-
-
Notifications
You must be signed in to change notification settings - Fork 5.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
TCP support #10
Comments
It needs some (a lot of ?) work... But it would be awsome :) |
TCP + TLS ? need more details on this proposal |
+1. |
I highly support the addition of this feature =) |
+1 |
+1 on this, I've been pushing a similar project called Fabio that has already solved this problem with Consul (though they don't do HTTP like here) to add Mesos/Marathon as an option but I'd really like to see this in Traefik. |
Hi @rvm2015, as far as I know, fabio is only supporting HTTP/S right now. How are you doing this with Fabio? |
You are correct, I am mistaken. I've been shopping around for a TCP load balancer and I misread their feature set. |
+1 for TCP services |
+1 indeed. We currently use an ugly hack to do it. I feel that traefik |
+1 for TCP |
+1 |
@faddat how did you hacked this? |
@hd-deman It wasn't with traefik. It was a combination of adding Consul to our marathon stack, using a marathon-consul container to report changes in applications to consul then using a haproxy-consul bridge to port forward from there. I'm not going to link here but if you'd like links to the different components feel free to send me a message and I'll forward you to them. This stack isn't extremely suitable for production though as you'd need to write a watcher daemon to make sure that all the components don't explode on you. (as they tend to do) +1 again. Traefik TCP/UDP support the dream :) |
see @Ozzadar's answer-- he's the one who actually implemented the hack. |
+1 |
1 similar comment
👍 |
+1 for TCP. It would be awesome! |
+1 for TCP/UDP. Added to TLS, would make the perfect solution. |
+1 TCP Load balancing would make it awesome and reduce the feature difference with other LBs like HAProxy or NGINX |
+1 for TCP |
1 similar comment
+1 for TCP |
👍 for TCP! |
+1 for TCP |
+1 |
i know these are useless and code would be better, but +1 |
Locking conversation, to avoid |
Would be awesome if this also supported TCP backends (ideally with optional TLS support)!
The text was updated successfully, but these errors were encountered: