-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[SCHEMATIC-215] Enable ingress for SigNoz UI #51
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -8,4 +8,5 @@ spec: | |
kind: Gateway | ||
name: eg | ||
tls: | ||
minVersion: "1.3" | ||
minVersion: "1.3" | ||
enableProxyProtocol: true |
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -12,3 +12,7 @@ spec: | |
- group: "" | ||
kind: Service | ||
name: signoz-otel-collector | ||
- group: "" | ||
kind: Service | ||
name: signoz-frontend | ||
|
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,7 +1,7 @@ | ||
apiVersion: gateway.envoyproxy.io/v1alpha1 | ||
kind: SecurityPolicy | ||
metadata: | ||
name: require-audience-for-authorization | ||
name: require-jwt-for-collector | ||
namespace: envoy-gateway | ||
spec: | ||
targetRef: | ||
|
@@ -11,3 +11,22 @@ spec: | |
jwt: | ||
providers: <replaced-by-kustomize> | ||
authorization: <replaced-by-kustomize> | ||
--- | ||
apiVersion: gateway.envoyproxy.io/v1alpha1 | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. alpha version? There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. It's the latest at the moment (https://gateway.envoyproxy.io/latest/api/extension_types/#gatewayenvoyproxyiov1alpha1) The gateway itself is past the v1.x.x mark, but the APIs (aka definition of this YAML) are subject to updates. I've been impressed with the changes this project has been publishing out and they have smoothed out a bunch of rough edges for shaping traffic into the K8s cluster. I've worked with other tools like Istio, and |
||
kind: SecurityPolicy | ||
metadata: | ||
name: restrict-ui-to-sage-vpn | ||
namespace: envoy-gateway | ||
spec: | ||
targetRef: | ||
group: gateway.networking.k8s.io | ||
kind: HTTPRoute | ||
name: signoz-ui-route | ||
authorization: | ||
defaultAction: Deny | ||
rules: | ||
- action: Allow | ||
principal: | ||
clientCIDRs: | ||
# Public IP address for the Sage VPN. `/32` CIDR mask means a single IP address. | ||
- 52.44.61.21/32 | ||
Comment on lines
+25
to
+32
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. i do't know about the rest but this looks like what we want. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
SigNoz only supports working at the root URL of the domain it's running on. In favor of getting a solution I am going to use the ${environment}.sagedpe.org URLs. If we want to swap to using a different sub-domain later we'll be able to do that, for example Sage-Bionetworks-IT/organizations-infra#1302 shows what we might do on the Sage IT infra stack.
On this side it's going to be a larger shift (And why I didn't want to worry about doing it now). It's because we'll need to make sure that we request SSL certs from Let's Encrypt and make sure it all works with the Listeners in the Envoy Gateway.