Romain
Romain
Hi @yorik, We saw the commit on your fork. Do you plan to open a pull request to address this issue?
Hello @dkrizic @StephanSalas, in Traefik v3 those endpoints are not producing any observability signal: https://doc.traefik.io/traefik/migration/v2-to-v3-details/#internal-resources-observability.
Hi @Alex-Waring, Thanks for investing in this! The `http.route` attribute is currently on the router span (internal) and contains the router's rule. But you are right, it should be on...
Hello @JavertArdo, Thanks for reporting this! It is indeed a limitation of the current implementation: https://github.com/traefik/traefik/blob/cdacf0bca84d6b727b2412ed3b8cb69b499482de/pkg/provider/kubernetes/gateway/kubernetes.go#L592 We are marking this issue as an enhancement.
> Then I wonder what will be the usage of multiple certificateRefs. For some kind of certificate rotation or a backup method when certificate is stored remotely outside of cluster?...
@jerrywoo96 Indeed, PR https://github.com/traefik/traefik/pull/11308 has been merged and is addressing this issue, thank you for noticing this. I'm closing this issue accordingly. Closed by #11308
Hello @bugficks, Thanks for your interest in Traefik! At glance, the priority computation did not change between v2 and v3. When trying the dynamic configuration with v3, I get: ```json...
Hello @bugficks, Sorry for the late feedback, In the docker compose example you have shared the `HostRegexp` matcher contains a regular expression that is not supported in v2 (`HostRegexp(`^(.+\\.)?ahost\\.net$`)`), please...
Hello @GeorgeMac, Thanks for the explanation. We’re unsure about the use case and the traction it will receive. We are going to leave the status as kind/proposal to give the...
Hi @smerschjohann, Thanks for this contribution! Following @lbenguigui @sdelicata comments, I think the SNICheck mechanism is simply not implementable with maps with regex, as it was done previously, because the...