Custom Traefik (local) plugins

Custom Traefik (local) plugins

[[442556]]

Traefik has implemented a lot of middleware by default, which can meet most of our daily needs. However, in actual work, users still have the need to customize middleware. To solve this problem, the official launched a Traefik Pilot[1] function. In addition, the Traefik v2.5 version also launched a function that supports local private plug-ins.

Traefik Pilot

Traefik Pilot is a SaaS platform that links with Traefik to extend its functionality. It provides many features to enhance the observation and control of Traefik through a global control panel and dashboard:

  • Metrics for network activity of Traefik proxies and proxy groups
  • Service health issues and security breach alerts
  • Plugins to extend Traefik functionality

Before Traefik can use the features of Traefik Pilot, it must connect to them. We only need to make a few changes to Traefik's static configuration.

[[442557]]

The Traefik proxy must have access to the internet to connect to Traefik Pilot, establishing a connection over HTTPS on port 443.

First we need to create an account on the Traefik Pilot homepage (https://pilot.traefik.io/), register a new Traefik instance and start using Traefik Pilot. After logging in, you can create a new instance by selecting Register New Traefik Instance.

In addition, when our Traefik is not yet connected to Traefik Pilot, a bell icon will appear in the Traefik Web UI, and we can select Connect with Traefik Pilot to navigate to the Traefik Pilot UI for operation.

After the login is complete, Traefik Pilot will generate a token for a new instance. We need to add this Token to the Traefik static configuration.

Enable Pilot's configuration in the Traefik installation configuration file:

  1. # Activate Pilot integration
  2. Pilot:
  3. enabled: true  
  4. token: "e079ea6e-536a-48c6-b3e3-f7cfaf94f477"  

After the update is complete, we can see the information related to Traefik Pilot UI in Traefik's Web UI.

Next, we can select the plugin we want to use on the plugin page of Traefik Pilot. For example, we use the Demo Plugin[2] plugin here.

Click the Install Plugin button in the upper right corner to install the plug-in, and a dialog box will pop up to prompt us how to install it.

First we need to register the current Traefik to Traefik Pilot (completed), then we need to add this plug-in to Traefik in a static configuration, and then add the plug-in startup parameters:

  1. # Activate Pilot integration
  2. Pilot:
  3. enabled: true  
  4. token: "e079ea6e-536a-48c6-b3e3-f7cfaf94f477"  
  5.  
  6. additionalArguments:
  7. # Add support for demo plugin
  8. - --experimental.plugins.plugindemo.modulename=github.com/traefik/plugindemo  
  9. - --experimental.plugins.plugindemo.version=v0.2.1  
  10. # Other Configuration

After the update is complete, create a Middleware object as follows:

  1. ➜ cat <<EOF | kubectl apply -f -
  2. apiVersion: traefik.containo.us/v1alpha1
  3. kind: Middleware
  4. metadata:
  5. name : myplugin
  6. spec:
  7. plugin:
  8. plugindemo: # plugin name
  9. Headers:
  10. X-Demo: test
  11. Foo: bar
  12. EOF

Then add it to the IngressRoute object of the whoami application above:

  1. apiVersion: traefik.containo.us/v1alpha1
  2. kind: IngressRoute
  3. metadata:
  4. name : ingressroute-demo
  5. namespace: default  
  6. spec:
  7. entryPoints:
  8. - web
  9. routes:
  10. - match: Host(`who.qikqiak.com`) && PathPrefix(`/notls`)
  11. kind: Rule  
  12. services:
  13. - name : whoami # K8s Service
  14. port: 80
  15. middlewares:
  16. - name : myplugin # Use the newly created middleware above

After the update is complete, when we visit http://who.qikqiak.com/notls, we can see that the two headers defined in the above plug-in have been added.

In addition to using the plugins provided by developers on Traefik Pilot, we can also develop our own plugins according to our needs. You can refer to the plugin development documentation [3].

Local private plugin

Above we introduced that you can use Traefik Pilot to use plug-ins, but this is a SaaS service platform, which is not very suitable for most enterprise scenarios. In more scenarios, we need to load plug-ins in the local environment. To solve this problem, after Traefik v2.5, a new method of loading plug-ins directly from the local storage directory is provided. There is no need to enable Traefik Pilot. You only need to put the plug-in source code into a new directory called /plugins-local and create this directory relative to the current working directory. For example, if we directly use the docker image of traefik, the entry point is the root directory /. Traefik itself will build your plug-in, so all we have to do is write the source code and put it in the correct directory and let Traefik load it.

It should be noted that since the plugin is only loaded once at each startup, if we want to reload your plugin source code, we need to restart Traefik.

Below we use a simple custom plug-in example to illustrate how to use private plug-ins. First, we define a Dockerfile file named Dockerfile.demo, clone the plug-in source code from the git repository, and then use traefik:v2.5 as the base image to copy the plug-in source code to the /plugins-local directory, as shown below:

  1. FROM alpine:3
  2. ARG PLUGIN_MODULE=github.com/traefik/plugindemo
  3. ARG PLUGIN_GIT_REPO=https://github.com/traefik/plugindemo.git
  4. ARG PLUGIN_GIT_BRANCH=master
  5. RUN apk add   --update git && \  
  6. git clone ${PLUGIN_GIT_REPO} /plugins- local /src/${PLUGIN_MODULE} \
  7. --depth 1 --single-branch --branch ${PLUGIN_GIT_BRANCH}  
  8.  
  9. FROM traefik:v2.5
  10. COPY --from=0 /plugins-local /plugins-local  

The demonstration plug-in we use here is the same plug-in demonstrated in the Pilot above. We can use this plug-in to customize the request header information.

Then build the image in the Dockerfile.demo directory:

  1. ➜ docker build -f Dockerfile.demo -t cnych/traefik-private-demo-plugin:2.5.4 .
  2. # Push to the image repository
  3. ➜ docker push cnych/traefik-private-demo-plugin:2.5.4

After the image is built, you can use this image to test the demo plug-in. Change the image to the image address we customized above:

  1. image:
  2. name : cnych/traefik-private-demo-plugin
  3. tag: 2.5.4
  4.  
  5. # Other omissions
  6.  
  7. # No need to enable pilot
  8. Pilot:
  9. enabled: false  
  10.  
  11. additionalArguments:
  12. # Add native support for demo plugin
  13. - --experimental.localPlugins.plugindemo.moduleName=github.com/traefik/plugindemo  
  14. # Other omissions

Note that we used --experimental.localPlugins when adding Traefik's startup parameters above. After the update is complete, we can use our private plug-in to create a Middleware object:

  1. ➜ cat <<EOF | kubectl apply -f -
  2. apiVersion: traefik.containo.us/v1alpha1
  3. kind: Middleware
  4. metadata:
  5. name : my-private-plugin
  6. spec:
  7. plugin:
  8. plugindemo: # plugin name
  9. Headers:
  10. X-Demo: private-demo
  11. Foo: bar
  12. EOF

Then add it to the IngressRoute object of the whoami application above:

  1. apiVersion: traefik.containo.us/v1alpha1
  2. kind: IngressRoute
  3. metadata:
  4. name : ingressroute-demo
  5. namespace: default  
  6. spec:
  7. entryPoints:
  8. - web
  9. routes:
  10. - match: Host(`who.qikqiak.com`) && PathPrefix(`/notls`)
  11. kind: Rule  
  12. services:
  13. - name : whoami # K8s Service
  14. port: 80
  15. middlewares:
  16. - name : my-private-plugin # Use the newly created middleware above

After updating the above resource object, we visit http://who.qikqiak.com/notls and we can see that the two Headers defined in the above plug-in have been added, proving that our private plug-in configuration is successful:

With the support of local private plugins, Traefik is really starting to take off, right?

References

[1]Traefik Pilot: https://pilot.traefik.io/

[2]Demo Plugin: https://github.com/traefik/plugindemo

[3]Plugin dev doc: https://doc.traefik.io/traefik-pilot/plugins/plugin-dev/

<<:  vSwitch expansion in the Ack cluster Terway network scenario

>>:  CAICT's first batch of AIOps systems and tools evaluations, Borui Data was rated "comprehensive" for anomaly detection module

Recommend

What are the obstacles to number portability?

On November 27, the number portability service wa...

Why 5G networks require a new way of operating

In the 5G reality, network operations are moving ...

How 5G and IoT will revolutionize the world

Imagine a world where we can download a movie in ...

Huawei releases next-generation CloudLink video conferencing solution

[Beijing, China, September 6, 2019] Huawei held a...

Discussion on SD-WAN development: SD-WAN combined with blockchain technology

As software-defined wide area networks (SD-WAN) b...

Gartner: China's IT spending is expected to exceed US$550 million in 2022

According to Gartner's latest forecast, globa...

How future technologies will improve physical security in data centers

In recent years, the demand for security solution...