The Gloo Gateway API is a superset of the kgateway project’s API.

Packages

agentgateway.dev/v1alpha1

Resource Types

AIBackend

AIBackend specifies the AI backend configuration

Appears in:

FieldDescriptionDefaultValidation
provider LLMProviderprovider specifies configuration for how to reach the configured LLM provider.
groups PriorityGroup arraygroups specifies a list of groups in priority order where each group defines
a set of LLM providers. The priority determines the priority of the backend endpoints chosen.
Note: provider names must be unique across all providers in all priority groups. Backend policies
may target a specific provider by name using targetRefs[].sectionName.

Example configuration with two priority groups:
yaml<br />groups:<br />- providers:<br /> - azureopenai:<br /> deploymentName: gpt-4o-mini<br /> apiVersion: 2024-02-15-preview<br /> endpoint: ai-gateway.openai.azure.com<br />- providers:<br /> - azureopenai:<br /> deploymentName: gpt-4o-mini-2<br /> apiVersion: 2024-02-15-preview<br /> endpoint: ai-gateway-2.openai.azure.com<br /> policies:<br /> auth:<br /> secretRef:<br /> name: azure-secret<br />
TODO: enable this rule when we don’t need to support older k8s versions where this rule breaks // +kubebuilder:validation:XValidation:message=“provider names must be unique across groups”,rule=“self.map(pg, pg.providers.map(pp, pp.name)).map(p, self.map(pg, pg.providers.map(pp, pp.name)).filter(cp, cp != p).exists(cp, p.exists(pn, pn in cp))).exists(p, !p)”
MaxItems: 32
MinItems: 1

AIPromptEnrichment

AIPromptEnrichment defines the config to enrich requests sent to the LLM provider by appending and prepending system prompts.

Prompt enrichment allows you to add additional context to the prompt before sending it to the model. Unlike RAG or other dynamic context methods, prompt enrichment is static and is applied to every request.

Note: Some providers, including Anthropic, do not support SYSTEM role messages, and instead have a dedicated system field in the input JSON. In this case, use the defaults setting to set the system field.

The following example prepends a system prompt of Answer all questions in French. and appends Describe the painting as if you were a famous art critic from the 17th century. to each request that is sent to the openai HTTPRoute.

  

	name: openai-opt
	namespace: kgateway-system


spec:


	targetRefs:
	- group: gateway.networking.k8s.io
	  kind: HTTPRoute
	  name: openai
	ai:
	    promptEnrichment:
	      prepend:
	      - role: SYSTEM
	        content: "Answer all questions in French."
	      append:
	      - role: USER
	        content: "Describe the painting as if you were a famous art critic from the 17th century."
  

Appears in:

FieldDescriptionDefaultValidation
prepend Message arrayA list of messages to be prepended to the prompt sent by the client.
append Message arrayA list of messages to be appended to the prompt sent by the client.

AIPromptGuard

AIPromptGuard configures a prompt guards to block unwanted requests to the LLM provider and mask sensitive data. Prompt guards can be used to reject requests based on the content of the prompt, as well as mask responses based on the content of the response.

This example rejects any request prompts that contain the string “credit card”, and masks any credit card numbers in the response.

  promptGuard:


	request:
	- response:
	    message: "Rejected due to inappropriate content"
	  regex:
	    action: REJECT
	    matches:
	    - pattern: "credit card"
	      name: "CC"
	response:
	- regex:
	    builtins:
	    - CREDIT_CARD
	    action: MASK
  

Appears in:

FieldDescriptionDefaultValidation
request PromptguardRequest arrayPrompt guards to apply to requests sent by the client.MaxItems: 8
MinItems: 1
response PromptguardResponse arrayPrompt guards to apply to responses returned by the LLM provider.MaxItems: 8
MinItems: 1

APIKeyAuthentication

Appears in:

FieldDescriptionDefaultValidation
mode APIKeyAuthenticationModeValidation mode for api key authentication.StrictEnum: [Strict Optional]
secretRef LocalObjectReferencesecretRef references a Kubernetes secret storing a set of API Keys. If there are many keys, ‘secretSelector’ can be
used instead.

Each entry in the Secret represents one API Key. The key is an arbitrary identifier. The value can either be:
* A string, representing the API Key.
* A JSON object, with two fields, key and metadata. key contains the API Key. metadata contains arbitrary JSON
metadata associated with the key, which may be used by other policies. For example, you may write an authorization
policy allow apiKey.group == 'sales'.

Example:

apiVersion: v1
kind: Secret
metadata:
name: api-key
stringData:
client1: |
{
“key”: “k-123”,
“metadata”: {
“group”: “sales”,
“created_at”: “2024-10-01T12:00:00Z”,
}
}
client2: “k-456”
secretSelector SecretSelectorsecretSelector selects multiple secrets containing API Keys. If the same key is defined in multiple secrets, the
behavior is undefined.

Each entry in the Secret represents one API Key. The key is an arbitrary identifier. The value can either be:
* A string, representing the API Key.
* A JSON object, with two fields, key and metadata. key contains the API Key. metadata contains arbitrary JSON
metadata associated with the key, which may be used by other policies. For example, you may write an authorization
policy allow apiKey.group == 'sales'.

Example:

apiVersion: v1
kind: Secret
metadata:
name: api-key
stringData:
client1: |
{
“key”: “k-123”,
“metadata”: {
“group”: “sales”,
“created_at”: “2024-10-01T12:00:00Z”,
}
}
client2: “k-456”

APIKeyAuthenticationMode

Underlying type: string

Validation:

  • Enum: [Strict Optional]

Appears in:

FieldDescription
StrictA valid API Key must be present.
This is the default option.
OptionalIf an API Key exists, validate it.
Warning: this allows requests without an API Key!

AWSGuardrailConfig

Appears in:

FieldDescriptionDefaultValidation
identifier stringGuardrailIdentifier is the identifier of the Guardrail policy to use for the backend.
version stringGuardrailVersion is the version of the Guardrail policy to use for the backend.

AccessLog

accessLogs specifies how per-request access logs are emitted.

Appears in:

FieldDescriptionDefaultValidation
filter CELExpressionfilter specifies a CEL expression that is used to filter logs. A log will only be emitted if the expression evaluates
to ’true’.
attributes LogTracingAttributesattributes specifies customizations to the key-value pairs that are logged

Action

Underlying type: string

Action to take if a regex pattern is matched in a request or response. This setting applies only to request matches. PromptguardResponse matches are always masked by default.

Appears in:

FieldDescription
MASKMask the matched data in the request.
REJECTReject the request if the regex matches content in the request.

AgentgatewayBackend

FieldDescriptionDefaultValidation
apiVersion stringagentgateway.dev/v1alpha1
kind stringAgentgatewayBackend
kind stringKind is a string value representing the REST resource this object represents.
Servers may infer this from the endpoint the client submits requests to.
Cannot be updated.
In CamelCase.
More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
apiVersion stringAPIVersion defines the versioned schema of this representation of an object.
Servers should convert recognized schemas to the latest internal value, and
may reject unrecognized values.
More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
metadata ObjectMetaRefer to Kubernetes API documentation for fields of metadata.
spec AgentgatewayBackendSpecspec defines the desired state of AgentgatewayBackend.
status AgentgatewayBackendStatusstatus defines the current state of AgentgatewayBackend.

AgentgatewayBackendSpec

Appears in:

FieldDescriptionDefaultValidation
static StaticBackendstatic represents a static hostname.
ai AIBackendai represents a LLM backend.
mcp MCPBackendmcp represents an MCP backend
dynamicForwardProxy DynamicForwardProxyBackenddynamicForwardProxy configures the proxy to dynamically send requests to the destination based on the incoming
request HTTP host header, or TLS SNI for TLS traffic.

Note: this Backend type enables users to send trigger the proxy to send requests to arbitrary destinations. Proper
access controls must be put in place when using this backend type.
policies BackendFullpolicies controls policies for communicating with this backend. Policies may also be set in AgentgatewayPolicy;
policies are merged on a field-level basis, with policies on the Backend (this field) taking precedence.

AgentgatewayBackendStatus

AgentgatewayBackend defines the observed state of AgentgatewayBackend.

Appears in:

FieldDescriptionDefaultValidation
conditions Condition arrayConditions is the list of conditions for the backend.MaxItems: 8

AgentgatewayPolicy

FieldDescriptionDefaultValidation
apiVersion stringagentgateway.dev/v1alpha1
kind stringAgentgatewayPolicy
kind stringKind is a string value representing the REST resource this object represents.
Servers may infer this from the endpoint the client submits requests to.
Cannot be updated.
In CamelCase.
More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
apiVersion stringAPIVersion defines the versioned schema of this representation of an object.
Servers should convert recognized schemas to the latest internal value, and
may reject unrecognized values.
More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
metadata ObjectMetaRefer to Kubernetes API documentation for fields of metadata.
spec AgentgatewayPolicySpecspec defines the desired state of AgentgatewayPolicy.
status PolicyStatusstatus defines the current state of AgentgatewayPolicy.

AgentgatewayPolicySpec

Appears in:

FieldDescriptionDefaultValidation
targetRefs LocalPolicyTargetReferenceWithSectionName arraytargetRefs specifies the target resources by reference to attach the policy to.MaxItems: 16
MinItems: 1
targetSelectors LocalPolicyTargetSelectorWithSectionName arraytargetSelectors specifies the target selectors to select resources to attach the policy to.MaxItems: 16
MinItems: 1
frontend Frontendfrontend defines settings for how to handle incoming traffic.

A frontend policy can only target a Gateway. Listener and ListenerSet are not valid targets.

When multiple policies are selected for a given request, they are merged on a field-level basis, but not a deep
merge. For example, policy A sets ’tcp’ and ’tls’, and policy B sets ’tls’, the effective policy would be ’tcp’ from
policy A, and ’tls’ from policy B.
traffic Traffictraffic defines settings for how process traffic.

A traffic policy can target a Gateway (optionally, with a sectionName indicating the listener), ListenerSet, Route
(optionally, with a sectionName indicating the route rule).

When multiple policies are selected for a given request, they are merged on a field-level basis, but not a deep
merge. Precedence is given to more precise policies: Gateway < Listener < Route < Route Rule. For example, policy A
sets ’timeouts’ and ‘retries’, and policy B sets ‘retries’, the effective policy would be ’timeouts’ from policy A,
and ‘retries’ from policy B.
backend BackendFullbackend defines settings for how to connect to destination backends.

A backend policy can target a Gateway (optionally, with a sectionName indicating the listener), ListenerSet, Route
(optionally, with a sectionName indicating the route rule), or a Service/Backend (optionally, with a sectionName
indicating the port (for Service) or sub-backend (for Backend).

Note that a backend policy applies when connecting to a specific destination backend. Targeting a higher level
resource, like Gateway, is just a way to easily apply a policy to a group of backends.

When multiple policies are selected for a given request, they are merged on a field-level basis, but not a deep
merge. Precedence is given to more precise policies: Gateway < Listener < Route < Route Rule < Backend/Service. For
example, if a Gateway policy sets ’tcp’ and ’tls’, and a Backend policy sets ’tls’, the effective policy would be
‘tcp’ from the Gateway, and ’tls’ from the Backend.

AnthropicConfig

AnthropicConfig settings for the Anthropic LLM provider.

Appears in:

FieldDescriptionDefaultValidation
model stringOptional: Override the model name, such as gpt-4o-mini.
If unset, the model name is taken from the request.

AttributeAdd

Appears in:

FieldDescriptionDefaultValidation
name string
expression CELExpression

AzureOpenAIConfig

AzureOpenAIConfig settings for the Azure OpenAI LLM provider.

Appears in:

FieldDescriptionDefaultValidation
endpoint stringThe endpoint for the Azure OpenAI API to use, such as my-endpoint.openai.azure.com.
If the scheme is included, it is stripped.
MinLength: 1
deploymentName stringThe name of the Azure OpenAI model deployment to use.
For more information, see the Azure OpenAI model docs.
This is required if ApiVersion is not ‘v1’. For v1, the model can be set in the request.
MinLength: 1
apiVersion stringThe version of the Azure OpenAI API to use.
For more information, see the Azure OpenAI API version reference.
If unset, defaults to “v1”

BackendAuthPassthrough

Appears in:

BackendFull

Appears in:

FieldDescriptionDefaultValidation
ai BackendAIai specifies settings for AI workloads. This is only applicable when connecting to a Backend of type ‘ai’.
mcp BackendMCPmcp specifies settings for MCP workloads. This is only applicable when connecting to a Backend of type ‘mcp’.

BackendSimple

Underlying type: struct

Appears in:

BackendWithAI

Appears in:

FieldDescriptionDefaultValidation
ai BackendAIai specifies settings for AI workloads. This is only applicable when connecting to a Backend of type ‘ai’.

BackendWithMCP

Appears in:

FieldDescriptionDefaultValidation
mcp BackendMCPmcp specifies settings for MCP workloads. This is only applicable when connecting to a Backend of type ‘mcp’.

BasicAuthentication

Appears in:

FieldDescriptionDefaultValidation
mode BasicAuthenticationModevalidation mode for basic auth authentication.StrictEnum: [Strict Optional]
realm stringrealm specifies the ‘realm’ to return in the WWW-Authenticate header for failed authentication requests.
If unset, “Restricted” will be used.
users string arrayusers provides an inline list of username/password pairs that will be accepted.
Each entry represents one line of the htpasswd format: https://httpd.apache.org/docs/2.4/programs/htpasswd.html.

Note: passwords should be the hash of the password, not the raw password. Use the htpasswd or similar commands
to generate a hash. MD5, bcrypt, crypt, and SHA-1 are supported.

Example:
users:
- “user1:$apr1$ivPt0D4C$DmRhnewfHRSrb3DQC.WHC."
- “user2:$2y$05$r3J4d3VepzFkedkd/q1vI.pBYIpSqjfN0qOARV3ScUHysatnS0cL2”
MaxItems: 256
MinItems: 1
secretRef LocalObjectReferencesecretRef references a Kubernetes secret storing the .htaccess file. The Secret must have a key named ‘.htaccess’,
and should contain the complete .htaccess file.

Note: passwords should be the hash of the password, not the raw password. Use the htpasswd or similar commands
to generate a hash. MD5, bcrypt, crypt, and SHA-1 are supported.

Example:

apiVersion: v1
kind: Secret
metadata:
name: basic-auth
stringData:
.htaccess: |
alice:$apr1$3zSE0Abt$IuETi4l5yO87MuOrbSE4V.
bob:$apr1$Ukb5LgRD$EPY2lIfY.A54jzLELNIId/

BasicAuthenticationMode

Underlying type: string

Validation:

  • Enum: [Strict Optional]

Appears in:

FieldDescription
StrictA valid username and password must be present.
This is the default option.
OptionalIf a username and password exists, validate it.
Warning: this allows requests without a username!

BedrockConfig

Appears in:

FieldDescriptionDefaultValidation
region stringRegion is the AWS region to use for the backend.
Defaults to us-east-1 if not specified.
us-east-1MaxLength: 63
MinLength: 1
Pattern: ^[a-z0-9-]+$
model stringOptional: Override the model name, such as gpt-4o-mini.
If unset, the model name is taken from the request.
guardrail AWSGuardrailConfigGuardrail configures the Guardrail policy to use for the backend. See https://docs.aws.amazon.com/bedrock/latest/userguide/guardrails.html
If not specified, the AWS Guardrail policy will not be used.

BuiltIn

Underlying type: string

BuiltIn regex patterns for specific types of strings in prompts. For example, if you specify CreditCard, any credit card numbers in the request or response are matched.

Validation:

  • Enum: [Ssn CreditCard PhoneNumber Email]

Appears in:

FieldDescription
SsnDefault regex matching for Social Security numbers.
CreditCardDefault regex matching for credit card numbers.
PhoneNumberDefault regex matching for phone numbers.
EmailDefault regex matching for email addresses.

CORS

Appears in:

CSRF

Appears in:

FieldDescriptionDefaultValidation
additionalOrigins string arrayadditionalOrigin specifies additional source origins that will be allowed in addition to the destination origin. The
Origin consists of a scheme and a host, with an optional port, and takes the form <scheme>://<host>(:<port>).
MaxItems: 16
MinItems: 1

CustomResponse

CustomResponse configures a response to return to the client if request content is matched against a regex pattern and the action is REJECT.

Appears in:

FieldDescriptionDefaultValidation
message stringA custom response message to return to the client. If not specified, defaults to
“The request was rejected due to inappropriate content”.
The request was rejected due to inappropriate content
statusCode integerThe status code to return to the client. Defaults to 403.403Maximum: 599
Minimum: 200

DirectResponse

DirectResponse defines the policy to send a direct response to the client.

Appears in:

FieldDescriptionDefaultValidation
status integerStatusCode defines the HTTP status code to return for this route.Maximum: 599
Minimum: 200
body stringBody defines the content to be returned in the HTTP response body.
The maximum length of the body is restricted to prevent excessively large responses.
If this field is omitted, no body is included in the response.
MaxLength: 4096
MinLength: 1

DynamicForwardProxyBackend

Appears in:

ExtAuth

Appears in:

FieldDescriptionDefaultValidation
backendRef BackendObjectReferencebackendRef references the External Authorization server to reach.

Supported types: Service and Backend.
forwardBody ExtAuthBodyforwardBody configures whether to include the HTTP body in the request. If enabled, the request body will be
buffered.
contextExtensions object (keys:string, values:string)contextExtensions specifies additional arbitrary key-value pairs to send to the authorization server.MaxProperties: 64

ExtAuthBody

Appears in:

FieldDescriptionDefaultValidation
maxSize integermaxSize specifies how large in bytes the largest body that will be buffered and sent to the authorization server. If
the body size is larger than maxSize, then the request will be rejected with a response.
Minimum: 1

ExtProc

Appears in:

FieldDescriptionDefaultValidation
backendRef BackendObjectReferencebackendRef references the External Processor server to reach.
Supported types: Service and Backend.

FieldDefault

FieldDefault provides default values for specific fields in the JSON request body sent to the LLM provider. These defaults are merged with the user-provided request to ensure missing fields are populated.

User input fields here refer to the fields in the JSON request body that a client sends when making a request to the LLM provider. Defaults set here do not override those user-provided values unless you explicitly set override to true.

Example: Setting a default system field for Anthropic, which does not support system role messages:

  defaults:
  - field: "system"
    value: "answer all questions in French"
  

Example: Setting a default temperature and overriding max_tokens:

  defaults:
  - field: "temperature"
    value: "0.5"
  - field: "max_tokens"
    value: "100"
    override: true
  

Example: Setting custom lists fields:

  defaults:
  - field: "custom_integer_list"
    value: [1,2,3]


overrides:
  - field: "custom_string_list"
    value: ["one","two","three"]
  

Note: The field values correspond to keys in the JSON request body, not fields in this CRD.

Appears in:

FieldDescriptionDefaultValidation
field stringThe name of the field.MinLength: 1
value JSONThe field default value, which can be any JSON Data Type.

Frontend

Appears in:

FieldDescriptionDefaultValidation
tcp FrontendTCPtcp defines settings on managing incoming TCP connections.
tls FrontendTLStls defines settings on managing incoming TLS connections.
http FrontendHTTPhttp defines settings on managing incoming HTTP requests.
accessLog AccessLogAccessLoggingConfig contains access logging configuration
tracing TracingTracing contains various settings for OpenTelemetry tracer.
TODO: not currently implemented

FrontendHTTP

Appears in:

FieldDescriptionDefaultValidation
maxBufferSize integermaxBufferSize defines the maximum size HTTP body that will be buffered into memory.
Bodies will only be buffered for policies which require buffering.
If unset, this defaults to 2mb.
Minimum: 1
http1MaxHeaders integerhttp1MaxHeaders defines the maximum number of headers that are allowed in HTTP/1.1 requests.
If unset, this defaults to 100.
Maximum: 4096
Minimum: 1
http1IdleTimeout Durationhttp1IdleTimeout defines the timeout before an unused connection is closed.
If unset, this defaults to 10 minutes.
http2WindowSize integerhttp2WindowSize indicates the initial window size for stream-level flow control for received data.Minimum: 1
http2ConnectionWindowSize integerhttp2ConnectionWindowSize indicates the initial window size for connection-level flow control for received data.Minimum: 1
http2FrameSize integerhttp2FrameSize sets the maximum frame size to use.
If unset, this defaults to 16kb
Maximum: 1.677215e+06
Minimum: 16384
http2KeepaliveInterval Duration
http2KeepaliveTimeout Duration

FrontendTCP

Appears in:

FieldDescriptionDefaultValidation
keepalive Keepalivekeepalive defines settings for enabling TCP keepalives on the connection.

FrontendTLS

Appears in:

FieldDescriptionDefaultValidation
handshakeTimeout DurationhandshakeTimeout specifies the deadline for a TLS handshake to complete.
If unset, this defaults to 15s.
alpnProtocols stringalpnProtocols sets the Application Level Protocol Negotiation (ALPN) value to use in the TLS handshake.

If not present, defaults to [“h2”, “http/1.1”].
MaxItems: 16
MinItems: 1

GeminiConfig

GeminiConfig settings for the Gemini LLM provider.

Appears in:

FieldDescriptionDefaultValidation
model stringOptional: Override the model name, such as gemini-2.5-pro.
If unset, the model name is taken from the request.

GlobalRateLimit

Appears in:

FieldDescriptionDefaultValidation
backendRef BackendObjectReferencebackendRef references the Rate Limit server to reach.
Supported types: Service and Backend.
domain stringdomain specifies the domain under which this limit should apply.
This is an arbitrary string that enables a rate limit server to distinguish between different applications.
descriptors RateLimitDescriptor arrayDescriptors define the dimensions for rate limiting. These values are passed to the rate limit service which applies
configured limits based on them. Each descriptor represents a single rate limit rule with one or more entries.
MaxItems: 16
MinItems: 1

HTTPVersion

Underlying type: string

Appears in:

FieldDescription
HTTP1
HTTP2

HeaderName

Underlying type: string

An HTTP Header Name.

Validation:

  • MaxLength: 256
  • MinLength: 1
  • Pattern: ^:?[A-Za-z0-9!#$%&'*+\-.^_\x60|~]+$

Appears in:

HeaderTransformation

Appears in:

FieldDescriptionDefaultValidation
name HeaderNamethe name of the header to add.MaxLength: 256
MinLength: 1
Pattern: ^:?[A-Za-z0-9!#$%&'*+\-.^_\x60|~]+$
value CELExpressionvalue is the CEL expression to apply to generate the output value for the header.

HostnameRewrite

Appears in:

FieldDescriptionDefaultValidation
mode HostnameRewriteModemode sets the hostname rewrite mode.

The following may be specified:
* Auto: automatically set the Host header based on the destination.
* None: do not rewrite the Host header. The original Host header will be passed through.

This setting defaults to Auto when connecting to hostname-based Backend types, and None otherwise (for Service or
IP-based Backends).

HostnameRewriteMode

Underlying type: string

Appears in:

FieldDescription
Auto
None

InsecureTLSMode

Underlying type: string

Appears in:

FieldDescription
AllInsecureTLSModeInsecure disables all TLS verification
HostnameInsecureTLSModeHostname enables verifying the CA certificate, but disables verification of the hostname/SAN.
Note this is still, generally, very “insecure” as the name suggests.

JWKS

Appears in:

FieldDescriptionDefaultValidation
remote RemoteJWKSremote specifies how to reach the JSON Web Key Set from a remote address.
inline stringinline specifies an inline JSON Web Key Set used validate the signature of the JWT.MaxLength: 65536
MinLength: 2

JWTAuthentication

Appears in:

FieldDescriptionDefaultValidation
mode JWTAuthenticationModevalidation mode for JWT authentication.StrictEnum: [Strict Optional Permissive]
providers JWTProvider arrayMaxItems: 64
MinItems: 1

JWTAuthenticationMode

Underlying type: string

Validation:

  • Enum: [Strict Optional Permissive]

Appears in:

FieldDescription
StrictA valid token, issued by a configured issuer, must be present.
This is the default option.
OptionalIf a token exists, validate it.
Warning: this allows requests without a JWT token!
PermissiveRequests are never rejected. This is useful for usage of claims in later steps (authorization, logging, etc).
Warning: this allows requests without a JWT token!

JWTProvider

Appears in:

FieldDescriptionDefaultValidation
issuer stringissuer identifies the IdP that issued the JWT. This corresponds to the ‘iss’ claim (https://tools.ietf.org/html/rfc7519#section-4.1.1).
audiences string arrayaudiences specifies the list of allowed audiences that are allowed access. This corresponds to the ‘aud’ claim (https://datatracker.ietf.org/doc/html/rfc7519#section-4.1.3).
If unset, any audience is allowed.
MaxItems: 64
MinItems: 1
jwks JWKSjwks defines the JSON Web Key Set used to validate the signature of the JWT.

Keepalive

TCP Keepalive settings

Appears in:

FieldDescriptionDefaultValidation
retries integerretries specifies the maximum number of keep-alive probes to send before dropping the connection.
If unset, this defaults to 9.
Maximum: 64
Minimum: 1
time Durationtime specifies the number of seconds a connection needs to be idle before keep-alive probes start being sent.
If unset, this defaults to 180s.
interval Durationinterval specifies the number of seconds between keep-alive probes.
If unset, this defaults to 180s.

LLMProvider

LLMProvider specifies the target large language model provider that the backend should route requests to.

Appears in:

FieldDescriptionDefaultValidation
openai OpenAIConfigOpenAI provider
azureopenai AzureOpenAIConfigAzure OpenAI provider
anthropic AnthropicConfigAnthropic provider
gemini GeminiConfigGemini provider
vertexai VertexAIConfigVertex AI provider
bedrock BedrockConfigBedrock provider
host stringHost specifies the hostname to send the requests to.
If not specified, the default hostname for the provider is used.
port integerPort specifies the port to send the requests to.Maximum: 65535
Minimum: 1
path stringPath specifies the URL path to use for the LLM provider API requests.
This is useful when you need to route requests to a different API endpoint while maintaining
compatibility with the original provider’s API structure.
If not specified, the default path for the provider is used.

LocalRateLimit

Policy for local rate limiting. Local rate limits are handled locally on a per-proxy basis, without co-ordination between instances of the proxy.

Appears in:

FieldDescriptionDefaultValidation
requests integerrequests specifies the number of HTTP requests per unit of time that are allowed. Requests exceeding this limit will fail with
a 429 error.
Minimum: 1
tokens integertokens specifies the number of LLM tokens per unit of time that are allowed. Requests exceeding this limit will fail
with a 429 error.

Both input and output tokens are counted. However, token counts are not known until the request completes. As a
result, token-based rate limits will apply to future requests only.
Minimum: 1
unit LocalRateLimitUnitunit specifies the unit of time that requests are limited based on.Enum: [Seconds Minutes Hours]
burst integerburst specifies an allowance of requests above the request-per-unit that should be allowed within a short period of time.

LocalRateLimitUnit

Underlying type: string

Appears in:

FieldDescription
Seconds
Minutes
Hours

LogTracingAttributes

Appears in:

FieldDescriptionDefaultValidation
remove string arrayremove lists the default fields that should be removed. For example, “http.method”.MaxItems: 32
MinItems: 1
add AttributeAdd arrayadd specifies additional key-value pairs to be added to each entry.
The value is a CEL expression. If the CEL expression fails to evaluate, the pair will be excluded.
MinItems: 1

MCPAuthentication

Appears in:

FieldDescriptionDefaultValidation
resourceMetadata object (keys:string, values:JSON)ResourceMetadata defines the metadata to use for MCP resources.
provider McpIDPMcpIDP specifies the identity provider to use for authenticationEnum: [Auth0 Keycloak]
issuer stringIssuer identifies the IdP that issued the JWT. This corresponds to the ‘iss’ claim (https://tools.ietf.org/html/rfc7519#section-4.1.1).
audiences string arrayaudiences specify the list of allowed audiences that are allowed access. This corresponds to the ‘aud’ claim (https://datatracker.ietf.org/doc/html/rfc7519#section-4.1.3).
If unset, any audience is allowed.
MaxItems: 64
MinItems: 1
jwks RemoteJWKSjwks defines the remote JSON Web Key used to validate the signature of the JWT.

MCPBackend

MCPBackend configures mcp backends

Appears in:

FieldDescriptionDefaultValidation
targets McpTargetSelector arrayTargets is a list of MCPBackend targets to use for this backend.
Policies targeting MCPBackend targets must use targetRefs[].sectionName
to select the target by name.
MaxItems: 32
MinItems: 1

MCPProtocol

Underlying type: string

MCPProtocol defines the protocol to use for the MCPBackend target

Validation:

  • Enum: [StreamableHTTP SSE]

Appears in:

FieldDescription
StreamableHTTPMCPProtocolStreamableHTTP specifies Streamable HTTP must be used as the protocol
SSEMCPProtocolSSE specifies Server-Sent Events (SSE) must be used as the protocol

McpIDP

Underlying type: string

Appears in:

FieldDescription
Auth0
Keycloak

McpSelector

Appears in:

FieldDescriptionDefaultValidation
namespaces LabelSelectornamespace is the label selector in which namespaces Services should be selected from.
If unset, only the namespace of the AgentgatewayBackend is searched.
services LabelSelectorservices is the label selector for which Services should be selected.

McpTarget

McpTarget defines a single MCPBackend target configuration.

