Envoy Filter

    NOTE 1: Since this is break glass configuration, there will notbe any backward compatibility across different Istio releases. Inother words, this configuration is subject to change based oninternal implementation of Istio networking subsystem.

    NOTE 2: The envoy configuration provided through this mechanismshould be carefully monitored across Istio proxy version upgrades,to ensure that deprecated fields are removed and replacedappropriately.

    NOTE 3: When multiple EnvoyFilters are bound to the sameworkload in a given namespace, all patches will be processedsequentially in order of creation time. The behavior is undefinedif multiple EnvoyFilter configurations conflict with each other.

    NOTE 4: *_To apply an EnvoyFilter resource to all workloads(sidecars and gateways) in the system, define the resource in theconfig rootnamespace,without a workloadSelector.

    The example below declares a global default EnvoyFilter resource inthe root namespace called istio-config, that adds a customprotocol filter on all sidecars in the system, for outbound port9307. The filter should be added before the terminating tcp_proxyfilter to take effect. In addition, it sets a 30s idle timeout forall HTTP connections in both gateays and sidecars.

    The following example enables Envoy’s Lua filter for all inboundHTTP calls arriving at service port 8080 of the reviews service podwith labels “app: reviews”, in the bookinfo namespace. The luafilter calls out to an external service internal.org.net:8888 thatrequires a special cluster definition in envoy. The cluster is alsoadded to the sidecar as part of this configuration.

    The following example overwrites certain fields (HTTP idle timeoutand X-Forward-For trusted hops) in the HTTP connection manager in alistener on the ingress gateway in istio-system namespace for theSNI host app.example.com:

    EnvoyFilter.ApplyTo

    ApplyTo specifies where in the Envoy configuration, the given patch should be applied.

    NameDescription
    INVALID
    LISTENERApplies the patch to the listener.
    FILTER_CHAINApplies the patch to the filter chain.
    NETWORK_FILTERApplies the patch to the network filter chain, to modify anexisting filter or add a new filter.
    HTTP_FILTERApplies the patch to the HTTP filter chain in the httpconnection manager, to modify an existing filter or add a newfilter.
    ROUTE_CONFIGURATIONApplies the patch to the Route configuration (rds output)inside a HTTP connection manager. This does not apply to thevirtual host. Currently, only MERGE operation is allowed on theroute configuration objects.
    VIRTUAL_HOSTApplies the patch to a virtual host inside a route configuration.
    HTTP_ROUTEApplies the patch to a route object inside the matched virtualhost in a route configuration. Currently, only MERGE operationis allowed on the route objects.
    CLUSTERApplies the patch to a cluster in a CDS output. Also used to add new clusters.

    EnvoyFilter.ClusterMatch

    Conditions specified in ClusterMatch must be met for the patchto be applied to a cluster.

    FieldTypeDescriptionRequired
    portNumberuint32The service port for which this cluster was generated. Ifomitted, applies to clusters for any port.No
    servicestringThe fully qualified service name for this cluster. If omitted,applies to clusters for any service. For services definedthrough service entries, the service name is same as the hostsdefined in the service entry.No
    subsetstringThe subset associated with the service. If omitted, applies toclusters for any subset of a service.No
    namestringThe exact name of the cluster to match. To match a specificcluster by name, such as the internally generated “Passthrough”cluster, leave all fields in clusterMatch empty, except thename.No

    EnvoyFilter.DeprecatedListenerMatch.ListenerProtocol

    NameDescription
    ALLAll protocols
    HTTPHTTP or HTTPS (with termination) / HTTP2/gRPC
    TCPAny non-HTTP listener

    EnvoyFilter.DeprecatedListenerMatch.ListenerType

    NameDescription
    ANYAll listeners
    SIDECAR_INBOUNDInbound listener in sidecar
    SIDECAR_OUTBOUNDOutbound listener in sidecar
    GATEWAYGateway listener

    EnvoyFilter.EnvoyConfigObjectMatch

    One or more match conditions to be met before a patch is appliedto the generated configuration for a given proxy.

