Skip to content

staging clusters to use envoy gateway api#507

Merged
azahmd merged 1 commit intomainfrom
use-envoy
Mar 26, 2026
Merged

staging clusters to use envoy gateway api#507
azahmd merged 1 commit intomainfrom
use-envoy

Conversation

@anish-mudaraddi
Copy link
Copy Markdown
Collaborator

@anish-mudaraddi anish-mudaraddi commented Mar 24, 2026

contingent on this PR being merged: stfc/cloud-helm-charts#188

This deploys envoy gateway onto our staging clusters. Using the charts that will be released from the above PR.

changelog:

  • setup envoy gateways service - which will deploy envoyproxy and setup 2 gateways for internal and user-facing services on clusters. Deprecate ingress nginx

  • argocd to use envoy gateway and backendtlspolicy for full encryption for external traffic. ArgoCD to use an internal TLS certificate generated by cert-manager for encrpyting east-west traffic

  • use cert-manager chart to setup clusterissuers on staging clusters. For worker, this will setup a letsencrypt issuer that can make http01 requests using gateway api. This cert-manager will also setup an internal TLS CA to sign internal certs for encrypting east-west traffic

  • setup a separate monitoring stack and setup httproute with basicauth securitypolicy to match ingress annotations, deprecate addon method of installation

  • setup httproute for longhorn

  • Setup httproute for Harbor, setup internal TLS certs and backendTLSPolicy for encrypting east-west traffic gateway->pod and pod->pod

  • Setup httproute for docker registry, use internal TLS and backendTLSPolicy for encrypting east-west traffic gateway->pod

  • Setup httproute, securitypolicies and internalTLS for opensearch - managed via cert-manager and signed with internal CA

  • Deprecate materials-galaxy and victoria metrics and remove those services from staging as we don't use them

jacob-ward
jacob-ward previously approved these changes Mar 25, 2026
Copy link
Copy Markdown
Contributor

@jacob-ward jacob-ward left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Approved but definitely requires a second reviewer

General comment that this should definitely have been split into multiple commits, a lot of the changes are quite simple but still.

If each item in your changelog in your commit message had been it's own commit this would have worked a bit better in my view

contingent on this PR being merged: stfc/cloud-helm-charts#188

This deploys envoy gateway onto our staging clusters. Using the charts that will be released from the above PR.

changelog:

setup envoy gateways service - which will deploy envoyproxy and setup 2 gateways for internal and user-facing services on clusters.  Deprecate ingress nginx

argocd to use envoy gateway and backendtlspolicy for full encryption for external traffic. ArgoCD to use an internal TLS certificate generated by cert-manager for encrpyting east-west traffic

use cert-manager chart to setup clusterissuers on staging clusters. For worker, this will setup a letsencrypt issuer that can make http01 requests using gateway api. This cert-manager will also setup an internal TLS CA to sign internal certs for encrypting east-west traffic

setup a separate monitoring stack and setup httproute with basicauth securitypolicy to match ingress annotations, deprecate addon method of installation

setup httproute for longhorn

Setup httproute for Harbor, setup internal TLS certs and backendTLSPolicy for encrypting east-west traffic gateway->pod and pod->pod

Setup httproute for docker registry, use internal TLS and backendTLSPolicy for encrypting east-west traffic gateway->pod

Setup httproute, securitypolicies and internalTLS for opensearch - managed via cert-manager and signed with internal CA

Deprecate materials-galaxy and victoria metrics and remove those services from staging as we don't use them
@azahmd azahmd merged commit 0fe95b0 into main Mar 26, 2026
1 check passed
@azahmd azahmd deleted the use-envoy branch March 26, 2026 10:34
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants