-
Notifications
You must be signed in to change notification settings - Fork 398
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
The TLS configuration cannot be placed in the Gateway's CR. #2289
Comments
Or is there any good way to solve this problem currently? Our scenario is that there are tens of thousands of separate tenants, who may all have their own domain names and certificates to configure, and the Gateway is created uniformly by cluster management, so it is impossible for tenants to modify the listener. And each tenant needs to configure their own domain name certificate in their own namespace. |
@fanux This may solve your problem: each tenant can create its own Gateway with an HTTPS listener in it, and these Gateways can be merged onto the same Envoy Proxy infrastructure by configuring https://gateway.envoyproxy.io/v0.6.0/api/extension_types/#envoyproxyspec
|
closing this issue, please refer to #2289 (comment) as a solution to optimize the data plane while still creating resources per tenant |
kubernetes-sigs/gateway-api#2665
The text was updated successfully, but these errors were encountered: