Sandboxes¶
We’ve created a number of sandboxes using Docker Compose that set up different environments to test out Envoy’s features and show sample configurations. As we gauge peoples’ interests we will add more sandboxes demonstrating different features. The following sandboxes are available:
- Cache Filter
- CORS Filter
- CSRF Filter
- Dynamic configuration (filesystem)
- Dynamic configuration (control plane)
- Step 1: Install Docker
- Step 2: Clone the Envoy repo
- Step 3: Start the proxy container
- Step 4: Check initial config and web response
- Step 5: Start the control plane
- Step 6: Query the proxy
- Step 5: Dump Envoy’s
dynamic_active_clusters
config - Step 6: Stop the control plane
- Step 7: Edit resource.go and restart the go-control-plane
- Step 8: Check Envoy uses the updated configuration
- External Authorization Filter
- Fault Injection Filter
- Front Proxy
- gRPC Bridge
- Jaeger Native Tracing
- Jaeger Tracing
- Load Reporting Service (LRS)
- Lua Filter
- MySQL Filter
- Postgres Filter
- Redis Filter
- WASM C++ filter
- Zipkin Tracing
- SkyWalking Tracing