Skip to content
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
@@ -0,0 +1,73 @@
{
"version": "kc-mission-v1",
"name": "envoy-1606-support-generic-outbound-proxy",
"missionClass": "solution",
"author": "KubeStellar Bot",
"authorGithub": "kubestellar",
"mission": {
"title": "envoy: Support generic outbound proxy",
"description": "Support generic outbound proxy. Requested by 20+ users.",
"type": "feature",
"status": "completed",
"steps": [
{
"title": "Check current envoy deployment",
"description": "Verify your envoy version and configuration:\n```bash\nkubectl get pods -n envoy -l app.kubernetes.io/name=envoy\nhelm list -n envoy 2>/dev/null || echo \"Not installed via Helm\"\n```\nThis feature requires a working envoy installation."
},
{
"title": "Review envoy configuration",
"description": "Inspect the relevant envoy configuration:\n```bash\nkubectl get all -n envoy -l app.kubernetes.io/name=envoy\nkubectl get configmap -n envoy -l app.kubernetes.io/part-of=envoy\n```\nWhen using Envoy as a general egress proxy, there doesn't seem to be a way to have `http_connection_manager` routes send to a cluster and have the `:authority` header be used to select the destination."
},
{
"title": "Apply the fix for Support generic outbound proxy",
"description": "This is the first step to upstream Istio JWT auth filter to Envoy.\n\nIstio JWT auth filter is here [https://github.com/istio/proxy/tree/master/src/envoy/http/jwt_auth]\n\nThe issue to upstream to envoy is: https://github.com/envoyproxy/envoy/issues/2514\n\nSee the fix PR for details: linked PR"
},
{
"title": "Verify the feature works",
"description": "Test that the new capability is working as expected:\n```bash\nkubectl get pods -n envoy -l app.kubernetes.io/name=envoy\nkubectl get events -n envoy --sort-by='.lastTimestamp' | tail -10\n```\nConfirm the feature described in \"Support generic outbound proxy\" is functioning correctly."
}
],
"resolution": {
"summary": "This is the first step to upstream Istio JWT auth filter to Envoy.\n\nIstio JWT auth filter is here [https://github.com/istio/proxy/tree/master/src/envoy/http/jwt_auth]\n\nThe issue to upstream to envoy is: https://github.com/envoyproxy/envoy/issues/2514",
"codeSnippets": []
}
},
"metadata": {
"tags": [
"envoy",
"graduated",
"networking",
"feature"
],
"cncfProjects": [
"envoy"
],
"targetResourceKinds": [],
"difficulty": "advanced",
"issueTypes": [
"feature"
],
"maturity": "graduated",
"sourceUrls": {
"issue": "https://github.com/envoyproxy/envoy/issues/1606",
"repo": "https://github.com/envoyproxy/envoy",
"pr": "https://github.com/envoyproxy/data-plane-api/pull/530"
},
"reactions": 20,
"comments": 38,
"synthesizedBy": "copilot"
},
"prerequisites": {
"kubernetes": ">=1.24",
"tools": [
"kubectl"
],
"description": "A running Kubernetes cluster with envoy installed or the issue environment reproducible."
},
"security": {
"scannedAt": "2026-03-11T00:58:21.237Z",
"scannerVersion": "cncf-gen-3.0.0",
"sanitized": true,
"findings": []
}
}
Loading