Traefik 2.0の概要

Traefikは、アプリケーションでマイクロサービスやコンテナを簡単に処理するためのオープンソースのリバースプロキシです。



リバースプロキシサーバー(リバースプロキシ、リバースプロキシ)は、外部ネットワークから内部ネットワーク上の任意のサーバー/サービス(Webサーバー、データベース、ファイルストレージなど)に要求を中継するために使用され、以下を可能にします。



  • 内部ネットワークの構造とそこにあるサービスの詳細を確実に隠蔽します。
  • 同じタスクの同じサービスまたはサーバーのインスタンス間で負荷分散を実行します。
  • クライアントと任意のサービスの間に暗号化(HTTPS)接続を提供します。この場合、SSLセッションはクライアントとプロキシの間に作成され、暗号化されていないHTTP接続がプロキシと内部ネットワークのサービスの間に確立されます。サービスがHTTPSをサポートしている場合、暗号化された接続も内部ネットワークで確立できます。
  • サービスへのアクセス制御(クライアント認証)を整理し、ファイアウォール(ファイアウォール)をセットアップします。


この記事では、DockerでTraefikを他のDockerコンテナーやコンテナー化されていないサービスのリバースプロキシとして使用する方法について説明します。



画像



前書き



Traefik “Edge Router”, . , , : -, Traefik ; -, Traefik EE — , HA (Hight Availability, ), (), , . , Traefik.



Traefik (“ ”) , .



:



  • Docker
  • Kubernetes
  • Consul Catalog
  • Marathon
  • Rancher
  • File


.

, , — “File”, ( ), - , , -. .



Traefik, “File” TOML YAML, YAML , - , . Traefik Docker. docker-compose, .



* Linux.



Traefik



docker docker-compose, .



traefik, ,



mkdir ~/traefik
cd ~/traefik


() Traefik docker-compose.yml . :



version: '3'
services:
  traefik:
    image: traefik:v2.2
    container_name: traefik
    restart: unless-stopped
    security_opt:
      - no-new-privileges:true
    ports:
      - 80:80
      - 443:443 
    volumes:
      - /etc/localtime:/etc/localtime:ro
      - /var/run/docker.sock:/var/run/docker.sock:ro
      - ./data/traefik.yml:/traefik.yml:ro


80 443 HTTP HTTPS . Docker . Traefik traefik.yml data .



networks Docker-, Traefik .

.



( , ):



entryPoints:
  http:
    address: ":80"
  https:
    address: ":443"


http https ( , a b) .



— Docker, :



providers:
  docker:
    endpoint: "unix:///var/run/docker.sock"
    exposedByDefault: false


Traefik , . — Traefik ( ).



HTTP HTTPS ( ):



http:
  routers:
    http-catchall:
      rule: HostRegexp(`{host:.+}`)
      entrypoints:
      - http
      middlewares:
      - redirect-to-https
  middlewares:
    redirect-to-https:
      redirectScheme:
        scheme: https
        permanent: false


Traefik HTTP , TCP UDP, http.



Traefik 2 routers () middlewares( ), .





:



  • http-catchall — , , http Traefik;
  • rule: — , , HostRegexp, Host .+ ( ), Traefik — (host ), {name:reg_exp};
  • entrypoints — , , http;
  • middlewares — , ( ).


.





  • redirect-to-https — , , http Traefik;
  • redirectScheme — , ;
  • scheme: https — HTTPS ;
  • permanent: false — .


( — BasicAuth).



traefik.yml
entryPoints:
  http:
    address: ":80"
  https:
    address: ":443"

http:
  routers:
    http-catchall:
      rule: hostregexp(`{host:.+}`)
      entrypoints:
      - http
      middlewares:
      - redirect-to-https
  middlewares:
    redirect-to-https:
      redirectScheme:
        scheme: https
        permanent: false

providers:
  docker:
    endpoint: "unix:///var/run/docker.sock"
    exposedByDefault: false


.



sudo docker-compose up -d


, (sudo docker-compose logs -f) , .



Let's Encrypt



HTTPS - SSL , , Let's Encrypt.



(traefik.yml) :



certificatesResolvers:
  letsEncrypt:
    acme:
      email: postmaster@example.com
      storage: acme.json
      caServer: "https://acme-staging-v02.api.letsencrypt.org/directory"
      httpChallenge:
        entryPoint: http


:



  • letsEncrypt — ;
  • acme — ( - );
  • storage — , ;
  • httpChallenge — acme-, — ;
  • caServer: "https://acme-staging-v02.api.letsencrypt.org/directory" — Let's Encrypt , API ( , ).


volumes docker-compose.yml, ( data/acme.json):



    volumes:
      - /etc/localtime:/etc/localtime:ro
      - /var/run/docker.sock:/var/run/docker.sock:ro
      - ./data/traefik.yml:/traefik.yml:ro
      - ./data/acme.json:/acme.json


Docker



HTTPS , , Traefik, Traefik Docker, .



