- "--providers.docker.network=proxy"# define default network to monitor for docker provider
- "--providers.docker.endpoint=tcp://socket-proxy:2375"# define socket-proxy as docker socket
- "--providers.docker.exposedbydefault=false"# do not expose docker hosts per default
- "--providers.file.watch=true"# monitor file provider for changes
- "--providers.file.filename=/etc/traefik/fileConfig.yml"# location of the dynamic configuration
- "--entrypoints.http.address=:80"# entrypoint for unencrypted http
- "--entrypoints.http.forwardedHeaders.trustedIPs=103.21.244.0/22,103.22.200.0/22,103.31.4.0/22,104.16.0.0/13,104.24.0.0/14,108.162.192.0/18,131.0.72.0/22,141.101.64.0/18,162.158.0.0/15,172.64.0.0/13,173.245.48.0/20,188.114.96.0/20,190.93.240.0/20,197.234.240.0/22,198.41.128.0/17,2400:cb00::/32,2606:4700::/32,2803:f800::/32,2405:b500::/32,2405:8100::/32,2a06:98c0::/29,2c0f:f248::/32"# define cloudflare ip ranges as trusted
- "--entrypoints.http.http.redirections.entryPoint.to=https"# automatic redirect from http to https
- "--entrypoints.http.http.redirections.entryPoint.scheme=https"# automatic redirect from http to https
- "--entrypoints.https.address=:443"# entrypoint for encrypted https
- "--entrypoints.https.forwardedHeaders.trustedIPs=103.21.244.0/22,103.22.200.0/22,103.31.4.0/22,104.16.0.0/13,104.24.0.0/14,108.162.192.0/18,131.0.72.0/22,141.101.64.0/18,162.158.0.0/15,172.64.0.0/13,173.245.48.0/20,188.114.96.0/20,190.93.240.0/20,197.234.240.0/22,198.41.128.0/17,2400:cb00::/32,2606:4700::/32,2803:f800::/32,2405:b500::/32,2405:8100::/32,2a06:98c0::/29,2c0f:f248::/32"# define cloudflare ip ranges as trusted
- "--entrypoints.https.http.middlewares=security-headers@file,rate-limit@file"# define default middlewares for all proxy entries
- "--api.dashboard=true"# enable traefik api dashboard
- "--api.insecure=true"# expose traefik api dashboard on TCP/8080 without need for router
- traefik.http.routers.api.rule=Host(`traefik.example.com`)# define subdomain for the traefik api dashboard
- traefik.http.routers.api.service=api@internal# enable traefik api dashboard
- traefik.http.routers.api.middlewares=local-ipwhitelist@file,basic-auth@file# protect dashboard with basic auth and restrict access to private class subnets only