You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When using Gateway Namespace Mode, Envoy Gateway needs additional RBAC permissions to create and manage resources across different namespaces. The following RBAC resources are automatically created when installing Envoy Gateway Helm Chart with Gateway Namespace Mode enabled.
65
65
66
-
```bash
66
+
```yaml
67
67
apiVersion: rbac.authorization.k8s.io/v1
68
68
kind: ClusterRole
69
69
metadata:
@@ -100,23 +100,23 @@ Envoy Gateway also supports configuration to you only watch resources in the spe
100
100
`EnvoyGateway.provider.kubernetes.watch.namespaces` or `EnvoyGateway.provider.kubernetes.watch.namespaceSelector`.
101
101
In this case, when you specify this configuration with Gateway Namespace Mode,Envoy Gateway will only watch for Gateway API resources in the specified namespaces and create needed Roles for infrastructure management in the specified namespaces.
102
102
103
-
# Testing
103
+
## Testing
104
104
105
105
The following example demonstrates deploying two Gateways in different namespaces `team-a` and `team-b`.
106
106
107
-
## Create test namespaces
107
+
### Create test namespaces
108
108
109
109
```shell
110
110
kubectl create namespace team-a
111
111
kubectl create namespace team-b
112
112
```
113
113
114
-
## Deploy Gateway Namespace Mode Example
114
+
### Deploy Gateway Namespace Mode Example
115
115
116
116
Deploy resources on your cluster from the example, it will create two sets of backend deployments, Gateways and their respective HTTPRoutes in the previously created namespaces `team-a` and `team-b`.
When using Gateway Namespace Mode, Envoy Gateway needs additional RBAC permissions to create and manage resources across different namespaces. The following RBAC resources are automatically created when installing Envoy Gateway Helm Chart with Gateway Namespace Mode enabled.
65
65
66
-
```bash
66
+
```yaml
67
67
apiVersion: rbac.authorization.k8s.io/v1
68
68
kind: ClusterRole
69
69
metadata:
@@ -100,23 +100,23 @@ Envoy Gateway also supports configuration to you only watch resources in the spe
100
100
`EnvoyGateway.provider.kubernetes.watch.namespaces` or `EnvoyGateway.provider.kubernetes.watch.namespaceSelector`.
101
101
In this case, when you specify this configuration with Gateway Namespace Mode,Envoy Gateway will only watch for Gateway API resources in the specified namespaces and create needed Roles for infrastructure management in the specified namespaces.
102
102
103
-
# Testing
103
+
## Testing
104
104
105
105
The following example demonstrates deploying two Gateways in different namespaces `team-a` and `team-b`.
106
106
107
-
## Create test namespaces
107
+
### Create test namespaces
108
108
109
109
```shell
110
110
kubectl create namespace team-a
111
111
kubectl create namespace team-b
112
112
```
113
113
114
-
## Deploy Gateway Namespace Mode Example
114
+
### Deploy Gateway Namespace Mode Example
115
115
116
116
Deploy resources on your cluster from the example, it will create two sets of backend deployments, Gateways and their respective HTTPRoutes in the previously created namespaces `team-a` and `team-b`.
0 commit comments