Traefik Labs Adds Hub to Simplify Container Networking - Container Journal

2022-06-22 20:14:47 By : Mr. Hailong Ding

Traefik Labs today unveiled a cloud service that leverages agent software to simplify the provisioning of network services for containers.

Manuel Zapf, a product manager for Traefik Labs, says Traefik Hub is a software-as-a-service (SaaS) platform that adds an agent to the open source Traefik Proxy software. That agent makes it possible to instantly authorize access to containers from a single dashboard. That capability eliminates the need to manually configure domain name system (DNS) addresses, routing rules, access control and network access translation to gain access to the internet, he adds.

Instead, Traefik Hub employs a lightweight agent to create a secure tunnel for both authenticating access and automating the management of transport layer security (TLS) certificates.

Zapf says that as more organizations begin to deploy microservices-based applications at scale across multiple Kubernetes clusters, the challenges involving networking and security are multiplying. Traefik Hub is designed to automate authentication processes without requiring a specialist to manage and secure all the network connections required, he adds.

Traefik Proxy provides load balancing, orchestrator ingress and east-west service communication in addition to providing an application programming interface (API) gateway. It also enables service discovery, dynamic configuration, load balancing, rate-limiting, circuit-breakers, mirroring, authentication and routing automation as the proxy software intercepts and routes every incoming request to the corresponding backend services.

It also uses service discovery to configure itself dynamically to simplify its use in a microservices-based application environment. All major protocols are supported in addition to providing a secure socket layer (SSL) termination capability that can be used to generate certificates.

Traefik Proxy has been downloaded more than three million times, Zapf says, with most of that usage involving cloud-native applications that need to be able to dynamically invoke networking services.

While the bulk of applications running in production environments are monolithic, the percentage of cloud-native applications deployed continues to steadily rise. As that transition occurs, the number of IT teams converging the management of compute, storage and networking will also increase. It’s not clear how that convergence will impact job roles within IT organizations, but development teams that are deploying modern applications don’t want to wait days for a network connection to be provisioned. In time, it’s apparent that network operations will become an extension of a larger DevOps workflow.

In the meantime, the battle for dominance over proxy software in cloud-native applications continues to intensify as the number of application programming interfaces (APIs) that need to be managed via a gateway expands. Each proxy software option also lays the foundation for a service mesh that makes it simpler to manage hundreds of APIs. Traefik Labs is betting that as it makes it simpler to employ its proxy software, the number of organizations that will eventually use its service mesh will increase.

One way or another, the provisioning of network services—and APIs at the core of many cloud-native applications—is slowly but surely getting easier to manage.

Mike Vizard is a seasoned IT journalist with over 25 years of experience. He also contributed to IT Business Edge, Channel Insider, Baseline and a variety of other IT titles. Previously, Vizard was the editorial director for Ziff-Davis Enterprise as well as Editor-in-Chief for CRN and InfoWorld.

Mike Vizard has 1344 posts and counting. See all posts by Mike Vizard

Imagine this: You wake up to find your Slack blowing up. Alerts are going off and users are complaining. You go straight to your Datadog (or New Relic, or Kibana, etc.) dashboard and you can see right away there’s a problem. What’s not clear is why the problem happened. Since you can’t tell the root […] The post Automating the Observer: Lessons From 1,000+ Incidents appeared first on DevOps.com. [...]

Cybersecurity resilience is a priority for enterprises that have ramped up digital transformation and distributed workforces in the past few years. However, differences of opinion about the urgency of application security solutions can be detrimental to enterprises. According to the latest World Economic Forum research, “While 92% of business executives agree that cybersecurity resilience is […] The post Closing the Gap: Reducing Enterprise AppSec Risks Without Disrupting Deadlines appeared first on DevOps.com. [...]

As apps move from concept to reality, they are often pulled in many directions by competing teams and stakeholders, ultimately leading to what we call the wall of complexity—and scope creep. Join this webinar to learn about simplifying your app building experience with a multi-experience platform. Whether it is a browser application or a native […] The post Boost Your Java/JavaScript Skills With a Multi-Experience Platform appeared first on DevOps.com. [...]

In this workshop, we’ll examine how Pulumi can rapidly accelerate provisioning of cloud infrastructure. We’ll focus on AWS Lambda and build an example set of microservices utilizing AWS’s newest Lambda features. The post Deploying Microservices With Pulumi & AWS Lambda appeared first on DevOps.com. [...]

In this webinar, TechStrong Research analysts will share new findings from their ongoing quarterly survey of DevOps professionals that reveal an increasing desire for more payment options to make it easier to access and build on cloud platforms. In addition, Hillary Wilmoth, senior manager, product marketing at Linode (now part of Akamai), will share insight […] The post Getting Paid: Why Cloud Providers Are Changing How Customers Use and Pay for Services appeared first on DevOps.com. [...]

Join us to learn how Bob has successfully worked with his development leaders to engineer software with security in mind along the pre-production software supply chain. Liav Caspi, CTO of Legit Security, will be joining Bob to share how new security methods and tools now enable teams to find security issues earlier in the development.. The post How to Shift Security Left: Best Practices From a Fortune 500 DevSecOps Leader appeared first on Security Boulevard. [...]

According to the 2022 Open Source Security and Risk Analysis (OSSRA) report, the overwhelming majority of software development organizations are leveraging open source to build their applications. However, the scale of use creates a growing management challenge. While development and risk management teams scramble to patch vulnerabilities, decipher complex license terms governing obligations associated with.. The post Applying the 2022 Open Source Findings to Software Supply Chain Risk Management appeared first on Security Boulevard. [...]

During this livestream, cybersecurity expert and president and CEO at BetterCyber Luciana Obregon will break down how you can lower RTO and RPO and create a reliable data recovery workflow. Modern backup data infrastructure must be immutable, isolated (air-gapped), scanned for and cleansed of malware and must be directly mounted (instant recovery). The post Finding the Ransomware Threat INSIDE Your Backups appeared first on Security Boulevard. [...]

Cybersecurity resilience is a priority for enterprises that have ramped up digital transformation and distributed workforces in the past few years. However, differences of opinion about the urgency of application security solutions can be detrimental to enterprises. According to the latest World Economic Forum research, “While 92% of business executives agree that cybersecurity resilience is.. The post Closing the Gap: Reducing Enterprise AppSec Risks Without Disrupting Deadlines appeared first on Security Boulevard. [...]

Join the CISO Talk Master Class live conversation. Part 6 brings all the elements into a cohesive, integrated strategy: continuous security strategy, leveraging frameworks, effective response strategies, growing next-gen security experts and communications that win and combat confusion. Join hosts Mitch Ashley and Mat Newfield and an elite panel of cybersecurity experts as they bring.. The post CISO Talk Master Class Episode: Catch Lightning in a Bottle – The Essentials: Bringing It All Together appeared first on Security Boulevard. [...]