You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Insert your entry using this template keeping the list alphabetically sorted:
5
+
6
+
## <Company/Organization Name>
7
+
* Website: https://www.your-website.com
8
+
* Category: End User, Service Provider, etc
9
+
* Environments: AWS, Azure, Google Cloud, Bare Metal, etc
10
+
* Use Cases:
11
+
- ...
12
+
* Status:
13
+
- [ ] development & testing
14
+
- [ ] production
15
+
* (Option) Logo (show in the official site):
16
+
* (Option) Description:
17
+
-->
18
+
19
+
# Envoy Gateway Adopters
20
+
21
+
This page contains a list of organizations who are users of Envoy Gateway, following the [definitions provided by the CNCF](https://github.com/cncf/toc/blob/main/FAQ.md#what-is-the-definition-of-an-adopter).
22
+
23
+
If you would like to be included in this table, please submit a PR to this file or comment to [this issue](https://github.com/envoyproxy/gateway/issues/2781) and your information will be added.
24
+
25
+
## AllFactors
26
+
* Website https://allfactors.com
27
+
* Category: End User
28
+
* Environments:
29
+
* Use Case:
30
+
- Routing all customer traffic to our various backends. Every time a new customer signs up we dynamically add a
31
+
route to a new hostname so Envoy Gateway is deeply integrated with our product.
- Tetrate provides Enterprise Gateway (TEG) to end users, which includes a 100% upstream distribution of Envoy Gateway, and management to deliver applications securely, authenticate user traffic, protect services with rate limiting and WAF, and integrate with your observability stack to monitor and observe activity.
// +kubebuilder:validation:XValidation:rule="has(self.http3) && has(self.tls) && has(self.tls.alpnProtocols) ? self.tls.alpnProtocols.size() == 0 : true",message="alpn protocols can't be set if HTTP/3 is enabled"
38
37
// ClientTrafficPolicySpec defines the desired state of ClientTrafficPolicy.
39
38
typeClientTrafficPolicySpecstruct {
40
39
// +kubebuilder:validation:XValidation:rule="self.group == 'gateway.networking.k8s.io'", message="this policy can only have a targetRef.group of gateway.networking.k8s.io"
Copy file name to clipboardexpand all lines: api/v1alpha1/shared_types.go
+2-4
Original file line number
Diff line number
Diff line change
@@ -126,10 +126,6 @@ type KubernetesPodSpec struct {
126
126
// +optional
127
127
Volumes []corev1.Volume`json:"volumes,omitempty"`
128
128
129
-
// HostNetwork, If this is set to true, the pod will use host's network namespace.
130
-
// +optional
131
-
HostNetworkbool`json:"hostNetwork,omitempty"`
132
-
133
129
// ImagePullSecrets is an optional list of references to secrets
134
130
// in the same namespace to use for pulling any of the images used by this PodSpec.
135
131
// If specified, these secrets will be passed to individual puller implementations for them to use.
@@ -348,6 +344,8 @@ const (
348
344
)
349
345
350
346
// KubernetesHorizontalPodAutoscalerSpec defines Kubernetes Horizontal Pod Autoscaler settings of Envoy Proxy Deployment.
347
+
// When HPA is enabled, it is recommended that the value in `KubernetesDeploymentSpec.replicas` be removed, otherwise
348
+
// Envoy Gateway will revert back to this value every time reconciliation occurs.
351
349
// See k8s.io.autoscaling.v2.HorizontalPodAutoScalerSpec.
352
350
//
353
351
// +kubebuilder:validation:XValidation:message="maxReplicas cannot be less than minReplicas",rule="!has(self.minReplicas) || self.maxReplicas >= self.minReplicas"
0 commit comments