IP tagging

This extension may be referenced by the qualified name envoy.filters.http.ip_tagging

Note

This extension is intended to be robust against untrusted downstream traffic. It assumes that the upstream is trusted.

IP tagging configuration overview.

config.filter.http.ip_tagging.v2.IPTagging

[config.filter.http.ip_tagging.v2.IPTagging proto]

{
  "request_type": "...",
  "ip_tags": []
}
request_type

(config.filter.http.ip_tagging.v2.IPTagging.RequestType) The type of request the filter should apply to.

ip_tags

(config.filter.http.ip_tagging.v2.IPTagging.IPTag, REQUIRED) The set of IP tags for the filter.

config.filter.http.ip_tagging.v2.IPTagging.IPTag

[config.filter.http.ip_tagging.v2.IPTagging.IPTag proto]

Supplies the IP tag name and the IP address subnets.

{
  "ip_tag_name": "...",
  "ip_list": []
}
ip_tag_name

(string) Specifies the IP tag name to apply.

ip_list

(core.CidrRange) A list of IP address subnets that will be tagged with ip_tag_name. Both IPv4 and IPv6 are supported.

Enum config.filter.http.ip_tagging.v2.IPTagging.RequestType

[config.filter.http.ip_tagging.v2.IPTagging.RequestType proto]

The type of requests the filter should apply to. The supported types are internal, external or both. The x-forwarded-for header is used to determine if a request is internal and will result in x-envoy-internal being set. The filter defaults to both, and it will apply to all request types.

BOTH

(DEFAULT) ⁣Both external and internal requests will be tagged. This is the default value.

INTERNAL

⁣Only internal requests will be tagged.

EXTERNAL

⁣Only external requests will be tagged.