<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Envoy Gateway on Documentation</title>
    <link>/docs/kubernetes/guides/envoy-gateway/</link>
    <description>Recent content in Envoy Gateway on Documentation</description>
    <generator>Hugo</generator>
    <language>en</language>
    <atom:link href="/docs/kubernetes/guides/envoy-gateway/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Direct (PROXY-protocol) mode</title>
      <link>/docs/kubernetes/guides/envoy-gateway/direct/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>/docs/kubernetes/guides/envoy-gateway/direct/</guid>
      <description>&lt;p&gt;This guide walks through setting up Envoy Gateway in a cluster where the&#xA;OpenStack load balancer is configured in TCP mode with &lt;strong&gt;PROXY protocol v2&lt;/strong&gt;.&#xA;The load balancer prepends a PROXY header to each incoming connection&#xA;carrying the real client IP. Envoy parses that header and uses it for&#xA;access logs, rate limiting and &lt;code&gt;X-Forwarded-For&lt;/code&gt;.&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; Your &lt;code&gt;ClientTrafficPolicy&lt;/code&gt; must set &lt;code&gt;proxyProtocol.optional: false&lt;/code&gt;. Without it Envoy rejects incoming connections and all routes return 503.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Proxy (X-Forwarded-For) mode</title>
      <link>/docs/kubernetes/guides/envoy-gateway/proxy/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>/docs/kubernetes/guides/envoy-gateway/proxy/</guid>
      <description>&lt;p&gt;This guide walks through setting up Envoy Gateway in a cluster where you&#xA;front the OpenStack load balancer with &lt;strong&gt;your own upstream proxy&lt;/strong&gt; — for&#xA;example a CDN, WAF, or edge proxy — that terminates the client connection&#xA;and injects the real client IP into the &lt;code&gt;X-Forwarded-For&lt;/code&gt; header. The&#xA;OpenStack load balancer itself stays in TCP passthrough; the upstream&#xA;proxy is what carries the client IP for you.&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; Your &lt;code&gt;ClientTrafficPolicy&lt;/code&gt; must set &lt;code&gt;clientIPDetection.xForwardedFor&lt;/code&gt; with &lt;code&gt;numTrustedHops&lt;/code&gt; set to the number of trusted proxies in front of Envoy. Without it Envoy will not honour the incoming &lt;code&gt;X-Forwarded-For&lt;/code&gt; header and your access logs and rate limiting will see the load balancer&amp;rsquo;s internal IP.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
