New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

TCP support #10

Open
chendo opened this Issue Sep 23, 2015 · 27 comments

Comments

Projects
None yet
@chendo
Copy link

chendo commented Sep 23, 2015

Would be awesome if this also supported TCP backends (ideally with optional TLS support)!

@emilevauge

This comment has been minimized.

Copy link
Member

emilevauge commented Sep 24, 2015

It needs some (a lot of ?) work... But it would be awsome :)

@xiaods

This comment has been minimized.

Copy link

xiaods commented Sep 28, 2015

TCP + TLS ? need more details on this proposal

@pragone

This comment has been minimized.

Copy link

pragone commented Oct 8, 2015

+1.
I love the concept of traefik for a microservices environment as it facilitates service discovery and balancing. But not all services are HTTP based. So, from what I understand, it can't be used for load-balancing MySQL or similar services.
If I have a microservices environment where I need another LB technology for any non-http service (for example HAProxy + Marathon template) I won't adopt traefik just to keep the number of moving pieces low. I think therefore that this is an important feature.
My 2 cents

@Ozzadar

This comment has been minimized.

Copy link

Ozzadar commented Oct 9, 2015

I highly support the addition of this feature =)

@faddat

This comment has been minimized.

Copy link

faddat commented Oct 9, 2015

+1

@ghost

This comment has been minimized.

Copy link

ghost commented Nov 3, 2015

+1 on this, I've been pushing a similar project called Fabio that has already solved this problem with Consul (though they don't do HTTP like here) to add Mesos/Marathon as an option but I'd really like to see this in Traefik.

@emilevauge

This comment has been minimized.

Copy link
Member

emilevauge commented Nov 3, 2015

Hi @rvm2015, as far as I know, fabio is only supporting HTTP/S right now. How are you doing this with Fabio?

@ghost

This comment has been minimized.

Copy link

ghost commented Nov 3, 2015

You are correct, I am mistaken. I've been shopping around for a TCP load balancer and I misread their feature set.

@altvnk

This comment has been minimized.

Copy link

altvnk commented Nov 16, 2015

+1 for TCP services

@faddat

This comment has been minimized.

Copy link

faddat commented Nov 16, 2015

+1 indeed. We currently use an ugly hack to do it. I feel that traefik
was a lot more elegant, not to mention stable.

@tpolekhin

This comment has been minimized.

Copy link

tpolekhin commented Nov 17, 2015

+1 for TCP

@klausenbusk

This comment has been minimized.

Copy link
Contributor

klausenbusk commented Nov 24, 2015

+1

@hd-deman

This comment has been minimized.

Copy link

hd-deman commented Dec 21, 2015

@faddat how did you hacked this?

@Ozzadar

This comment has been minimized.

Copy link

Ozzadar commented Dec 21, 2015

@hd-deman It wasn't with traefik. It was a combination of adding Consul to our marathon stack, using a marathon-consul container to report changes in applications to consul then using a haproxy-consul bridge to port forward from there.

I'm not going to link here but if you'd like links to the different components feel free to send me a message and I'll forward you to them. This stack isn't extremely suitable for production though as you'd need to write a watcher daemon to make sure that all the components don't explode on you. (as they tend to do)

+1 again. Traefik TCP/UDP support the dream :)

@faddat

This comment has been minimized.

Copy link

faddat commented Dec 21, 2015

see @Ozzadar's answer-- he's the one who actually implemented the hack.
We're both glad to help if you need :).

@spoon99

This comment has been minimized.

Copy link

spoon99 commented Jan 31, 2016

+1

1 similar comment
@cedvan

This comment has been minimized.

Copy link

cedvan commented Feb 29, 2016

👍

@referup-amontero

This comment has been minimized.

Copy link

referup-amontero commented Feb 29, 2016

+1 for TCP. It would be awesome!

@pataquets

This comment has been minimized.

Copy link

pataquets commented Feb 29, 2016

+1 for TCP/UDP. Added to TLS, would make the perfect solution.
Thanks for this software.

@saswatp

This comment has been minimized.

Copy link

saswatp commented Mar 8, 2016

+1 TCP Load balancing would make it awesome and reduce the feature difference with other LBs like HAProxy or NGINX

@gembin

This comment has been minimized.

Copy link

gembin commented Mar 19, 2016

+1 for TCP

1 similar comment
@darxkies

This comment has been minimized.

Copy link

darxkies commented Apr 1, 2016

+1 for TCP

@ghost

This comment has been minimized.

Copy link

ghost commented Apr 7, 2016

👍 for TCP!

@emdem

This comment has been minimized.

Copy link

emdem commented Apr 13, 2016

+1 for TCP

@marshyski

This comment has been minimized.

Copy link

marshyski commented Apr 19, 2016

+1

@blsmth

This comment has been minimized.

Copy link

blsmth commented Apr 19, 2016

i know these are useless and code would be better, but +1

@emilevauge

This comment has been minimized.

Copy link
Member

emilevauge commented Apr 19, 2016

Locking conversation, to avoid +1.

@containous containous locked and limited conversation to collaborators Apr 19, 2016

@ldez ldez added the priority/P2 label May 30, 2017

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.