This is a short guide for setting up traefik inside of a rancher kubernetes environment with client pki authentication enabled. This allows us to only grant access to specific people who have been issued a pki certificate that was signed by our Certificate Authority. In this guide we will walk through the following
- Creating a private CA + Client Certificates for PKI Authentication
- Generating Custom SSL Certificates
- Installing Traefik via helm chart
- Configuring Traefik for custom ssl and client authentication
- Adding IngressRoutes to the kubernetes cluster
- Passing Client Certificate information to downstream apis via middlewares