pomerium/examples/traefik-ingress
rgrente aa5e63656f
fixing pomerium traefik sample (#3290)
replace policy by routes
2022-05-05 07:38:43 -07:00
..
crds docs: Add Traefik + Kubernetes example (#1411) 2020-09-19 13:33:32 -04:00
values fixing pomerium traefik sample (#3290) 2022-05-05 07:38:43 -07:00
add_repos.sh docs: Add Traefik + Kubernetes example (#1411) 2020-09-19 13:33:32 -04:00
install.sh docs: Add Traefik + Kubernetes example (#1411) 2020-09-19 13:33:32 -04:00
README.md docs: Add Traefik + Kubernetes example (#1411) 2020-09-19 13:33:32 -04:00

Pomerium as forward-auth provider for Traefik on Kubernetes

Run this demo locally on your kubernetes capable workstation or: - use kubectl port-forward service/traefik 80:80 443:443 - replace localhost.pomerium.io with your own domain

Includes

  • Authentication and Authorization managed by pomerium
  • Routing / reverse proxying handled by traefik
  • Installation using upstream helm charts

How

  • Update values/pomerium.yaml for your e-mail address, if not using gmail/google.
  • Replace IdP secrets in values/pomerium.yaml.
  • Run ./add_repos.sh from this directory.
  • Run ./install.sh from this directory.
  • Navigate to https://hello.localhost.pomerium.io