TLS Inspector
TLS Inspector listener filter allows detecting whether the transport appears to be TLS or plaintext, and if it is TLS, it detects the Server Name Indication and/or Application-Layer Protocol Negotiation from the client. This can be used to select a FilterChain via the server_names and/or application_protocols of a FilterChainMatch.
This filter should be configured with the type URL
type.googleapis.com/envoy.extensions.filters.listener.tls_inspector.v3.TlsInspector
.
Example
A sample filter configuration could be:
listener_filters:
- name: tls_inspector
typed_config:
"@type": type.googleapis.com/envoy.extensions.filters.listener.tls_inspector.v3.TlsInspector
Statistics
This filter has a statistics tree rooted at tls_inspector with the following statistics:
Name |
Type |
Description |
---|---|---|
client_hello_too_large |
counter |
total unreasonably large client hello received |
tls_found |
Counter |
Total number of times TLS was found |
tls_not_found |
Counter |
Total number of times TLS was not found |
alpn_found |
Counter |
Total number of times Application-Layer Protocol Negotiation was successful |
alpn_not_found |
Counter |
Total number of times Application-Layer Protocol Negotiation has failed |
sni_found |
Counter |
Total number of times Server Name Indication was found |
sni_not_found |
Counter |
Total number of times Server Name Indication was not found |
bytes_processed |
Histogram |
Records sizes which records the number of bytes the tls_inspector processed while analyzing for tls usage. If the connection uses TLS: this is the size of client hello. If the client hello is too large, then the recorded value will be 64KiB which is the maximum client hello size. If the connection does not use TLS: it is the number of bytes processed until the inspector determined the connection was not using TLS. If the connection terminates early nothing is recorded if we didn’t have sufficient bytes for either of the cases above. |