Skip to content

ServersTransportTCP

ServersTransportTCP is the CRD implementation of ServersTransportTCP.

Before creating ServersTransportTCP objects, you need to apply the Traefik Kubernetes CRDs to your Kubernetes cluster.

This registers the ServersTransportTCP kind and other Traefik-specific resources.

Default serversTransportTCP

If no serversTransportTCP is specified, the default@internal will be used. The default@internal serversTransportTCP is created from the install configuration (formerly known as static configuration).

ServersTransport reference

By default, the referenced ServersTransportTCP CRD must be defined in the same Kubernetes service namespace.

To reference a ServersTransportTCP CRD from another namespace, the value must be of form namespace-name@kubernetescrd, and the allowCrossNamespace option must be enabled.

If the ServersTransportTCP CRD is defined in another provider the cross-provider format name@provider should be used.

Configuration Example

apiVersion: traefik.io/v1alpha1
kind: ServersTransportTCP
metadata:
  name: mytransport
  namespace: default

spec:
  tls:
    serverName: example.org
    insecureSkipVerify: true

Configuration Options

Field Description Default Required
dialTimeout The amount of time to wait until a connection to a server can be established. If zero, no timeout exists. 30s No
dialKeepAlive The interval between keep-alive probes for an active network connection.
If this option is set to zero, keep-alive probes are sent with a default value (currently 15 seconds),
if supported by the protocol and operating system. Network protocols or operating systems that do not support keep-alives ignore this field.
If negative, keep-alive probes are turned off.
15s No
terminationDelay Defines the delay to wait before fully terminating the connection, after one connected peer has closed its writing capability. 100ms No
tls.serverName ServerName used to contact the server. "" No
tls.insecureSkipVerify Controls whether the server's certificate chain and host name is verified. false No
tls.peerCertURI Defines the URI used to match against SAN URIs during the server's certificate verification. "" No
tls.rootCAsSecrets Defines the set of root certificate authorities to use when verifying server certificates.
The CA secret must contain a base64 encoded certificate under either a tls.ca or a ca.crt key.
"" No
tls.certificatesSecrets Certificates to present to the server for mTLS. "" No
spiffe Configures SPIFFE options. "" No
spiffe.ids Defines the allowed SPIFFE IDs. This takes precedence over the SPIFFE trustDomain. "" No
spiffe.trustDomain Defines the allowed SPIFFE trust domain. "" No