Traefik & Redis

A Story of KV store & Containers

Store your configuration in Redis and let Traefik do the rest!

Routing Configuration

See the dedicated section in routing.

Provider Configuration

endpoints

Required, Default=”127.0.0.1:6379”

Defines how to access to Redis.

File (TOML)

  1. [providers.redis]
  2. endpoints = ["127.0.0.1:6379"]

File (YAML)

  1. providers:
  2. redis:
  3. endpoints:
  4. - "127.0.0.1:6379"

CLI

  1. --providers.redis.endpoints=127.0.0.1:6379

rootKey

Defines the root key of the configuration.

Required, Default=”traefik”

File (TOML)

  1. [providers.redis]
  2. rootKey = "traefik"

File (YAML)

  1. providers:
  2. redis:
  3. rootKey: "traefik"

CLI

  1. --providers.redis.rootkey=traefik

username

Defines a username to connect with Redis.

Optional, Default=””

File (TOML)

  1. [providers.redis]
  2. # ...
  3. username = "foo"

File (YAML)

  1. providers:
  2. redis:
  3. # ...
  4. usename: "foo"

CLI

  1. --providers.redis.username=foo

password

Optional, Default=””

Defines a password to connect with Redis.

File (TOML)

  1. [providers.redis]
  2. # ...
  3. password = "bar"

File (YAML)

  1. providers:
  2. redis:
  3. # ...
  4. password: "bar"

CLI

  1. --providers.redis.password=foo

tls

Optional

tls.ca

Certificate Authority used for the secured connection to Redis.

File (TOML)

  1. [providers.redis.tls]
  2. ca = "path/to/ca.crt"

File (YAML)

  1. providers:
  2. redis:
  3. tls:
  4. ca: path/to/ca.crt

CLI

  1. --providers.redis.tls.ca=path/to/ca.crt

tls.caOptional

Policy followed for the secured connection with TLS Client Authentication to Redis. Requires tls.ca to be defined.

  • true: VerifyClientCertIfGiven
  • false: RequireAndVerifyClientCert
  • if tls.ca is undefined NoClientCert

File (TOML)

  1. [providers.redis.tls]
  2. caOptional = true

File (YAML)

  1. providers:
  2. redis:
  3. tls:
  4. caOptional: true

CLI

  1. --providers.redis.tls.caOptional=true

tls.cert

Public certificate used for the secured connection to Redis.

File (TOML)

  1. [providers.redis.tls]
  2. cert = "path/to/foo.cert"
  3. key = "path/to/foo.key"

File (YAML)

  1. providers:
  2. redis:
  3. tls:
  4. cert: path/to/foo.cert
  5. key: path/to/foo.key

CLI

  1. --providers.redis.tls.cert=path/to/foo.cert
  2. --providers.redis.tls.key=path/to/foo.key

tls.key

Private certificate used for the secured connection to Redis.

File (TOML)

  1. [providers.redis.tls]
  2. cert = "path/to/foo.cert"
  3. key = "path/to/foo.key"

File (YAML)

  1. providers:
  2. redis:
  3. tls:
  4. cert: path/to/foo.cert
  5. key: path/to/foo.key

CLI

  1. --providers.redis.tls.cert=path/to/foo.cert
  2. --providers.redis.tls.key=path/to/foo.key

tls.insecureSkipVerify

If insecureSkipVerify is true, TLS for the connection to Redis accepts any certificate presented by the server and any host name in that certificate.

File (TOML)

  1. [providers.redis.tls]
  2. insecureSkipVerify = true

File (YAML)

  1. providers:
  2. redis:
  3. tls:
  4. insecureSkipVerify: true

CLI

  1. --providers.redis.tls.insecureSkipVerify=true