Advanced Search
Search Results
99 total results found
HTTP Middlewares Overview
HTTP Middlewares in Traefik let you modify requests and responses on the fly. You can configure them in multiple ways (Docker labels, TOML, YAML, etc.). Configuration Example in a docker-compose.yaml Configuration Example in a docker-compose.yaml # As a...
TCP Middlewares Overview
TCP Middlewares in Traefik let you manage connections on the fly. You can configure them in multiple ways (Docker labels, TOML, YAML, etc.). Configuration Example in a docker-compose.yaml Configuration Example in a docker-compose.yaml # As a Docker Labe...
Plugin Catalog
Plugin Catalog The Traefik Plugin Catalog is a centralized marketplace where community members can share their own custom middleware solutions for the Traefik Proxy. By leveraging this catalog, you can easily discover, install, and configure third-party plugi...
Docker-compose with Let's Encrypt: TLS Challenge
Introduction This guide provides information on how to set up a simple TLS-Challenge for Traefik to use Let's Encrypt and certify your domains/websites. We will configure Traefik to act as a reverse proxy for a simple "Whoami" application and secure the a...
Docker-compose with Let's Encrypt : HTTP Challenge
Introduction This guide provides information on how to set up a simple HTTP-Challenge for Traefik to use Let's Encrypt and certify your domains/websites. We will configure Traefik to act as a reverse proxy for a simple "Whoami" application and secure the ...
Docker-compose with Let's Encrypt: DNS Challenge & Cloudflare (Recommended)
Introduction This guide aims to demonstrate how to create a certificate with the Let's Encrypt DNS-01 Challenge to use HTTPS on a simple service exposed with Traefik. Why Use DNS-01 Challenge Instead of TLS? Using the DNS-01 Challenge instead of TLS-ALP...
Beginner-Guide: Traefik & Docker Standalone Engine
Step 1: Install Docker Before setting up Traefik, make sure Docker is installed on your system. You can follow My Dockerengine Guide for instructions on installing Docker Engine. Step 2: Setting Up Traefik Create a docker-compose.yml file to define th...
WG-Easy Step-by-Step Guide
Setting up WG-Easy to manage your WireGuard VPN server is a simple process that requires a few steps using Docker. In this guide, we'll walk through the steps to get WG-Easy up and running, including detailed configurations, environment variables, and port...
Bind mounts (persistant data into Container)
Bind Mounts When you use a bind mount, a file or directory on the host machine is mounted from the host into a container. By contrast, when you use a volume, a new directory is created within Docker's storage directory on the host machine, and Docker manage...
Overview - How does Docker Networks work?
Container networking refers to the ability for containers to connect to and communicate with each other, or to non-Docker workloads. Containers have networking enabled by default, and they can make outgoing connections. A container has no information about wh...
Step-by-Step Setup Guide for Databag with Traefik
This guide will walk you through the setup process of deploying Databag, a decentralized and lightweight messaging system, in combination with Traefik as a reverse proxy using Docker Swarm. The configuration ensures that Databag runs efficiently across y...
What ist Wastebin?
Wastebin is a minimal pastebin tool designed for simplicity and efficiency, with a user interface inspired by the popular pastebin service, bin. It provides a straightforward solution for storing and sharing text, code, or other snippets in an easily accessibl...
Step-by-Step Guide: How to Setup Wastebin
This article will guide you through the process of building your own Wastebin image for the ARM64 architecture, specifically designed to run on a Raspberry Pi 5. Wastebin is a minimal pastebin application originally designed for AMD64 architecture. In this gui...
What is Databag?
Databag is a lightweight, decentralized messaging platform designed for efficiency and privacy. It enables direct communication between users and server nodes with a focus on end-to-end encryption and federation. Keyfeatures Decentralized communication...
Step-by-Step Setup Guide Coturn - TURN Server
GabrielTanner Website This step-by-step article will guide you through setting up Coturn, a TURN server, using Docker Swarm and Traefik as a reverse proxy. You will configure Coturn to help WebRTC function by handling NAT traversal issues in peer-to-peer conn...
Overview: What is Pihole?
Overview: What is Pihole? Pi-hole is a network-wide ad blocker that acts as a DNS sinkhole, filtering out unwanted content, advertisements, and tracking at the network level. It's typically installed on small devices like a Raspberry Pi but c...
Environment Variables for Pi-hole
Variable Default Value Description PIHOLE_DNS_ 8.8.8.8;8.8.4.4 Upstream DNS servers, separated by ;. Supports custom ports (e.g., 127.0.0.1#5053). DNS servers added via the web interface will be overwritten on restart. DNSSEC ...
Overview Providers
Configuration discovery in Traefik is achieved through Providers. The providers are infrastructure components, whether orchestrators, container engines, cloud providers, or key-value stores. The idea is that Traefik queries the provider APIs in order to find ...
Setting up Self-Signed Multiple FQDN Certificates for Local Services in Traefik
Overview In this article, we will walk through creating a self-signed certificate for multiple local services (e.g., Portainer and Pi-hole) using OpenSSL. We'll also configure Traefik to use this certificate in Docker Swarm. Additionally, we will explain how ...
How SSL Certificates Work: A Breakdown
What is SSL? SSL stands for Secure Sockets Layer, a protocol for encrypting, securing, and authenticating communications on the Internet. Although SSL has been replaced by TLS (Transport Layer Security), the term "SSL" is still widely used to describe thi...