Appears in:

FieldDescriptionDefaultValidation
host stringHost is the hostname or IP address of the MCPBackend target.
port integerPort is the port number of the MCPBackend target.Maximum: 65535
Minimum: 1
path stringPath is the URL path of the MCPBackend target endpoint.
Defaults to “/sse” for SSE protocol or “/mcp” for StreamableHTTP protocol if not specified.
protocol MCPProtocolProtocol is the protocol to use for the connection to the MCPBackend target.Enum: [StreamableHTTP SSE]
policies BackendWithMCPpolicies controls policies for communicating with this backend. Policies may also be set in AgentgatewayPolicy, or
in the top level AgentgatewayBackend. Policies are merged on a field-level basis, with order: AgentgatewayPolicy «br />AgentgatewayBackend < AgentgatewayBackend MCP (this field).

McpTargetSelector

McpTargetSelector defines the MCPBackend target to use for this backend.

Appears in:

FieldDescriptionDefaultValidation
name SectionNameName of the MCPBackend target.
selector McpSelectorselector is a label selector is the selector to use to select Services.
If policies are needed on a per-service basis, AgentgatewayPolicy can target the desired Service.
static McpTargetstatic configures a static MCP destination. When connecting to in-cluster Services, it is recommended to use
‘selector’ instead.

Message

An entry for a message to prepend or append to each prompt.

Appears in:

FieldDescriptionDefaultValidation
role stringRole of the message. The available roles depend on the backend
LLM provider model, such as SYSTEM or USER in the OpenAI API.
content stringString content of the message.

NamedLLMProvider

Appears in:

FieldDescriptionDefaultValidation
name SectionNameName of the provider. Policies can target this provider by name.
policies BackendWithAIpolicies controls policies for communicating with this backend. Policies may also be set in AgentgatewayPolicy, or
in the top level AgentgatewayBackend. policies are merged on a field-level basis, with order: AgentgatewayPolicy «br />AgentgatewayBackend < AgentgatewayBackend LLM provider (this field).
openai OpenAIConfigOpenAI provider
azureopenai AzureOpenAIConfigAzure OpenAI provider
anthropic AnthropicConfigAnthropic provider
gemini GeminiConfigGemini provider
vertexai VertexAIConfigVertex AI provider
bedrock BedrockConfigBedrock provider
host stringHost specifies the hostname to send the requests to.
If not specified, the default hostname for the provider is used.
port integerPort specifies the port to send the requests to.Maximum: 65535
Minimum: 1
path stringPath specifies the URL path to use for the LLM provider API requests.
This is useful when you need to route requests to a different API endpoint while maintaining
compatibility with the original provider’s API structure.
If not specified, the default path for the provider is used.

OpenAIConfig

OpenAIConfig settings for the OpenAI LLM provider.

Appears in:

FieldDescriptionDefaultValidation
model stringOptional: Override the model name, such as gpt-4o-mini.
If unset, the model name is taken from the request.

OpenAIModeration

Appears in:

FieldDescriptionDefaultValidation
model stringmodel specifies the moderation model to use. For example, omni-moderation.
policies BackendSimplepolicies controls policies for communicating with OpenAI.

PolicyPhase

Underlying type: string

Validation:

  • Enum: [PreRouting PostRouting]

Appears in:

FieldDescription
PreRouting
PostRouting

PriorityGroup

Appears in:

FieldDescriptionDefaultValidation
providers NamedLLMProvider arrayproviders specifies a list of LLM providers within this group. Each provider is treated equally in terms of priority,
with automatic weighting based on health.
MaxItems: 32
MinItems: 1

PromptCachingConfig

PromptCachingConfig configures automatic prompt caching for supported LLM providers. Currently only AWS Bedrock supports this feature (Claude 3+ and Nova models).

When enabled, the gateway automatically inserts cache points at strategic locations to reduce API costs. Bedrock charges lower rates for cached tokens (90% discount).

Example:

promptCaching:
  cacheSystem: true       # Cache system prompts
  cacheMessages: true     # Cache conversation history
  cacheTools: false       # Don't cache tool definitions
  minTokens: 1024         # Only cache if ≥1024 tokens

Cost savings example:

  • Without caching: 10,000 tokens × $3/MTok = $0.03
  • With caching (90% cached): 1,000 × $3/MTok + 9,000 × $0.30/MTok = $0.0057 (81% savings)

Appears in:

FieldDescriptionDefaultValidation
cacheSystem booleanCacheSystem enables caching for system prompts.
Inserts a cache point after all system messages.
true
cacheMessages booleanCacheMessages enables caching for conversation messages.
Caches all messages in the conversation for cost savings.
true
cacheTools booleanCacheTools enables caching for tool definitions.
Inserts a cache point after all tool specifications.
false
minTokens integerMinTokens specifies the minimum estimated token count
before caching is enabled. Uses rough heuristic (word count × 1.3) to estimate tokens.
Bedrock requires at least 1,024 tokens for caching to be effective.
1024Minimum: 0

PromptguardRequest

PromptguardRequest defines the prompt guards to apply to requests sent by the client.

Appears in:

FieldDescriptionDefaultValidation
response CustomResponseA custom response message to return to the client. If not specified, defaults to
“The request was rejected due to inappropriate content”.
regex RegexRegular expression (regex) matching for prompt guards and data masking.
webhook WebhookConfigure a webhook to forward requests to for prompt guarding.
openAIModeration OpenAIModerationopenAIModeration passes prompt data through the OpenAI Moderations endpoint.
See https://developers.openai.com/api/reference/resources/moderations for more information.

PromptguardResponse

PromptguardResponse configures the response that the prompt guard applies to responses returned by the LLM provider.

Appears in:

FieldDescriptionDefaultValidation
response CustomResponseA custom response message to return to the client. If not specified, defaults to
“The response was rejected due to inappropriate content”.
regex RegexRegular expression (regex) matching for prompt guards and data masking.
webhook WebhookConfigure a webhook to forward responses to for prompt guarding.

RateLimitDescriptor

Appears in:

FieldDescriptionDefaultValidation
entries RateLimitDescriptorEntry arrayentries are the individual components that make up this descriptor.MaxItems: 16
MinItems: 1
unit RateLimitUnitunit defines what to use as the cost function. If unspecified, Requests is used.Enum: [Requests Tokens]

RateLimits

Appears in:

FieldDescriptionDefaultValidation
local LocalRateLimit arrayLocal defines a local rate limiting policy.MaxItems: 16
MinItems: 1
global GlobalRateLimitGlobal defines a global rate limiting policy using an external service.

Regex

Regex configures the regular expression (regex) matching for prompt guards and data masking.

Appears in:

FieldDescriptionDefaultValidation
matches string arrayA list of regex patterns to match against the request or response.
Matches and built-ins are additive.
builtins BuiltIn arrayA list of built-in regex patterns to match against the request or response.
Matches and built-ins are additive.
Enum: [Ssn CreditCard PhoneNumber Email]
action ActionThe action to take if a regex pattern is matched in a request or response.
This setting applies only to request matches. PromptguardResponse matches are always masked by default.
Defaults to MASK.
MASK

RemoteJWKS

Underlying type: struct

Appears in:

Retry

Retry defines the retry policy

Appears in:

RouteType

Underlying type: string

RouteType specifies how the AI gateway should process incoming requests based on the URL path and the API format expected.

Validation:

  • Enum: [Completions Messages Models Passthrough Responses AnthropicTokenCount]

Appears in:

FieldDescription
CompletionsRouteTypeCompletions processes OpenAI /v1/chat/completions format requests
MessagesRouteTypeMessages processes Anthropic /v1/messages format requests
ModelsRouteTypeModels handles /v1/models endpoint (returns available models)
PassthroughRouteTypePassthrough sends requests to upstream as-is without LLM processing
ResponsesRouteTypeResponses processes OpenAI /v1/responses format requests
AnthropicTokenCountRouteTypeAnthropicTokenCount processes Anthropic /v1/messages/count_tokens format requests

SecretSelector

Appears in:

FieldDescriptionDefaultValidation
matchLabels object (keys:string, values:string)Label selector to select the target resource.

StaticBackend

Appears in:

FieldDescriptionDefaultValidation
host stringhost to connect to.
port integerport to connect to.Maximum: 65535
Minimum: 1

Timeouts

Appears in:

FieldDescriptionDefaultValidation
request Durationrequest specifies a timeout for an individual request from the gateway to a backend. This covers the time from when
the request first starts being sent from the gateway to when the full response has been received from the backend.

Tracing

Appears in:

FieldDescriptionDefaultValidation
backendRef BackendObjectReferencebackendRef references the OTLP server to reach.
Supported types: Service and Backend.
protocol TracingProtocolprotocol specifies the OTLP protocol variant to use.HTTPEnum: [HTTP GRPC]
attributes LogTracingAttributesattributes specifies customizations to the key-value pairs that are included in the trace
randomSampling CELExpressionrandomSampling is an expression to determine the amount of random sampling. Random sampling will initiate a new
trace span if the incoming request does not have a trace initiated already. This should evaluate to a float between
0.0-1.0, or a boolean (true/false) If unspecified, random sampling is disabled.
clientSampling CELExpressionclientSampling is an expression to determine the amount of client sampling. Client sampling determines whether to
initiate a new trace span if the incoming request does have a trace already. This should evaluate to a float between
0.0-1.0, or a boolean (true/false) If unspecified, client sampling is 100% enabled.

TracingProtocol

Underlying type: string

Appears in:

FieldDescription
HTTP
GRPC

Traffic

Appears in:

FieldDescriptionDefaultValidation
phase PolicyPhaseThe phase to apply the traffic policy to. If the phase is PreRouting, the targetRef must be a Gateway or a Listener.
PreRouting is typically used only when a policy needs to influence the routing decision.

Even when using PostRouting mode, the policy can target the Gateway/Listener. This is a helper for applying the policy
to all routes under that Gateway/Listener, and follows the merging logic described above.

Note: PreRouting and PostRouting rules do not merge together. These are independent execution phases. That is, all
PreRouting rules will merge and execute, then all PostRouting rules will merge and execute.

If unset, this defaults to PostRouting.
Enum: [PreRouting PostRouting]
transformation Transformationtransformation is used to mutate and transform requests and responses
before forwarding them to the destination.
extProc ExtProcextProc specifies the external processing configuration for the policy.
extAuth ExtAuthextAuth specifies the external authentication configuration for the policy.
This controls what external server to send requests to for authentication.
rateLimit RateLimitsrateLimit specifies the rate limiting configuration for the policy.
This controls the rate at which requests are allowed to be processed.
cors CORScors specifies the CORS configuration for the policy.
csrf CSRFcsrf specifies the Cross-Site Request Forgery (CSRF) policy for this traffic policy.

The CSRF policy has the following behavior:
* Safe methods (GET, HEAD, OPTIONS) are automatically allowed
* Requests without Sec-Fetch-Site or Origin headers are assumed to be same-origin or non-browser requests and are allowed.
* Otherwise, the Sec-Fetch-Site header is checked, with a fallback to comparing the Origin header to the Host header.
headerModifiers HeaderModifiersheaderModifiers defines the policy to modify request and response headers.
hostRewrite HostnameRewritehostRewrite specifies how to rewrite the Host header for requests.

If the HTTPRoute urlRewrite filter already specifies a host rewrite, this setting is ignored.
Enum: [Auto None]
timeouts Timeoutstimeouts defines the timeouts for requests
It is applicable to HTTPRoutes and ignored for other targeted kinds.
retry Retryretry defines the policy for retrying requests.
authorization Authorizationauthorization specifies the access rules based on roles and permissions.
If multiple authorization rules are applied across different policies (at the same, or different, attachment points),
all rules are merged.
jwtAuthentication JWTAuthenticationjwtAuthentication authenticates users based on JWT tokens.
basicAuthentication BasicAuthenticationbasicAuthentication authenticates users based on the “Basic” authentication scheme (RFC 7617), where a username and password
are encoded in the request.
apiKeyAuthentication APIKeyAuthenticationapiKeyAuthentication authenticates users based on a configured API Key.
directResponse DirectResponsedirect response configures the policy to send a direct response to the client.

Transform

Appears in:

FieldDescriptionDefaultValidation
set HeaderTransformation arrayset is a list of headers and the value they should be set to.MaxItems: 16
MinItems: 1
add HeaderTransformation arrayadd is a list of headers to add to the request and what that value should be set to. If there is already a header
with these values then append the value as an extra entry.
MaxItems: 16
MinItems: 1
remove HeaderName arrayRemove is a list of header names to remove from the request/response.MaxItems: 16
MaxLength: 256
MinItems: 1
MinLength: 1
Pattern: ^:?[A-Za-z0-9!#$%&'*+\-.^_\x60|~]+$
body CELExpressionbody controls manipulation of the HTTP body.

Transformation

Appears in:

FieldDescriptionDefaultValidation
request Transformrequest is used to modify the request path.
response Transformresponse is used to modify the response path.

VertexAIConfig

VertexAIConfig settings for the Vertex AI LLM provider.

Appears in:

FieldDescriptionDefaultValidation
model stringOptional: Override the model name, such as gpt-4o-mini.
If unset, the model name is taken from the request.
projectId stringThe ID of the Google Cloud Project that you use for the Vertex AI.MinLength: 1
region stringThe location of the Google Cloud Project that you use for the Vertex AI.MinLength: 1

Webhook

Webhook configures a webhook to forward requests or responses to for prompt guarding.

Appears in:

FieldDescriptionDefaultValidation
backendRef BackendObjectReferencebackendRef references the webhook server to reach.

Supported types: Service and Backend.
forwardHeaderMatches HTTPHeaderMatch arrayForwardHeaderMatches defines a list of HTTP header matches that will be
used to select the headers to forward to the webhook.
Request headers are used when forwarding requests and response headers
are used when forwarding responses.
By default, no headers are forwarded.

gateway.kgateway.dev/v1alpha1

Resource Types

AWSLambdaPayloadTransformMode

Underlying type: string

AWSLambdaPayloadTransformMode defines the transformation mode for the payload in the request before it is sent to the AWS Lambda function.

Validation:

  • Enum: [None Envoy]

Appears in:

FieldDescription
NoneAWSLambdaPayloadTransformNone indicates that the payload will not be transformed using Envoy’s
built-in transformation before it is sent to the Lambda function.
Note: Transformation policies configured on the route will still apply.
EnvoyAWSLambdaPayloadTransformEnvoy indicates that the payload will be transformed using Envoy’s
built-in transformation. Refer to
https://www.envoyproxy.io/docs/envoy/latest/configuration/http/http_filters/aws_lambda_filter#configuration-as-a-listener-filter
for more details on how Envoy transforms the payload.

AccessLog

AccessLog represents the top-level access log configuration.

Appears in:

FieldDescriptionDefaultValidation
fileSink FileSinkOutput access logs to local file
grpcService AccessLogGrpcServiceSend access logs to gRPC service
openTelemetry OpenTelemetryAccessLogServiceSend access logs to an OTel collector
filter AccessLogFilterFilter access logs configurationMaxProperties: 1
MinProperties: 1

AccessLogFilter

AccessLogFilter represents the top-level filter structure. Based on: https://www.envoyproxy.io/docs/envoy/v1.33.0/api-v3/config/accesslog/v3/accesslog.proto#config-accesslog-v3-accesslogfilter

Validation:

  • MaxProperties: 1
  • MinProperties: 1

Appears in:

FieldDescriptionDefaultValidation
andFilter FilterType arrayPerforms a logical “and” operation on the result of each individual filter.
Based on: https://www.envoyproxy.io/docs/envoy/v1.33.0/api-v3/config/accesslog/v3/accesslog.proto#config-accesslog-v3-andfilter
MaxProperties: 1
MinItems: 2
MinProperties: 1
orFilter FilterType arrayPerforms a logical “or” operation on the result of each individual filter.
Based on: https://www.envoyproxy.io/docs/envoy/v1.33.0/api-v3/config/accesslog/v3/accesslog.proto#config-accesslog-v3-orfilter
MaxProperties: 1
MinItems: 2
MinProperties: 1

AccessLogGrpcService

AccessLogGrpcService represents the gRPC service configuration for access logs. Ref: https://www.envoyproxy.io/docs/envoy/latest/api-v3/extensions/access_loggers/grpc/v3/als.proto#envoy-v3-api-msg-extensions-access-loggers-grpc-v3-httpgrpcaccesslogconfig

Appears in:

FieldDescriptionDefaultValidation
backendRef BackendRefThe backend gRPC service. Can be any type of supported backend (Kubernetes Service, kgateway Backend, etc..)
authority stringThe :authority header in the grpc request. If this field is not set, the authority header value will be cluster_name.
Note that this authority does not override the SNI. The SNI is provided by the transport socket of the cluster.
maxReceiveMessageLength integerMaximum gRPC message size that is allowed to be received. If a message over this limit is received, the gRPC stream is terminated with the RESOURCE_EXHAUSTED error.
Defaults to 0, which means unlimited.
Minimum: 1
skipEnvoyHeaders booleanThis provides gRPC client level control over envoy generated headers. If false, the header will be sent but it can be overridden by per stream option. If true, the header will be removed and can not be overridden by per stream option. Default to false.
timeout DurationThe timeout for the gRPC request. This is the timeout for a specific request
initialMetadata HeaderValue arrayAdditional metadata to include in streams initiated to the GrpcService.
This can be used for scenarios in which additional ad hoc authorization headers (e.g. x-foo-bar: baz-key) are to be injected
retryPolicy RetryPolicyIndicates the retry policy for re-establishing the gRPC stream.
If max interval is not provided, it will be set to ten times the provided base interval
logName stringname of log stream
additionalRequestHeadersToLog string arrayAdditional request headers to log in the access log
additionalResponseHeadersToLog string arrayAdditional response headers to log in the access log
additionalResponseTrailersToLog string arrayAdditional response trailers to log in the access log

Agentgateway

Agentgateway configures the agentgateway dataplane integration. The agentgateway dataplane is automatically used when the Gateway references a GatewayClass with controllerName: kgateway.dev/agentgateway.

Appears in:

FieldDescriptionDefaultValidation
logLevel stringLog level for the agentgateway. Defaults to info.
Levels include “trace”, “debug”, “info”, “error”, “warn”. See: https://docs.rs/tracing/latest/tracing/struct.Level.html
image ImageThe agentgateway container image. See
https://kubernetes.io/docs/concepts/containers/images/
for details.

Default values, which may be overridden individually:

registry: ghcr.io/agentgateway
repository: agentgateway
tag:
pullPolicy: IfNotPresent
securityContext SecurityContextThe security context for this container. See
https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.26/#securitycontext-v1-core
for details.
resources ResourceRequirementsThe compute resources required by this container. See
https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
for details.
env EnvVar arrayThe container environment variables.
customConfigMapName stringName of the custom configmap to use instead of the default generated one.
When set, the agent gateway will use this configmap instead of creating the default one.
The configmap must contain a ‘config.yaml’ key with the agent gateway configuration.
extraVolumeMounts VolumeMount arrayAdditional volume mounts to add to the container. See
https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.26/#volumemount-v1-core
for details.

AnyValue

AnyValue is used to represent any type of attribute value. AnyValue may contain a primitive value such as a string or integer or it may contain an arbitrary nested object containing arrays, key-value lists and primitives. This is limited to string and nested values as OTel only supports them

Validation:

  • MaxProperties: 1
  • MinProperties: 1

Appears in:

FieldDescriptionDefaultValidation
stringValue string
arrayValue AnyValue arrayTODO: Add support for ArrayValue && KvListValueMaxProperties: 1
MinProperties: 1

AppProtocol

Underlying type: string

AppProtocol defines the application protocol to use when communicating with the backend.

Validation:

  • Enum: [http2 grpc grpc-web kubernetes.io/h2c kubernetes.io/ws]

Appears in:

FieldDescription
http2AppProtocolHttp2 is the http2 app protocol.
grpcAppProtocolGrpc is the grpc app protocol.
grpc-webAppProtocolGrpcWeb is the grpc-web app protocol.
kubernetes.io/h2cAppProtocolKubernetesH2C is the kubernetes.io/h2c app protocol.
kubernetes.io/wsAppProtocolKubernetesWs is the kubernetes.io/ws app protocol.

AuthorizationRequest

AuthorizationRequest configures the authorization request to the external service.

Appears in:

FieldDescriptionDefaultValidation
headersToAdd object (keys:string, values:string)HeadersToAdd specifies additional headers to add to the authorization request.
These headers are sent to the authorization service in addition to the original request headers.
Client request headers with the same key will be overridden.
The keys are header names and values are envoy format specifiers, see https://www.envoyproxy.io/docs/envoy/latest/api-v3/extensions/filters/http/ext_authz/v3/ext_authz.proto#envoy-v3-api-field-extensions-filters-http-ext-authz-v3-authorizationrequest-headers-to-add.

AuthorizationResponse

AuthorizationResponse configures the authorization response from the external service.

Appears in:

FieldDescriptionDefaultValidation
headersToBackend string arrayHeadersToBackend specifies which headers from the authorization response
should be forwarded to the upstream service when the request is authorized.
Common examples: [“x-current-user”, “x-user-id”, “x-auth-request-email”]

AwsAuth

AwsAuth specifies the authentication method to use for the backend.

Appears in:

FieldDescriptionDefaultValidation
type AwsAuthTypeType specifies the authentication method to use for the backend.Enum: [Secret]
secretRef LocalObjectReferenceSecretRef references a Kubernetes Secret containing the AWS credentials.
The Secret must have keys “accessKey”, “secretKey”, and optionally “sessionToken”.

AwsAuthType

Underlying type: string

AwsAuthType specifies the authentication method to use for the backend.

Appears in:

FieldDescription
SecretAwsAuthTypeSecret uses credentials stored in a Kubernetes Secret.

AwsBackend

AwsBackend is the AWS backend configuration.

Appears in:

FieldDescriptionDefaultValidation
lambda AwsLambdaLambda configures the AWS lambda service.
accountId stringAccountId is the AWS account ID to use for the backend.MaxLength: 12
MinLength: 1
Pattern: ^[0-9]\{12\}$
auth AwsAuthAuth specifies an explicit AWS authentication method for the backend.
When omitted, the following credential providers are tried in order, stopping when one
of them returns an access key ID and a secret access key (the session token is optional):
1. Environment variables: when the environment variables AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY, and AWS_SESSION_TOKEN are set.
2. AssumeRoleWithWebIdentity API call: when the environment variables AWS_WEB_IDENTITY_TOKEN_FILE and AWS_ROLE_ARN are set.
3. EKS Pod Identity: when the environment variable AWS_CONTAINER_AUTHORIZATION_TOKEN_FILE is set.

See the Envoy docs for more info:
https://www.envoyproxy.io/docs/envoy/latest/configuration/http/http_filters/aws_request_signing_filter#credentials
region stringRegion is the AWS region to use for the backend.
Defaults to us-east-1 if not specified.
us-east-1MaxLength: 63
MinLength: 1
Pattern: ^[a-z0-9-]+$

AwsLambda

AwsLambda configures the AWS lambda service.

Appears in:

FieldDescriptionDefaultValidation
endpointURL stringEndpointURL is the URL or domain for the Lambda service. This is primarily
useful for testing and development purposes. When omitted, the default
lambda hostname will be used.
MaxLength: 2048
Pattern: ^https?://[-a-zA-Z0-9@:%.+~#?&/=]+$
functionName stringFunctionName is the name of the Lambda function to invoke.Pattern: ^[A-Za-z0-9-_]\{1,140\}$
invocationMode stringInvocationMode defines how to invoke the Lambda function.
Defaults to Sync.
SyncEnum: [Sync Async]
qualifier stringQualifier is the alias or version for the Lambda function.
Valid values include a numeric version (e.g. “1”), an alias name
(alphanumeric plus “-” or “_”), or the special literal “$LATEST”.
$LATESTPattern: ^(\$LATEST|[0-9]+|[A-Za-z0-9-_]\{1,128\})$
payloadTransformMode AWSLambdaPayloadTransformModePayloadTransformation specifies payload transformation mode before it is sent to the Lambda function.
Defaults to Envoy.
EnvoyEnum: [None Envoy]

Backend

FieldDescriptionDefaultValidation
apiVersion stringgateway.kgateway.dev/v1alpha1
kind stringBackend
kind stringKind is a string value representing the REST resource this object represents.
Servers may infer this from the endpoint the client submits requests to.
Cannot be updated.
In CamelCase.
More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
apiVersion stringAPIVersion defines the versioned schema of this representation of an object.
Servers should convert recognized schemas to the latest internal value, and
may reject unrecognized values.
More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
metadata ObjectMetaRefer to Kubernetes API documentation for fields of metadata.
spec BackendSpec
status BackendStatus

BackendConfigPolicy

FieldDescriptionDefaultValidation
apiVersion stringgateway.kgateway.dev/v1alpha1
kind stringBackendConfigPolicy
kind stringKind is a string value representing the REST resource this object represents.
Servers may infer this from the endpoint the client submits requests to.
Cannot be updated.
In CamelCase.
More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
apiVersion stringAPIVersion defines the versioned schema of this representation of an object.
Servers should convert recognized schemas to the latest internal value, and
may reject unrecognized values.
More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
metadata ObjectMetaRefer to Kubernetes API documentation for fields of metadata.
spec BackendConfigPolicySpec
status PolicyStatus

BackendConfigPolicySpec

BackendConfigPolicySpec defines the desired state of BackendConfigPolicy.

Appears in:

FieldDescriptionDefaultValidation
targetRefs LocalPolicyTargetReference arrayTargetRefs specifies the target references to attach the policy to.MaxItems: 16
MinItems: 1
targetSelectors LocalPolicyTargetSelector arrayTargetSelectors specifies the target selectors to select resources to attach the policy to.
connectTimeout DurationThe timeout for new network connections to hosts in the cluster.
perConnectionBufferLimitBytes integerSoft limit on the size of the cluster’s connections read and write buffers.
If unspecified, an implementation-defined default is applied (1MiB).
Minimum: 0
tcpKeepalive TCPKeepaliveConfigure OS-level TCP keepalive checks.
commonHttpProtocolOptions CommonHttpProtocolOptionsAdditional options when handling HTTP requests upstream, applicable to
both HTTP1 and HTTP2 requests.
http1ProtocolOptions Http1ProtocolOptionsAdditional options when handling HTTP1 requests upstream.
http2ProtocolOptions Http2ProtocolOptionsHttp2ProtocolOptions contains the options necessary to configure HTTP/2 backends.
Note: Http2ProtocolOptions can only be applied to HTTP/2 backends.
See Envoy documentation for more details.
tls TLSTLS contains the options necessary to configure a backend to use TLS origination.
See Envoy documentation for more details.
loadBalancer LoadBalancerLoadBalancer contains the options necessary to configure the load balancer.
healthCheck HealthCheckHealthCheck contains the options necessary to configure the health check.
outlierDetection OutlierDetectionOutlierDetection contains the options necessary to configure passive health checking.
circuitBreakers CircuitBreakersCircuitBreakers contains the options necessary to configure circuit breaking.
See Envoy documentation for more details.

BackendSpec

BackendSpec defines the desired state of Backend.

Appears in:

FieldDescriptionDefaultValidation
type BackendTypeType indicates the type of the backend to be used.Enum: [AWS Static DynamicForwardProxy]
aws AwsBackendAws is the AWS backend configuration.
The Aws backend type is only supported with envoy-based gateways, it is not supported in agentgateway.
static StaticBackendStatic is the static backend configuration.
dynamicForwardProxy DynamicForwardProxyBackendDynamicForwardProxy is the dynamic forward proxy backend configuration.

BackendStatus

BackendStatus defines the observed state of Backend.

Appears in:

FieldDescriptionDefaultValidation
conditions Condition arrayConditions is the list of conditions for the backend.MaxItems: 8

BackendType

Underlying type: string

BackendType indicates the type of the backend.

Appears in:

FieldDescription
AWSBackendTypeAWS is the type for AWS backends.
StaticBackendTypeStatic is the type for static backends.
DynamicForwardProxyBackendTypeDynamicForwardProxy is the type for dynamic forward proxy backends.

BasicAuthPolicy

BasicAuthPolicy configures HTTP basic authentication using the Authorization header. Basic authentication validates requests against username/password pairs provided either inline or via a Kubernetes secret. The credentials must be in htpasswd SHA-1 format.

Appears in:

FieldDescriptionDefaultValidation
users string arrayUsers provides an inline list of username/password pairs in htpasswd format.
Each entry should be formatted as “username:hashed_password”.
The only supported hash format is SHA-1

Example entries:
- “user1:{SHA}d95o2uzYI7q7tY7bHI4U1xBug7s=”
MaxItems: 256
MinItems: 1
secretRef SecretReferenceSecretRef references a Kubernetes secret containing htpasswd data.
The secret must contain username/password pairs in htpasswd format.
disable PolicyDisableDisable basic auth.
Can be used to disable basic auth policies applied at a higher level in the config hierarchy.

BodyParseBehavior

Underlying type: string

BodyparseBehavior defines how the body should be parsed If set to json and the body is not json then the filter will not perform the transformation.

Validation:

  • Enum: [AsString AsJson]

Appears in:

FieldDescription
AsStringBodyParseBehaviorAsString will parse the body as a string.
AsJsonBodyParseBehaviorAsJSON will parse the body as a json object.

BodyTransformation

BodyTransformation controls how the body should be parsed and transformed.

Appears in:

FieldDescriptionDefaultValidation
parseAs BodyParseBehaviorParseAs defines what auto formatting should be applied to the body.
This can make interacting with keys within a json body much easier if AsJson is selected.
AsStringEnum: [AsString AsJson]
value InjaTemplateValue is the template to apply to generate the output value for the body.
Only Inja templates are supported.

Buffer

Appears in:

FieldDescriptionDefaultValidation
maxRequestSize QuantityMaxRequestSize sets the maximum size in bytes of a message body to buffer.
Requests exceeding this size will receive HTTP 413.
Example format: “1Mi”, “512Ki”, “1Gi”
disable PolicyDisableDisable the buffer filter.
Can be used to disable buffer policies applied at a higher level in the config hierarchy.

CELFilter

Underlying type: struct

CELFilter filters requests based on Common Expression Language (CEL).

Appears in:

CSRFPolicy

CSRFPolicy can be used to set percent of requests for which the CSRF filter is enabled, enable shadow-only mode where policies will be evaluated and tracked, but not enforced and add additional source origins that will be allowed in addition to the destination origin.

Appears in:

FieldDescriptionDefaultValidation
percentageEnabled integerSpecifies the percentage of requests for which the CSRF filter is enabled.Maximum: 100
Minimum: 0
percentageShadowed integerSpecifies that CSRF policies will be evaluated and tracked, but not enforced.Maximum: 100
Minimum: 0
additionalOrigins StringMatcher arraySpecifies additional source origins that will be allowed in addition to the destination origin.MaxItems: 16

CircuitBreakers

CircuitBreakers contains the options to configure circuit breaker thresholds for the default priority. See Envoy documentation for more details.

Appears in:

FieldDescriptionDefaultValidation
maxConnections integerMaxConnections is the maximum number of connections that will be made to
the upstream cluster. If not specified, defaults to 1024.
Minimum: 1
maxPendingRequests integerMaxPendingRequests is the maximum number of pending requests that are
allowed to the upstream cluster. If not specified, defaults to 1024.
Minimum: 1
maxRequests integerMaxRequests is the maximum number of parallel requests that are allowed
to the upstream cluster. If not specified, defaults to 1024.
Minimum: 1
maxRetries integerMaxRetries is the maximum number of parallel retries that are allowed
to the upstream cluster. If not specified, defaults to 3.
Minimum: 0

CommonAccessLogGrpcService

Common configuration for gRPC access logs. Ref: https://www.envoyproxy.io/docs/envoy/latest/api-v3/extensions/access_loggers/grpc/v3/als.proto#envoy-v3-api-msg-extensions-access-loggers-grpc-v3-commongrpcaccesslogconfig

Appears in:

FieldDescriptionDefaultValidation
backendRef BackendRefThe backend gRPC service. Can be any type of supported backend (Kubernetes Service, kgateway Backend, etc..)
authority stringThe :authority header in the grpc request. If this field is not set, the authority header value will be cluster_name.
Note that this authority does not override the SNI. The SNI is provided by the transport socket of the cluster.
maxReceiveMessageLength integerMaximum gRPC message size that is allowed to be received. If a message over this limit is received, the gRPC stream is terminated with the RESOURCE_EXHAUSTED error.
Defaults to 0, which means unlimited.
Minimum: 1
skipEnvoyHeaders booleanThis provides gRPC client level control over envoy generated headers. If false, the header will be sent but it can be overridden by per stream option. If true, the header will be removed and can not be overridden by per stream option. Default to false.
timeout DurationThe timeout for the gRPC request. This is the timeout for a specific request
initialMetadata HeaderValue arrayAdditional metadata to include in streams initiated to the GrpcService.
This can be used for scenarios in which additional ad hoc authorization headers (e.g. x-foo-bar: baz-key) are to be injected
retryPolicy RetryPolicyIndicates the retry policy for re-establishing the gRPC stream.
If max interval is not provided, it will be set to ten times the provided base interval
logName stringname of log stream

CommonGrpcService

Common gRPC service configuration created by setting `envoy_grpc“ as the gRPC client Ref: https://www.envoyproxy.io/docs/envoy/latest/api-v3/config/core/v3/grpc_service.proto#envoy-v3-api-msg-config-core-v3-grpcservice Ref: https://www.envoyproxy.io/docs/envoy/latest/api-v3/config/core/v3/grpc_service.proto#envoy-v3-api-msg-config-core-v3-grpcservice-envoygrpc

Appears in:

FieldDescriptionDefaultValidation
backendRef BackendRefThe backend gRPC service. Can be any type of supported backend (Kubernetes Service, kgateway Backend, etc..)
authority stringThe :authority header in the grpc request. If this field is not set, the authority header value will be cluster_name.
Note that this authority does not override the SNI. The SNI is provided by the transport socket of the cluster.
maxReceiveMessageLength integerMaximum gRPC message size that is allowed to be received. If a message over this limit is received, the gRPC stream is terminated with the RESOURCE_EXHAUSTED error.
Defaults to 0, which means unlimited.
Minimum: 1
skipEnvoyHeaders booleanThis provides gRPC client level control over envoy generated headers. If false, the header will be sent but it can be overridden by per stream option. If true, the header will be removed and can not be overridden by per stream option. Default to false.
timeout DurationThe timeout for the gRPC request. This is the timeout for a specific request
initialMetadata HeaderValue arrayAdditional metadata to include in streams initiated to the GrpcService.
This can be used for scenarios in which additional ad hoc authorization headers (e.g. x-foo-bar: baz-key) are to be injected
retryPolicy RetryPolicyIndicates the retry policy for re-establishing the gRPC stream.
If max interval is not provided, it will be set to ten times the provided base interval

CommonHttpProtocolOptions

CommonHttpProtocolOptions are options that are applicable to both HTTP1 and HTTP2 requests. See Envoy documentation for more details.

Appears in:

FieldDescriptionDefaultValidation
idleTimeout DurationThe idle timeout for connections. The idle timeout is defined as the
period in which there are no active requests. When the
idle timeout is reached the connection will be closed. If the connection is an HTTP/2
downstream connection a drain sequence will occur prior to closing the connection.
Note that request based timeouts mean that HTTP/2 PINGs will not keep the connection alive.
If not specified, this defaults to 1 hour. To disable idle timeouts explicitly set this to 0.
Disabling this timeout has a highly likelihood of yielding connection leaks due to lost TCP
FIN packets, etc.
maxHeadersCount integerSpecifies the maximum number of headers that the connection will accept.
If not specified, the default of 100 is used. Requests that exceed this limit will receive
a 431 response for HTTP/1.x and cause a stream reset for HTTP/2.
Minimum: 0
maxStreamDuration DurationTotal duration to keep alive an HTTP request/response stream. If the time limit is reached the stream will be
reset independent of any other timeouts. If not specified, this value is not set.
maxRequestsPerConnection integerMaximum requests for a single upstream connection.
If set to 0 or unspecified, defaults to unlimited.
Minimum: 0

Compression

Compression configures HTTP gzip compression and decompression behavior.

Appears in:

FieldDescriptionDefaultValidation
responseCompression ResponseCompressionResponseCompression controls response compression to the downstream.
If set, responses with the appropriate Accept-Encoding header with certain textual content types will be compressed using gzip.
The content-types that will be compressed are:
- application/javascript
- application/json
- application/xhtml+xml
- image/svg+xml
- text/css
- text/html
- text/plain
- text/xml
requestDecompression RequestDecompressionRequestDecompression controls request decompression.
If set, gzip requests will be decompressed.

Appears in:

FieldDescriptionDefaultValidation
name stringName of the cookie.MinLength: 1
path stringPath is the name of the path for the cookie.
ttl DurationTTL specifies the time to live of the cookie.
If specified, a cookie with the TTL will be generated if the cookie is not present.
If the TTL is present and zero, the generated cookie will be a session cookie.
secure booleanSecure specifies whether the cookie is secure.
If true, the cookie will only be sent over HTTPS.
httpOnly booleanHttpOnly specifies whether the cookie is HTTP only, i.e. not accessible to JavaScript.
sameSite stringSameSite controls cross-site sending of cookies.
Supported values are Strict, Lax, and None.
Enum: [Strict Lax None]

CorsPolicy

Appears in:

FieldDescriptionDefaultValidation
disable PolicyDisableDisable the CORS filter.
Can be used to disable CORS policies applied at a higher level in the config hierarchy.

CustomAttribute

Describes attributes for the active span. Ref: https://www.envoyproxy.io/docs/envoy/latest/api-v3/type/tracing/v3/custom_tag.proto#envoy-v3-api-msg-type-tracing-v3-customtag

Validation:

  • MaxProperties: 2
  • MinProperties: 1

Appears in:

FieldDescriptionDefaultValidation
name stringThe name of the attribute
literal CustomAttributeLiteralA literal attribute value.
environment CustomAttributeEnvironmentAn environment attribute value.
requestHeader CustomAttributeHeaderA request header attribute value.
metadata CustomAttributeMetadataRefer to Kubernetes API documentation for fields of metadata.

CustomAttributeEnvironment

Environment type attribute with environment name and default value. Ref: https://www.envoyproxy.io/docs/envoy/latest/api-v3/type/tracing/v3/custom_tag.proto#type-tracing-v3-customtag-environment

Appears in:

FieldDescriptionDefaultValidation
name stringEnvironment variable name to obtain the value to populate the attribute value.
defaultValue stringWhen the environment variable is not found, the attribute value will be populated with this default value if specified,
otherwise no attribute will be populated.

CustomAttributeHeader

Header type attribute with header name and default value. https://www.envoyproxy.io/docs/envoy/latest/api-v3/type/tracing/v3/custom_tag.proto#type-tracing-v3-customtag-header

Appears in:

FieldDescriptionDefaultValidation
name stringHeader name to obtain the value to populate the attribute value.
defaultValue stringWhen the header does not exist, the attribute value will be populated with this default value if specified,
otherwise no attribute will be populated.

CustomAttributeLiteral

Literal type attribute with a static value. Ref: https://www.envoyproxy.io/docs/envoy/latest/api-v3/type/tracing/v3/custom_tag.proto#type-tracing-v3-customtag-literal

Appears in:

FieldDescriptionDefaultValidation
value stringStatic literal value to populate the attribute value.

CustomAttributeMetadata

Metadata type attribute using MetadataKey to retrieve the protobuf value from Metadata, and populate the attribute value with the canonical JSON representation of it. Ref: https://www.envoyproxy.io/docs/envoy/latest/api-v3/type/tracing/v3/custom_tag.proto#type-tracing-v3-customtag-metadata

Appears in:

FieldDescriptionDefaultValidation
kind MetadataKindSpecify what kind of metadata to obtain attribute value fromEnum: [Request Route Cluster Host]
metadataKey MetadataKeyMetadata key to define the path to retrieve the attribute value.
defaultValue stringWhen no valid metadata is found, the attribute value would be populated with this default value if specified, otherwise no attribute would be populated.

DirectResponse

DirectResponse contains configuration for defining direct response routes.

FieldDescriptionDefaultValidation
apiVersion stringgateway.kgateway.dev/v1alpha1
kind stringDirectResponse
kind stringKind is a string value representing the REST resource this object represents.
Servers may infer this from the endpoint the client submits requests to.
Cannot be updated.
In CamelCase.
More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
apiVersion stringAPIVersion defines the versioned schema of this representation of an object.
Servers should convert recognized schemas to the latest internal value, and
may reject unrecognized values.
More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
metadata ObjectMetaRefer to Kubernetes API documentation for fields of metadata.
spec DirectResponseSpec
status DirectResponseStatus

DirectResponseSpec

DirectResponseSpec describes the desired state of a DirectResponse.

Appears in:

FieldDescriptionDefaultValidation
status integerStatusCode defines the HTTP status code to return for this route.Maximum: 599
Minimum: 200
body stringBody defines the content to be returned in the HTTP response body.
The maximum length of the body is restricted to prevent excessively large responses.
If this field is omitted, no body is included in the response.
MaxLength: 4096
MinLength: 1

DirectResponseStatus

DirectResponseStatus defines the observed state of a DirectResponse.

Appears in:

DurationFilter

Underlying type: ComparisonFilter

DurationFilter filters based on request duration. Based on: https://www.envoyproxy.io/docs/envoy/v1.33.0/api-v3/config/accesslog/v3/accesslog.proto#config-accesslog-v3-durationfilter

Appears in:

DynamicForwardProxyBackend

DynamicForwardProxyBackend is the dynamic forward proxy backend configuration.

Appears in:

FieldDescriptionDefaultValidation
enableTls booleanEnableTls enables TLS. When true, the backend will be configured to use TLS. System CA will be used for validation.
The hostname will be used for SNI and auto SAN validation.

EnvoyBootstrap

EnvoyBootstrap configures the Envoy proxy instance that is provisioned from a Kubernetes Gateway.

Appears in:

FieldDescriptionDefaultValidation
logLevel stringEnvoy log level. Options include “trace”, “debug”, “info”, “warn”, “error”,
“critical” and “off”. Defaults to “info”. See
https://www.envoyproxy.io/docs/envoy/latest/start/quick-start/run-envoy#debugging-envoy
for more information.
componentLogLevels object (keys:string, values:string)Envoy log levels for specific components. The keys are component names and
the values are one of “trace”, “debug”, “info”, “warn”, “error”,
“critical”, or “off”, e.g.

yaml<br /> componentLogLevels:<br /> upstream: debug<br /> connection: trace<br />

These will be converted to the --component-log-level Envoy argument
value. See
https://www.envoyproxy.io/docs/envoy/latest/start/quick-start/run-envoy#debugging-envoy
for more information.

Note: the keys and values cannot be empty, but they are not otherwise validated.

EnvoyContainer

EnvoyContainer configures the container running Envoy.

Appears in:

FieldDescriptionDefaultValidation
bootstrap EnvoyBootstrapInitial envoy configuration.
image ImageThe envoy container image. See
https://kubernetes.io/docs/concepts/containers/images/
for details.

Default values, which may be overridden individually:

registry: quay.io/solo-io
repository: envoy-wrapper
tag:
pullPolicy: IfNotPresent
securityContext SecurityContextThe security context for this container. See
https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.26/#securitycontext-v1-core
for details.
resources ResourceRequirementsThe compute resources required by this container. See
https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
for details.
env EnvVar arrayThe container environment variables.
extraVolumeMounts VolumeMount arrayAdditional volume mounts to add to the container. See
https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.26/#volumemount-v1-core
for details.

EnvoyHealthCheck

EnvoyHealthCheck represents configuration for Envoy’s health check filter. The filter will be configured in No pass through mode, and will only match requests with the specified path.

Appears in:

FieldDescriptionDefaultValidation
path stringPath defines the exact path that will be matched for health check requests.MaxLength: 2048
Pattern: ^/[-a-zA-Z0-9@:%.+~#?&/=_]+$

ExtAuthBufferSettings

ExtAuthBufferSettings configures how the request body should be buffered.

