# Ajouter le repo Helm de Traefik
helm repo add traefik https://traefik.github.io/charts
helm repo update
# Installer Traefik dans le namespace kube-system
helm install traefik traefik/traefik -n kube-system
# Ou avec des valeurs personnalisées
helm install traefik traefik/traefik \
--namespace kube-system \
--set "ports.web.exposedPort=80" \
--set "ports.websecure.exposedPort=443"
Fichier : traefik-deployment.yml
---
apiVersion: v1
kind: Namespace
metadata:
name: traefik
---
apiVersion: v1
kind: ServiceAccount
metadata:
name: traefik-account
namespace: traefik
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: traefik-role
rules:
- apiGroups:
- ""
resources:
- services
- endpoints
- secrets
verbs:
- get
- list
- watch
- apiGroups:
- extensions
- networking.k8s.io
resources:
- ingresses
- ingressclasses
verbs:
- get
- list
- watch
- apiGroups:
- extensions
- networking.k8s.io
resources:
- ingresses/status
verbs:
- update
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: traefik-role-binding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: traefik-role
subjects:
- kind: ServiceAccount
name: traefik-account
namespace: traefik
---
apiVersion: apps/v1
kind: Deployment
metadata:
name: traefik-deployment
namespace: traefik
labels:
app: traefik
spec:
replicas: 1
selector:
matchLabels:
app: traefik
template:
metadata:
labels:
app: traefik
spec:
serviceAccountName: traefik-account
containers:
- name: traefik
image: traefik:v2.10
args:
- --api.insecure=true
- --providers.kubernetesingress
- --entrypoints.web.address=:80
- --entrypoints.websecure.address=:443
ports:
- name: web
containerPort: 80
- name: websecure
containerPort: 443
- name: dashboard
containerPort: 8080
---
apiVersion: v1
kind: Service
metadata:
name: traefik-service
namespace: traefik
spec:
type: LoadBalancer
selector:
app: traefik
ports:
- name: web
port: 80
targetPort: 80
- name: websecure
port: 443
targetPort: 443
- name: dashboard
port: 8080
targetPort: 8080
---
apiVersion: networking.k8s.io/v1
kind: IngressClass
metadata:
name: traefik
spec:
controller: traefik.io/ingress-controller
Appliquer le manifeste :
kubectl apply -f traefik-deployment.yml
# Activer l'addon Ingress avec Traefik
minikube addons enable ingress
# Ou utiliser Traefik spécifiquement
kubectl apply -f https://raw.githubusercontent.com/traefik/traefik/v2.10/docs/content/reference/dynamic-configuration/kubernetes-crd-definition-v1.yml
# Vérifier le déploiement
kubectl get pods -n traefik
kubectl get svc -n traefik
# Vérifier l'IngressClass
kubectl get ingressclass
Fichier : ingress-web.yml
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: ingress-web
namespace: default
annotations:
# Spécifier Traefik comme contrôleur
kubernetes.io/ingress.class: traefik
spec:
rules:
- host: monapp.local
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: service-web
port:
number: 80
Appliquer l’Ingress :
kubectl apply -f ingress-web.yml
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: ingress-multi-services
namespace: default
annotations:
kubernetes.io/ingress.class: traefik
spec:
rules:
# Service web principal
- host: monapp.local
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: service-web
port:
number: 80
# Service API
- host: api.monapp.local
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: service-api
port:
number: 8080
# Service admin
- host: admin.monapp.local
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: service-admin
port:
number: 3000
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: ingress-paths
namespace: default
annotations:
kubernetes.io/ingress.class: traefik
traefik.ingress.kubernetes.io/router.middlewares: default-strip-prefix@kubernetescrd
spec:
rules:
- host: monapp.local
http:
paths:
# Route vers le service web
- path: /web
pathType: Prefix
backend:
service:
name: service-web
port:
number: 80
# Route vers l'API
- path: /api
pathType: Prefix
backend:
service:
name: service-api
port:
number: 8080
# Route vers le dashboard
- path: /dashboard
pathType: Prefix
backend:
service:
name: service-dashboard
port:
number: 3000
# Obtenir l'IP de Minikube
minikube ip
# Exemple de sortie: 192.168.49.2
# Ajouter dans /etc/hosts (Linux/Mac) ou C:\Windows\System32\drivers\etc\hosts (Windows)
192.168.49.2 monapp.local
192.168.49.2 api.monapp.local
192.168.49.2 admin.monapp.local
# Obtenir l'IP externe du service Traefik
kubectl get svc -n traefik traefik-service
# Ajouter dans /etc/hosts
<IP_EXTERNE> monapp.local
# Tester avec curl
curl http://monapp.local
