-
Notifications
You must be signed in to change notification settings - Fork 5
/
Copy pathistio-controlplane.yaml
71 lines (70 loc) · 1.88 KB
/
istio-controlplane.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
apiVersion: install.istio.io/v1alpha1
kind: IstioOperator
metadata:
namespace: istio-system
name: istiocontrolplane
spec:
profile: minimal
components:
ingressGateways:
- name: ingressgateway
namespace: istio-system
enabled: true
label:
# Set a unique label for the gateway. This is required to ensure Gateways
# can select this workload
istio: ingressgateway
k8s:
service:
type: LoadBalancer
# Change ip to ip of loadbalancer
externalIPs:
- 10.10.10.1
loadBalancerIP: 10.10.10.1
# type: NodePort
# ports:
# - port: 80
# targetPort: 8080
# nodePort: 30080
# name: http
# - port: 443
# targetPort: 8443
# nodePort: 30443
# name: https
pilot:
enabled: true
meshConfig:
extensionProviders:
- name: "oauth2-proxy"
envoyExtAuthzHttp:
service: "oauth2-proxy.demo.svc.cluster.local"
port: "80"
headersToDownstreamOnDeny:
- content-type
- set-cookie
headersToUpstreamOnAllow:
- authorization
- cookie
- path
- x-auth-request-access-token
- x-forwarded-access-token
includeHeadersInCheck:
- "cookie"
- "x-forwarded-access-token"
- "x-forwarded-user"
- "x-forwarded-email"
- "authorization"
- "x-forwarded-proto"
- "proxy-authorization"
- "user-agent"
- "x-forwarded-host"
- "from"
- "x-forwarded-for"
- "accept"
includeAdditionalHeadersInCheck:
authorization: '%REQ(x-auth-request-access-token)%'
values:
gateways:
istio-ingressgateway:
# Enable gateway injection
injectionTemplate: gateway