Kubernetes - Traefik - 0 views
-
allow fine-grained control of Kubernetes resources and API.
- ...29 more annotations...
-
RoleBindings per namespace enable to restrict granted permissions to the very namespaces only that Traefik is watching over, thereby following the least-privileges principle.
-
DaemonSets can be run with the NET_BIND_SERVICE capability, which will allow it to bind to port 80/443/etc on each host. This will allow bypassing the kube-proxy, and reduce traffic hops.
-
The DaemonSet automatically scales to all nodes that meets a specific selector and guarantees to fill nodes one at a time.
-
If there are any errors while loading the TLS section of an ingress, the whole ingress will be skipped.
-
When specifying an ExternalName, Traefik will forward requests to the given host accordingly and use HTTPS when the Service port matches 443.
-
It is also possible to set the ingressClass option in Traefik to a particular value. Traefik will only process matching Ingress objects.
-
It is possible to split Ingress traffic in a fine-grained manner between multiple deployments using service weights.
-
use case is canary releases where a deployment representing a newer release is to receive an initially small but ever-increasing fraction of the requests over time.
-
Over time, the ratio may slowly shift towards the canary deployment until it is deemed to replace the previous main application, in steps such as 5%/95%, 10%/90%, 50%/50%, and finally 100%/0%.