Skip to content

Demo on spinning up AKS with GitHub action and setting up Traefik

License

Notifications You must be signed in to change notification settings

fredrkl/traefik-k8s-setup

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

56 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Traefik v2.8.4 on Kubernetes (K8s) sample

Demo on setting up Traefik in K8s. This demo also spins up a new MS AKS cluster.

Setup

  1. Clone/Fork this repo
  2. Create an RG in Azure and note down the name
  3. Create a GitHub secret holding an Azure Service Principal following this guide: https://github.com/Azure/actions-workflow-samples/blob/master/assets/create-secrets-for-GitHub-workflows.md giving it access to the RG in step 2.
  4. Kick off the Deploy to AKS GitHub action to create AKS

Traefik

Tips

  • If you want to use middlewares in K8s, you need to enable the KubernetesCRD provider regardless, even if you use the KubernetesIngress provider for Traefik configuration, e.g., https://github.com/fredrkl/traefik-k8s-setup/commit/fcdba1a878c815249e07ba711a0e9429572882ff
  • Also, make sure that the middleware name does not include -. Traefik uses - in its naming convention to find the middlewares namespace.
  • When using Cert-Manager without Helm, do not add kustomize namespace as the kube-system ns is hardcoded for the leader election role

Workflows

Create Traefik demo AKS cluster

Deploy to AKS

About

Demo on spinning up AKS with GitHub action and setting up Traefik

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published