Skip to content

Commit 6b6f047

Browse files
authored
add a concrete example of an allow-nothing binding to istio-waypoint gtw class (#16632)
Signed-off-by: Ian Rudie <[email protected]>
1 parent 5cdef4b commit 6b6f047

File tree

1 file changed

+15
-0
lines changed
  • content/en/docs/ops/best-practices/security

1 file changed

+15
-0
lines changed

content/en/docs/ops/best-practices/security/index.md

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -54,6 +54,21 @@ By binding `AuthorizationPolicy` to the `GatewayClass`, you can configure all ga
5454
It is important to note that `GatewayClass` is a cluster-scoped resource, and binding namespace-scoped policies to it requires special care.
5555
Istio requires that policies which are bound to a `GatewayClass` reside in the root namespace, typically `istio-system`.
5656

57+
For waypoints, standard allow-nothing policy would be:
58+
59+
{{< text yaml >}}
60+
apiVersion: security.istio.io/v1
61+
kind: AuthorizationPolicy
62+
metadata:
63+
name: allow-nothing-istio-waypoint
64+
namespace: istio-system
65+
spec:
66+
targetRefs:
67+
- group: gateway.networking.k8s.io
68+
kind: GatewayClass
69+
name: istio-waypoint
70+
{{< /text >}}
71+
5772
{{< tip >}}
5873
When using the default-deny pattern with waypoints, the policy bound to the `istio-waypoint` `GatewayClass` should be used in addition to the "classic" default-deny policy. The "classic" default-deny policy will be enforced by ztunnel against the workloads in your mesh and still provides meaningful value.
5974
{{< /tip >}}

0 commit comments

Comments
 (0)