Traefik Labs’ cover photo
Traefik Labs

Traefik Labs

Software Development

San Francisco, California 12,770 followers

Run APIs Easily. Anywhere.

About us

Traefik Labs helps organizations adopt and scale cloud-native architectures by providing a modern, intuitive, and open platform that reimagines application connectivity and API management, paving the way for seamless operations and enhanced productivity. Traefik’s flagship open source project, Traefik Proxy, is used by the world’s largest enterprises and is one of Docker Hub’s top 10 projects, with over 3 billion downloads. Founded in 2016, Traefik Labs is backed by investors including Balderton Capital, Elaia, 360 Capital Partner, and Kima Ventures.

Website
https://traefik.io
Industry
Software Development
Company size
11-50 employees
Headquarters
San Francisco, California
Type
Privately Held
Founded
2016
Specialties
DevOps, Reverse Proxy, Load Balancer, Open Source, Microservices, Edge Router, Cloud Native, Kubernetes, Docker, Traefik, api management, api gateway, application proxy, Cloud Native, and API

Locations

Employees at Traefik Labs

Updates

  • Traefik Labs reposted this

    KubeCon Amsterdam. Day 3. Done. 🎉 Traefik is the only memory-safe, drop-in, enterprise-grade open source replacement for ingress NGINX. Bar none! And we have the data and actual users to prove it! Day 1: 100s of users stopped by to say "thank you". And we ran out of t-shirts. 👕 Day 2: the migration questions got deeper. 🤔 Day 3: the conversations turned to what comes after the migration. 🔭 Not just "how do we get off ingress NGINX" but "what are we actually moving toward, and will it hold?" That is exactly the right question. Because the retirement created three separate risks BUT most teams are only focused on managing the first one: 🚧 Migration risk is the visible one. We built the bridge. 90%+ annotation coverage, open source, no strings. 🔓 Security risk is the one most vendors are not talking about. IngressNightmare was not a bug. It was a structural consequence of C. A replacement written in C or C++ still contains that exposure without eliminating it. Traefik Proxy is Go-native. The vulnerability class is architecturally impossible, not merely patched away. 📈 Stagnation risk is the one with the longest tail. The ingress layer is not the destination. API gateway, WAF, AI gateway, MCP governance: all of it needs to build on the same memory-safe and enterprise-grade foundation without forcing another migration in 18 months. Full breakdown in the blog: https://lnkd.in/gSr-N2av To this team: three days, 100s of conversations, zero complaints. I am so proud of every single one of you. ❤️ To the community and our customers: you keep building. We will keep making sure the foundation holds. 🙏 To our partners who stood alongside us this week: this is what the ecosystem looks like when it works. Thank you. 🤝 Safe travels back home and see you at the next one. #KubeCon #KubeConEU #Kubernetes #CloudNative #TraefikLabs #Nutanix #OVHcloud #SUSE #Dash0 #TIBCO #theCUBE

    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image
      +1
  • Traefik Labs reposted this

    Three questions every team building with AI agents should be able to answer right now: 1. If a poisoned file entered your agent's context window, which controls would survive? 2. Can your agent disable its own governance? 3. How many independent enforcement layers exist between a compromised agent and your most sensitive systems? If the answer to #1 is "not sure," the answer to #2 is "technically yes," and the answer to #3 is "one," you have an architecture problem, not a configuration problem. The LiteLLM supply chain attack yesterday compromised a library. The next class of attacks will compromise the files agents read, the code agents write, and the memory agents accumulate. Controls that run inside the runtime get compromised with the runtime. Infrastructure-layer enforcement, independent of the agent framework, is the only layer that survives. We wrote about why and what that architecture actually looks like here: https://lnkd.in/gpepeZdj #AIGovernance #AgentSecurity #MCP #APIGateway #CloudNative

    • No alternative text description for this image
  • Traefik Labs reposted this

    📢 Traefik Labs : du proxy à l’API Management et au MCP Gateway ! 🚀 Emile Vauge, fondateur et CTO de Traefik Labs (3 milliards de téléchargements, 60 000 ⭐ sur GitHub), retrace l’évolution spectaculaire de Traefik. Du reverse proxy open source devenu incontournable à une plateforme complète d’API Management, d’AI Gateway et de MCP Server, il décrypte les grandes transitions de l’écosystème cloud native 💡 🎙️ Interview réalisée par Jean-Francois Le Nilias sur le plateau TV Informatiquenews aux Cloud Native Days France 2026 à Paris. 🎥 A découvrir en vidéo sur notre chaîne YouTube 👉 https://lnkd.in/eTYJc7mV

  • If your AI agent's runtime gets compromised, do your governance controls survive or do they go down with it? The LiteLLM supply chain attack from March 24 is a sharp reminder that the runtime itself is the attack surface. When access control, content safety, and tool authorization all run inside the same process that can be poisoned (through a malicious dependency, an indirect prompt injection embedded in a document, or insecure agent-generated code) those controls are just assumptions. Enforcement that operates at the infrastructure layer, independent of the agent framework, below the application, governing API calls and LLM interactions as they cross the network, survives a compromised runtime. Application-embedded guardrails don't. Get the story here: https://bit.ly/4c65HYo

    • No alternative text description for this image
  • Traefik Labs reposted this

    🐘 Let's talk about the elephant in the room at KubeCon Amsterdam. IngressNginx has reached the end of life — and if you're wondering what's next, come find us at the Traefik Labs booth! Traefik is the only true drop-in replacement, and our team is here to walk you through the migration, answer your questions, and show you what's possible. See you there! 👇 #KubeCon #Amsterdam #TraefikLabs #CloudNative #IngressNginx

    • No alternative text description for this image
  • Traefik Labs reposted this

    🚨 Kubecon EU kicks off today in Amsterdam and I'm thrilled to share some exciting news from Traefik Labs. IBM Nutanix OVHcloud SUSE TIBCO and many others independently evaluated every alternative to ingress NGINX (⚡ retires in 7 days). Each company arrived at the same conclusion. Traefik Proxy is now the de facto standard for Kubernetes Networking, providing over 90% coverage of the most-used Ingress NGINX annotations. This isn't a coordinated campaign. It's a market signal. The Kubernetes Steering Committee officially retires ingress NGINX this month — ending all maintenance, bug fixes, and security patches for one of the most widely deployed components in the ecosystem. Millions of clusters in financial services, healthcare, government, and telecom now need a path forward. The reason these platform vendors chose Traefik comes down to three things: 🔌 DROP-IN MIGRATION. Traefik's Ingress NGINX Provider automatically translates existing NGINX annotations at runtime. Over 90% coverage. No Ingress annotation changes required. ⏩ FORWARD COMPATIBILITY. Full Kubernetes Gateway API support. Migrate on your timeline. Adopt the future standard when you're ready. 🌐 OPEN SOURCE, NO STRINGS. MIT license. Not a proprietary fork. Not a temporary patch. With Enterprise support backed by a real company. For teams running these platforms, that combination is decisive. And for organizations already on Traefik, this is just the beginning. Traefik Hub extends the same foundation to API Gateway, AI Gateway, and MCP Gateway — single Helm chart upgrade, zero re-architecture, with full portability from edge to cloud to sovereign. 🚪 The front door of your infrastructure matters. More organizations just made their choice. 📄 Full press release: https://lnkd.in/g_5ypt_b 🔗 Migration guide: ingressnginxmigration.org Stop by our booth #981 and meet with the creators of Traefik! Huge thanks to our partners, customers, and the CNCF community! Dan Ciruli Deepak Goel Aniket Daptari Anurag Narula Saveen Pakala Peter Smails Emina C. Troy Topnik Jacques Murez Antonin Anchisi Anthony Monier Maxime Lehmann Jason Henley Mark Bloomfield Devu Heda Cale Rath Luca Marchi Chris Rosen #KubeCon #Kubernetes #CloudNative #TraefikLabs #OpenSource #PlatformEngineering

    • No alternative text description for this image
  • An autonomous AI agent from CodeWall recently breached McKinsey's internal LLM platform in under two hours ... with no credentials, no insider access, and no human in the loop. The headlines focused on the data: 46.5 million chat messages, 728,000 files, 57,000 user accounts. But they missed the most important detail: 👉 95 system prompts were writable. No deployment needed. No code change. With a single UPDATE statement wrapped in a single HTTP call, an attacker could silently rewrite how a platform used by 40,000 consultants frames competitive landscapes, evaluates acquisition targets, or assesses risk. Poisoned output could flow directly into client deliverables, with no one the wiser. While the breach was just SQL injection in JSON field names, the real threat this uncovered was an architecture with no independent enforcement layers between the internet and production. There was no WAF at the gateway, no authentication on 22 endpoints, no content safety checks on the AI pipeline. Dig into the story and see what could have prevented this at every step here 👇 https://bit.ly/40IoT8e

    • No alternative text description for this image

Similar pages

Browse jobs

Funding