-
Notifications
You must be signed in to change notification settings - Fork 460
Configure Envoy Proxy fleet in different namespaces #2629
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
I would like to tackle this one |
It will also be necessary to move away from mTLS for control plane auth to sTLS + JWT Authn to validate the envoy. |
yah @cnvergence, we can selectively do it for the case when the Gateway is running in a user namespace |
This issue has been automatically marked as stale because it has not had activity in the last 30 days. |
This issue has been automatically marked as stale because it has not had activity in the last 30 days. |
I believe this would be solved once GEP-1762: In Cluster Gateway Deployments is implemented, which is tracked in #4330 as referenced just above. Or I know at least the use case that led me to this issue would be solved by it. |
@kamalmarhubi can you share your use case ? |
@arkodg thanks yes, I'm already customizing it! The reason I'd like the resources to be created in the Gateway namespace is that it allows cleaner RBAC policies. I'd like owners to be able to inspect their gateways' generated resources without necessarily giving them access to the gateway controller itself. It also makes setting up network policies easier: with a default-deny setup, we need to add allow-egress policies in the Do you expect that Envoy Gateway will implement GEP-1762? |
the inability to target the generated resources when creating a resource like network policy, is a fair point @kamalmarhubi |
edit: Never mind I think I was incorrect; this is documented on the Envoy gateway website. |
Hey all, slowly returning back to speed, I should have some cycles to work again on EG |
thanks @cnvergence, thinking out loud you should be able to use the k8s service account token and append it the request, may need changes to the xds cluster , and perform sTLS + JWT Validation in the xds server for this case / if token exists |
This issue has been automatically marked as stale because it has not had activity in the last 30 days. |
Enthusiastic about this and GEP-1762 / #4330. In addition to the already mentioned use cases, running the Proxy in the same namespace as the Gateway would allow for a really clean a microgateway pattern type of architecture to support east-west communication between applications internally in a cluster. Here's my use case: As cluster admin, I could bundle a Gateway in each tenant namespace, configured to have Envoy Gateway Controller spawn an Envoy Proxy exposed by a ClusterIP Service with a predefined name like Bonus: Tenants don't need to step outside their namespace boundary to view their proxy access logs. WDYT @zhaohuabing @cnvergence, can we expect this in the near future (v1.3.0)? 🙌 |
Hi @illrill Thanks for sharing your use case! This issue has alredy been added to v1.3.0 milestone. Hopeflly, someone from the community will pick it up soon. |
This issue has been automatically marked as stale because it has not had activity in the last 30 days. |
This issue has been automatically marked as stale because it has not had activity in the last 30 days. |
This issue has been automatically marked as stale because it has not had activity in the last 30 days. |
ControllerNamespace
)watch.namespaces
can be used to set the specific namespaces to watch resources (Gateway, xRoute, Service etc)deploy.envoy.namespaceType
can be used to specify to EG to deploy proxy infra to deploy envoy deployments in the namespace where the Gateway is created in. This option will need a helm knob too, to configure added permissions to be able to create deployments and services in other namespacesOriginally posted by @arkodg in #1117 (comment)
The text was updated successfully, but these errors were encountered: