You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: documentation/modules/ROOT/pages/02-architecture.adoc
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -67,13 +67,13 @@ Refer to the https://developers.redhat.com/articles/2024/06/12/getting-started-r
67
67
68
68
.. https://gateway-api.sigs.k8s.io/api-types/gateway/[*Gateway*^]: create a new Gateway (using the Gateway API and Istio-based controllers) as an entrypoint for all requests to Globex's system. The Gateway uses the TLS Certificates created by the TLS Issuer. Also a number of policies are setup to secure and protect the Gateway.
69
69
70
-
.. https://docs.kuadrant.io/0.8.0/kuadrant-operator/doc/tls/[*TLS Policy*^]: leverages the TLS-issuer/CertificateIssuer to set up TLS certificates for the listeners defined within the Gateway. Listeners define the hostname for the various incoming requests and is denoted with a wildcard hostname based on the root domain. These gateways can use a subdomain of the Managed Zone. E.g. `*.managed.globex.com`.
70
+
.. *TLS Policy*: leverages the TLS-issuer/CertificateIssuer to set up TLS certificates for the listeners defined within the Gateway. Listeners define the hostname for the various incoming requests and is denoted with a wildcard hostname based on the root domain. These gateways can use a subdomain of the Managed Zone. E.g. `*.managed.globex.com`.
71
71
72
-
.. https://docs.kuadrant.io/0.8.0/kuadrant-operator/doc/auth/[*Auth Policy*^]: setup a zero-trust deny-all policy that result in a default 403 response for any unprotected endpoints.
72
+
.. *Auth Policy*: setup a zero-trust deny-all policy that result in a default 403 response for any unprotected endpoints.
73
73
74
-
.. https://docs.kuadrant.io/0.8.0/kuadrant-operator/doc/dns/[*DNS Policy*^]: provide DNS management by managing the lifecycle of DNS records to setup ingress connectivity using DNS to bring traffic to the Gateway.
74
+
.. *DNS Policy*: provide DNS management by managing the lifecycle of DNS records to setup ingress connectivity using DNS to bring traffic to the Gateway.
75
75
76
-
.. https://docs.kuadrant.io/0.8.0/kuadrant-operator/doc/rate-limiting/[*RateLimit Policy*^]: set up a default artificially low global limit to further protect any endpoints exposed by this Gateway.
76
+
.. *RateLimit Policy*^: set up a default, artificially low, global limit to further protect any endpoints exposed by this Gateway.
77
77
====
78
78
79
79
. *Developer/Application owners* workflow: +
@@ -140,7 +140,7 @@ If needed, one can create the certificates manually and inject them, rather than
It enables platform engineers and application developers to easily connect, secure, and protect their services and infrastructure across multiple clusters. It exposes these capabilities in the form of powerful policy APIs that implement the https://gateway-api.sigs.k8s.io/[Gateway API^] concept of https://gateway-api.sigs.k8s.io/reference/policy-attachment/[policy attachment^] - with policies for https://docs.kuadrant.io/latest/kuadrant-operator/doc/tls/[TLS^], https://docs.kuadrant.io/0.8.0/kuadrant-operator/doc/reference/dnspolicy/[DNS^], application https://docs.kuadrant.io/latest/kuadrant-operator/doc/auth/[AuthN & AuthZ^], and https://docs.kuadrant.io/latest/kuadrant-operator/doc/rate-limiting/[rate limiting^]. Additionally, Kuadrant offers observability templates to further support infrastructure management.
143
+
It enables platform engineers and application developers to easily connect, secure, and protect their services and infrastructure across multiple clusters. It exposes these capabilities in the form of powerful policy APIs that implement the https://gateway-api.sigs.k8s.io/[Gateway API^] concept of https://gateway-api.sigs.k8s.io/reference/policy-attachment/[policy attachment^] - with policies for https://docs.kuadrant.io/1.0.x/kuadrant-operator/doc/overviews/tls/[TLS^], https://docs.kuadrant.io/1.0.x/kuadrant-operator/doc/overviews/dns/[DNS^], application https://docs.kuadrant.io/1.0.x/kuadrant-operator/doc/overviews/auth/[AuthN & AuthZ^], and https://docs.kuadrant.io/1.0.x/kuadrant-operator/doc/overviews/rate-limiting/[rate limiting^]. Additionally, Kuadrant offers observability templates to further support infrastructure management.
144
144
145
145
146
146
Simply put, Red Hat Connectivity Link
@@ -177,7 +177,7 @@ DNS operator consumes DNSRecord resources that are configured via the *DNSPolicy
177
177
==== Authorino Operator for Auth Policy
178
178
179
179
External authorization server fully manageable via Kubernetes Custom Resources. Supports JWT authentication, API key, mTLS, pattern-matching authz, OPA, K8s SA tokens, K8s RBAC, external metadata fetching, and more, with minimum to no coding at all, no rebuilding of your applications. +
AuthPolicy and RateLimitPolicy can be attached to Gateways or to HTTPRoutes, with cascading effects through the hierarchy that result in one effective policy per gateway-route combination.
205
205
206
-
Ref: More about https://docs.kuadrant.io/0.8.0/architecture/rfcs/0009-defaults-and-overrides/#policy-spec-resembling-more-the-target-spec[defaults and overrides^]
206
+
Ref: More about https://docs.kuadrant.io/1.0.x/architecture/rfcs/0009-defaults-and-overrides/[defaults and overrides^]
207
207
208
208
// For example, we can apply a RateLimit Policy to a Gateway which will by *default* be applied across all the resources (such as HTTPRoute) attached to it. But developers might want to apply different rate limits based on the service endpoint they are exposing. This could be higher than the Gateway's rate limits for inexpensive requests, or could be quite low if for e.g., they would like to expose an LLM API as a service. This can be achieved by applying another RateLimit Policy to the HTTPRoute thereby *overriding* the default value.
Copy file name to clipboardExpand all lines: documentation/modules/ROOT/pages/03.1-platform.adoc
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@
12
12
13
13
The ansible scripts we just run has setup the following as ArgoCD applicatiopns:
14
14
15
-
* Red Hat Connectivity Link/Kuadrant operator and a Kuadrant instance
15
+
* Red Hat Connectivity Link operator and a Kuadrant instance
16
16
* A TLS issuer for TLS certificates. [https://console-openshift-console.%OPENSHIFTSUBDOMAIN%/k8s/cluster/cert-manager.io\~v1~ClusterIssuer/prod-web-lets-encrypt-issuer/yaml[View CR^]]
17
17
+
18
18
.[underline]#Click to see an example and description#
@@ -303,7 +303,7 @@ spec:
303
303
----
304
304
for i in {1..10}; do curl -k -w "%{http_code}" https://echo.globex.%AWSROOTZONE%; done
305
305
----
306
-
* Learn more about Rate Limiting https://docs.kuadrant.io/0.8.0/kuadrant-operator/doc/rate-limiting/[here^]
306
+
* Learn more about Rate Limiting https://docs.kuadrant.io/1.0.x/kuadrant-operator/doc/overviews/rate-limiting/[here^]
0 commit comments