Traefik proxy is part of NethServer core and it handles all HTTP routes. The proxy is installed on each cluster node.
Access the HTTP routes
card inside the Settings
page to see all configured routes.
Applications usually automatically setup the proxy during the configuration phase.
Automatic routes can't be modified except for the allowed IPs.
Each route can have a list of special attributes visible from the list:
automatic
for created rules created by the applicationsaccess restricted
if access is restricted to a specific network
You can add a custom route by clicking :guilabel:`Create route` button. Then enter the following details:
Name
: a unique name to identify the routeNode
: the node where the proxy instance is runningURL
: target URL of the route. It must correspond to a reachable backend HTTP server. It can be both internal or external to the cluster.Skip certificate validation
: if the URL starts withhttps://
, this switch disables the verification of the backend TLS certificate. If the backend is reached through a trusted network but it cannot provide a valid TLS certificate, it could be acceptable to skip the TLS verification.Host
: fill this field with a valid FQDN if you want a host-based route, sometimes also referred as virtual host; the application will be available on a URL likehttps://myapp.nethserver.org
Path
: fill this field with a valid path if you want a path-based route accessible from the cluster FQDN; the application will be available on a URL likehttps://cluster.nethserver.org/myapp
Strip URL path prefix
: whenPath
field is not empty, strip the path before routing the request to the target URLRequest Let's Encrypt certificate
enable this option to request a valid certificate, please remember :ref:`all requirements <certificate_manager-section>`Restrict access from
: restrict access to the route to a specific network, by default the route is accessible from any network. Enter a valid IPv4 address or CIDR network per line.
Note
The route named cluster-admin
is a special route that is automatically created during the cluster setup.
It is used to access the cluster administration interface.
Please bear in mind that if you restrict access to this route:
- you may prevent a new worker from joining the cluster
- you may lose access to the cluster configuration if you do not correctly enter your own IP address
If you loose access to the cluster administration interface, you can remove the access restriction from the command line. Follow these steps:
Access the cluster node using SSH with root privileges
Run the following command to remove the access restriction from the
cluster-admin
route:api-cli run module/traefik1/set-route --data '{"instance": "cluster-admin", "ip_allowlist": []}'
Replace
traefik1
with the correct module identifier, if your cluster has multiple nodes. Traefik identifiers are listed in theHTTP routes
page.