-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature Request: Exchange arbitrary metadata between sidecars at connection time #6532
Comments
/cc @yangminzhu |
/cc @incfly |
This issue has been automatically marked as stale because it has not had activity in the last 30 days. It will be closed in the next 7 days unless it is tagged "help wanted" or other activity occurs. Thank you for your contributions. |
This issue has been automatically closed because it has not had activity in the last 37 days. If this issue is still valid, please ping a maintainer and ask them to label it as "help wanted". Thank you for your contributions. |
Exploring if TCP over HTTP/2 metadata frames can be used to implement this... We would need both these issues fixed for that afaik: |
/cc @alyssawilk To use TCP over HTTP/2 metadata frames, looks like support for TCP over HTTP(#1630) is a blocker right now. We are going to explore TLS extension path for which #173 is currently a blocker.. Ref: @kyessenov has a great doc on metadata exchange https://docs.google.com/document/d/1bWQAsrBZguk5HCmBVDEgEMVGS91r9uh3SIr7D7ELZBk/edit. |
A required PR to enable "network filters for upstream" #7503 |
@mandarjog : I think this can be closed now... |
Title: Exchange arbitrary metadata during TLS handshake or some other process
Description:
In order for Envoy to produce rich telemetry about details of source and destination workloads, we need a mechanism to exchange this information.
As an example, Istio telemetry produces highly dimensioned metrics that identify source and destination of the traffic. The metrics are dimensioned using source and destination metadata such as NodeID and labels associated with the pods or VMs.
For HTTP this can be achieved easily by forwarding the node metadata to destination in a well-known header, and the destination responding with its own header.
Even though the above solution works, it needlessly sends the same information over and over with every request.
For TCP this does not work, and we have to rely on ip address to metadata mapping at the destination and source.
Options:
If there is a way to add metadata during TLS handshake, it works.
Proxy protocol
to exchange this information. Not sure if it works both ways.The text was updated successfully, but these errors were encountered: