Port details on branch 2024Q4 |
- traefik High availability reverse proxy and load balancer
- 3.2.1 net =0 3.2.1Version of this port present on the latest quarterly branch.
- Maintainer: riggs@FreeBSD.org
- Port Added: 2024-10-12 06:12:07
- Last Update: 2024-12-11 14:59:54
- Commit Hash: 9cb167e
- License: MIT
- WWW:
- https://traefik.io/
- Description:
- Traefik (pronounced like traffic) is a modern HTTP reverse proxy and load
balancer made to deploy microservices with ease. It supports several backends
(Docker, Swarm mode, Kubernetes, Marathon, Consul, Etcd, Rancher, Amazon ECS,
and a lot more) to manage its configuration automatically and dynamically.
- ¦ ¦ ¦ ¦
- Manual pages:
- FreshPorts has no man page information for this port.
- pkg-plist: as obtained via:
make generate-plist - Dependency lines:
-
- To install the port:
- cd /usr/ports/net/traefik/ && make install clean
- To add the package, run one of these commands:
- pkg install net/traefik
- pkg install traefik
NOTE: If this package has multiple flavors (see below), then use one of them instead of the name specified above.- PKGNAME: traefik
- Flavors: there is no flavor information for this port.
- distinfo:
- TIMESTAMP = 1733609916
SHA256 (traefik-3.2.1.tar.xz) = 6d67e297cd7d761634a73b7ccdbfc3b0ee72baac481c655aeb2685c1033bdbf3
SIZE (traefik-3.2.1.tar.xz) = 23126168
No package information for this port in our database- Sometimes this happens. Not all ports have packages. Perhaps there is a build error. Check the fallout link:
- Dependencies
- NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
- Build dependencies:
-
- go-bindata : devel/go-bindata
- go123 : lang/go123
- This port is required by:
- for Run
-
- sysutils/minipot
Configuration Options:
- No options to configure
- Options name:
- net_traefik
- USES:
- cpe go:1.23,modules tar:xz
- pkg-message:
- For install:
- Note that traefik starts as unpriviliged user. Thus, it cannot
bind to privileged ports (by default, ports below 1024) and
will exit when configured to do so.
If traefik should serve ports in the privileged range, there
are options to achieve this:
- Have traffic bind to an unprivileged port and use the
packet filter configuration to redirect requests to the
desired privileged port to the unprivileged port in
traefik's configuration file e.g. the rdr rules in pf(4).
- The mac_portacl kernel module allows unprivileged processes
to bind to privileged ports.
- If upgrading from < 2.0:
- The version 2 of Traefik requires manual configuration changes
when migrating from a legacy v1 version to v2.
Please consult the Traefik migration guide at
https://doc.traefik.io/traefik/migration/v1-to-v2/
for details on how to adapt existing configuration files.
Note that there is a tool that can automate migration and
rewrite existing configuration files (at least partially):
https://github.com/traefik/traefik-migration-tool
- Master Sites:
|