Docker Traefik (labels) . docker-compose.yml:



    labels:
      - "traefik.enable=true"
      - "traefik.http.routers.traefik.entrypoints=https"
      - "traefik.http.routers.traefik.rule=Host(`traefik.example.com`)"
      - "traefik.http.routers.traefik.tls=true"
      - "traefik.http.routers.traefik.tls.certresolver=letsEncrypt"
      - "traefik.http.routers.traefik.service=api@internal"
      - "traefik.http.services.traefik-traefik.loadbalancer.server.port=888"


:

traefik.enable=true — Traefik , ;

traefik.http.routers.traefik.entrypoints=httpshttps;

traefik.http.routers.traefik.rule=Host(traefik.example.com) — traefik.example.com;

traefik.http.routers.traefik.tls=true — TLS;

traefik.http.routers.traefik.tls.certresolver=letsEncrypt — ;

traefik.http.routers.traefik.service=api@internal — , — api@internal, , , ;

traefik.http.services.traefik-traefik.loadbalancer.server.port=888 — , , .



, traefik.yml:



api:
  dashboard: true


( docker-compose.yml):



sudo docker-compose down && sudo docker-compose up -d


traefik.example.com ( , Traefik) .



, , , BasicAuth, Traefik middleware.



(admin/password)^



$ htpasswd -nb admin password
admin:$apr1$vDSqkf.v$GTJOtsd9CBiAFFnHTI2Ds1


docker-compose.yml :



      - "traefik.http.middlewares.traefik-auth.basicauth.users=admin:$$apr1$$vDSqkf.v$$GTJOtsd9CBiAFFnHTI2Ds1"
      - "traefik.http.routers.traefik.middlewares=traefik-auth"


, $ $$.

traefik.http.middlewares.traefik-auth.basicauth.users=... — middleware basicauth users;

traefik.http.routers.traefik.middlewares=traefik-authtraefik - middleware.



docker-compose.yml
version: '3'
services:
  traefik:
    image: traefik:v2.2
    container_name: traefik
    restart: unless-stopped
    security_opt:
      - no-new-privileges:true
    ports:
      - 80:80
      - 443:443 
    volumes:
      - /etc/localtime:/etc/localtime:ro
      - /var/run/docker.sock:/var/run/docker.sock:ro
      - ./data/traefik.yml:/traefik.yml:ro
      - ./data/acme.json:/acme.json
    labels:
      - "traefik.enable=true"
      - "traefik.http.routers.traefik.entrypoints=https"
      - "traefik.http.routers.traefik.rule=Host(`traefik.example.com`)"
      - "traefik.http.routers.traefik.tls=true"
      - "traefik.http.routers.traefik.tls.certresolver=letsEncrypt"
      - "traefik.http.routers.traefik.service=api@internal"
      - "traefik.http.services.traefik-traefik.loadbalancer.server.port=888"
      - "traefik.http.middlewares.traefik-auth.basicauth.users=admin:$$apr1$$vDSqkf.v$$GTJOtsd9CBiAFFnHTI2Ds1"
      - "traefik.http.routers.traefik.middlewares=traefik-auth"


.



, docker-compose ( docker):



    labels:
      - "traefik.enable=true"
      - "traefik.http.routers.test.entrypoints=https"
      - "traefik.http.routers.test.rule=Host(`test.example.com`)"
      - "traefik.http.routers.test.tls=true"
      - "traefik.http.routers.test.tls.certresolver=letsEncrypt"
      - "traefik.http.services.test-service.loadbalancer.server.port=80"


traefik.http.services.test-service.loadbalancer.server.port=80test-service 80, test, Traefik , .



File



, - ( IP 192.168.1.222 8080) , HTTPS. .



docker-compose.yml volume:



    volumes:
      - /etc/localtime:/etc/localtime:ro
      - /var/run/docker.sock:/var/run/docker.sock:ro
      - ./data/traefik.yml:/traefik.yml:ro
      - ./data/custom/:/custom/:ro
      - ./data/acme.json:/acme.json


data/custom/ ( , ).



traefik.yml file :



providers:
...
  file:
    directory: /custom
    watch: true


docker-compose.yml, watch: true Traefik ( “ ”, , ).



Traefik (data/custom/host.yml):



http:
  routers:
    host:
      entryPoints: 
      - https
      service: service-host
      rule: Host(`host.example.com`) 
      tls:
        certResolver: letsEncrypt
  services:
    service-host:  
      loadBalancer:
        servers:
        - url: http://192.168.1.222:8080/
        passHostHeader: true 


, service: service-host — , TLS.



:



_:
  loadBalancer:
    servers:
    -    
    - ...


passHostHeader: true , .





