====== Container 'traefik' ====== ===== Ressourcen ===== * 0.5 GB RAM * 1 Cores * 8 GB HDD (root-fs) ===== System ===== * interne IPs * 10.2.0.1, fd00:10:2:0::1 ===== Dienste ===== * Traefik (Loadbalancer, SSL-Terminierung) ===== Betrieb ===== ==== Routing für Domain anlegen ==== - DNS-Eintrag anlegen * Name: **Subdomain** der entsprechenden Domain * Typ: **CNAME** * Wert: **bytecluster0002.bytespeicher.org** * TTL: **3600** - Konfiguration anlegen - Beispiel für einfachen Webdienst auf einem anderen Port [http.services] [http.services.testwiki.loadbalancer] [[http.services.testwiki.loadbalancer.servers]] # Internal Destination URL and port url = "http://10.2.0.10:8088" [http.routers] [http.routers.testwiki] entryPoints = [ "https"] # Domain used for service rule = "Host(`testwiki.technikkultur-erfurt.de`)" # Servicename used in http.services.SERVICENAME.loadbalancer above service = "testwiki" [http.routers.wiki.tls] # Use Let's Encrypt certResolver = "letsencrypt" ===== Installation ===== * Standard-Template mit Benutzern ==== Traefik ==== - Traefik herunterladen * **wget https://github.com/traefik/traefik/releases/download/v2.3.1/traefik_v2.3.1_linux_amd64.tar.gz** - Verzeichnisse erstellen * **sudo mkdir /opt/traefik** * **sudo mkdir -p /etc/traefik/{acme,conf}** * **sudo mkdir /var/log/traefik** - Traefik-Archiv auspacken und entfernen * **sudo tar -xvzf traefik_v2.3.1_linux_amd64.tar.gz --directory=/opt/traefik** * **rm traefik_v2.3.1_linux_amd64.tar.gz** - Benutzer und Gruppe anlegen * **sudo groupadd --gid 321 traefik** * **sudo useradd --gid traefik --no-user-group --home-dir /opt/traefik --no-create-home --shell /usr/sbin/nologin --system --uid 321 traefik** - Konfiguration anlegen * **TODO** - Service Unit anlegen [Unit] Description=traefik proxy After=network-online.target Wants=network-online.target systemd-networkd-wait-online.service [Service] Restart=on-abnormal ; User and group the process will run as. User=traefik Group=traefik ; Always set "-root" to something safe in case it gets forgotten in the traefikfile. ExecStart=/opt/traefik/traefik --configfile=/etc/traefik/traefik.toml ; Limit the number of file descriptors; see `man systemd.exec` for more limit settings. LimitNOFILE=1048576 ; Use private /tmp and /var/tmp, which are discarded after traefik stops. PrivateTmp=true ; Use a minimal /dev (May bring additional security if switched to 'true', but it may not work on Raspberry Pi's or other devices, so it has been disabled in this dist.) PrivateDevices=false ; Hide /home, /root, and /run/user. Nobody will steal your SSH-keys. ProtectHome=true ; Make /usr, /boot, /etc and possibly some more folders read-only. ProtectSystem=full ; ... except /etc/traefik/acme, because we want Letsencrypt-certificates there. ; This merely retains r/w access rights, it does not add any new. Must still be writable on the host! ReadWriteDirectories=/etc/traefik/acme ; The following additional security directives only work with systemd v229 or later. ; They further restrict privileges that can be gained by traefik. Uncomment if you like. ; Note that you may have to add capabilities required by any plugins in use. CapabilityBoundingSet=CAP_NET_BIND_SERVICE AmbientCapabilities=CAP_NET_BIND_SERVICE NoNewPrivileges=true [Install] WantedBy=multi-user.target - Berechtigungen setzen * **sudo chown -R traefik:traefik /{opt,etc,var/log}/traefik** * **sudo chmod 750 /opt/traefik/traefik** * **sudo chmod 644 /etc/systemd/system/traefik.service** * **sudo chown root:root /etc/systemd/system/traefik.service** * **sudo chmod 644 /etc/logrotate.d/traefik** * **sudo chown root:root /etc/logrotate.d/traefik** - Traefik dauerhaft aktivieren und gleichzeitig starten * **sudo systemctl daemon-reload** * **sudo systemctl enable --now traefik.service** ==== Backup mit Borgmatic ==== * siehe [[mariadb]]