Appears in:

FieldDescriptionDefaultValidation
maxRequestBytes integerMaxRequestBytes sets the maximum size of a message body to buffer.
Requests exceeding this size will receive HTTP 413 and not be sent to the auth service.
Minimum: 1
allowPartialMessage booleanAllowPartialMessage determines if partial messages should be allowed.
When true, requests will be sent to the auth service even if they exceed maxRequestBytes.
The default behavior is false.
false
packAsBytes booleanPackAsBytes determines if the body should be sent as raw bytes.
When true, the body is sent as raw bytes in the raw_body field.
When false, the body is sent as UTF-8 string in the body field.
The default behavior is false.
false

ExtAuthPolicy

ExtAuthPolicy configures external authentication/authorization for a route. This policy will determine the ext auth server to use and how to talk to it. Note that most of these fields are passed along as is to Envoy. For more details on particular fields please see the Envoy ExtAuth documentation. https://raw.githubusercontent.com/envoyproxy/envoy/f910f4abea24904aff04ec33a00147184ea7cffa/api/envoy/extensions/filters/http/ext_authz/v3/ext_authz.proto

Appears in:

FieldDescriptionDefaultValidation
extensionRef NamespacedObjectReferenceExtensionRef references the GatewayExtension that should be used for auth.
withRequestBody ExtAuthBufferSettingsWithRequestBody allows the request body to be buffered and sent to the auth service.
Warning buffering has implications for streaming and therefore performance.
contextExtensions object (keys:string, values:string)Additional context for the auth service.
disable PolicyDisableDisable all external auth filters.
Can be used to disable external auth policies applied at a higher level in the config hierarchy.

ExtAuthProvider

ExtAuthProvider defines the configuration for an ExtAuth provider.

Appears in:

FieldDescriptionDefaultValidation
grpcService ExtGrpcServiceGrpcService is the GRPC service that will handle the auth.
Mutually exclusive with HttpService.
httpService ExtHttpServiceHttpService is the HTTP service that will handle the auth.
Mutually exclusive with GrpcService.
headersToForward string arrayHeadersToForward specifies which headers from the client request should be
forwarded to the external authorization service.

HTTP services by default have the following headers forwarded: Host, Method, Path, Content-Length, Authorization.

If this field is omitted, gRPC services will have all client request headers forwarded,
while HTTP services will only receive the default headers described above.

Common examples: [“cookie”, “authorization”, “x-forwarded-for”]
More info is available on the Envoy docs
failOpen booleanFailOpen determines if requests are allowed when the ext auth service is unavailable.
Defaults to false, meaning requests will be denied if the ext auth service is unavailable.
false
clearRouteCache booleanClearRouteCache determines if the route cache should be cleared to allow the
external authentication service to correctly affect routing decisions.
false
withRequestBody ExtAuthBufferSettingsWithRequestBody allows the request body to be buffered and sent to the auth service.
Warning: buffering has implications for streaming and therefore performance.
statusOnError integerStatusOnError sets the HTTP status response code that is returned to the client when the
auth server returns an error or cannot be reached. Must be in the range of 100-511 inclusive.
The default matches the deny response code of 403 Forbidden.
403Maximum: 511
Minimum: 100
statPrefix stringStatPrefix is an optional prefix to include when emitting stats from the extauthz filter,
enabling different instances of the filter to have unique stats.
MinLength: 1

ExtGrpcService

ExtGrpcService defines the GRPC service that will handle the processing.

Appears in:

FieldDescriptionDefaultValidation
backendRef BackendRefBackendRef references the backend GRPC service.
authority stringAuthority is the authority header to use for the GRPC service.
requestTimeout DurationRequestTimeout is the timeout for the gRPC request. This is the timeout for a specific request.
retry ExtSvcRetryPolicyRetry specifies the retry policy for gRPC streams associated with the service.

ExtHttpService

ExtHttpService defines the HTTP service that will handle external authorization.

Appears in:

FieldDescriptionDefaultValidation
backendRef BackendRefBackendRef references the backend HTTP service.
pathPrefix stringPathPrefix specifies a prefix to the value of the authorization request’s path header.
This allows customizing the path at which the authorization server expects to receive requests.
For example, if the authorization server expects requests at “/verify”, set this to “/verify”.
If not specified, the original request path is used.
requestTimeout DurationRequestTimeout is the timeout for the HTTP request. Default timeout is 2 seconds.
authorizationRequest AuthorizationRequestAuthorizationRequest configures the authorization request to the external service.
authorizationResponse AuthorizationResponseAuthorizationResponse configures the authorization response from the external service.
retry ExtSvcRetryPolicyRetry specifies the retry policy for HTTP requests to the authorization service.

ExtProcPolicy

ExtProcPolicy defines the configuration for the Envoy External Processing filter.

Appears in:

FieldDescriptionDefaultValidation
extensionRef NamespacedObjectReferenceExtensionRef references the GatewayExtension that should be used for external processing.
processingMode ProcessingModeProcessingMode defines how the filter should interact with the request/response streams
disable PolicyDisableDisable all external processing filters.
Can be used to disable external processing policies applied at a higher level in the config hierarchy.

ExtProcProvider

ExtProcProvider defines the configuration for an ExtProc provider.

Appears in:

FieldDescriptionDefaultValidation
grpcService ExtGrpcServiceGrpcService is the GRPC service that will handle the processing.
failOpen booleanFailOpen determines if requests are allowed when the ext proc service is unavailable.
Defaults to true, meaning requests are allowed upstream even if the ext proc service is unavailable.
true
processingMode ProcessingModeProcessingMode defines how the filter should interact with the request/response streams.
messageTimeout DurationMessageTimeout is the timeout for each message sent to the external processing server.
maxMessageTimeout DurationMaxMessageTimeout specifies the upper bound of override_message_timeout that may be sent from the external processing server.
The default value 0, which effectively disables the override_message_timeout API.
statPrefix stringStatPrefix is an optional prefix to include when emitting stats from the extproc filter,
enabling different instances of the filter to have unique stats.
MinLength: 1
routeCacheAction ExtProcRouteCacheActionRouteCacheAction describes the route cache action to be taken when an
external processor response is received in response to request headers.
The default behavior is “FromResponse” which will only clear the route cache when
an external processing response has the clear_route_cache field set.
FromResponseEnum: [FromResponse Clear Retain]
metadataOptions MetadataOptionsMetadataOptions allows configuring metadata namespaces to forwarded or received from the external
processing server.

ExtProcRouteCacheAction

Underlying type: string

Appears in:

FieldDescription
FromResponseRouteCacheActionFromResponse is the default behavior, which clears the route cache only
when the clear_route_cache field is set in an external processor response.
ClearRouteCacheActionClear always clears the route cache irrespective of the
clear_route_cache field in the external processor response.
RetainRouteCacheActionRetain never clears the route cache irrespective of the
clear_route_cache field in the external processor response.

ExtSvcRetryPolicy

Appears in:

FieldDescriptionDefaultValidation
attempts integerAttempts specifies the number of retry attempts for a request.
Defaults to 1 attempt if not set.
A value of 0 effectively disables retries.
1Minimum: 0
backoff RetryBackoffBackoff specifies the retry backoff strategy.
If not set, a default backoff with a base interval of 1000ms is used. The default max interval is 10 times the base interval.

FileSink

FileSink represents the file sink configuration for access logs.

Appears in:

FieldDescriptionDefaultValidation
path stringthe file path to which the file access logging service will sink
stringFormat stringthe format string by which envoy will format the log lines
https://www.envoyproxy.io/docs/envoy/v1.33.0/configuration/observability/access_log/usage#format-strings
jsonFormat RawExtensionthe format object by which to envoy will emit the logs in a structured way.
https://www.envoyproxy.io/docs/envoy/v1.33.0/configuration/observability/access_log/usage#format-dictionaries

FilterType

FilterType represents the type of filter to apply (only one of these should be set). Based on: https://www.envoyproxy.io/docs/envoy/v1.33.0/api-v3/config/accesslog/v3/accesslog.proto#envoy-v3-api-msg-config-accesslog-v3-accesslogfilter

Validation:

  • MaxProperties: 1
  • MinProperties: 1

Appears in:

FieldDescriptionDefaultValidation
statusCodeFilter StatusCodeFilter
durationFilter DurationFilter
notHealthCheckFilter booleanFilters for requests that are not health check requests.
Based on: https://www.envoyproxy.io/docs/envoy/v1.33.0/api-v3/config/accesslog/v3/accesslog.proto#config-accesslog-v3-nothealthcheckfilter
traceableFilter booleanFilters for requests that are traceable.
Based on: https://www.envoyproxy.io/docs/envoy/v1.33.0/api-v3/config/accesslog/v3/accesslog.proto#config-accesslog-v3-traceablefilter
headerFilter HeaderFilter
responseFlagFilter ResponseFlagFilter
grpcStatusFilter GrpcStatusFilter
celFilter CELFilter

GatewayExtension

FieldDescriptionDefaultValidation
apiVersion stringgateway.kgateway.dev/v1alpha1
kind stringGatewayExtension
kind stringKind is a string value representing the REST resource this object represents.
Servers may infer this from the endpoint the client submits requests to.
Cannot be updated.
In CamelCase.
More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
apiVersion stringAPIVersion defines the versioned schema of this representation of an object.
Servers should convert recognized schemas to the latest internal value, and
may reject unrecognized values.
More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
metadata ObjectMetaRefer to Kubernetes API documentation for fields of metadata.
spec GatewayExtensionSpec
status GatewayExtensionStatus

GatewayExtensionSpec

GatewayExtensionSpec defines the desired state of GatewayExtension.

Appears in:

FieldDescriptionDefaultValidation
type GatewayExtensionTypeDeprecated: Setting this field has no effect.
Type indicates the type of the GatewayExtension to be used.
Enum: [ExtAuth ExtProc RateLimit JWT]
extAuth ExtAuthProviderExtAuth configuration for ExtAuth extension type.
extProc ExtProcProviderExtProc configuration for ExtProc extension type.
rateLimit RateLimitProviderRateLimit configuration for RateLimit extension type.
jwt JWTJWT configuration for JWT extension type.

GatewayExtensionStatus

GatewayExtensionStatus defines the observed state of GatewayExtension.

Appears in:

FieldDescriptionDefaultValidation
conditions Condition arrayConditions is the list of conditions for the GatewayExtension.MaxItems: 8

GatewayExtensionType

Underlying type: string

GatewayExtensionType indicates the type of the GatewayExtension.

Appears in:

FieldDescription
ExtAuthGatewayExtensionTypeExtAuth is the type for Extauth extensions.
ExtProcGatewayExtensionTypeExtProc is the type for ExtProc extensions.
RateLimitGatewayExtensionTypeRateLimit is the type for RateLimit extensions.
JWTGatewayExtensionTypeJWT is the type for the JWT extensions

GatewayParameters

A GatewayParameters contains configuration that is used to dynamically provision kgateway’s data plane (Envoy or agentgateway proxy instance), based on a Kubernetes Gateway.

FieldDescriptionDefaultValidation
apiVersion stringgateway.kgateway.dev/v1alpha1
kind stringGatewayParameters
kind stringKind is a string value representing the REST resource this object represents.
Servers may infer this from the endpoint the client submits requests to.
Cannot be updated.
In CamelCase.
More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
apiVersion stringAPIVersion defines the versioned schema of this representation of an object.
Servers should convert recognized schemas to the latest internal value, and
may reject unrecognized values.
More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
metadata ObjectMetaRefer to Kubernetes API documentation for fields of metadata.
spec GatewayParametersSpec
status GatewayParametersStatus

GatewayParametersSpec

A GatewayParametersSpec describes the type of environment/platform in which the proxy will be provisioned.

Appears in:

FieldDescriptionDefaultValidation
kube KubernetesProxyConfigThe proxy will be deployed on Kubernetes.
selfManaged SelfManagedGatewayThe proxy will be self-managed and not auto-provisioned.

GatewayParametersStatus

The current conditions of the GatewayParameters. This is not currently implemented.

Appears in:

GracefulShutdownSpec

Appears in:

FieldDescriptionDefaultValidation
enabled booleanEnable grace period before shutdown to finish current requests while Envoy health checks fail to e.g. notify external load balancers. NOTE: This will not have any effect if you have not defined health checks via the health check filter
sleepTimeSeconds integerTime (in seconds) for the preStop hook to wait before allowing Envoy to terminateMaximum: 3.1536e+07
Minimum: 0

GrpcStatusFilter

Underlying type: struct

GrpcStatusFilter filters gRPC requests based on their response status. Based on: https://www.envoyproxy.io/docs/envoy/v1.33.0/api-v3/config/accesslog/v3/accesslog.proto#enum-config-accesslog-v3-grpcstatusfilter-status

Appears in:

HTTPListenerPolicy

HTTPListenerPolicy is intended to be used for configuring the Envoy HttpConnectionManager and any other config or policy that should map 1-to-1 with a given HTTP listener, such as the Envoy health check HTTP filter. Currently these policies can only be applied per Gateway but support for Listener attachment may be added in the future. See https://github.com/kgateway-dev/kgateway/issues/11786 for more details. Deprecated: Use the httpSettings field on ListenerPolicy instead.

FieldDescriptionDefaultValidation
apiVersion stringgateway.kgateway.dev/v1alpha1
kind stringHTTPListenerPolicy
kind stringKind is a string value representing the REST resource this object represents.
Servers may infer this from the endpoint the client submits requests to.
Cannot be updated.
In CamelCase.
More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
apiVersion stringAPIVersion defines the versioned schema of this representation of an object.
Servers should convert recognized schemas to the latest internal value, and
may reject unrecognized values.
More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
metadata ObjectMetaRefer to Kubernetes API documentation for fields of metadata.
spec HTTPListenerPolicySpec
status PolicyStatus

HTTPListenerPolicySpec

HTTPListenerPolicySpec defines the desired state of a HTTP listener policy.