    FieldTypeDescriptionRequired
    contextPatchContextThe specific config generation context to match on. Istio Pilotgenerates envoy configuration in the context of a gateway,inbound traffic to sidecar and outbound traffic from sidecar.No
    proxyMatch on properties associated with a proxy.No
    listenerListenerMatch (oneof)Match on envoy listener attributes.Yes
    routeConfigurationMatch on envoy HTTP route configuration attributes.Yes
    clusterMatch on envoy cluster attributes.Yes

    EnvoyFilter.EnvoyConfigObjectPatch

    Changes to be made to various envoy config objects.

    FieldTypeDescriptionRequired
    applyToSpecifies where in the Envoy configuration, the patch should beapplied. The match is expected to select the appropriateobject based on applyTo. For example, an applyTo withHTTP_FILTER is expected to have a match condition on thelisteners, with a network filter selection onenvoy.http_connection_manager and a sub filter selection on theHTTP filter relative to which the insertion should beperformed. Similarly, an applyTo on CLUSTER should have a match(if provided) on the cluster and not on a listener.No
    matchEnvoyConfigObjectMatchMatch on listener/route configuration/cluster.No
    patchThe patch to apply along with the operation.No

    EnvoyFilter.InsertPosition.Index

    Index/position in the filter chain.

    NameDescription
    FIRSTInsert first
    LASTInsert last
    BEFOREInsert before the named filter.
    AFTERInsert after the named filter.

    EnvoyFilter.ListenerMatch

    Conditions specified in a listener match must be met for thepatch to be applied to a specific listener across all filterchains, or a specific filter chain inside the listener.

    FieldTypeDescriptionRequired
    portNumberuint32The service port/gateway port to which traffic is beingsent/received. If not specified, matches all listeners. Even thoughinbound listeners are generated for the instance/pod ports, onlyservice ports should be used to match listeners.No
    filterChainFilterChainMatchMatch a specific filter chain in a listener. If specified, thepatch will be applied to the filter chain (and a specificfilter if specified) and not to other filter chains in thelistener.No
    namestringMatch a specific listener by its name. The listeners generatedby Pilot are typically named as IP:Port.No

    EnvoyFilter.ListenerMatch.FilterChainMatch

    For listeners with multiple filter chains (e.g., inboundlisteners on sidecars with permissive mTLS, gateway listenerswith multiple SNI matches), the filter chain match can be usedto select a specific filter chain to patch.

    FieldTypeDescriptionRequired
    namestringThe name assigned to the filter chain.No
    snistringThe SNI value used by a filter chain’s match condition. Thiscondition will evaluate to false if the filter chain has nosni match.No
    transportProtocolstringApplies only to SIDECAR_INBOUND context. If non-empty, atransport protocol to consider when determining a filterchain match. This value will be compared against thetransport protocol of a new connection, when it’s detected bythe tls_inspector listener filter.Accepted values include:- raw_buffer - default, used when no transport protocol is detected.- tls - set when TLS protocol is detected by the TLS inspector.No
    applicationProtocolsstringApplies only to sidecars. If non-empty, a comma separated setof application protocols to consider when determining afilter chain match. This value will be compared against theapplication protocols of a new connection, when it’s detectedby one of the listener filters such as the http_inspector.Accepted values include: h2,http/1.1,http/1.0No
    filterFilterMatchThe name of a specific filter to apply the patch to. Set thisto envoy.http_connection_manager to add a filter or apply apatch to the HTTP connection manager.No

    EnvoyFilter.ListenerMatch.FilterMatch

    FieldTypeDescriptionRequired
    namestringThe filter name to match on.No
    subFilterSubFilterMatchThe next level filter within this filter to matchupon. Typically used for HTTP Connection Manager filters andThrift filters.No

    EnvoyFilter.ListenerMatch.SubFilterMatch

    Conditions to match a specific filter within anotherfilter. This field is typically useful to match a HTTP filterinside the envoy.http_connection_manager network filter. Thiscould also be applicable for thrift filters.

