Migrating from nginx to Traefik

I’ve been trying to simplify my server’s deployment configuration for a while now. Specifically, I’ve been running nginx on bare metal and all my services in docker. It’s been great and I think there’s value in insulating the web server and reverse proxy from other services.

nginx

nginx is probably a bit too powerful for my needs. I’ve been typically just using it as a reverse proxy and all of my site configurations look pretty much the same.

I wanted to look at other options that would hopefully have simpler configurations or even automated configurations. It would also be nice to have everything in a single docker compose file.

I didn’t realize this at the time, but there are some web servers / reverse proxy managers that automate certificate generation and renewal. I’ve had issues in the past where issues with certbot and custom scripts have led to expired certificates.

Traefik

Traefik seemed to check all the boxes. There were plenty of other options like Caddy, nginx proxy manager etc but I decided to just go with Traefik. Traefik uses docker labels to configure things automatically.

Previous setup

In my previous setup, I had a single docker compose file with a bunch of services and an nginx server that acted as a reverse proxy. Using Nextcloud as an example:

upstream nextcloud_backend {
  server    127.0.0.1:8081;
  keepalive 32;
}

server {
  server_name         nc.example.com;
  location / {
    proxy_pass http://nc_backend;
    #proxy_set_header Host nc.example.com;
    proxy_set_header Host $host;
    proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
    proxy_set_header X-Forwarded-Proto $scheme;
    proxy_buffering off;
    proxy_request_buffering off;
    proxy_set_header X-Real-IP $remote_addr;
    client_max_body_size 10G;
  }
  location /.well-known/carddav {
    return 301 $scheme://$host/remote.php/dav;
  }

  location /.well-known/caldav {
    return 301 $scheme://$host/remote.php/dav;
  }

  listen 443 ssl; # managed by Certbot
  ssl_certificate /path/to/certs/example.com/fullchain.pem; # managed by Certbot
  ssl_certificate_key /path/to/certs/example.com/privkey.pem; # managed by Certbot
  include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
  ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot

}

server {
  if ($host = nc.example.com) {
      return 301 https://$host$request_uri;
  }
  server_name         nc.example.com;
  listen 80;
    return 404;
}

As you can probably notice, a lot of the config is just boilerplate. Here’s how my docker compose was configured:

services:
  # Database for nextcloud
  nextcloud_db:
    image: mariadb:10.6
    container_name: nextcloud_db
    restart: unless-stopped
    user: ${PUID}:${PGID}
    command: --transaction-isolation=READ-COMMITTED --log-bin=binlog --binlog-format=ROW
    volumes:
      - /path/to/configs/nextcloud_db:/var/lib/mysql
    environment:
      - MYSQL_PASSWORD=password
      - MYSQL_ROOT_PASSWORD=rootpassword
      - MYSQL_DATABASE=mysqldb
      - MYSQL_USER=mysqldbuser

  nextcloud:
    image: nextcloud
    container_name: nextcloud
    restart: unless-stopped
    #user: ${PUID}:${PGID}
    links:
      - nextcloud_db
    volumes:
      - /path/to/configs/nextcloud:/var/www/html
      - /path/to/configs/nextcloud/apps:/var/ww/html/custom_apps
      - /path/to/configs/nextcloud/config:/var/ww/html/config
      - /path/to/data/nextcloud:/var/www/html/data
    environment:
      - NEXTCLOUD_TRUSTED_DOMAINS=nc.example.com
      - MYSQL_PASSWORD=${MYSQL_PASSWORD}
      - MYSQL_DATABASE=nextcloud
      - MYSQL_USER=nextcloud
      - MYSQL_HOST=nextcloud_db
    expose:
      - 80

New setup

The first step was to add Traefik to the docker compose file

traefik:
    image: "traefik:v3.3"
    container_name: "traefik"
    command:
      - "--log.level=DEBUG"
      - "--accesslog=true"
      - "--api.debug=true"
      - "--api.insecure=true"
      - "--providers.docker=true"
      - "--providers.docker.exposedbydefault=false"
      - "--entryPoints.web.address=:80"
      - "--entryPoints.websecure.address=:443"
      - "--certificatesresolvers.letsencrypt.acme.httpchallenge=true"
      - "--certificatesresolvers.letsencrypt.acme.httpchallenge.entrypoint=web"
      #- "--certificatesresolvers.letsencrypt.acme.caserver=https://acme-staging-v02.api.letsencrypt.org/directory"
      - "[email protected]"
      - "--certificatesresolvers.letsencrypt.acme.storage=/letsencrypt/acme.json"
    ports:
      - "80:80"
      - "443:443"
      - "8080:8080"
    volumes:
      - /var/run/docker.sock:/var/run/docker.sock:ro
      - ./letsencrypt:/letsencrypt
      - ./traefik:/opt/conf
    labels:
      - "traefik.http.routers.api.rule=Host(`dash.example.com`)"
      - "traefik.http.routers.api.service=api@internal"
      - "traefik.http.routers.api.middlewares=auth"
      - "traefik.http.middlewares.auth.basicauth.users=test:$$apr1$$H6uskkkW$$IgXLP6ewTrSuBkTrqE8wj/,test2:$$apr1$$d9hr9HBB$$4HxwgUir3HP4EsggP/QNo0"

The above sets Traefik up to listen on ports 80 and 443. It also sets up LetsEncrypt to certificate generation and renewal happen automatically. It also exposes a dashboard on port 8080 that allows you to view all the services that have been configured.

Exposing the Nextcloud service is as simple as adding a bunch of labels to the Nextcloud service:

nextcloud:
  image: nextcloud
  container_name: nextcloud
  ...
  labels:
    traefik.enable: true
    traefik.http.routers.nextcloud.rule: Host(`nc.example.com`)
    traefik.http.routers.nextcloud.entrypoints: websecure
    traefik.http.routers.nextcloud.tls.certresolver: letsencrypt

The config exposes Nextcloud on https://nc.example.com.

Traefik is very powerful and has made my configuration a lot simpler. It is a bit difficult to initially get started because simple examples aren’t easy to find but once you get going, it starts to make a bit more sense.