Appears in:

FieldDescriptionDefaultValidation
targetRefs LocalPolicyTargetReference arrayTargetRefs specifies the target resources by reference to attach the policy to.MaxItems: 16
MinItems: 1
targetSelectors LocalPolicyTargetSelector arrayTargetSelectors specifies the target selectors to select resources to attach the policy to.
accessLog AccessLog arrayAccessLoggingConfig contains various settings for Envoy’s access logging service.
See here for more information: https://www.envoyproxy.io/docs/envoy/v1.33.0/api-v3/config/accesslog/v3/accesslog.proto
MaxItems: 16
tracing TracingTracing contains various settings for Envoy’s OpenTelemetry tracer.
See here for more information: https://www.envoyproxy.io/docs/envoy/latest/api-v3/config/trace/v3/opentelemetry.proto.html
upgradeConfig UpgradeConfigUpgradeConfig contains configuration for HTTP upgrades like WebSocket.
See here for more information: https://www.envoyproxy.io/docs/envoy/v1.34.1/intro/arch_overview/http/upgrades.html
useRemoteAddress booleanUseRemoteAddress determines whether to use the remote address for the original client.
Note: If this field is omitted, it will fallback to the default value of ’true’, which we set for all Envoy HCMs.
Thus, setting this explicitly to true is unnecessary (but will not cause any harm).
When true, Envoy will use the remote address of the connection as the client address.
When false, Envoy will use the X-Forwarded-For header to determine the client address.
See here for more information: https://www.envoyproxy.io/docs/envoy/latest/api-v3/extensions/filters/network/http_connection_manager/v3/http_connection_manager.proto#envoy-v3-api-field-extensions-filters-network-http-connection-manager-v3-httpconnectionmanager-use-remote-address
xffNumTrustedHops integerXffNumTrustedHops is the number of additional ingress proxy hops from the right side of the X-Forwarded-For HTTP header to trust when determining the origin client’s IP address.
See here for more information: https://www.envoyproxy.io/docs/envoy/latest/api-v3/extensions/filters/network/http_connection_manager/v3/http_connection_manager.proto#envoy-v3-api-field-extensions-filters-network-http-connection-manager-v3-httpconnectionmanager-xff-num-trusted-hops
Minimum: 0
serverHeaderTransformation ServerHeaderTransformationServerHeaderTransformation determines how the server header is transformed.
See here for more information: https://www.envoyproxy.io/docs/envoy/latest/api-v3/extensions/filters/network/http_connection_manager/v3/http_connection_manager.proto#envoy-v3-api-field-extensions-filters-network-http-connection-manager-v3-httpconnectionmanager-server-header-transformation
Enum: [Overwrite AppendIfAbsent PassThrough]
streamIdleTimeout DurationStreamIdleTimeout is the idle timeout for HTTP streams.
See here for more information: https://www.envoyproxy.io/docs/envoy/latest/api-v3/extensions/filters/network/http_connection_manager/v3/http_connection_manager.proto#envoy-v3-api-field-extensions-filters-network-http-connection-manager-v3-httpconnectionmanager-stream-idle-timeout
idleTimeout DurationIdleTimeout is the idle timeout for connnections.
See here for more information: https://www.envoyproxy.io/docs/envoy/latest/api-v3/config/core/v3/protocol.proto#envoy-v3-api-msg-config-core-v3-httpprotocoloptions
healthCheck EnvoyHealthCheckHealthCheck configures Envoy health checks
preserveHttp1HeaderCase booleanPreserveHttp1HeaderCase determines whether to preserve the case of HTTP1 request headers.
See here for more information: https://www.envoyproxy.io/docs/envoy/latest/configuration/http/http_conn_man/header_casing
acceptHttp10 booleanAcceptHTTP10 determines whether to accept incoming HTTP/1.0 and HTTP 0.9 requests.
See here for more information: https://www.envoyproxy.io/docs/envoy/latest/api-v3/config/core/v3/protocol.proto#config-core-v3-http1protocoloptions
defaultHostForHttp10 stringDefaultHostForHttp10 specifies a default host for HTTP/1.0 requests. This is highly suggested if acceptHttp10 is true and a no-op if acceptHttp10 is false.
See here for more information: https://www.envoyproxy.io/docs/envoy/latest/api-v3/config/core/v3/protocol.proto#config-core-v3-http1protocoloptions
MinLength: 1
earlyRequestHeaderModifier HTTPHeaderFilterEarlyRequestHeaderModifier defines header modifications to be applied early in the request processing,
before route selection.
For example, if you use ExternalAuthz to add a header, you may want to remove it here, to make
sure it did not come from the client.

HTTPSettings

Appears in:

FieldDescriptionDefaultValidation
accessLog AccessLog arrayAccessLoggingConfig contains various settings for Envoy’s access logging service.
See here for more information: https://www.envoyproxy.io/docs/envoy/v1.33.0/api-v3/config/accesslog/v3/accesslog.proto
MaxItems: 16
tracing TracingTracing contains various settings for Envoy’s OpenTelemetry tracer.
See here for more information: https://www.envoyproxy.io/docs/envoy/latest/api-v3/config/trace/v3/opentelemetry.proto.html
upgradeConfig UpgradeConfigUpgradeConfig contains configuration for HTTP upgrades like WebSocket.
See here for more information: https://www.envoyproxy.io/docs/envoy/v1.34.1/intro/arch_overview/http/upgrades.html
useRemoteAddress booleanUseRemoteAddress determines whether to use the remote address for the original client.
Note: If this field is omitted, it will fallback to the default value of ’true’, which we set for all Envoy HCMs.
Thus, setting this explicitly to true is unnecessary (but will not cause any harm).
When true, Envoy will use the remote address of the connection as the client address.
When false, Envoy will use the X-Forwarded-For header to determine the client address.
See here for more information: https://www.envoyproxy.io/docs/envoy/latest/api-v3/extensions/filters/network/http_connection_manager/v3/http_connection_manager.proto#envoy-v3-api-field-extensions-filters-network-http-connection-manager-v3-httpconnectionmanager-use-remote-address
xffNumTrustedHops integerXffNumTrustedHops is the number of additional ingress proxy hops from the right side of the X-Forwarded-For HTTP header to trust when determining the origin client’s IP address.
See here for more information: https://www.envoyproxy.io/docs/envoy/latest/api-v3/extensions/filters/network/http_connection_manager/v3/http_connection_manager.proto#envoy-v3-api-field-extensions-filters-network-http-connection-manager-v3-httpconnectionmanager-xff-num-trusted-hops
Minimum: 0
serverHeaderTransformation ServerHeaderTransformationServerHeaderTransformation determines how the server header is transformed.
See here for more information: https://www.envoyproxy.io/docs/envoy/latest/api-v3/extensions/filters/network/http_connection_manager/v3/http_connection_manager.proto#envoy-v3-api-field-extensions-filters-network-http-connection-manager-v3-httpconnectionmanager-server-header-transformation
Enum: [Overwrite AppendIfAbsent PassThrough]
streamIdleTimeout DurationStreamIdleTimeout is the idle timeout for HTTP streams.
See here for more information: https://www.envoyproxy.io/docs/envoy/latest/api-v3/extensions/filters/network/http_connection_manager/v3/http_connection_manager.proto#envoy-v3-api-field-extensions-filters-network-http-connection-manager-v3-httpconnectionmanager-stream-idle-timeout
idleTimeout DurationIdleTimeout is the idle timeout for connnections.
See here for more information: https://www.envoyproxy.io/docs/envoy/latest/api-v3/config/core/v3/protocol.proto#envoy-v3-api-msg-config-core-v3-httpprotocoloptions
healthCheck EnvoyHealthCheckHealthCheck configures Envoy health checks
preserveHttp1HeaderCase booleanPreserveHttp1HeaderCase determines whether to preserve the case of HTTP1 request headers.
See here for more information: https://www.envoyproxy.io/docs/envoy/latest/configuration/http/http_conn_man/header_casing
acceptHttp10 booleanAcceptHTTP10 determines whether to accept incoming HTTP/1.0 and HTTP 0.9 requests.
See here for more information: https://www.envoyproxy.io/docs/envoy/latest/api-v3/config/core/v3/protocol.proto#config-core-v3-http1protocoloptions
defaultHostForHttp10 stringDefaultHostForHttp10 specifies a default host for HTTP/1.0 requests. This is highly suggested if acceptHttp10 is true and a no-op if acceptHttp10 is false.
See here for more information: https://www.envoyproxy.io/docs/envoy/latest/api-v3/config/core/v3/protocol.proto#config-core-v3-http1protocoloptions
MinLength: 1
earlyRequestHeaderModifier HTTPHeaderFilterEarlyRequestHeaderModifier defines header modifications to be applied early in the request processing,
before route selection.
For example, if you use ExternalAuthz to add a header, you may want to remove it here, to make
sure it did not come from the client.

HashPolicy

Appears in:

FieldDescriptionDefaultValidation
header HeaderHeader specifies a header’s value as a component of the hash key.
cookie CookieCookie specifies a given cookie as a component of the hash key.
sourceIP SourceIPSourceIP specifies whether to use the request’s source IP address as a component of the hash key.
terminal booleanTerminal, if set, and a hash key is available after evaluating this policy, will cause Envoy to skip the subsequent policies and
use the key as it is.
This is useful for defining “fallback” policies and limiting the time Envoy spends generating hash keys.

Appears in:

FieldDescriptionDefaultValidation
name stringName is the name of the header to use as a component of the hash key.MinLength: 1

HeaderFilter

Underlying type: struct

HeaderFilter filters requests based on headers. Based on: https://www.envoyproxy.io/docs/envoy/v1.33.0/api-v3/config/accesslog/v3/accesslog.proto#config-accesslog-v3-headerfilter

Appears in:

HeaderName

Underlying type: string

Appears in:

HeaderSource

Underlying type: struct

HeaderSource configures how to retrieve a JWT from a header

Appears in:

HeaderTransformation

Appears in:

FieldDescriptionDefaultValidation
name HeaderNameName is the name of the header to interact with.
value InjaTemplateValue is the Inja template to apply to generate the output value for the header.

HeaderValue

Underlying type: struct

Header name/value pair. Ref: https://www.envoyproxy.io/docs/envoy/latest/api-v3/config/core/v3/base.proto#envoy-v3-api-msg-config-core-v3-headervalue

Appears in:

HealthCheck

Appears in:

FieldDescriptionDefaultValidation
timeout DurationTimeout is time to wait for a health check response. If the timeout is reached the
health check attempt will be considered a failure.
interval DurationInterval is the time between health checks.
unhealthyThreshold integerUnhealthyThreshold is the number of consecutive failed health checks that will be considered
unhealthy.
Note that for HTTP health checks, if a host responds with a code not in ExpectedStatuses or RetriableStatuses,
this threshold is ignored and the host is considered immediately unhealthy.
Minimum: 0
healthyThreshold integerHealthyThreshold is the number of healthy health checks required before a host is marked
healthy. Note that during startup, only a single successful health check is
required to mark a host healthy.
Minimum: 0
http HealthCheckHttpHttp contains the options to configure the HTTP health check.
grpc HealthCheckGrpcGrpc contains the options to configure the gRPC health check.

HealthCheckGrpc

Appears in:

FieldDescriptionDefaultValidation
serviceName stringServiceName is the optional name of the service to check.
authority stringAuthority is the authority header used to make the gRPC health check request.
If unset, the name of the cluster this health check is associated
with will be used.

HealthCheckHttp

Appears in:

FieldDescriptionDefaultValidation
host stringHost is the value of the host header in the HTTP health check request. If
unset, the name of the cluster this health check is associated
with will be used.
path stringPath is the HTTP path requested.
method stringMethod is the HTTP method to use.
If unset, GET is used.
Enum: [GET HEAD POST PUT DELETE OPTIONS TRACE PATCH]

Host

Host defines a static backend host.

Appears in:

FieldDescriptionDefaultValidation
host stringHost is the host name to use for the backend.MinLength: 1
port integerPort is the port to use for the backend.

Http1ProtocolOptions

See Envoy documentation for more details.

Appears in:

FieldDescriptionDefaultValidation
enableTrailers booleanEnables trailers for HTTP/1. By default the HTTP/1 codec drops proxied trailers.
Note: Trailers must also be enabled at the gateway level in order for this option to take effect
preserveHttp1HeaderCase booleanPreserveHttp1HeaderCase determines whether to preserve the case of HTTP1 response headers.
See here for more information: https://www.envoyproxy.io/docs/envoy/latest/configuration/http/http_conn_man/header_casing
overrideStreamErrorOnInvalidHttpMessage booleanAllows invalid HTTP messaging. When this option is false, then Envoy will terminate
HTTP/1.1 connections upon receiving an invalid HTTP message. However,
when this option is true, then Envoy will leave the HTTP/1.1 connection
open where possible.

Http2ProtocolOptions

Appears in:

FieldDescriptionDefaultValidation
initialStreamWindowSize QuantityInitialStreamWindowSize is the initial window size for the stream.
Valid values range from 65535 (2^16 - 1, HTTP/2 default) to 2147483647 (2^31 - 1, HTTP/2 maximum).
Defaults to 268435456 (256 * 1024 * 1024).
Values can be specified with units like “64Ki”.
initialConnectionWindowSize QuantityInitialConnectionWindowSize is similar to InitialStreamWindowSize, but for the connection level.
Same range and default value as InitialStreamWindowSize.
Values can be specified with units like “64Ki”.
maxConcurrentStreams integerThe maximum number of concurrent streams that the connection can have.Minimum: 0
overrideStreamErrorOnInvalidHttpMessage booleanAllows invalid HTTP messaging and headers. When disabled (default), then
the whole HTTP/2 connection is terminated upon receiving invalid HEADERS frame.
When enabled, only the offending stream is terminated.

Image

A container image. See https://kubernetes.io/docs/concepts/containers/images/ for details.

Appears in:

FieldDescriptionDefaultValidation
registry stringThe image registry.
repository stringThe image repository (name).
tag stringThe image tag.
digest stringThe hash digest of the image, e.g. sha256:12345...
pullPolicy PullPolicyThe image pull policy for the container. See
https://kubernetes.io/docs/concepts/containers/images/#image-pull-policy
for details.

InjaTemplate

Underlying type: string

Appears in:

IstioContainer

IstioContainer configures the container running the istio-proxy.

Appears in:

FieldDescriptionDefaultValidation
image ImageThe container image. See
https://kubernetes.io/docs/concepts/containers/images/
for details.
securityContext SecurityContextThe security context for this container. See
https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.26/#securitycontext-v1-core
for details.
resources ResourceRequirementsThe compute resources required by this container. See
https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
for details.
logLevel stringLog level for istio-proxy. Options include “info”, “debug”, “warning”, and “error”.
Default level is info Default is “warning”.
istioDiscoveryAddress stringThe address of the istio discovery service. Defaults to “istiod.istio-system.svc:15012”.
istioMetaMeshId stringThe mesh id of the istio mesh. Defaults to “cluster.local”.
istioMetaClusterId stringThe cluster id of the istio cluster. Defaults to “Kubernetes”.

IstioIntegration

IstioIntegration configures the Istio integration settings used by kgateway’s data plane

Appears in:

FieldDescriptionDefaultValidation
istioProxyContainer IstioContainerConfiguration for the container running istio-proxy.
Note that if Istio integration is not enabled, the istio container will not be injected
into the gateway proxy deployment.
customSidecars Container arraydo not use slice of pointers: https://github.com/kubernetes/code-generator/issues/166
Override the default Istio sidecar in gateway-proxy with a custom container.

JWKS

JWKS (JSON Web Key Set) configures the source for the JWKS Exactly one of LocalJWKS or RemoteJWKS must be specified.

Appears in:

FieldDescriptionDefaultValidation
local LocalJWKSLocalJWKS configures getting the public keys to validate the JWT from a Kubernetes configmap,
or inline (raw string) JWKS.
remote RemoteJWKSRemoteJWKS configures getting the public keys to validate the JWT from a remote JWKS server.

