Container 'traefik'
Ressourcen
- 0.5 GB RAM
- 1 Cores
- 8 GB HDD (root-fs)
System
- interne IPs
- 10.2.0.1, fd00:10:2:0::1
Dienste
- Traefik (Loadbalancer, SSL-Terminierung)
Betrieb
Routing für Domain anlegen
- DNS-Eintrag anlegen
- Name: Subdomain der entsprechenden Domain
- Typ: CNAME
- Wert: bytecluster0002.bytespeicher.org
- TTL: 3600
- Konfiguration anlegen
- Beispiel für einfachen Webdienst auf einem anderen Port
/etc/traefik/conf/testwiki.conf
[http.services] [http.services.testwiki.loadbalancer] [[http.services.testwiki.loadbalancer.servers]] # Internal Destination URL and port url = "http://10.2.0.10:8088" [http.routers] [http.routers.testwiki] entryPoints = [ "https"] # Domain used for service rule = "Host(`testwiki.technikkultur-erfurt.de`)" # Servicename used in http.services.SERVICENAME.loadbalancer above service = "testwiki" [http.routers.wiki.tls] # Use Let's Encrypt certResolver = "letsencrypt"
Installation
- Standard-Template mit Benutzern
Traefik
- Traefik herunterladen
- Verzeichnisse erstellen
- sudo mkdir /opt/traefik
- sudo mkdir -p /etc/traefik/{acme,conf}
- sudo mkdir /var/log/traefik
- Traefik-Archiv auspacken und entfernen
- sudo tar -xvzf traefik_v2.3.1_linux_amd64.tar.gz --directory=/opt/traefik
- rm traefik_v2.3.1_linux_amd64.tar.gz
- Benutzer und Gruppe anlegen
- sudo groupadd --gid 321 traefik
- sudo useradd --gid traefik --no-user-group --home-dir /opt/traefik --no-create-home --shell /usr/sbin/nologin --system --uid 321 traefik
- Konfiguration anlegen
- TODO
- Service Unit anlegen
/etc/systemd/system/traefik.service
[Unit] Description=traefik proxy After=network-online.target Wants=network-online.target systemd-networkd-wait-online.service [Service] Restart=on-abnormal ; User and group the process will run as. User=traefik Group=traefik ; Always set "-root" to something safe in case it gets forgotten in the traefikfile. ExecStart=/opt/traefik/traefik --configfile=/etc/traefik/traefik.toml ; Limit the number of file descriptors; see `man systemd.exec` for more limit settings. LimitNOFILE=1048576 ; Use private /tmp and /var/tmp, which are discarded after traefik stops. PrivateTmp=true ; Use a minimal /dev (May bring additional security if switched to 'true', but it may not work on Raspberry Pi's or other devices, so it has been disabled in this dist.) PrivateDevices=false ; Hide /home, /root, and /run/user. Nobody will steal your SSH-keys. ProtectHome=true ; Make /usr, /boot, /etc and possibly some more folders read-only. ProtectSystem=full ; ... except /etc/traefik/acme, because we want Letsencrypt-certificates there. ; This merely retains r/w access rights, it does not add any new. Must still be writable on the host! ReadWriteDirectories=/etc/traefik/acme ; The following additional security directives only work with systemd v229 or later. ; They further restrict privileges that can be gained by traefik. Uncomment if you like. ; Note that you may have to add capabilities required by any plugins in use. CapabilityBoundingSet=CAP_NET_BIND_SERVICE AmbientCapabilities=CAP_NET_BIND_SERVICE NoNewPrivileges=true [Install] WantedBy=multi-user.target
- Berechtigungen setzen
- sudo chown -R traefik:traefik /{opt,etc,var/log}/traefik
- sudo chmod 750 /opt/traefik/traefik
- sudo chmod 644 /etc/systemd/system/traefik.service
- sudo chown root:root /etc/systemd/system/traefik.service
- sudo chmod 644 /etc/logrotate.d/traefik
- sudo chown root:root /etc/logrotate.d/traefik
- Traefik dauerhaft aktivieren und gleichzeitig starten
- sudo systemctl daemon-reload
- sudo systemctl enable –now traefik.service
Backup mit Borgmatic
- siehe mariadb