I used to work with traefik 1.x and succeded to route every request to my authenticator service by adding a setting to the configmap (see bellow my cm of v1.0)
Now , I am on traefik 2.x and I want to force the traefik controller to route every request to my authenticator service but didn't found a way.
I tried to add a middleware where the traefik is running but without a succeed
Can anyone elaborate - on what I need to config in my traefik v2.0 so the forwardauth will work for my running services?
apiVersion: v1 data: traefik.toml: | # traefik.toml logLevel = "info" defaultEntryPoints = ["http","https"] [entryPoints] [entryPoints.http] address = ":80" compress = true [entryPoints.http.auth.forward] address = "http://my-url-to-the-service" trustForwardHeader = true [entryPoints.http.redirect] regex = "^http://(.*)" replacement = "https://$1" [entryPoints.https] address = ":443" compress = true [entryPoints.https.auth.forward] address = "http://my-url-to-the-service" trustForwardHeader = true [entryPoints.https.tls] minVersion = "VersionTLS12" [[entryPoints.https.tls.certificates]] CertFile = "/ssl/tls.crt" KeyFile = "/ssl/tls.key" [entryPoints.prometheus] address = ":9100" [ping] entryPoint = "http" [kubernetes] [kubernetes.ingressEndpoint] publishedService = "kube-system/traefik" [traefikLog] format = "json" [metrics] [metrics.prometheus] entryPoint = "prometheus" kind: ConfigMap metadata: labels: app: traefik app.kubernetes.io/managed-by: Helm chart: traefik-1.81.0 heritage: Helm release: traefik managedFields: - apiVersion: v name: traefik namespace: kube-system resourceVersion: "1910" selfLink: /api/v1/namespaces/kube-system/configmaps/traefik