EntryPoints
Opening Connections for Incoming Requests
EntryPoints are the network entry points into Traefik. They define the port which will receive the packets, and whether to listen for TCP or UDP.
Configuration Examples
Port 80 only
File (YAML)
## Static configuration
entryPoints:
web:
address: ":80"
File (TOML)
## Static configuration
[entryPoints]
[entryPoints.web]
address = ":80"
CLI
## Static configuration
--entryPoints.web.address=:80
We define an entrypoint
called web
that will listen on port 80
.
Port 80 & 443
File (YAML)
## Static configuration
entryPoints:
web:
address: ":80"
websecure:
address: ":443"
File (TOML)
## Static configuration
[entryPoints]
[entryPoints.web]
address = ":80"
[entryPoints.websecure]
address = ":443"
CLI
## Static configuration
--entryPoints.web.address=:80
--entryPoints.websecure.address=:443
- Two entrypoints are defined: one called
web
, and the other calledwebsecure
. web
listens on port80
, andwebsecure
on port443
.
UDP on port 1704
File (YAML)
## Static configuration
entryPoints:
streaming:
address: ":1704/udp"
File (TOML)
## Static configuration
[entryPoints]
[entryPoints.streaming]
address = ":1704/udp"
CLI
## Static configuration
--entryPoints.streaming.address=:1704/udp
Configuration
General
EntryPoints are part of the static configuration. They can be defined by using a file (YAML or TOML) or CLI arguments.
See the complete reference for the list of available options
File (YAML)
## Static configuration
entryPoints:
name:
address: ":8888" # same as ":8888/tcp"
enableHTTP3: true
transport:
lifeCycle:
requestAcceptGraceTimeout: 42
graceTimeOut: 42
respondingTimeouts:
readTimeout: 42
writeTimeout: 42
idleTimeout: 42
proxyProtocol:
insecure: true
trustedIPs:
- "127.0.0.1"
- "192.168.0.1"
forwardedHeaders:
insecure: true
trustedIPs:
- "127.0.0.1"
- "192.168.0.1"
File (TOML)
## Static configuration
[entryPoints]
[entryPoints.name]
address = ":8888" # same as ":8888/tcp"
enableHTTP3 = true
[entryPoints.name.transport]
[entryPoints.name.transport.lifeCycle]
requestAcceptGraceTimeout = 42
graceTimeOut = 42
[entryPoints.name.transport.respondingTimeouts]
readTimeout = 42
writeTimeout = 42
idleTimeout = 42
[entryPoints.name.proxyProtocol]
insecure = true
trustedIPs = ["127.0.0.1", "192.168.0.1"]
[entryPoints.name.forwardedHeaders]
insecure = true
trustedIPs = ["127.0.0.1", "192.168.0.1"]
CLI
## Static configuration
--entryPoints.name.address=:8888 # same as :8888/tcp
--entryPoints.name.http3=true
--entryPoints.name.transport.lifeCycle.requestAcceptGraceTimeout=42
--entryPoints.name.transport.lifeCycle.graceTimeOut=42
--entryPoints.name.transport.respondingTimeouts.readTimeout=42
--entryPoints.name.transport.respondingTimeouts.writeTimeout=42
--entryPoints.name.transport.respondingTimeouts.idleTimeout=42
--entryPoints.name.proxyProtocol.insecure=true
--entryPoints.name.proxyProtocol.trustedIPs=127.0.0.1,192.168.0.1
--entryPoints.name.forwardedHeaders.insecure=true
--entryPoints.name.forwardedHeaders.trustedIPs=127.0.0.1,192.168.0.1
Address
The address defines the port, and optionally the hostname, on which to listen for incoming connections and packets. It also defines the protocol to use (TCP or UDP). If no protocol is specified, the default is TCP. The format is:
[host]:port[/tcp|/udp]
If both TCP and UDP are wanted for the same port, two entryPoints definitions are needed, such as in the example below.
Both TCP and UDP on Port 3179
File (YAML)
## Static configuration
entryPoints:
tcpep:
address: ":3179"
udpep:
address: ":3179/udp"
File (TOML)
## Static configuration
[entryPoints]
[entryPoints.tcpep]
address = ":3179"
[entryPoints.udpep]
address = ":3179/udp"
CLI
## Static configuration
--entryPoints.tcpep.address=:3179
--entryPoints.udpep.address=:3179/udp
Listen on Specific IP Addresses Only
File (yaml)
entryPoints:
specificIPv4:
address: "192.168.2.7:8888"
specificIPv6:
address: "[2001:db8::1]:8888"
File (TOML)
[entryPoints.specificIPv4]
address = "192.168.2.7:8888"
[entryPoints.specificIPv6]
address = "[2001:db8::1]:8888"
CLI
--entrypoints.specificIPv4.address=192.168.2.7:8888
--entrypoints.specificIPv6.address=[2001:db8::1]:8888
Full details for how to specify address
can be found in net.Listen (and net.Dial) of the doc for go.
EnableHTTP3
enableHTTP3
defines that you want to enable HTTP3 on this address
. You can only enable HTTP3 on a TCP entrypoint. Enabling HTTP3 will automatically add the correct headers for the connection upgrade to HTTP3.
HTTP3 uses UDP+TLS
As HTTP3 uses UDP, you can’t have a TCP entrypoint with HTTP3 on the same port as a UDP entrypoint. Since HTTP3 requires the use of TLS, only routers with TLS enabled will be usable with HTTP3.
Enabling Experimental HTTP3
As the HTTP3 spec is still in draft, HTTP3 support in Traefik is an experimental feature and needs to be activated in the experimental section of the static configuration.
File (YAML)
experimental:
http3: true
entryPoints:
name:
enableHTTP3: true
File (TOML)
[experimental]
http3 = true
[entryPoints.name]
enableHTTP3 = true
CLI
--experimental.http3=true --entrypoints.name.enablehttp3=true
Forwarded Headers
You can configure Traefik to trust the forwarded headers information (X-Forwarded-*
).
forwardedHeaders.trustedIPs
Trusting Forwarded Headers from specific IPs.
File (YAML)
## Static configuration
entryPoints:
web:
address: ":80"
forwardedHeaders:
trustedIPs:
- "127.0.0.1/32"
- "192.168.1.7"
File (TOML)
## Static configuration
[entryPoints]
[entryPoints.web]
address = ":80"
[entryPoints.web.forwardedHeaders]
trustedIPs = ["127.0.0.1/32", "192.168.1.7"]
CLI
## Static configuration
--entryPoints.web.address=:80
--entryPoints.web.forwardedHeaders.trustedIPs=127.0.0.1/32,192.168.1.7
forwardedHeaders.insecure
Insecure Mode (Always Trusting Forwarded Headers).
File (YAML)
## Static configuration
entryPoints:
web:
address: ":80"
forwardedHeaders:
insecure: true
File (TOML)
## Static configuration
[entryPoints]
[entryPoints.web]
address = ":80"
[entryPoints.web.forwardedHeaders]
insecure = true
CLI
## Static configuration
--entryPoints.web.address=:80
--entryPoints.web.forwardedHeaders.insecure
Transport
respondingTimeouts
respondingTimeouts
are timeouts for incoming requests to the Traefik instance. Setting them has no effect for UDP entryPoints.
transport.respondingTimeouts.readTimeout
Optional, Default=0s
readTimeout
is the maximum duration for reading the entire request, including the body.
If zero, no timeout exists.
Can be provided in a format supported by time.ParseDuration or as raw values (digits). If no units are provided, the value is parsed assuming seconds.
File (YAML)
## Static configuration
entryPoints:
name:
address: ":8888"
transport:
respondingTimeouts:
readTimeout: 42
File (TOML)
## Static configuration
[entryPoints]
[entryPoints.name]
address = ":8888"
[entryPoints.name.transport]
[entryPoints.name.transport.respondingTimeouts]
readTimeout = 42
CLI
## Static configuration
--entryPoints.name.address=:8888
--entryPoints.name.transport.respondingTimeouts.readTimeout=42
transport.respondingTimeouts.writeTimeout
Optional, Default=0s
writeTimeout
is the maximum duration before timing out writes of the response.
It covers the time from the end of the request header read to the end of the response write. If zero, no timeout exists.
Can be provided in a format supported by time.ParseDuration or as raw values (digits). If no units are provided, the value is parsed assuming seconds.
File (YAML)
## Static configuration
entryPoints:
name:
address: ":8888"
transport:
respondingTimeouts:
writeTimeout: 42
File (TOML)
## Static configuration
[entryPoints]
[entryPoints.name]
address = ":8888"
[entryPoints.name.transport]
[entryPoints.name.transport.respondingTimeouts]
writeTimeout = 42
CLI
## Static configuration
--entryPoints.name.address=:8888
--entryPoints.name.transport.respondingTimeouts.writeTimeout=42
transport.respondingTimeouts.idleTimeout
Optional, Default=180s
idleTimeout
is the maximum duration an idle (keep-alive) connection will remain idle before closing itself.
If zero, no timeout exists.
Can be provided in a format supported by time.ParseDuration or as raw values (digits). If no units are provided, the value is parsed assuming seconds.
File (YAML)
## Static configuration
entryPoints:
name:
address: ":8888"
transport:
respondingTimeouts:
idleTimeout: 42
File (TOML)
## Static configuration
[entryPoints]
[entryPoints.name]
address = ":8888"
[entryPoints.name.transport]
[entryPoints.name.transport.respondingTimeouts]
idleTimeout = 42
CLI
## Static configuration
--entryPoints.name.address=:8888
--entryPoints.name.transport.respondingTimeouts.idleTimeout=42
lifeCycle
Controls the behavior of Traefik during the shutdown phase.
lifeCycle.requestAcceptGraceTimeout
Optional, Default=0s
Duration to keep accepting requests prior to initiating the graceful termination period (as defined by the graceTimeOut
option). This option is meant to give downstream load-balancers sufficient time to take Traefik out of rotation.
Can be provided in a format supported by time.ParseDuration or as raw values (digits).
If no units are provided, the value is parsed assuming seconds. The zero duration disables the request accepting grace period, i.e., Traefik will immediately proceed to the grace period.
File (YAML)
## Static configuration
entryPoints:
name:
address: ":8888"
transport:
lifeCycle:
requestAcceptGraceTimeout: 42
File (TOML)
## Static configuration
[entryPoints]
[entryPoints.name]
address = ":8888"
[entryPoints.name.transport]
[entryPoints.name.transport.lifeCycle]
requestAcceptGraceTimeout = 42
CLI
## Static configuration
--entryPoints.name.address=:8888
--entryPoints.name.transport.lifeCycle.requestAcceptGraceTimeout=42
lifeCycle.graceTimeOut
Optional, Default=10s
Duration to give active requests a chance to finish before Traefik stops.
Can be provided in a format supported by time.ParseDuration or as raw values (digits).
If no units are provided, the value is parsed assuming seconds.
In this time frame no new requests are accepted.
File (YAML)
## Static configuration
entryPoints:
name:
address: ":8888"
transport:
lifeCycle:
graceTimeOut: 42
File (TOML)
## Static configuration
[entryPoints]
[entryPoints.name]
address = ":8888"
[entryPoints.name.transport]
[entryPoints.name.transport.lifeCycle]
graceTimeOut = 42
CLI
## Static configuration
--entryPoints.name.address=:8888
--entryPoints.name.transport.lifeCycle.graceTimeOut=42
ProxyProtocol
Traefik supports ProxyProtocol version 1 and 2.
If Proxy Protocol header parsing is enabled for the entry point, this entry point can accept connections with or without Proxy Protocol headers.
If the Proxy Protocol header is passed, then the version is determined automatically.
proxyProtocol.trustedIPs
Enabling Proxy Protocol with Trusted IPs.
File (YAML)
## Static configuration
entryPoints:
web:
address: ":80"
proxyProtocol:
trustedIPs:
- "127.0.0.1/32"
- "192.168.1.7"
File (TOML)
## Static configuration
[entryPoints]
[entryPoints.web]
address = ":80"
[entryPoints.web.proxyProtocol]
trustedIPs = ["127.0.0.1/32", "192.168.1.7"]
CLI
--entryPoints.web.address=:80
--entryPoints.web.proxyProtocol.trustedIPs=127.0.0.1/32,192.168.1.7
IPs in trustedIPs
only will lead to remote client address replacement: Declare load-balancer IPs or CIDR range here.
proxyProtocol.insecure
Insecure Mode (Testing Environment Only).
In a test environments, you can configure Traefik to trust every incoming connection. Doing so, every remote client address will be replaced (trustedIPs
won’t have any effect)
File (YAML)
## Static configuration
entryPoints:
web:
address: ":80"
proxyProtocol:
insecure: true
File (TOML)
## Static configuration
[entryPoints]
[entryPoints.web]
address = ":80"
[entryPoints.web.proxyProtocol]
insecure = true
CLI
--entryPoints.web.address=:80
--entryPoints.web.proxyProtocol.insecure
Queuing Traefik behind Another Load Balancer
When queuing Traefik behind another load-balancer, make sure to configure Proxy Protocol on both sides. Not doing so could introduce a security risk in your system (enabling request forgery).
HTTP Options
This whole section is dedicated to options, keyed by entry point, that will apply only to HTTP routing.
Redirection
HTTPS redirection (80 to 443)
File (YAML)
entryPoints:
web:
address: :80
http:
redirections:
entryPoint:
to: websecure
scheme: https
websecure:
address: :443
File (TOML)
[entryPoints.web]
address = ":80"
[entryPoints.web.http]
[entryPoints.web.http.redirections]
[entryPoints.web.http.redirections.entryPoint]
to = "websecure"
scheme = "https"
[entryPoints.websecure]
address = ":443"
CLI
--entrypoints.web.address=:80
--entrypoints.web.http.redirections.entryPoint.to=websecure
--entrypoints.web.http.redirections.entryPoint.scheme=https
--entrypoints.websecure.address=:443
entryPoint
This section is a convenience to enable (permanent) redirecting of all incoming requests on an entry point (e.g. port 80
) to another entry point (e.g. port 443
) or an explicit port (:443
).
entryPoint.to
Required
The target element, it can be:
- an entry point name (ex:
websecure
) - a port (
:443
)
File (YAML)
entryPoints:
foo:
# ...
http:
redirections:
entryPoint:
to: websecure
File (TOML)
[entryPoints.foo]
# ...
[entryPoints.foo.http.redirections]
[entryPoints.foo.http.redirections.entryPoint]
to = "websecure"
CLI
--entrypoints.foo.http.redirections.entryPoint.to=websecure
entryPoint.scheme
Optional, Default=”https”
The redirection target scheme.
