Traefik & Consul

A Story of KV store & Containers

Store your configuration in Consul and let Traefik do the rest!

Routing Configuration

See the dedicated section in routing.

Provider Configuration

endpoints

Required, Default="127.0.0.1:8500"

Defines how to access to Consul.

[providers.consul]
  endpoints = ["127.0.0.1:8500"]
providers:
  consul:
    endpoints:
      - "127.0.0.1:8500"
--providers.consul.endpoints=127.0.0.1:8500

rootKey

Defines the root key of the configuration.

Required, Default="traefik"

[providers.consul]
  rootKey = "traefik"
providers:
  consul:
    rootKey: "traefik"
--providers.consul.rootkey=traefik

username

Defines a username to connect with Consul.

Optional, Default=""

[providers.consul]
  # ...
  username = "foo"
providers:
  consul:
    # ...
    usename: "foo"
--providers.consul.username=foo

password

Optional, Default=""

Defines a password to connect with Consul.

[providers.consul]
  # ...
  password = "bar"
providers:
  consul:
    # ...
    password: "bar"
--providers.consul.password=foo

tls

Optional

tls.ca

Certificate Authority used for the secured connection to Consul.

[providers.consul.tls]
  ca = "path/to/ca.crt"
providers:
  consul:
    tls:
      ca: path/to/ca.crt
--providers.consul.tls.ca=path/to/ca.crt

tls.caOptional

Policy followed for the secured connection with TLS Client Authentication to Consul. Requires tls.ca to be defined.

  • true: VerifyClientCertIfGiven
  • false: RequireAndVerifyClientCert
  • if tls.ca is undefined NoClientCert
[providers.consul.tls]
  caOptional = true
providers:
  consul:
    tls:
      caOptional: true
--providers.consul.tls.caOptional=true

tls.cert

Public certificate used for the secured connection to Consul.

[providers.consul.tls]
  cert = "path/to/foo.cert"
  key = "path/to/foo.key"
providers:
  consul:
    tls:
      cert: path/to/foo.cert
      key: path/to/foo.key
--providers.consul.tls.cert=path/to/foo.cert
--providers.consul.tls.key=path/to/foo.key

tls.key

Private certificate used for the secured connection to Consul.

[providers.consul.tls]
  cert = "path/to/foo.cert"
  key = "path/to/foo.key"
providers:
  consul:
    tls:
      cert: path/to/foo.cert
      key: path/to/foo.key
--providers.consul.tls.cert=path/to/foo.cert
--providers.consul.tls.key=path/to/foo.key

tls.insecureSkipVerify

If insecureSkipVerify is true, TLS for the connection to Consul accepts any certificate presented by the server and any host name in that certificate.

[providers.consul.tls]
  insecureSkipVerify = true
providers:
  consul:
    tls:
      insecureSkipVerify: true
--providers.consul.tls.insecureSkipVerify=true