# Ou avec un navigateur
# Ouvrir: http://monapp.local
# Vérifier le statut de l'Ingress
kubectl get ingress
kubectl describe ingress ingress-web
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: ingress-web-secure
namespace: default
annotations:
kubernetes.io/ingress.class: traefik
traefik.ingress.kubernetes.io/redirect-entry-point: https
traefik.ingress.kubernetes.io/redirect-permanent: "true"
spec:
tls:
- hosts:
- monapp.local
secretName: monapp-tls
rules:
- host: monapp.local
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: service-web
port:
number: 80
# Définition du Middleware
apiVersion: traefik.containo.us/v1alpha1
kind: Middleware
metadata:
name: strip-prefix
namespace: default
spec:
stripPrefix:
prefixes:
- /api
- /web
---
# Ingress utilisant le middleware
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: ingress-with-middleware
namespace: default
annotations:
kubernetes.io/ingress.class: traefik
traefik.ingress.kubernetes.io/router.middlewares: default-strip-prefix@kubernetescrd
spec:
rules:
- host: monapp.local
http:
paths:
- path: /api
pathType: Prefix
backend:
service:
name: service-api
port:
number: 8080
# Créer le secret avec les credentials
# htpasswd -nb user password | base64
apiVersion: v1
kind: Secret
metadata:
name: authsecret
namespace: default
data:
users: dXNlcjokYXByMSRINnVza2trVyRJZ1hMUDZ3Tm5oOGJ1UEQyZVIzZ3AuCg==
---
apiVersion: traefik.containo.us/v1alpha1
kind: Middleware
metadata:
name: basic-auth
namespace: default
spec:
basicAuth:
secret: authsecret
---
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: ingress-protected
namespace: default
annotations:
kubernetes.io/ingress.class: traefik
traefik.ingress.kubernetes.io/router.middlewares: default-basic-auth@kubernetescrd
spec:
rules:
- host: admin.monapp.local
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: service-admin
port:
number: 80
apiVersion: traefik.containo.us/v1alpha1
kind: Middleware
metadata:
name: rate-limit
namespace: default
spec:
rateLimit:
average: 100
burst: 200
---
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: ingress-rate-limited
namespace: default
annotations:
kubernetes.io/ingress.class: traefik
traefik.ingress.kubernetes.io/router.middlewares: default-rate-limit@kubernetescrd
spec:
rules:
- host: api.monapp.local
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: service-api
port:
number: 8080
# Port-forward pour accéder au dashboard
kubectl port-forward -n traefik $(kubectl get pods -n traefik --selector "app=traefik" --output=name) 9000:8080
# Ouvrir dans le navigateur
# http://localhost:9000/dashboard/
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: traefik-dashboard
namespace: traefik
annotations:
kubernetes.io/ingress.class: traefik
spec:
rules:
- host: traefik.local
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: traefik-service
port:
number: 8080
---
# Deployment SuperMinou
apiVersion: apps/v1
kind: Deployment
metadata:
name: deploy-superminou
labels:
app: superminou
spec:
replicas: 3
selector:
matchLabels:
app: superminou
template:
metadata:
labels:
app: superminou
spec:
containers:
- name: superminou
image: alainboudreault/superminou:latest
ports:
- containerPort: 80
---
# Service SuperMinou
apiVersion: v1
kind: Service
metadata:
name: service-web
spec:
selector:
app: superminou
ports:
- protocol: TCP
port: 80
targetPort: 80
---
# Ingress SuperMinou
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: ingress-superminou
annotations:
kubernetes.io/ingress.class: traefik
spec:
rules:
- host: superminou.local
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: service-web
port:
number: 80
Déployer :
kubectl apply -f superminou-complete.yml
# Ajouter dans /etc/hosts
echo "$(minikube ip) superminou.local" | sudo tee -a /etc/hosts
# Tester
curl http://superminou.local
kubectl logs -n traefik -l app=traefik -f
kubectl describe ingress ingress-web
kubectl get ingress -A
# Vérifier que le service existe et fonctionne
kubectl get svc service-web
kubectl get endpoints service-web
# Tester le service directement
kubectl port-forward svc/service-web 8080:80
curl http://localhost:8080
# Vérifier le service Traefik
kubectl get svc -n traefik
# Pour Minikube, utiliser le tunnel
minikube tunnel
# Lister tous les Ingress
kubectl get ingress -A
# Voir les détails d'un Ingress
kubectl describe ingress <nom-ingress>
# Voir les logs Traefik
kubectl logs -n traefik deployment/traefik-deployment -f
# Redémarrer Traefik
kubectl rollout restart deployment/traefik-deployment -n traefik
# Supprimer un Ingress
kubectl delete ingress <nom-ingress>