Traefik & AWS ECS

Configuration Example

You can enable the ECS provider with as detailed below:

File (YAML)

  1. providers:
  2. ecs: {}

File (TOML)

  1. [providers.ecs]

CLI

  1. --providers.ecs=true

Configuration Options

FieldDescriptionDefaultRequired
providers.providersThrottleDurationMinimum amount of time to wait for, after a configuration reload, before taking into account any new configuration refresh event.
If multiple events occur within this time, only the most recent one is taken into account, and all others are discarded.
This option cannot be set per provider, but the throttling algorithm applies to each of them independently.
2sNo
providers.ecs.autoDiscoverClustersSearch for services in cluster list. If set to true service discovery is enabled for all clusters.falseNo
providers.ecs.ecsAnywhereEnable ECS Anywhere support.falseNo
providers.ecs.clustersSearch for services in cluster list. This option is ignored if autoDiscoverClusters is set to true.[“default”]No
providers.ecs.exposedByDefaultExpose ECS services by default in Traefik.trueNo
providers.ecs.constraintsDefines an expression that Traefik matches against the container labels to determine whether to create any route for that container. See here for more information.trueNo
providers.ecs.healthyTasksOnlyDefines whether Traefik discovers only healthy tasks (HEALTHY healthStatus).falseNo
providers.ecs.defaultRuleThe Default Host rule for all services. See here for more information.“Host({{ normalize .Name }})”No
providers.ecs.refreshSecondsDefines the polling interval (in seconds).15No
providers.ecs.regionDefines the region of the ECS instance. See here for more information.“”No
providers.ecs.accessKeyIDDefines the Access Key ID for the ECS instance. See here for more information.“”No
providers.ecs.secretAccessKeyDefines the Secret Access Key for the ECS instance. See here for more information.“”No

constraints

The constraints option can be set to an expression that Traefik matches against the container labels (task), to determine whether to create any route for that container. If none of the container labels match the expression, no route for that container is created. If the expression is empty, all detected containers are included.

The expression syntax is based on the Label("key", "value"), and LabelRegex("key", "value") functions, as well as the usual boolean logic, as shown in examples below.

Constraints Expression Examples

  1. # Includes only containers having a label with key `a.label.name` and value `foo`
  2. constraints = "Label(`a.label.name`, `foo`)"
  1. # Excludes containers having any label with key `a.label.name` and value `foo`
  2. constraints = "!Label(`a.label.name`, `value`)"
  1. # With logical AND.
  2. constraints = "Label(`a.label.name`, `valueA`) && Label(`another.label.name`, `valueB`)"
  1. # With logical OR.
  2. constraints = "Label(`a.label.name`, `valueA`) || Label(`another.label.name`, `valueB`)"
  1. # With logical AND and OR, with precedence set by parentheses.
  2. constraints = "Label(`a.label.name`, `valueA`) && (Label(`another.label.name`, `valueB`) || Label(`yet.another.label.name`, `valueC`))"
  1. # Includes only containers having a label with key `a.label.name` and a value matching the `a.+` regular expression.
  2. constraints = "LabelRegex(`a.label.name`, `a.+`)"

File (YAML)

  1. providers:
  2. ecs:
  3. constraints: "Label(`a.label.name`,`foo`)"
  4. # ...

File (TOML)

  1. [providers.ecs]
  2. constraints = "Label(`a.label.name`,`foo`)"
  3. # ...

CLI

  1. --providers.ecs.constraints="Label(`a.label.name`,`foo`)"
  2. # ...

For additional information, refer to Restrict the Scope of Service Discovery.

defaultRule

The defaultRule option defines what routing rule to apply to a container if no rule is defined by a label.

It must be a valid Go template, and can use sprig template functions. The container service name can be accessed with the Name identifier, and the template has access to all the labels defined on this container.

File (YAML)

  1. providers:
  2. ecs:
  3. defaultRule: "Host(`{{ .Name }}.{{ index .Labels \"customLabel\"}}`)"
  4. # ...

File (TOML)

  1. [providers.ecs]
  2. defaultRule = "Host(`{{ .Name }}.{{ index .Labels \"customLabel\"}}`)"
  3. # ...

CLI

  1. --providers.ecs.defaultRule='Host(`{{ .Name }}.{{ index .Labels "customLabel"}}`)'
  2. # ...

Default rule and Traefik service

The exposure of the Traefik container, combined with the default rule mechanism, can lead to create a router targeting itself in a loop. In this case, to prevent an infinite loop, Traefik adds an internal middleware to refuse the request if it comes from the same router.

Credentials

This defines the credentials for the ECS instance

If region is not provided, it is resolved from the EC2 metadata endpoint for EC2 tasks. In a FARGATE context it is resolved from the AWS_REGION environment variable.

If accessKeyID and secretAccessKey are not provided, credentials are resolved in the following order:

  • Using the environment variables AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY, and AWS_SESSION_TOKEN.
  • Using shared credentials, determined by AWS_PROFILE and AWS_SHARED_CREDENTIALS_FILE, defaults to default and ~/.aws/credentials.
  • Using EC2 instance role or ECS task role

File (YAML)

  1. providers:
  2. ecs:
  3. region: us-east-1
  4. accessKeyID: "abc"
  5. secretAccessKey: "123"
  6. # ...

File (TOML)

  1. [providers.ecs]
  2. region = "us-east-1"
  3. accessKeyID = "abc"
  4. secretAccessKey = "123"

CLI

  1. --providers.ecs.region="us-east-1"
  2. --providers.ecs.accessKeyID="abc"
  3. --providers.ecs.secretAccessKey="123"
  4. # ...

Policy

Traefik needs the following policy to read ECS information:

  1. {
  2. "Version": "2012-10-17",
  3. "Statement": [
  4. {
  5. "Sid": "TraefikECSReadAccess",
  6. "Effect": "Allow",
  7. "Action": [
  8. "ecs:ListClusters",
  9. "ecs:DescribeClusters",
  10. "ecs:ListTasks",
  11. "ecs:DescribeTasks",
  12. "ecs:DescribeContainerInstances",
  13. "ecs:DescribeTaskDefinition",
  14. "ec2:DescribeInstances",
  15. "ssm:DescribeInstanceInformation"
  16. ],
  17. "Resource": [
  18. "*"
  19. ]
  20. }
  21. ]
  22. }

ECS Anywhere

Please note that the ssm:DescribeInstanceInformation action is required for ECS anywhere instances discovery.