Traefik & etcd

Configuration Example

You can enable the etcd provider as detailed below:

File (YAML)

  1. providers:
  2. etcd: {}

File (TOML)

  1. [providers.etcd]

CLI

  1. --providers.etcd=true

Configuration Options

FieldDescriptionDefaultRequired
providers.providersThrottleDurationMinimum amount of time to wait for, after a configuration reload, before taking into account any new configuration refresh event.
If multiple events occur within this time, only the most recent one is taken into account, and all others are discarded.
This option cannot be set per provider, but the throttling algorithm applies to each of them independently.
2sNo
providers.etcd.endpointsDefines the endpoint to access etcd.“127.0.0.1:2379”Yes
providers.etcd.rootKeyDefines the root key for the configuration.“traefik”Yes
providers.etcd.usernameDefines a username with which to connect to etcd.“”No
providers.etcd.passwordDefines a password for connecting to etcd.“”No
providers.etcd.tlsDefines the TLS configuration used for the secure connection to etcd.-No
providers.etcd.tls.caDefines the path to the certificate authority used for the secure connection to etcd, it defaults to the system bundle.“”No
providers.etcd.tls.certDefines the path to the public certificate used for the secure connection to etcd. When using this option, setting the key option is required.“”Yes
providers.etcd.tls.keyDefines the path to the private key used for the secure connection to etcd. When using this option, setting the cert option is required.“”Yes
providers.etcd.tls.insecureSkipVerifyInstructs the provider to accept any certificate presented by etcd when establishing a TLS connection, regardless of the hostnames the certificate covers.falseNo

Routing Configuration

See the dedicated section in routing.