To install Traefik Mesh, the installation method is quite simple:
helm repo add traefik-mesh https://helm.traefik.io/mesh
helm repo update
Install Traefik Mesh Helm Chart:
helm install traefik-mesh traefik-mesh/traefik-mesh
Please be aware that the supported installation method is via Helm, using official releases. If you want to build/install/run Traefik Mesh from source, we may not be able to provide support. Installing from source is intended for development/contributing.
To build the image locally, run:
You will then be able to use the tagged image as your image in your
To deploy the Helm Chart, run:
helm install traefik-mesh traefik-mesh/traefik-mesh --set controller.image.pullPolicy=IfNotPresent--set controller.image.tag=latest
Traefik Mesh supports KubeDNS:
helm install traefik-mesh traefik-mesh/traefik-mesh --set kubedns=true
kubedns parameter Traefik Mesh will install CoreDNS and patch KubeDNS to use it as a stubDomain.
If you use a cluster domain other than
cluster.local set it by using the
helm install traefik-mesh traefik-mesh/traefik-mesh --set clusterDomain=my.custom.domain.com
By default, Traefik Mesh does not restrict traffic between pods and services. However, some scenarios require more control over the rules for internal communication. The Access Control List mode (ACL) requires a set of rules to explicitly allow traffic between different resources.
To enable ACL, install Traefik Mesh in ACL mode by setting the
acl Helm Chart option to
helm install traefik-mesh --namespace=traefik-mesh traefik-mesh/traefik-mesh --set acl=true
Traefik Mesh supports the SMI specification which defines a set of custom resources to provide a fine-grained control over instrumentation, routing and access control of east-west communications.
Helm v3 will install automatically the CRDs in the
/crds directory. If you are (re)installing into a cluster with the CRDs already present, Helm may print a warning. If you do not want to install them, or want to avoid the warning, use the new
--skip-crds flag. More information can be found in the Helm documentation.
Traefik Mesh works on Kubernetes environments that conforms to the global Kubernetes specification. That being said, we have had users encounter issues when using variants such as minikube, microk8s, and other development distributions.
Traefik Mesh runs without issue on most public clouds (AWS, GKE, Azure, DigitalOcean, and more). If you want to run Traefik Mesh in development, we would recommend using k3s, as it is fully conformant. We use k3s in Traefik Mesh’s integration tests, so you can be sure that it works properly.
If you encounter issues on variants such as minikube or microk8s, please try and reproduce the issue on k3s. If you are unable to reproduce, it may be an issue with the distribution behaving differently than official Kubernetes.
You can check that Traefik Mesh has been installed properly by running the following command:
kubectl get all -n traefik-mesh
NAME READY STATUS RESTARTS AGE
NAME DESIRED CURRENT READY UP-TO-DATE AVAILABLE NODE SELECTOR AGE
NAME DESIRED CURRENT UP-TO-DATE AVAILABLE AGE
NAME DESIRED CURRENT READY AGE
To use Traefik Mesh, instead of referencing services via their normal
<servicename>.<namespace>, instead use
<servicename>.<namespace>.traefik.mesh. This will access the Traefik Mesh service mesh, and will allow you to route requests through Traefik Mesh.
By default, Traefik Mesh is opt-in, meaning you have to use the Traefik Mesh service names to access the mesh, so you can have some services running through the mesh, and some services not.