æ¦è¦ Envoyã®yamlã¯é常ã«é·å¤§ã§åãã¦èªã人ããããã¨ã¨ã¦ãåããã«ããã§ãã ãããå®éã¯åè¦ç´ ã®å½¹å²ãç解ããã¨ã¨ã¦ãã·ã³ãã«ã«æ§æããã¦ãããã¨ãåããã¾ãã ãã®ããã®æå©ãã¨ãã¦ãã¡ãã§å³ã交ããªãã説æãã¾ãã ç°å¢ Envoy 1.22.0 è¦ç´ ã®èª¬æ ã¾ãã¯åè¦ç´ ãç解ãã¾ãã downstreamã¨upstream è¦ç´ 説æ downstream Envoyããã¿ãã¯ã©ã¤ã¢ã³ã upstream Envoyããµã¼ãã¹ã«å¯¾ãããªã¯ã¨ã¹ãã転éããéã«æ¥ç¶ããã¨ã³ããã¤ã³ãï¼ãããã¯ã¼ã¯ãã¼ãï¼ ãããããã¿ã¼ã³ã§å³ç¤ºãã¦ã¿ãã¨ä»¥ä¸ã§ãã front proxyã¢ãã« sidecarã§å¤é¨ãããªã¯ã¨ã¹ããåãã sidecarã§ãã¼ã«ã«ã¢ããªã±ã¼ã·ã§ã³ããã®ãªã¯ã¨ã¹ãã転éãã ãã®ããã«sidecarã¢ãã«ã®ãã¼ã«ã«ã¢ããªã±ã¼ã·ã§ã³ã¯ãdownstreamã«ãup
This article uses Istio's official bookinfo example to explain how Envoy performs routing forwarding after the traffic entering the Pod and forwarded to Envoy sidecar by iptables, detailing the inbound and outbound processing. For a detailed analysis of traffic interception, see Understanding Envoy Sidecar Proxy Injection and Traffic Interception in Istio Service Mesh. NOTE: This blog is mostly tr
æè¿ Kubernetes å¨ãã®æè¡ããã触ãã®ã§ãããEnvoy Proxy (Envoy)ãããè³ã«ããã®ã§åå¼·ãã¾ããã Envoy Proxy Envoy ã¨ã¯ï¼ Envoy ã¯ã¯ã©ã¦ããã¤ãã£ã㪠Web ãµã¼ãã¹ã®ããã«è¨è¨ããããã¼ããã©ã³ãµã¼ã§ãã å 㯠Lyft ãéçºãã¦ãããç¾å¨ã¯ CNCF (Cloud Network Computing Foundation) ã«ãã£ã¦ç®¡çããã¦ãã¾ãã Envoy ã«ã¯å¤§ããï¼ã¤ã®ç¨éãããã¾ãã ãµã¼ãã¹ã¡ãã·ã¥ã®éä¿¡ãã¹: ãµã¼ãã¹ã¡ãã·ã¥å ã®åãµã¼ãã¹éã®éä¿¡ãå¶å¾¡ãããããã·ããµã¼ãã¹ãã£ã¹ã«ããªã¼ãæµéã®å¶å¾¡ãããã ã¨ãã¸ãããã·: ãµã¼ãã¹å ã®ãã©ã¤ãã¼ããããã¯ã¼ã¯ã¨ãµã¼ãã¹å¤ãã¤ãªããããã·ããã¼ã¿ã»ã³ã¿ã¼ã Kubernetes ã¯ã©ã¹ã¿ã®å¤ããã®ã¢ã¯ã»ã¹ãåãä»ããã èæ¯ ã¢ããªã¹ã§å·¨å¤§ãª Web ã·ã¹
ã©ã³ãã³ã°
ã©ã³ãã³ã°
ã©ã³ãã³ã°
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}