mirror of
https://github.com/traefik/traefik.git
synced 2025-09-20 13:21:19 +02:00
Fix invalid links in documentation
This commit is contained in:
parent
c450306c5a
commit
aac3d70fa1
@ -503,7 +503,7 @@ Traefik supports mutual authentication, through the `clientAuth` section.
|
|||||||
|
|
||||||
For authentication policies that require verification of the client certificate, the certificate authority for the certificates should be set in `clientAuth.caFiles`.
|
For authentication policies that require verification of the client certificate, the certificate authority for the certificates should be set in `clientAuth.caFiles`.
|
||||||
|
|
||||||
In Kubernetes environment, CA certificate can be set in `clientAuth.secretNames`. See [TLSOption resource](../../routing/providers/kubernetes-crd#kind-tlsoption) for more details.
|
In Kubernetes environment, CA certificate can be set in `clientAuth.secretNames`. See [TLSOption resource](../../routing/providers/kubernetes-crd/#kind-tlsoption) for more details.
|
||||||
|
|
||||||
The `clientAuth.clientAuthType` option governs the behaviour as follows:
|
The `clientAuth.clientAuthType` option governs the behaviour as follows:
|
||||||
|
|
||||||
|
@ -113,9 +113,9 @@ kubectl apply -f https://raw.githubusercontent.com/traefik/traefik/v3.3/docs/con
|
|||||||
|
|
||||||
**Updated Resources:**
|
**Updated Resources:**
|
||||||
|
|
||||||
- [TraefikService](../../routing/services#mirroring-service) ([PR #11032](https://github.com/traefik/traefik/pull/11032))
|
- [TraefikService](../../routing/services/#mirroring-service) ([PR #11032](https://github.com/traefik/traefik/pull/11032))
|
||||||
- [RateLimit](../../middlewares/http/ratelimit) & [InFlightReq](../../middlewares/http/inflightreq) middlewares ([PR #9747](https://github.com/traefik/traefik/pull/9747))
|
- [RateLimit](../../middlewares/http/ratelimit/) & [InFlightReq](../../middlewares/http/inflightreq/) middlewares ([PR #9747](https://github.com/traefik/traefik/pull/9747))
|
||||||
- [Compress](../../middlewares/http/compress) middleware ([PR #10943](https://github.com/traefik/traefik/pull/10943))
|
- [Compress](../../middlewares/http/compress/) middleware ([PR #10943](https://github.com/traefik/traefik/pull/10943))
|
||||||
|
|
||||||
### Kubernetes Gateway Provider Standard Channel
|
### Kubernetes Gateway Provider Standard Channel
|
||||||
|
|
||||||
|
@ -109,7 +109,7 @@ api:
|
|||||||
--api.dashboard=true
|
--api.dashboard=true
|
||||||
```
|
```
|
||||||
|
|
||||||
!!! warning "With Dashboard enabled, the router [rule](../../routing/routers#rule) must catch requests for both `/api` and `/dashboard`"
|
!!! warning "With Dashboard enabled, the router [rule](../../routing/routers/#rule) must catch requests for both `/api` and `/dashboard`"
|
||||||
Please check the [Dashboard documentation](./dashboard.md#dashboard-router-rule) to learn more about this and to get examples.
|
Please check the [Dashboard documentation](./dashboard.md#dashboard-router-rule) to learn more about this and to get examples.
|
||||||
|
|
||||||
### `debug`
|
### `debug`
|
||||||
|
@ -28,7 +28,7 @@ The OCSP response is cached in memory and is not persisted between Traefik resta
|
|||||||
|
|
||||||
### General
|
### General
|
||||||
|
|
||||||
Enabling OCSP is part of the [static configuration](../getting-started/configuration-overview.md#the-static-configuration).
|
Enabling OCSP is part of the [static configuration](../../../getting-started/configuration-overview.md#the-static-configuration).
|
||||||
It can be defined by using a file (YAML or TOML) or CLI arguments:
|
It can be defined by using a file (YAML or TOML) or CLI arguments:
|
||||||
|
|
||||||
```yaml tab="File (YAML)"
|
```yaml tab="File (YAML)"
|
||||||
|
@ -246,7 +246,7 @@ http:
|
|||||||
|
|
||||||
Most of what happens to the connection between the clients and Traefik,
|
Most of what happens to the connection between the clients and Traefik,
|
||||||
and then between Traefik and the backend servers, is configured through the
|
and then between Traefik and the backend servers, is configured through the
|
||||||
[entrypoints](../entrypoints) and the [routers](../routers).
|
[entrypoints](../entrypoints/) and the [routers](../routers/).
|
||||||
|
|
||||||
In addition, a few parameters are dedicated to configuring globally
|
In addition, a few parameters are dedicated to configuring globally
|
||||||
what happens with the connections between Traefik and the backends.
|
what happens with the connections between Traefik and the backends.
|
||||||
|
@ -392,7 +392,7 @@ Register the `IngressRoute` [kind](../../reference/dynamic-configuration/kuberne
|
|||||||
| [13] | `services[n].port` | Defines the port of a [Kubernetes service](https://kubernetes.io/docs/concepts/services-networking/service/). This can be a reference to a named port. |
|
| [13] | `services[n].port` | Defines the port of a [Kubernetes service](https://kubernetes.io/docs/concepts/services-networking/service/). This can be a reference to a named port. |
|
||||||
| [14] | `services[n].serversTransport` | Defines the reference to a [ServersTransport](#kind-serverstransport). The ServersTransport namespace is assumed to be the [Kubernetes service](https://kubernetes.io/docs/concepts/services-networking/service/) namespace (see [ServersTransport reference](#serverstransport-reference)). |
|
| [14] | `services[n].serversTransport` | Defines the reference to a [ServersTransport](#kind-serverstransport). The ServersTransport namespace is assumed to be the [Kubernetes service](https://kubernetes.io/docs/concepts/services-networking/service/) namespace (see [ServersTransport reference](#serverstransport-reference)). |
|
||||||
| [15] | `services[n].healthCheck` | Defines the HealthCheck when service references a [Kubernetes service](https://kubernetes.io/docs/concepts/services-networking/service/) of type ExternalName. |
|
| [15] | `services[n].healthCheck` | Defines the HealthCheck when service references a [Kubernetes service](https://kubernetes.io/docs/concepts/services-networking/service/) of type ExternalName. |
|
||||||
| [16] | `services[n].strategy` | Defines the load-balancing strategy for the load-balancer. Supported values are `wrr` and `p2c`, please refer to the [Load Balancing documentation](../routing/services/#load-balancing-strategy) for more information. |
|
| [16] | `services[n].strategy` | Defines the load-balancing strategy for the load-balancer. Supported values are `wrr` and `p2c`, please refer to the [Load Balancing documentation](../../services/#load-balancing-strategy) for more information. |
|
||||||
| [17] | `services[n].nativeLB` | Controls, when creating the load-balancer, whether the LB's children are directly the pods IPs or if the only child is the Kubernetes Service clusterIP. |
|
| [17] | `services[n].nativeLB` | Controls, when creating the load-balancer, whether the LB's children are directly the pods IPs or if the only child is the Kubernetes Service clusterIP. |
|
||||||
| [18] | `services[n].nodePortLB` | Controls, when creating the load-balancer, whether the LB's children are directly the nodes internal IPs using the nodePort when the service type is NodePort. |
|
| [18] | `services[n].nodePortLB` | Controls, when creating the load-balancer, whether the LB's children are directly the nodes internal IPs using the nodePort when the service type is NodePort. |
|
||||||
| [19] | `tls` | Defines [TLS](../routers/index.md#tls) certificate configuration |
|
| [19] | `tls` | Defines [TLS](../routers/index.md#tls) certificate configuration |
|
||||||
|
@ -94,7 +94,7 @@ To use this certificate with an Ingress, the [Kubernetes Ingress](../../provider
|
|||||||
|
|
||||||
### With an IngressRoute
|
### With an IngressRoute
|
||||||
|
|
||||||
To use this certificate with an IngressRoute, the [Kubernetes CRD](../../providers/kubernetes-crd) provider has to be enabled.
|
To use this certificate with an IngressRoute, the [Kubernetes CRD](../../providers/kubernetes-crd/) provider has to be enabled.
|
||||||
|
|
||||||
!!! info Traefik Helm Chart
|
!!! info Traefik Helm Chart
|
||||||
|
|
||||||
@ -124,7 +124,7 @@ To use this certificate with an IngressRoute, the [Kubernetes CRD](../../provide
|
|||||||
|
|
||||||
### With an HTTPRoute
|
### With an HTTPRoute
|
||||||
|
|
||||||
To use this certificate with an HTTPRoute, the [Kubernetes Gateway](../../routing/providers/kubernetes-gateway) provider has to be enabled.
|
To use this certificate with an HTTPRoute, the [Kubernetes Gateway](../../routing/providers/kubernetes-gateway/) provider has to be enabled.
|
||||||
|
|
||||||
!!! info Traefik Helm Chart
|
!!! info Traefik Helm Chart
|
||||||
|
|
||||||
|
@ -6,7 +6,7 @@ description: "Learn how to create a certificate with the Let's Encrypt HTTP chal
|
|||||||
# Docker-compose with Let's Encrypt : HTTP Challenge
|
# Docker-compose with Let's Encrypt : HTTP Challenge
|
||||||
|
|
||||||
This guide aims to demonstrate how to create a certificate with the Let's Encrypt HTTP challenge to use https on a simple service exposed with Traefik.
|
This guide aims to demonstrate how to create a certificate with the Let's Encrypt HTTP challenge to use https on a simple service exposed with Traefik.
|
||||||
Please also read the [basic example](../basic-example) for details on how to expose such a service.
|
Please also read the [basic example](../basic-example/) for details on how to expose such a service.
|
||||||
|
|
||||||
## Prerequisite
|
## Prerequisite
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user