:



docker-compose.yml
version: '3'
services:
  traefik:
    image: traefik:v2.2
    container_name: traefik
    restart: unless-stopped
    security_opt:
      - no-new-privileges:true
    ports:
      - 80:80
      - 443:443 
    volumes:
      - /etc/localtime:/etc/localtime:ro
      - /var/run/docker.sock:/var/run/docker.sock:ro
      - ./data/traefik.yml:/traefik.yml:ro
      - ./data/custom/:/custom/:ro
      - ./data/acme.json:/acme.json
    labels:
      - "traefik.enable=true"
      - "traefik.http.routers.traefik.entrypoints=https"
      - "traefik.http.routers.traefik.rule=Host(`traefik.example.com`)"
      - "traefik.http.routers.traefik.tls=true"
      - "traefik.http.routers.traefik.tls.certresolver=letsEncrypt"
      - "traefik.http.routers.traefik.service=api@internal"
      - "traefik.http.services.traefik-traefik.loadbalancer.server.port=888"
      - "traefik.http.middlewares.traefik-auth.basicauth.users=admin:$$apr1$$vDSqkf.v$$GTJOtsd9CBiAFFnHTI2Ds1"
      - "traefik.http.routers.traefik.middlewares=traefik-auth"


data/traefik.yml
api:
  dashboard: true

entryPoints:
  http:
    address: ":80"
  https:
    address: ":443"

http:
  routers:
    http-catchall:
      rule: hostregexp(`{host:.+}`)
      entrypoints:
      - http
      middlewares:
      - redirect-to-https
  middlewares:
    redirect-to-https:
      redirectScheme:
        scheme: https
        permanent: false

providers:
  docker:
    endpoint: "unix:///var/run/docker.sock"
    exposedByDefault: false
  file:
    directory: /custom
    watch: true

certificatesResolvers:
  letsEncrypt:
    acme:
      email: postmaster@example.com
      storage: acme.json
      #caServer: "https://acme-staging-v02.api.letsencrypt.org/directory"
      httpChallenge:
        entryPoint: http


data/custom/host.yml
http:
  routers:
    host:
      entryPoints: 
      - https
      service: service-host
      rule: Host(`host.example.com`) 
      tls:
        certResolver: letsEncrypt
  services:
    service-host:  
      loadBalancer:
        servers:
        - url: http://192.168.1.222:8080/
        passHostHeader: true 


Traefik HTTP Docker File. SSL Let's Encrypt, HTTPS, .



TCP UDP ( , — TCP), , Traefik .



.



Traefikを使用すると、作業に関する情報をさまざまな形式で収集できます。これをPrometheusを使用して行う方法を検討してください。



新しいエントリポイントを追加しましょう

data/traefik.yml



entryPoints:
...
  metrics:
    address: ":8082"


docker-compose.yml



    ports:
      - 80:80
      - 443:443 
      - 8082:8082


このポートからPrometheusのメトリックを収集する機能を追加しますdata/traefik.yml



metrics:
  prometheus:
    entryPoint: metrics


からメトリックを収集するようにPrometheusを構成するだけtraefik_ip:8082です。



結果の構成を持つファイルの内容は次のとおりです。



docker-compose.yml
version: '3'
services:
  traefik:
    image: traefik:v2.2
    container_name: traefik
    restart: unless-stopped
    security_opt:
      - no-new-privileges:true
    ports:
      - 80:80
      - 443:443 
      - 8082:8082
    volumes:
      - /etc/localtime:/etc/localtime:ro
      - /var/run/docker.sock:/var/run/docker.sock:ro
      - ./data/traefik.yml:/traefik.yml:ro
      - ./data/custom/:/custom/:ro
      - ./data/acme.json:/acme.json
    labels:
      - "traefik.enable=true"
      - "traefik.http.routers.traefik.entrypoints=https"
      - "traefik.http.routers.traefik.rule=Host(`traefik.example.com`)"
      - "traefik.http.routers.traefik.tls=true"
      - "traefik.http.routers.traefik.tls.certresolver=letsEncrypt"
      - "traefik.http.routers.traefik.service=api@internal"
      - "traefik.http.services.traefik-traefik.loadbalancer.server.port=888"
      - "traefik.http.middlewares.traefik-auth.basicauth.users=admin:$$apr1$$vDSqkf.v$$GTJOtsd9CBiAFFnHTI2Ds1"
      - "traefik.http.routers.traefik.middlewares=traefik-auth"


データ/traefik.yml
api:
  dashboard: true

entryPoints:
  http:
    address: ":80"
  https:
    address: ":443"
  metrics:
    address: ":8082"

metrics:
  prometheus:
    entryPoint: metrics

http:
  routers:
    http-catchall:
      rule: hostregexp(`{host:.+}`)
      entrypoints:
      - http
      middlewares:
      - redirect-to-https
  middlewares:
    redirect-to-https:
      redirectScheme:
        scheme: https
        permanent: false

providers:
  docker:
    endpoint: "unix:///var/run/docker.sock"
    exposedByDefault: false
  file:
    directory: /custom
    watch: true

certificatesResolvers:
  letsEncrypt:
    acme:
      email: postmaster@example.com
      storage: acme.json
      #caServer: "https://acme-staging-v02.api.letsencrypt.org/directory"
      httpChallenge:
        entryPoint: http



All Articles