Kubernetes CRDs
In v2.10, the Kubernetes CRDs API Group traefik.containo.us is deprecated, and its support will end starting with Traefik v3. Please use the API Group traefik.io instead.
entryPoints
Specify the entryPoints to use with annotations on Ingress:
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: myingress
annotations:
traefik.ingress.kubernetes.io/router.entrypoints: webOtherwise, the default entryPoints is used.
asDefault
If there is no entryPoint with the asDefault option set to true, then the list of default entryPoints includes all HTTP/TCP entryPoints.
If at least one entryPoint has the asDefault option set to true, then the list of default entryPoints includes only entryPoints that have the asDefault option set to true.
Some built-in entryPoints are always excluded from the list, namely: traefik.
The asDefault option has no effect on UDP entryPoints. When a UDP router does not define the entryPoints option, it is attached to all available UDP entryPoints.
Default certificate
Specify default TLS certificate with a TLSStore named “default” in Traefik’s namespace.
apiVersion: traefik.io/v1alpha1
kind: TLSStore
metadata:
name: default
namespace: {{ template "traefik.namespace" $ }}
spec:
defaultCertificate:
secretName: mySecretFor Traefik versions < 2.10, use the old API group.
apiVersion: traefik.containo.us/v1alpha1
kind: TLSStore
metadata:
name: default
namespace: {{ template "traefik.namespace" $ }}
spec:
defaultCertificate:
secretName: mySecretTraefik dashboard (in default setup)
kubectl -n kube-system port-forward deploy/traefik 9000
# open http://127.0.0.1:9000/