Traefik is an excellent reverse proxy tool. Compared with Nginx, Traefik offers the following advantages:
This document introduces how to install Traefik in a TKE cluster and provides use cases for Ingress and IngressRoute via Traefik.
This document describes the installation of Traefik in a TKE cluster as an example. For the detailed installation method, see the official documentation.
Run the following command to add the Helm chart repo source of Traefik. See the sample below:
helm repo add traefik https://helm.traefik.io/traefik
Prepare the installation configuration file
values-traefik.yaml. See the sample below:
providers: kubernetesIngress: publishedService: enabled: true # Display the external IP address of Ingress as the LB IP address of Traefik. additionalArguments: - "--providers.kubernetesingress.ingressclass=traefik" # Indicates the ingress class name. - "--log.level=DEBUG" service: annotations: service.cloud.tencent.com/direct-access: "true" # For gateway applications, we recommend that you use direct connection between the LB and pods (bypassing NodePort). If you use the VPC-CNI and Global Router network modes at the same time, use this annotation to display the declaration of direct binding of the LB to pods (bypassing NodePort). If you selected the VPC-CNI network mode during cluster creation, the declaration need not be displayed (because, by default, the LB is directly connected to pods). For more information, see the official documentation at https://intl.cloud.tencent.com/document/product/457/38408. service.kubernetes.io/tke-existed-lbid: lb-lb57hvgl # Use this annotation to bind the LB created in advance, so that even if Traefik is rebuilt in the future, the traffic entry will remain unchanged. If you do not specify this annotation, a new LB will be automatically created by default. For more information, see the official documentation at https://intl.cloud.tencent.com/document/product/457/36835. ports: web: expose: true exposedPort: 80 # HTTP port number that is externally exposed. To use a standard port number in the Chinese mainland, ICP filing is required. websecure: expose: true exposedPort: 443 # HTTPS port number that is externally exposed. To use a standard port number in the Chinese mainland, ICP filing is required. deployment: enabled: true replicas: 1 podAnnotations: tke.cloud.tencent.com/networks: "tke-route-eni" # When VPC-CNI and Global Router network modes are used at the same time, display a statement to indicate the ENI to be used by pods. This should be used together with the request and limit of eni-ip below. resources: requests: tke.cloud.tencent.com/eni-ip: "1" limits: tke.cloud.tencent.com/eni-ip: "1"
To view the full default configuration, run
helm show values traefik/traefik.
Run the following command to install Traefik to your TKE cluster. See the sample below:
kubectl create ns ingress helm upgrade --install traefik -f values-traefik.yaml traefik/traefik
Run the following command to obtain the IP address of the traffic entry (for example, EXTERNAL-IP as shown below). See the sample below:
$ kubectl get service -n ingress NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE traefik LoadBalancer 172.22.252.242 18.104.22.168 80:31650/TCP,443:32288/TCP 42h
Traefik allows you to use the Ingress resources of Kubernetes as a dynamic configuration. You can directly create Ingress resources in your cluster and use them to externally open your cluster. You need to add the specified Ingress class (defined during Traefik installation). See the sample below:
apiVersion: networking.k8s.io/v1beta1 kind: Ingress metadata: name: test-ingress annotations: kubernetes.io/ingress.class: traefik # Indicates the ingress class name. spec: rules: - host: traefik.demo.com http: paths: - path: /test backend: serviceName: nginx servicePort: 80
At present, TKE does not display Traefik as a product, so you cannot use the TKE console to create an Ingress in a visualized manner. Instead, you need to use YAML to create the Ingress.
Traefik not only supports standard Kubernetes Ingress resources but also supports the unique CRD resources of Traefik, such as IngressRoute. It can support more advanced features that an Ingress does not provide. See the IngressRoute usage example below:
apiVersion: traefik.containo.us/v1alpha1 kind: IngressRoute metadata: name: test-ingressroute spec: entryPoints: - web routes: - match: Host(`traefik.demo.com`) && PathPrefix(`/test`) kind: Rule services: - name: nginx port: 80
For more information on the usage of Traefik, see the Traefik Official Documentation.