Skip to content

Use separate networks in Traefik example #254

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Dec 23, 2024
Merged

Conversation

mbrodala
Copy link
Contributor

The whole point of using a Docker socket proxy like CetusGuard is to limit access to the Docker socket. The main purpose of Traefik is exposing HTTP/TCP/UDP services to the public. Such services must share a network with Traefik to be discovered and routed to, but this must not be a network with the Docker socket proxy. Only services which actually needs access to the Docker socket must be in such a network, in this case only Traefik.

The whole point of using a Docker socket proxy like CetusGuard is to limit access to the Docker socket. The main purpose of Traefik is exposing HTTP/TCP/UDP services to the public. Such services must share a network with Traefik to be discovered and routed to, but this must not be a network with the Docker socket proxy. Only services which actually needs access to the Docker socket must be in such a network, in this case only Traefik.
@hectorm
Copy link
Owner

hectorm commented Dec 23, 2024

I also use independent networks in my personal infrastructure, these examples are simplified, but it makes sense to apply this change.

@hectorm hectorm merged commit e236dc3 into hectorm:master Dec 23, 2024
25 checks passed
@mbrodala mbrodala deleted the patch-1 branch December 30, 2024 11:58
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants