This guide shows you how to deploy your containers behind Traefik reverse-proxy. It will obtain and refresh HTTPS certificates automatically and it comes with password-protected Traefik dashboard.
- Docker Socket Proxy 1.26.2/latest
- Traefik 2.11.x, 3.1.x, 3.2.x & 3.3.x
- Logger Alpine Linux 3.20 or 3.21
- Docker Socket Proxy (security) -
Linuxserver.ioDocument - Traefik Document
- Logger (logrotate & cron)
Custom of Alpine - Portainer (Optional) Document
- Git
- Docker
- Docker Compose
Official documentation for install Docker with new Docker Compose V2 doc, and you can install too Docker Compose V1. Follow official documentation.
sudo apt-get install git docker-ce docker-ce-cli containerd.io docker-compose-plugingit clone https://github.com/asapdotid/dcc-traefik-cf-https.git
cd dcc-traefik-cf-httpsMake command help:
make helpmake initModified file in .make/.env for build image
...
# Project variables
DOCKER_REGISTRY=docker.io
DOCKER_NAMESPACE=asapdotid
DOCKER_PROJECT_NAME=cf-proxy
# Docker image version
DOCKER_SOCKET_VERSION=latest
TRAEFIK_VERSION=3.2
ALPINE_VERSION=3.21
# Timezone for os and log level
TIMEZONE=Asia/Jakartamake envModified file in src/.env for build image
The password is adminpass and you might want to change it before deploying to production.
Note: when used in docker-compose.yml all dollar signs in the hash need to be doubled for escaping.
Install
Apache Toolspackage to usinghtpasswdTo create auser:passwordpair, the following command can be used:
echo $(htpasswd -nb user)
# OR
echo $(htpasswd -nb user password)Running script:
echo $(htpasswd -nb admin)
New password:
Re-type new password:
admin:$apr1$W3jHMbEG$TCzyOICAWv/6kkraCHKYC0or
echo $(htpasswd -nb admin adminpass)
admin:$apr1$W3jHMbEG$TCzyOICAWv/6kkraCHKYC0The output has the following format: username:password_hash. The username doesn't have to be admin, feel free to change it (in the first line).
Encode password hash with base64:
echo '$apr1$W3jHMbEG$TCzyOICAWv/6kkraCHKYC0' | openssl enc -e -base64
JGFwcjEkVzNqSE1iRUckVEN6eU9JQ0FXdi82a2tyYUNIS1lDMAo=Check decode:
echo 'JGFwcjEkVzNqSE1iRUckVEN6eU9JQ0FXdi82a2tyYUNIS1lDMAo=' | openssl enc -d -base64You can paste the username into the TRAEFIK_BASIC_AUTH_USERNAME environment variable. The other part, hashedPassword, should be assigned to TRAEFIK_BASIC_AUTH_PASSWORD_HASH. Now you have your own username:password pair.
Optional create docker network net-proxy for external used with other docker containers:
docker network create net-proxymake env
make buildDocker composer make commands:
make up
# or
make down- Whoami
- Portainer
Can remove or command.
curl -I https://{domain_name}/You can also test it in the browser:
https://{domain_name}/
https://monitor.{domain_name}/
Traefik requires you to define "Certificate Resolvers" in the static configuration, which are responsible for retrieving certificates from an ACME server.
Then, each "router" is configured to enable TLS, and is associated to a certificate resolver through the tls.certresolver configuration option.
Here is a list of supported providers, on this project:
- Cloudflare
Let's say you have a domain example.com and it's DNS records point to your production server. Just repeat the local deployment steps, but don't forget to update TRAEFIK_DOMAIN_NAME, TRAEFIK_ACME_DNS_CHALLENGE_PROVIDER_EMAIL & TRAEFIK_ACME_DNS_CHALLENGE_PROVIDER_TOKEN environment variables. In case of example.com, your src/.env file should have the following lines:
TRAEFIK_DOMAIN_NAME=example.com
TRAEFIK_ACME_DNS_CHALLENGE_PROVIDER_EMAIL=email@mail.com
TRAEFIK_ACME_DNS_CHALLENGE_PROVIDER_TOKEN=coudflare-access-token-123ABCSetting correct email is important because it allows Let’s Encrypt to contact you in case there are any present and future issues with your certificates.
Example labels redirect www to npn www:
labels:
- traefik.enable=true
- traefil.docker.network=net-proxy
- traefik.http.routers.whoami.entrypoints=https
- traefik.http.routers.whoami.rule=Host(`jogjascript.com`)||Host(`www.jogjascript.com`)
# Add redirect middlewares for http and https
- traefik.http.routers.whoami.middlewares=redirect-http-www@file,redirect-https-www@fileFile:
src/compose/docker-compose.local.yml
whoami:
image: traefik/whoami:latest
container_name: whoami
networks:
- net-internal
depends_on:
- traefik
labels:
- traefik.enable=true
- traefik.http.routers.whoami.entrypoints=https
- traefik.http.routers.whoami.rule=Host(`jogjascript.com`)||Host(`www.jogjascript.com`)
# Add redirect middlewares for http and https
- traefik.http.routers.whoami.middlewares=redirect-http-www@file,redirect-https-www@fileportainer:
image: portainer/portainer-ce:latest
restart: unless-stopped
security_opt:
- no-new-privileges:true
networks:
- net-internal
volumes:
- /etc/localtime:/etc/localtime:ro
- ../../.data/portainer:/data
labels:
- traefik.enable=true
- traefik.http.routers.portainer.entrypoints=https
- traefik.http.routers.portainer.rule=Host(`portainer.${TRAEFIK_DOMAIN_NAME}`)
- traefik.http.services.portainer.loadbalancer.server.port=9000
depends_on:
- dockersocket
- traefikSample:
---
labels:
- traefik.enable=true
- traefil.docker.network=net-proxy
- traefik.http.routers.portainer.entrypoints=https
- traefik.http.routers.portainer.rule=Host(`app.${TRAEFIK_DOMAIN_NAME}`)Path prefix with loadbalancer:
---
labels:
- traefik.enable=true
- traefik.docker.network=net-proxy
- traefik.http.routers.backend-v1.entrypoints=https
- traefik.http.routers.backend-v1.rule=Host(`api.domain_name.com`) && PathPrefix(`/v1`)
- traefik.http.services.backend-v1.loadbalancer.server.port=3000
- traefik.http.routers.backend-v1.middlewares=api-strip
- traefik.http.middlewares.api-strip.stripprefix.prefixes=/v1Sample nginx service:
---
nginx:
image: nginx:stable
networks:
- net-proxy
labels:
- traefik.enable=true
- traefil.docker.network=net-proxy
- traefik.http.routers.portainer.entrypoints=https
- traefik.http.routers.portainer.rule=Host(`app.${TRAEFIK_DOMAIN_NAME}`)Also included is an option that allows only TLS v1.3. This option must be manually configured. There is an example below on how to do this with a docker label.
---
nginx:
image: nginx:stable
networks:
- net-proxy
labels:
- traefik.enable=true
- traefil.docker.network=net-proxy
# only TLS v1.3
- traefik.http.routers.project-app.tls.options=tlsv13only@file
- traefik.http.routers.portainer.entrypoints=https
- traefik.http.routers.portainer.rule=Host(`app.${TRAEFIK_DOMAIN_NAME}`)Read instruction after container up instruction
MIT / BSD
This Docker Compose Traefik HTTPS was created in 2022 by Asapdotid 🚀