    FieldTypeDescriptionRequired
    namestringThe filter name to match on.No

    EnvoyFilter.Patch

    Patch specifies how the selected object should be modified.

    FieldTypeDescriptionRequired
    operationDetermines how the patch should be applied.No
    valueThe JSON config of the object being patched. This will be merged usingjson merge semantics with the existing proto in the path.No

    Operation denotes how the patch should be applied to the selectedconfiguration.

    EnvoyFilter.PatchContext

    PatchContext selects a class of configurations based on thetraffic flow direction and workload type.

    NameDescription
    ANYAll listeners/routes/clusters in both sidecars and gateways.
    SIDECAR_INBOUNDInbound listener/route/cluster in sidecar.
    SIDECAR_OUTBOUNDOutbound listener/route/cluster in sidecar.
    GATEWAYGateway listener/route/cluster.

    EnvoyFilter.ProxyMatch

    One or more properties of the proxy to match on.

    FieldTypeDescriptionRequired
    proxyVersionstringA regular expression in golang regex format (RE2) that can beused to select proxies using a specific version of istioproxy. The Istio version for a given proxy is obtained from thenode metadata field ISTIO_VERSION supplied by the proxy whenconnecting to Pilot. This value is embedded as an environmentvariable (ISTIO_META_ISTIO_VERSION) in the Istio proxy dockerimage. Custom proxy implementations should provide this metadatavariable to take advantage of the Istio version check option.No
    metadatamap<string, string>Match on the node metadata supplied by a proxy when connectingto Istio Pilot. Note that while Envoy’s node metadata is oftype Struct, only string key-value pairs are processed byPilot. All keys specified in the metadata must match with exactvalues. The match will fail if any of the specified keys areabsent or the values fail to match.No

    EnvoyFilter.RouteConfigurationMatch

    Conditions specified in RouteConfigurationMatch must be met forthe patch to be applied to a route configuration object or aspecific virtual host within the route configuration.

    FieldTypeDescriptionRequired
    portNumberuint32The service port number or gateway server port number for whichthis route configuration was generated. If omitted, applies toroute configurations for all ports.No
    portNamestringApplicable only for GATEWAY context. The gateway server portname for which this route configuration was generated.No
    gatewaystringThe Istio gateway config’s namespace/name for which this routeconfiguration was generated. Applies only if the context isGATEWAY. Should be in the namespace/name format. Use this fieldin conjunction with the portNumber and portName to accuratelyselect the Envoy route configuration for a specific HTTPSserver within a gateway config object.No
    vhostMatch a specific virtual host in a route configuration andapply the patch to the virtual host.No
    namestringRoute configuration name to match on. Can be used to match aspecific route configuration by name, such as the internallygenerated “http_proxy” route configuration for all sidecars.No

    EnvoyFilter.RouteConfigurationMatch.RouteMatch

    Match a specific route inside a virtual host in a route configuration.

    FieldTypeDescriptionRequired
    namestringThe Route objects generated by default are named as“default”. Route objects generated using a virtual servicewill carry the name used in the virtual service’s HTTProutes.No
    actionMatch a route with specific action type.No

    EnvoyFilter.RouteConfigurationMatch.RouteMatch.Action

    NameDescription
    ANYAll three route actions
    ROUTERoute traffic to a cluster / weighted clusters.
    REDIRECTRedirect request.
    DIRECT_RESPONSEdirectly respond to a request with specific payload.

    EnvoyFilter.RouteConfigurationMatch.VirtualHostMatch

    Match a specific virtual host inside a route configuration.

    FieldTypeDescriptionRequired
    namestringThe VirtualHosts objects generated by Istio are named ashost:port, where the host typically corresponds to theVirtualService’s host field or the hostname of a service in theregistry.No
    routeRouteMatchMatch a specific route within the virtual host.No