Documentation Index
Fetch the complete documentation index at: https://docs.coreweave.com/llms.txt
Use this file to discover all available pages before exploring further.
| Chart reference | Description |
|---|---|
coreweave/traefik | CoreWeave’s Helm chart for deploying Traefik on CKS clusters |
About Traefik
The CoreWeave Traefik Helm Chart is based on the upstream Traefik chart, however the CoreWeave Chart includes additional templating for configurations that are commonly used in CKS Clusters. Additionally, CoreWeave Chart default values are set to what works best for the CoreWeave platform. All code examples provided in the repository assume the Chart default values are used. If the Chart is installed with different namespaces or resource names, the values must be updated to match.Configuration
Ingress DNS
By default, a wildcard hostname is applied via aservice.beta.kubernetes.io/external-hostname annotation:
*) is then automatically suffixed with the appropriate domain name for your Cluster. For Services that do not route via Traefik, specific DNS hostnames will still take precedence.
The applied value can be retrieved at any time using kubectl:
For more information on exposing Services, see How to: Expose a Service.
IngressRouteTCP and Kubernetes API Proxy
This Chart’s default values include the creation of a Traefik IngressRouteTCP TCP router for your cluster’s Kubernetes API server. This Service provides the means to proxy HTTP traffic to your Cluster over Direct Connect while also providing TLS passthrough. The hostname of this Service may be located withkubectl get svc. For example:
Creating Ingresses with TLS
Once deployed, Traefik can be used as theIngressClass for a Kubernetes Ingress with TLS. To create the TLS certificate, cert-manager uses the specified ClusterIssuer set by the cert-manager.io/cluster-issuer annotation on the Ingress object.
Example chart
In this example manifest, the Ingress uses the default Let’s EncryptClusterIssuer from CoreWeave’s cert-issuer Chart. It is also possible to configure your own TLS certificate solution.
ingress-example.yaml - An example using Traefik with TLS and DNS
For more information on Traefik as a Kubernetes Ingress provider, see the official Traefik documentation.