Traefik & ZooKeeper
A Story of KV store & Containers
Store your configuration in ZooKeeper and let Traefik do the rest!
Routing Configuration
See the dedicated section in routing.
Provider Configuration
endpoints
Required, Default=”127.0.0.1:2181”
Defines how to access to ZooKeeper.
File (TOML)
[providers.zooKeeper]
endpoints = ["127.0.0.1:2181"]
File (YAML)
providers:
zooKeeper:
endpoints:
- "127.0.0.1:2181"
CLI
--providers.zookeeper.endpoints=127.0.0.1:2181
rootKey
Defines the root key of the configuration.
Required, Default=”traefik”
File (TOML)
[providers.zooKeeper]
rootKey = "traefik"
File (YAML)
providers:
zooKeeper:
rootKey: "traefik"
CLI
--providers.zookeeper.rootkey=traefik
username
Defines a username to connect with ZooKeeper.
Optional, Default=””
File (TOML)
[providers.zooKeeper]
# ...
username = "foo"
File (YAML)
providers:
zooKeeper:
# ...
usename: "foo"
CLI
--providers.zookeeper.username=foo
password
Optional, Default=””
Defines a password to connect with ZooKeeper.
File (TOML)
[providers.zooKeeper]
# ...
password = "bar"
File (YAML)
providers:
zooKeeper:
# ...
password: "bar"
CLI
--providers.zookeeper.password=foo
tls
Optional
tls.ca
Certificate Authority used for the secured connection to ZooKeeper.
File (TOML)
[providers.zooKeeper.tls]
ca = "path/to/ca.crt"
File (YAML)
providers:
zooKeeper:
tls:
ca: path/to/ca.crt
CLI
--providers.zookeeper.tls.ca=path/to/ca.crt
tls.caOptional
Policy followed for the secured connection with TLS Client Authentication to ZooKeeper. Requires tls.ca
to be defined.
true
: VerifyClientCertIfGivenfalse
: RequireAndVerifyClientCert- if
tls.ca
is undefined NoClientCert
File (TOML)
[providers.zooKeeper.tls]
caOptional = true
File (YAML)
providers:
zooKeeper:
tls:
caOptional: true
CLI
--providers.zookeeper.tls.caOptional=true
tls.cert
Public certificate used for the secured connection to ZooKeeper.
File (TOML)
[providers.zooKeeper.tls]
cert = "path/to/foo.cert"
key = "path/to/foo.key"
File (YAML)
providers:
zooKeeper:
tls:
cert: path/to/foo.cert
key: path/to/foo.key
CLI
--providers.zookeeper.tls.cert=path/to/foo.cert
--providers.zookeeper.tls.key=path/to/foo.key
tls.key
Private certificate used for the secured connection to ZooKeeper.
File (TOML)
[providers.zooKeeper.tls]
cert = "path/to/foo.cert"
key = "path/to/foo.key"
File (YAML)
providers:
zooKeeper:
tls:
cert: path/to/foo.cert
key: path/to/foo.key
CLI
--providers.zookeeper.tls.cert=path/to/foo.cert
--providers.zookeeper.tls.key=path/to/foo.key
tls.insecureSkipVerify
If insecureSkipVerify
is true
, TLS for the connection to ZooKeeper accepts any certificate presented by the server and any host name in that certificate.
File (TOML)
[providers.zooKeeper.tls]
insecureSkipVerify = true
File (YAML)
providers:
zooKeeper:
tls:
insecureSkipVerify: true
CLI
--providers.zookeeper.tls.insecureSkipVerify=true