Traefik & Marathon
Traefik can be configured to use Marathon as a provider.
For additional information, refer to Marathon user guide.
Configuration Examples
Configuring Marathon & Deploying / Exposing Applications
Enabling the Marathon provider
File (YAML)
providers:
marathon: {}
File (TOML)
[providers.marathon]
CLI
--providers.marathon=true
Attaching labels to Marathon applications
{
"id": "/whoami",
"container": {
"type": "DOCKER",
"docker": {
"image": "traefik/whoami",
"network": "BRIDGE",
"portMappings": [
{
"containerPort": 80,
"hostPort": 0,
"protocol": "tcp"
}
]
}
},
"labels": {
"traefik.http.Routers.app.Rule": "PathPrefix(`/app`)"
}
}
Routing Configuration
See the dedicated section in routing.
Provider Configuration
basic
Optional
Enables Marathon basic authentication.
File (YAML)
providers:
marathon:
basic:
httpBasicAuthUser: foo
httpBasicPassword: bar
File (TOML)
[providers.marathon.basic]
httpBasicAuthUser = "foo"
httpBasicPassword = "bar"
CLI
--providers.marathon.basic.httpbasicauthuser=foo
--providers.marathon.basic.httpbasicpassword=bar
dcosToken
Optional
Datacenter Operating System (DCOS) Token for DCOS environment.
If set, it overrides the Authorization header.
File (YAML)
providers:
marathon:
dcosToken: "xxxxxx"
# ...
File (TOML)
[providers.marathon]
dcosToken = "xxxxxx"
# ...
CLI
--providers.marathon.dcosToken=xxxxxx
defaultRule
Optional, Default=Host(`{{ normalize .Name }}`)
The default host rule for all services.
For a given application, if no routing rule was defined by a label, it is defined by this defaultRule
instead.
It must be a valid Go template, and can include sprig template functions.
The app ID can be accessed with the Name
identifier, and the template has access to all the labels defined on this Marathon application.
File (YAML)
providers:
marathon:
defaultRule: "Host(`{{ .Name }}.{{ index .Labels \"customLabel\"}}`)"
# ...
File (TOML)
[providers.marathon]
defaultRule = "Host(`{{ .Name }}.{{ index .Labels \"customLabel\"}}`)"
# ...
CLI
--providers.marathon.defaultRule=Host(`{{ .Name }}.{{ index .Labels \"customLabel\"}}`)
# ...
dialerTimeout
Optional, Default=5s
Amount of time the Marathon provider should wait before timing out, when trying to open a TCP connection to a Marathon master.
The value of dialerTimeout
should be provided in seconds or as a valid duration format, see time.ParseDuration.
File (YAML)
providers:
marathon:
dialerTimeout: "10s"
# ...
File (TOML)
[providers.marathon]
dialerTimeout = "10s"
# ...
CLI
--providers.marathon.dialerTimeout=10s
endpoint
Optional, Default=http://127.0.0.1:8080
Marathon server endpoint.
You can optionally specify multiple endpoints.
File (YAML)
providers:
marathon:
endpoint: "http://10.241.1.71:8080,10.241.1.72:8080,10.241.1.73:8080"
# ...
File (TOML)
[providers.marathon]
endpoint = "http://10.241.1.71:8080,10.241.1.72:8080,10.241.1.73:8080"
# ...
CLI
--providers.marathon.endpoint=http://10.241.1.71:8080,10.241.1.72:8080,10.241.1.73:8080
exposedByDefault
Optional, Default=true
Exposes Marathon applications by default through Traefik.
If set to false
, applications that do not have a traefik.enable=true
label are ignored from the resulting routing configuration.
For additional information, refer to Restrict the Scope of Service Discovery.
File (YAML)
providers:
marathon:
exposedByDefault: false
# ...
File (TOML)
[providers.marathon]
exposedByDefault = false
# ...
CLI
--providers.marathon.exposedByDefault=false
# ...
constraints
Optional, Default=””
The constraints
option can be set to an expression that Traefik matches against the application labels to determine whether to create any route for that application. If none of the application labels match the expression, no route for that application is created. In addition, the expression is also matched against the application constraints, such as described in Marathon constraints. If the expression is empty, all detected applications are included.
The expression syntax is based on the Label("key", "value")
, and LabelRegex("key", "value")
functions, as well as the usual boolean logic. In addition, to match against Marathon constraints, the function MarathonConstraint("field:operator:value")
can be used, where the field, operator, and value parts are concatenated in a single string using the :
separator.
Constraints Expression Examples
# Includes only applications having a label with key `a.label.name` and value `foo`
constraints = "Label(`a.label.name`, `foo`)"
# Excludes applications having any label with key `a.label.name` and value `foo`
constraints = "!Label(`a.label.name`, `value`)"
# With logical AND.
constraints = "Label(`a.label.name`, `valueA`) && Label(`another.label.name`, `valueB`)"
# With logical OR.
constraints = "Label(`a.label.name`, `valueA`) || Label(`another.label.name`, `valueB`)"
# With logical AND and OR, with precedence set by parentheses.
constraints = "Label(`a.label.name`, `valueA`) && (Label(`another.label.name`, `valueB`) || Label(`yet.another.label.name`, `valueC`))"
# Includes only applications having a label with key `a.label.name` and a value matching the `a.+` regular expression.
constraints = "LabelRegex(`a.label.name`, `a.+`)"
# Includes only applications having a Marathon constraint with field `A`, operator `B`, and value `C`.
constraints = "MarathonConstraint(`A:B:C`)"
# Uses both Marathon constraint and application label with logical operator.
constraints = "MarathonConstraint(`A:B:C`) && Label(`a.label.name`, `value`)"
For additional information, refer to Restrict the Scope of Service Discovery.
File (YAML)
providers:
marathon:
constraints: "Label(`a.label.name`,`foo`)"
# ...
File (TOML)
[providers.marathon]
constraints = "Label(`a.label.name`,`foo`)"
# ...
CLI
--providers.marathon.constraints=Label(`a.label.name`,`foo`)
# ...
forceTaskHostname
Optional, Default=false
By default, the task IP address (as returned by the Marathon API) is used as backend server if an IP-per-task configuration can be found; otherwise, the name of the host running the task is used. The latter behavior can be enforced by setting this option to true
.
File (YAML)
providers:
marathon:
forceTaskHostname: true
# ...
File (TOML)
[providers.marathon]
forceTaskHostname = true
# ...
CLI
--providers.marathon.forceTaskHostname=true
# ...
keepAlive
Optional, Default=10s
Set the TCP Keep Alive duration for the Marathon HTTP Client. The value of keepAlive
should be provided in seconds or as a valid duration format, see time.ParseDuration.
File (YAML)
providers:
marathon:
keepAlive: "30s"
# ...
File (TOML)
[providers.marathon]
keepAlive = "30s"
# ...
CLI
--providers.marathon.keepAlive=30s
# ...
respectReadinessChecks
Optional, Default=false
Applications may define readiness checks which are probed by Marathon during deployments periodically, and these check results are exposed via the API. Enabling respectReadinessChecks
causes Traefik to filter out tasks whose readiness checks have not succeeded. Note that the checks are only valid during deployments.
See the Marathon guide for details.
File (YAML)
providers:
marathon:
respectReadinessChecks: true
# ...
File (TOML)
[providers.marathon]
respectReadinessChecks = true
# ...
CLI
--providers.marathon.respectReadinessChecks=true
# ...
responseHeaderTimeout
Optional, Default=60s
Amount of time the Marathon provider should wait before timing out when waiting for the first response header from a Marathon master.
The value of responseHeaderTimeout
should be provided in seconds or as a valid duration format, see time.ParseDuration.
File (YAML)
providers:
marathon:
responseHeaderTimeout: "66s"
# ...
File (TOML)
[providers.marathon]
responseHeaderTimeout = "66s"
# ...
CLI
--providers.marathon.responseHeaderTimeout=66s
# ...
tls
Optional
tls.ca
Certificate Authority used for the secure connection to Marathon.
File (YAML)
providers:
marathon:
tls:
ca: path/to/ca.crt
File (TOML)
[providers.marathon.tls]
ca = "path/to/ca.crt"
CLI
--providers.marathon.tls.ca=path/to/ca.crt
tls.caOptional
The value of tls.caOptional
defines which policy should be used for the secure connection with TLS Client Authentication to Marathon.
If tls.ca
is undefined, this option will be ignored, and no client certificate will be requested during the handshake. Any provided certificate will thus never be verified.
When this option is set to true
, a client certificate is requested during the handshake but is not required. If a certificate is sent, it is required to be valid.
When this option is set to false
, a client certificate is requested during the handshake, and at least one valid certificate should be sent by the client.
File (YAML)
providers:
marathon:
tls:
caOptional: true
File (TOML)
[providers.marathon.tls]
caOptional = true
CLI
--providers.marathon.tls.caOptional=true
tls.cert
Public certificate used for the secure connection to Marathon.
File (YAML)
providers:
marathon:
tls:
cert: path/to/foo.cert
key: path/to/foo.key
File (TOML)
[providers.marathon.tls]
cert = "path/to/foo.cert"
key = "path/to/foo.key"
CLI
--providers.marathon.tls.cert=path/to/foo.cert
--providers.marathon.tls.key=path/to/foo.key
tls.key
Private certificate used for the secure connection to Marathon.
File (YAML)
providers:
marathon:
tls:
cert: path/to/foo.cert
key: path/to/foo.key
File (TOML)
[providers.marathon.tls]
cert = "path/to/foo.cert"
key = "path/to/foo.key"
CLI
--providers.marathon.tls.cert=path/to/foo.cert
--providers.marathon.tls.key=path/to/foo.key
tls.insecureSkipVerify
If insecureSkipVerify
is true
, the TLS connection to Marathon accepts any certificate presented by the server regardless of the hostnames it covers.
File (YAML)
providers:
marathon:
tls:
insecureSkipVerify: true
File (TOML)
[providers.marathon.tls]
insecureSkipVerify = true
CLI
--providers.marathon.tls.insecureSkipVerify=true
tlsHandshakeTimeout
Optional, Default=5s
Amount of time the Marathon provider should wait before timing out, when waiting for the TLS handshake to complete.
The value of tlsHandshakeTimeout
should be provided in seconds or as a valid duration format, see time.ParseDuration.
File (YAML)
providers:
marathon:
responseHeaderTimeout: "10s"
# ...
File (TOML)
[providers.marathon]
responseHeaderTimeout = "10s"
# ...
CLI
--providers.marathon.responseHeaderTimeout=10s
# ...
trace
Optional, Default=false
Displays additional provider logs when available.
File (YAML)
providers:
marathon:
trace: true
# ...
File (TOML)
[providers.marathon]
trace = true
# ...
CLI
--providers.marathon.trace=true
# ...
watch
Optional, Default=true
When set to true
, watches for Marathon changes.
File (YAML)
providers:
marathon:
watch: false
# ...
File (TOML)
[providers.marathon]
watch = false
# ...
CLI
--providers.marathon.watch=false
# ...