Traefik uses these labels to auto-configure itself and then exposes the containers just as required. In essence, you will learn how to start Traefik alongside your other Docker containers, and then see make other Docker containers accessible by configuring them with container labels. In this article, you will learn how to setup Traefik that enables to access Docker containers with custom URLs and HTTPs encryption. This is ok if you have just one or two applications, but soon it will be hard to remember all the ports, and you are still using unencrypted HTTP which is not ideal when you use a WiFi connection to access the applications.īoth problems can be solved with a reverse proxy, an application that listens for incoming HTTP requests and forwards them to other applications. ![]() To access the applications, you type in the IP address of the host and its exposed ports. Typically, containers expose a port on its host. ![]() ![]() In your IOT home network, several applications are provided as Docker containers.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |