The bouncer can be deployed in a Kubernetes cluster alongside Envoy Gateway. An example manifest is provided at manifest.yaml.
You will need to create a secret with your LAPI API key and configure the bouncer to use it. I did this via env vars, but you can also use a config map or a file.
[!WARNING] Make sure you point the bouncer to your LAPI instance and update the image sha from
envoy-bouncerto your desired version.
apiVersion: v1
kind: Secret
metadata:
name: crowdsec-api-key-secret
namespace: envoy-gateway-system
type: Opaque
data:
ENVOY_BOUNCER_BOUNCER_APIKEY: <b64-encoded-api-key>
To base64 encode your API key:
echo -n <your-api-key> | base64
Apply it to the cluster
kubectl apply -f secret.yaml
kubectl apply -f manifest.yaml
kubectl logs -f deployment/envoy-bouncer
The bouncer can be configured as an external authorization service in Envoy Gateway. An example policy is provided at policy.yaml
Add the Helm repository:
helm repo add envoy-proxy-bouncer https://kdwils.github.io/envoy-proxy-bouncer
helm repo update
Install the chart and create a security policy:
```bash
helm install bouncer envoy-proxy-bouncer/envoy-proxy-bouncer
–set crowdsec.apiKey=