Skip to content

Commit b16a97b

Browse files
committed
fix review
Signed-off-by: Karol Szwaj <[email protected]>
1 parent 89f61f5 commit b16a97b

File tree

2 files changed

+5
-3
lines changed

2 files changed

+5
-3
lines changed

site/content/en/latest/tasks/operations/deployment-mode.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1079,6 +1079,6 @@ curl --header "Host: www.merged3.com" http://$GATEWAY_HOST:8082/example3
10791079
[EnvoyProxy]: ../../api/extension_types#envoyproxy
10801080
[GatewayClass]: https://gateway-api.sigs.k8s.io/api-types/gatewayclass/
10811081
[Namespaced deployment mode]: ../../api/extension_types#kuberneteswatchmode
1082-
[Gateway Namespace Mode]: gateway-namespace-mode.md
1082+
[Gateway Namespace Mode]: ./gateway-namespace-mode.md
10831083
[issue1231]: https://github.com/envoyproxy/gateway/issues/1231
10841084
[issue2629]: https://github.com/envoyproxy/gateway/issues/2629

site/content/en/latest/tasks/operations/gateway-namespace-mode.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,8 +16,6 @@ In standard deployment mode, Envoy Gateway creates all data plane resources in t
1616

1717
Gateway Namespace Mode changes this behavior by placing Envoy Proxy data plane resources like Deployments, Services and ServiceAccounts in each Gateway's namespace, providing stronger isolation and multi-tenancy.
1818

19-
# Design
20-
2119
Traditional deployment mode uses mTLS where both the client and server authenticate each other. However, in Gateway Namespace Mode, we've shifted to server-side TLS and JWT token validation between infra and control-plane.
2220

2321
* Only the CA certificate is available in pods running in Gateway namespaces
@@ -28,8 +26,12 @@ Gateway Namespace Mode uses projected service account JWT tokens for authenticat
2826
* Use short-lived, audience-specific JWT tokens. These tokens are automatically mounted into pods via the projected volume mechanism
2927
* JWT validation ensures that only authorized proxies can connect to the xDS server
3028

29+
{{% alert title="Note" color="warning" %}}
30+
3131
Currently it is not supported to run Gateway Namespace Mode with Merged Gateways deployments.
3232

33+
{{% /alert %}}
34+
3335
# Configuration
3436

3537
To enable Gateway Namespace Mode, configure the `provider.kubernetes.deploy.type` field in your Envoy Gateway ConfigMap:

0 commit comments

Comments
 (0)