File (YAML)
entryPoints:
foo:
# ...
http:
redirections:
entryPoint:
# ...
scheme: https
File (TOML)
[entryPoints.foo]
# ...
[entryPoints.foo.http.redirections]
[entryPoints.foo.http.redirections.entryPoint]
# ...
scheme = "https"
CLI
--entrypoints.foo.http.redirections.entryPoint.scheme=https
entryPoint.permanent
Optional, Default=true
To apply a permanent redirection.
File (YAML)
entryPoints:
foo:
# ...
http:
redirections:
entryPoint:
# ...
permanent: true
File (TOML)
[entryPoints.foo]
# ...
[entryPoints.foo.http.redirections]
[entryPoints.foo.http.redirections.entryPoint]
# ...
permanent = true
CLI
--entrypoints.foo.http.redirections.entrypoint.permanent=true
entryPoint.priority
Optional, Default=1
Priority of the generated router.
File (YAML)
entryPoints:
foo:
# ...
http:
redirections:
entryPoint:
# ...
priority: 10
File (TOML)
[entryPoints.foo]
# ...
[entryPoints.foo.http.redirections]
[entryPoints.foo.http.redirections.entryPoint]
# ...
priority = 10
CLI
--entrypoints.foo.http.redirections.entrypoint.priority=10
Middlewares
The list of middlewares that are prepended by default to the list of middlewares of each router associated to the named entry point.
File (YAML)
entryPoints:
websecure:
address: ':443'
http:
middlewares:
- auth@file
- strip@file
File (TOML)
[entryPoints.websecure]
address = ":443"
[entryPoints.websecure.http]
middlewares = ["auth@file", "strip@file"]
CLI
--entrypoints.websecure.address=:443
--entrypoints.websecure.http.middlewares=auth@file,strip@file
TLS
This section is about the default TLS configuration applied to all routers associated with the named entry point.
If a TLS section (i.e. any of its fields) is user-defined, then the default configuration does not apply at all.
The TLS section is the same as the TLS section on HTTP routers.
File (YAML)
entryPoints:
websecure:
address: ':443'
http:
tls:
options: foobar
certResolver: leresolver
domains:
- main: example.com
sans:
- foo.example.com
- bar.example.com
- main: test.com
sans:
- foo.test.com
- bar.test.com
File (TOML)
[entryPoints.websecure]
address = ":443"
[entryPoints.websecure.http.tls]
options = "foobar"
certResolver = "leresolver"
[[entryPoints.websecure.http.tls.domains]]
main = "example.com"
sans = ["foo.example.com", "bar.example.com"]
[[entryPoints.websecure.http.tls.domains]]
main = "test.com"
sans = ["foo.test.com", "bar.test.com"]
CLI
--entrypoints.websecure.address=:443
--entrypoints.websecure.http.tls.options=foobar
--entrypoints.websecure.http.tls.certResolver=leresolver
--entrypoints.websecure.http.tls.domains[0].main=example.com
--entrypoints.websecure.http.tls.domains[0].sans=foo.example.com,bar.example.com
--entrypoints.websecure.http.tls.domains[1].main=test.com
--entrypoints.websecure.http.tls.domains[1].sans=foo.test.com,bar.test.com
Let’s Encrypt
File (YAML)
entryPoints:
websecure:
address: ':443'
http:
tls:
certResolver: leresolver
File (TOML)
[entryPoints.websecure]
address = ":443"
[entryPoints.websecure.http.tls]
certResolver = "leresolver"
CLI
--entrypoints.websecure.address=:443
--entrypoints.websecure.http.tls.certResolver=leresolver
UDP Options
This whole section is dedicated to options, keyed by entry point, that will apply only to UDP routing.
Timeout
Optional, Default=3s
Timeout defines how long to wait on an idle session before releasing the related resources. The Timeout value must be greater than zero.
File (YAML)
entryPoints:
foo:
address: ':8000/udp'
udp:
timeout: 10s
File (TOML)
[entryPoints.foo]
address = ":8000/udp"
[entryPoints.foo.udp]
timeout = "10s"
CLI
entrypoints.foo.address=:8000/udp
entrypoints.foo.udp.timeout=10s