Installing Gloo Gateway to Multiple Namespaces
In the default deployment scenario, a single deployment of the Gloo Gateway control plane and Envoy proxy are installed for the entire cluster. However, in some cases, it may be desirable to deploy multiple instances of the Gloo Gateway control plane and proxies in a single cluster.
This is useful when multiple tenants or applications want control over their own instance of Gloo Gateway. Some deployment scenarios may involve a Gloo Gateway per-application architecture. Additionally, different Gloo Gateway instances living in their own namespace may be given different levels of RBAC permissions.
In this document, we will review how to deploy multiple instances of Gloo Gateway to their own namespaces within a single Kubernetes cluster.
Scoping Gloo Gateway to specific namespaces
When using the default installation, Gloo Gateway will watch all namespaces for Kubernetes services and Gloo Gateway CRDs. This means that any Kubernetes service can be a destination for any VirtualService in the cluster.
Gloo Gateway can be configured to only watch specific namespaces, meaning Gloo Gateway will not see services and CRDs in any namespaces other than those provided in the watchNamespaces setting .
Additionally, Gloo reads configuration for the Gateway custom resource only in the namespace that the gateway controller is deployed by default. For Gateway configuration in other namespaces, such as to support multiple gateways, enable the GatewayOptions.readGatewaysFromAllNamespaces setting .
By leveraging these options, we can install Gloo Gateway to as many namespaces we need, ensuring that the watchNamespaces
do not overlap.
watchNamespaces
can be shared between Gloo Gateway instances, so long as any Virtual Services are not written to a shared namespace. When this happens, both Gloo Gateway instances will attempt to apply the same routing config, which can cause domain conflicts.
Currently, installing Gloo Gateway with specific watchNamespaces
requires installation via the Helm chart.
Installing Namespace-Scoped Gloo Gateway with Helm
In this section we’ll deploy Gloo Gateway twice, each instance to a different namespace, with two different Helm value files.
For Gloo Gateway Enterprise users, you often use Gloo with the enterprise observability tools, Grafana and Prometheus. However, you cannot use the same observability instance for multiple Gloo instances. You can disable the observability tool for additional Gloo instances, or create separate observability tool instances by using name and RBAC overrides, as shown in the following examples.
For Gloo Gateway Open Source users, remove the Grafana and Prometheus settings from the examples. Grafana and Prometheus are enterprise-only features.
Create a file named gloo1-overrides.yaml
and paste the following inside:
settings:
create: true
writeNamespace: gloo1
watchNamespaces:
- default
- gloo1
gloo:
gateway:
readGatewaysFromAllNamespaces: true # Read Gateway config in all 'watchNamespaces'
grafana: # Remove the grafana settings for Gloo Gateway OSS
rbac:
namespaced: true
prometheus: # Remove the prometheus settings for Gloo Gateway OSS
kube-state-metrics:
fullnameOverride: glooe-prometheus-kube-state-metrics-1
server:
fullnameOverride: glooe-prometheus-server-1
Now, let’s install Gloo Gateway. Review our Kubernetes installation guide if you need a refresher.
First create the namespace for our first Gloo Gateway deployment:
kubectl create ns gloo1
Then install Gloo Gateway using one of the following methods:
glooctl install gateway -n gloo1 --values gloo1-overrides.yaml
helm install gloo gloo/gloo --namespace gloo1 -f gloo1-overrides.yaml
Using Helm 2 is not supported in Gloo Gateway.
Check that gloo pods are running:
kubectl get pod -n gloo1
NAME READY STATUS RESTARTS AGE
discovery-798cdd5499-z7rrt 1/1 Running 0 37s
gateway-5fc999b847-jf4xp 1/1 Running 0 32s
gateway-proxy-67f4c7dfb6-hc5kg 1/1 Running 0 27s
gloo-dd5bcdc8f-bvtjh 1/1 Running 0 39s
And we should see that Gloo Gateway is only creating Upstreams from services in default
and gloo1
:
kubectl get us -n gloo1
NAME AGE
default-kubernetes-443 1h
gloo1-gateway-proxy-443 1h
gloo1-gateway-proxy-80 1h
gloo1-gloo-9977 1h
Let’s repeat the above process, substituting gloo2
for gloo1
:
Create a file named gloo2-overrides.yaml
and paste the following inside:
settings:
create: true
writeNamespace: gloo2
watchNamespaces:
- default
- gloo2
gloo:
gateway:
readGatewaysFromAllNamespaces: true # Read Gateway config in all 'watchNamespaces'
grafana: # Remove the grafana settings for Gloo Gateway OSS
rbac:
namespaced: true
prometheus: # Remove the prometheus settings for Gloo Gateway OSS
kube-state-metrics:
fullnameOverride: glooe-prometheus-kube-state-metrics-2
server:
fullnameOverride: glooe-prometheus-server-2
Now, let’s install Gloo Gateway for the second time. First create the second namespace:
# create the namespace for our second gloo deployment
kubectl create ns gloo2
Then perform the second installation using one of the following methods:
glooctl install gateway -n gloo2 --values gloo2-overrides.yaml
helm install gloo gloo/gloo --namespace gloo2 -f gloo2-overrides.yaml
Check that gloo pods are running:
kubectl get pod -n gloo2
NAME READY STATUS RESTARTS AGE
discovery-798cdd5499-kzmkc 1/1 Running 0 8s
gateway-5fc999b847-pn2tk 1/1 Running 0 8s
gateway-proxy-67f4c7dfb6-284wv 1/1 Running 0 8s
gloo-dd5bcdc8f-krp5p 1/1 Running 0 9s
And we should see that the second installation of Gloo Gateway is only creating Upstreams from services in default
and gloo2
:
kubectl get us -n gloo2
NAME AGE
default-kubernetes-443 53s
gloo2-gateway-proxy-443 53s
gloo2-gateway-proxy-80 53s
gloo2-gloo-9977 53s
And that’s it! We can now create routes for Gloo Gateway #1 by creating our Virtual Services in the gloo1
namespace, and routes for Gloo Gateway #2 by creating Virtual Services in the gloo2
namespace. We can add watchNamespaces
to our liking; the only catch is that a Virtual Service which lives in a shared namespace will be applied to both gateways (which can lead to undesired behavior if this was not the intended effect).
When uninstalling a single instance of Gloo Gateway when multiple instances are installed, you should only delete the namespace into which that instance is installed. Running glooctl uninstall
can cause cluster-wide resources to be deleted, which will break any remaining Gloo Gateway installation in your cluster