-
Notifications
You must be signed in to change notification settings - Fork 360
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Make it possible to configure secure access to Envoy admin endpoint #3565
Comments
@nezdolik what is the UX you are looking for here ? |
@arkodg for the case when bunch of teams have access to localhost/namespace/cluster, so we could let all those teams have access to read only endpoints and only the team that operates the gateway write+read access. |
This issue has been automatically marked as stale because it has not had activity in the last 30 days. |
Hi, what happens with this issue? |
If you enable the apiVersion: gateway.envoyproxy.io/v1alpha1
kind: Backend
metadata:
name: admin
namespace: default
spec:
endpoints:
- ip:
address: 127.0.0.1
port: 19000 Once you have this backend available, you can create a standard For example, add the following to the quickstart configuration to expose the admin port on the envoy proxy: apiVersion: gateway.networking.k8s.io/v1
kind: HTTPRoute
metadata:
name: admin
namespace: default
spec:
hostnames:
- admin.local
parentRefs:
- group: gateway.networking.k8s.io
kind: Gateway
name: eg
rules:
- backendRefs:
- group: gateway.envoyproxy.io
kind: Backend
name: admin
matches:
- path:
type: PathPrefix
value: / |
this's a good use case for |
Upon further reflection, I think that the fact that this works is a bug. There are two issues here:
I've opened issue #4203 to track this. |
I believe that users can still use this technique by setting an FQDN endpoint like I'm not sure that we should document that as a best practice, though. |
This issue has been automatically marked as stale because it has not had activity in the last 30 days. |
Description:
Make configurable access policy to Envoy admin endpoint a first class citizen in Gateway Api. E.g. Envoy admin exposes both read and write endpoints and Envoy Gateway operators may want to restrict access to write endpoints with auth.
[optional Relevant Links:]
Parent Envoy issue: envoyproxy/envoy#2763
The text was updated successfully, but these errors were encountered: