-
Notifications
You must be signed in to change notification settings - Fork 363
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use Case - Front Proxy with mTLS #88
Comments
thanks for raising this issue, this seems like mTLS support between downstream client and envoy which should definitely be supported by the project. Linking the Gateway API issue kubernetes-sigs/gateway-api#91 which will be required to be able to describe this user intent. |
Thanks for sharing that use-case. I think that the only trick here is delivery of self-signed CA certificate to the gateway. Gateway itself will push the certificate down to Envoy via SDS. |
After #95 is merged, TLS config will need to be added. |
We do exactly what OP described (for the exact same reasons [to benefit from Cloudflares strong DDoS, bot detection, machine learning, etc.] for a custom gRPC API using Cloudflares Origin Pulls mTLS setup with the API (and our custom Envoy front proxy setup) hosted on fly.io. Good to see that others are doing similar setups and I'd love to see this as an Envoy Gateway example. |
This issue has been automatically marked as stale because it has not had activity in the last 30 days. It will be closed in the next 7 days unless it is tagged "help wanted" or "no stalebot" or other activity occurs. Thank you for your contributions. |
This issue has been automatically closed because it has not had activity in the last 37 days. If this issue is still valid, please ping a maintainer and ask them to label it as "help wanted" or "no stalebot". Thank you for your contributions. |
#208 adds control plane auth where |
Note that kubernetes-sigs/gateway-api#91 has yet to be fixed and is still tagged as "help wanted". |
@arkodg I suggest adding an agenda item for kubernetes-sigs/gateway-api#91 (comment) to the Gateway API community meeting. I expect a design doc, review, etc will be needed for the Gateway API community to achieve consensus. |
Moving to the backlog since the dependent upstream issue, kubernetes-sigs/gateway-api#91, is not fixed. |
since its unclear whether kubernetes-sigs/gateway-api#91 will land before March 2024 when Envoy Gateway plans on going GA, plan on picking up this issue and adding this API field into |
Relates to envoyproxy#88 Signed-off-by: Arko Dasgupta <[email protected]>
Relates to envoyproxy#88 Signed-off-by: Arko Dasgupta <[email protected]>
* api: downstream client CACert validation Relates to #88 Signed-off-by: Arko Dasgupta <[email protected]> * docs Signed-off-by: Arko Dasgupta <[email protected]> * lint Signed-off-by: Arko Dasgupta <[email protected]> * charts Signed-off-by: Arko Dasgupta <[email protected]> --------- Signed-off-by: Arko Dasgupta <[email protected]>
* api: downstream client CACert validation Relates to envoyproxy#88 Signed-off-by: Arko Dasgupta <[email protected]> * docs Signed-off-by: Arko Dasgupta <[email protected]> * lint Signed-off-by: Arko Dasgupta <[email protected]> * charts Signed-off-by: Arko Dasgupta <[email protected]> --------- Signed-off-by: Arko Dasgupta <[email protected]>
This issue has been automatically marked as stale because it has not had activity in the last 30 days. |
Last meeting we discussed providing some use cases on how people are deploying Envoy in production. We have somewhat of an interesting use case I thought I would share.
We deploy Envoy as a front proxy that sits behind a CDN. Our Envoy Proxy sits behind a network load balancer and has one TLS listener that requires all connections present a client certificate signed by the Cloudflare CA. Many CDN providers, such as Cloudflare and Fastly, provide a way to authenticate origin requests using a CA/self-signed certificate. See the Cloudflare Authenticated Origin Pulls documentation for additional details. This provides similar benefits as deploying Envoy as a sidecar with mTLS; only requests that originate from the CDN provider with a valid certificate will be accepted by the Envoy Proxy.
This affords a few benefits as a front proxy:
Happy to discuss any specific challenges on getting this deployed and configured correctly, but this is one of our use cases.
Example
An example listener would look something like this:
The text was updated successfully, but these errors were encountered: