Supported Backends
- [Docker]( / [Swarm mode](
- [Kubernetes](
- [Marathon](
- [Rancher]( (Metadata)
- [File](
## Quickstart
To get your hands on Traefik, you can use the [5-Minute Quickstart]( in our documentation (you will need Docker).
## Web UI
You can access the simple HTML frontend of Traefik.
![Web UI Providers](docs/content/assets/img/webui-dashboard.png)
## Documentation
You can find the complete documentation of Traefik v2 at [](
If you are using Traefik v1, you can find the complete documentation at [](
A collection of contributions around Traefik can be found at [](
## Support
To get community support, you can:
- join the Traefik community forum: [![Join the chat at](](
If you need commercial support, please contact []( by mail: <>.
## Download
- Grab the latest binary from the [releases]( page and run it with the [sample configuration file](
./traefik --configFile=traefik.toml
- Or use the official tiny Docker image and run it with the [sample configuration file](
docker run -d -p 8080:8080 -p 80:80 -v $PWD/traefik.toml:/etc/traefik/traefik.toml traefik
- Or get the sources:
git clone
## Introductory Videos
You can find high level and deep dive videos on [](
## Maintainers
We are strongly promoting a philosophy of openness and sharing, and firmly standing against the elitist closed approach. Being part of the core team should be accessible to anyone who is motivated and want to be part of that journey!
This [document](docs/content/contributing/ describes how to be part of the core team as well as various responsibilities and guidelines for Traefik maintainers.
You can also find more information on our process to review pull requests and manage issues [in this document](docs/content/contributing/
## Contributing
If you'd like to contribute to the project, refer to the [contributing documentation](
Please note that this project is released with a [Contributor Code of Conduct](
By participating in this project, you agree to abide by its terms.
## Release Cycle
- We usually release 3/4 new versions (e.g. 1.1.0, 1.2.0, 1.3.0) per year.
- Release Candidates are available before the release (e.g. 1.1.0-rc1, 1.1.0-rc2, 1.1.0-rc3, 1.1.0-rc4, before 1.1.0).
- Bug-fixes (e.g. 1.1.1, 1.1.2, 1.2.1, 1.2.3) are released as needed (no additional features are delivered in those versions, bug-fixes only).
Each version is supported until the next one is released (e.g. 1.1.x will be supported until 1.2.0 is out).
We use [Semantic Versioning](
## Mailing Lists
- General announcements, new releases: mail at or on [the online viewer](!forum/news).
- Security announcements: mail at or on [the online viewer](!forum/security).
## Credits
Kudos to [Peka]( for his awesome work on the gopher's logo!.
The gopher's logo of Traefik is licensed under the Creative Commons 3.0 Attributions license.
The gopher's logo of Traefik was inspired by the gopher stickers made by [Takuya Ueda](
The original Go gopher was designed by [Renee French](


@ -0,0 +1,2 @@
touch acme.json && chmod 600 acme.json


@ -0,0 +1,37 @@
version: "3"
# The official v2 Traefik docker image
image: traefik:v2.5
container_name: traefik
# Enables the web UI and tells Traefik to listen to docker
# command: --api.insecure=true --providers.docker
- --configFile=/etc/traefik.yml
- --entrypoints.ssh.address=:22
restart: always
# The HTTP port
- "80:80"
# The TSL port
- "443:443"
# The Web UI (enabled by --api.insecure=true)
- "8080:8080"
# - "22:22"
# So that Traefik can listen to the Docker events
- /var/run/docker.sock:/var/run/docker.sock
# Access to docker is disabled, we use file provider, no docker provider
# - ./config/:/config/:ro
# - ./traefik.yml:/etc/traefik.yml:ro
# - ./traefik_letsencrypt/:/etc/traefik_letsencrypt/
- $PWD/traefik.toml:/traefik.toml
- $PWD/traefik_dynamic.toml:/traefik_dynamic.toml
- $PWD/acme.json:/acme.json
- web
external: true


@ -0,0 +1,32 @@
address = ":80"
to = "websecure"
scheme = "https"
address = ":443"
# [entryPoints.ssh]
# address = ":22"
dashboard = true
email = ""
storage = "acme.json"
watch = true
network = "web"
filename = "traefik_dynamic.toml"
buckets = [0.1,0.3,1.2,5.0]
addEntryPointsLabels = true
addRoutersLabels = true
addServicesLabels = true


@ -0,0 +1,23 @@
users = [
rule = "Host(``)"
entrypoints = ["websecure"]
middlewares = ["simpleAuth"]
service = "api@internal"
certResolver = "lets-encrypt"
# [tcp.routers]
# [tcp.routers.ssh]
# entryPoints = ["ssh"]
# rule = "HostSNI(``)" # <~~ this one will terminal any ssh request from putty
# service = "ssh"
# []
# []
# [[]]
# address = ""