JWT

Appears in:

FieldDescriptionDefaultValidation
validationMode ValidationModeValidationMode configures how JWT validation behaves.
If unset or empty, Strict mode is used (JWT is required).
If set to AllowMissing, unauthenticated requests without a JWT are allowed through.
If using this mode, make sure to consider the security implications and
consider using an RBAC policy to enforce authorization.
Enum: [Strict AllowMissing]
providers NamedJWTProvider arrayProviders configures named JWT providers.
If multiple providers are specified for a given JWT policy,
the providers will be OR-ed together and will allow validation to any of the providers.
MaxItems: 32

JWTAuthentication

JWTAuthentication defines the providers used to configure JWT authentication

Appears in:

FieldDescriptionDefaultValidation
extensionRef NamespacedObjectReferenceExtensionRef references a GatewayExtension that provides the jwt providers
disable PolicyDisableDisable all JWT filters.
Can be used to disable JWT policies applied at a higher level in the config hierarchy.

JWTClaimToHeader

JWTClaimToHeader allows copying verified claims to headers sent upstream

Appears in:

FieldDescriptionDefaultValidation
name stringName is the JWT claim name, for example, “sub”.MaxLength: 2048
MinLength: 1
header stringHeader is the header the claim will be copied to, for example, “x-sub”.MaxLength: 2048
MinLength: 1

JWTProvider

JWTProvider configures the JWT Provider If multiple providers are specified for a given JWT policy, the providers will be OR-ed together and will allow validation to any of the providers.

Appears in:

FieldDescriptionDefaultValidation
issuer stringIssuer of the JWT. the ‘iss’ claim of the JWT must match this.MaxLength: 2048
audiences string arrayAudiences is the list of audiences to be used for the JWT provider.
If specified an incoming JWT must have an ‘aud’ claim, and it must be in this list.
If not specified, the audiences will not be checked in the token.
MaxItems: 32
MinItems: 1
tokenSource JWTTokenSourceTokenSource configures where to find the JWT of the current provider.
claimsToHeaders JWTClaimToHeader arrayClaimsToHeaders is the list of claims to headers to be used for the JWT provider.
Optionally set the claims from the JWT payload that you want to extract and add as headers
to the request before the request is forwarded to the upstream destination.
Note: if ClaimsToHeaders is set, the Envoy route cache will be cleared.
This allows the JWT filter to correctly affect routing decisions.
MaxItems: 32
MinItems: 1
jwks JWKSJWKS is the source for the JSON Web Keys to be used to validate the JWT.
forwardToken booleanForwardToken configures if the JWT token is forwarded to the upstream backend.
If true, the header containing the token will be forwarded upstream.
If false or not set, the header containing the token will be removed.

JWTTokenSource

JWTTokenSource configures the source for the JWTToken Exactly one of HeaderSource or QueryParameter must be specified.

Appears in:

FieldDescriptionDefaultValidation
header HeaderSourceHeaderSource configures retrieving token from a header
queryParameter stringQueryParameter configures retrieving token from the query parameter

KubernetesProxyConfig

KubernetesProxyConfig configures the set of Kubernetes resources that will be provisioned for a given Gateway.

Appears in:

FieldDescriptionDefaultValidation
deployment ProxyDeploymentUse a Kubernetes deployment as the proxy workload type. Currently, this is the only
supported workload type.
envoyContainer EnvoyContainerConfiguration for the container running Envoy.
If the Gateway uses a GatewayClass with controllerName: kgateway.dev/agentgateway,
the EnvoyContainer values will be ignored.
sdsContainer SdsContainerConfiguration for the container running the Secret Discovery Service (SDS).
podTemplate PodConfiguration for the pods that will be created.
service ServiceConfiguration for the Kubernetes Service that exposes the proxy over
the network.
serviceAccount ServiceAccountConfiguration for the Kubernetes ServiceAccount used by the proxy pods.
istio IstioIntegrationConfiguration for the Istio integration.
stats StatsConfigConfiguration for the stats server.
agentgateway AgentgatewayConfigure the agentgateway integration. If agentgateway is disabled, the
EnvoyContainer values will be used by default to configure the data
plane proxy.
omitDefaultSecurityContext booleanOmitDefaultSecurityContext is used to control whether or not
securityContext fields should be rendered for the various generated
Deployments/Containers that are dynamically provisioned by the deployer.

When set to true, no securityContexts will be provided and will left
to the user/platform to be provided.

This should be enabled on platforms such as Red Hat OpenShift where the
securityContext will be dynamically added to enforce the appropriate
level of security.

ListenerConfig

Appears in:

FieldDescriptionDefaultValidation
proxyProtocol ProxyProtocolConfigProxyProtocol configures the PROXY protocol listener filter.
When set, Envoy will expect connections to include the PROXY protocol header.
This is commonly used when kgateway is behind a load balancer that preserves client IP information.
See here for more information: https://www.envoyproxy.io/docs/envoy/latest/api-v3/extensions/filters/listener/proxy_protocol/v3/proxy_protocol.proto
perConnectionBufferLimitBytes integerPerConnectionBufferLimitBytes sets the per-connection buffer limit for all listeners on the gateway.
This controls the maximum size of read and write buffers for new connections.
When using Envoy as an edge proxy, configuring the listener buffer limit is important to guard against
potential attacks or misconfigured downstreams that could hog the proxy’s resources.
If unspecified, an implementation-defined default is applied (1MiB).
See here for more information: https://www.envoyproxy.io/docs/envoy/latest/api-v3/config/listener/v3/listener.proto#envoy-v3-api-field-config-listener-v3-listener-per-connection-buffer-limit-bytes
Minimum: 0
httpSettings HTTPSettingsHTTPListenerPolicy is intended to be used for configuring the Envoy HttpConnectionManager and any other config or policy
that should map 1-to-1 with a given HTTP listener, such as the Envoy health check HTTP filter.

ListenerPolicy

ListenerPolicy is used for configuring Envoy listener-level settings that apply to all protocol types (HTTP, HTTPS, TCP, TLS). These policies can only target Gateway objects.

FieldDescriptionDefaultValidation
apiVersion stringgateway.kgateway.dev/v1alpha1
kind stringListenerPolicy
kind stringKind is a string value representing the REST resource this object represents.
Servers may infer this from the endpoint the client submits requests to.
Cannot be updated.
In CamelCase.
More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
apiVersion stringAPIVersion defines the versioned schema of this representation of an object.
Servers should convert recognized schemas to the latest internal value, and
may reject unrecognized values.
More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
metadata ObjectMetaRefer to Kubernetes API documentation for fields of metadata.
spec ListenerPolicySpec
status PolicyStatus

ListenerPolicySpec

ListenerPolicySpec defines the desired state of a listener policy.

Appears in:

FieldDescriptionDefaultValidation
targetRefs LocalPolicyTargetReference arrayTargetRefs specifies the target resources by reference to attach the policy to.
Only supports Gateway resources
MaxItems: 16
MinItems: 1
targetSelectors LocalPolicyTargetSelector arrayTargetSelectors specifies the target selectors to select Gateway resources to attach the policy to.
default ListenerConfigDefault specifies default listener configuration for all Listeners, unless a per-port
configuration is defined.
perPort ListenerPortConfig arrayPer port configuration allows overriding the listener config per port. Once set, this
configuration completely replaces the default configuration for all listeners handling traffic
that match this port. Unspecified fields in per-port configuration will not inherit values from default.
MaxItems: 64

ListenerPortConfig

Appears in:

FieldDescriptionDefaultValidation
port integerThe Port indicates the Port Number to which the Listener configuration will be
applied. This configuration will be applied to all Listeners handling
traffic that match this port.
Maximum: 65535
Minimum: 1
listener ListenerConfigListener stores the configuration that will be applied to all Listeners handling
matching the given port.

LoadBalancer

Appears in:

FieldDescriptionDefaultValidation
healthyPanicThreshold integerHealthyPanicThreshold configures envoy’s panic threshold percentage between 0-100. Once the number of non-healthy hosts
reaches this percentage, envoy disregards health information.
See Envoy documentation.
Maximum: 100
Minimum: 0
updateMergeWindow DurationThis allows batch updates of endpoints health/weight/metadata that happen during a time window.
this help lower cpu usage when endpoint change rate is high. defaults to 1 second.
Set to 0 to disable and have changes applied immediately.
leastRequest LoadBalancerLeastRequestConfigLeastRequest configures the least request load balancer type.
roundRobin LoadBalancerRoundRobinConfigRoundRobin configures the round robin load balancer type.
ringHash LoadBalancerRingHashConfigRingHash configures the ring hash load balancer type.
maglev LoadBalancerMaglevConfigMaglev configures the maglev load balancer type.
random LoadBalancerRandomConfigRandom configures the random load balancer type.
localityType LocalityTypeLocalityType specifies the locality config type to use.
See https://www.envoyproxy.io/docs/envoy/latest/api-v3/extensions/load_balancing_policies/common/v3/common.proto#envoy-v3-api-msg-extensions-load-balancing-policies-common-v3-localitylbconfig
Enum: [WeightedLb]
closeConnectionsOnHostSetChange booleanIf set to true, the load balancer will drain connections when the host set changes.

Ring Hash or Maglev can be used to ensure that clients with the same key
are routed to the same upstream host.
Distruptions can cause new connections with the same key as existing connections
to be routed to different hosts.
Enabling this feature will cause the load balancer to drain existing connections
when the host set changes, ensuring that new connections with the same key are
consistently routed to the same host.
Connections are not immediately closed, but are allowed to drain
before being closed.

LoadBalancerLeastRequestConfig

LoadBalancerLeastRequestConfig configures the least request load balancer type.

Appears in:

FieldDescriptionDefaultValidation
choiceCount integerHow many choices to take into account.
Defaults to 2.
2
slowStart SlowStartSlowStart configures the slow start configuration for the load balancer.

LoadBalancerMaglevConfig

Appears in:

FieldDescriptionDefaultValidation
useHostnameForHashing booleanUseHostnameForHashing specifies whether to use the hostname instead of the resolved IP address for hashing.
Defaults to false.
hashPolicies HashPolicy arrayHashPolicies specifies the hash policies for hashing load balancers (RingHash, Maglev).MaxItems: 16
MinItems: 1

LoadBalancerRandomConfig

Appears in:

LoadBalancerRingHashConfig

LoadBalancerRingHashConfig configures the ring hash load balancer type.

Appears in:

FieldDescriptionDefaultValidation
minimumRingSize integerMinimumRingSize is the minimum size of the ring.Minimum: 0
maximumRingSize integerMaximumRingSize is the maximum size of the ring.Minimum: 0
useHostnameForHashing booleanUseHostnameForHashing specifies whether to use the hostname instead of the resolved IP address for hashing.
Defaults to false.
hashPolicies HashPolicy arrayHashPolicies specifies the hash policies for hashing load balancers (RingHash, Maglev).MaxItems: 16
MinItems: 1

LoadBalancerRoundRobinConfig

LoadBalancerRoundRobinConfig configures the round robin load balancer type.

Appears in:

FieldDescriptionDefaultValidation
slowStart SlowStartSlowStart configures the slow start configuration for the load balancer.

LocalJWKS

LocalJWKS configures getting the public keys to validate the JWT from a Kubernetes ConfigMap, or inline (raw string) JWKS.

Appears in:

FieldDescriptionDefaultValidation
inline stringInline is the JWKS as the raw, inline JWKS string
This can be an individual key, a key set or a pem block public key
MaxLength: 16384
MinLength: 1
configMapRef LocalObjectReferenceConfigMapRef configures storing the JWK in a Kubernetes ConfigMap in the same namespace as the GatewayExtension.
The ConfigMap must have a data key named ‘jwks’ that contains the JWKS.

LocalRateLimitPolicy

LocalRateLimitPolicy represents a policy for local rate limiting. It defines the configuration for rate limiting using a token bucket mechanism.

Appears in:

FieldDescriptionDefaultValidation
tokenBucket TokenBucketTokenBucket represents the configuration for a token bucket local rate-limiting mechanism.
It defines the parameters for controlling the rate at which requests are allowed.

LocalityType

Underlying type: string

Appears in:

FieldDescription
WeightedLbhttps://www.envoyproxy.io/docs/envoy/latest/intro/arch_overview/upstream/load_balancing/locality_weight#locality-weighted-load-balancing
Locality weighted load balancing enables weighting assignments across different zones and geographical locations by using explicit weights.
This field is required to enable locality weighted load balancing.

MetadataKey

MetadataKey provides a way to retrieve values from Metadata using a key and a path.

Appears in:

FieldDescriptionDefaultValidation
key stringThe key name of the Metadata from which to retrieve the Struct
path MetadataPathSegment arrayThe path used to retrieve a specific Value from the Struct. This can be either a prefix or a full path,
depending on the use case

MetadataKind

Underlying type: string

Describes different types of metadata sources. Ref: https://www.envoyproxy.io/docs/envoy/latest/api-v3/type/metadata/v3/metadata.proto#envoy-v3-api-msg-type-metadata-v3-metadatakind-request

Validation:

  • Enum: [Request Route Cluster Host]

Appears in:

FieldDescription
RequestRequest kind of metadata.
RouteRoute kind of metadata.
ClusterCluster kind of metadata.
HostHost kind of metadata.

MetadataNamespaces

MetadataNamespaces configures which metadata namespaces to use. See envoy docs for specifics.

Appears in:

FieldDescriptionDefaultValidation
typed string arrayMinItems: 1
untyped string arrayMinItems: 1

MetadataOptions

MetadataOptions allows configuring metadata namespaces to forward or receive from the external processing server.

Appears in:

FieldDescriptionDefaultValidation
forwarding MetadataNamespacesForwarding defines the typed or untyped dynamic metadata namespaces to forward to the external processing server.

NamedJWTProvider

NamedJWTProvider is a named JWT provider entry.

Appears in:

FieldDescriptionDefaultValidation
name stringName is the unique name of the JWT provider.MaxLength: 253
MinLength: 1
issuer stringIssuer of the JWT. the ‘iss’ claim of the JWT must match this.MaxLength: 2048
audiences string arrayAudiences is the list of audiences to be used for the JWT provider.
If specified an incoming JWT must have an ‘aud’ claim, and it must be in this list.
If not specified, the audiences will not be checked in the token.
MaxItems: 32
MinItems: 1
tokenSource JWTTokenSourceTokenSource configures where to find the JWT of the current provider.
claimsToHeaders JWTClaimToHeader arrayClaimsToHeaders is the list of claims to headers to be used for the JWT provider.
Optionally set the claims from the JWT payload that you want to extract and add as headers
to the request before the request is forwarded to the upstream destination.
Note: if ClaimsToHeaders is set, the Envoy route cache will be cleared.
This allows the JWT filter to correctly affect routing decisions.
MaxItems: 32
MinItems: 1
jwks JWKSJWKS is the source for the JSON Web Keys to be used to validate the JWT.
forwardToken booleanForwardToken configures if the JWT token is forwarded to the upstream backend.
If true, the header containing the token will be forwarded upstream.
If false or not set, the header containing the token will be removed.

Op

Underlying type: string

Op represents comparison operators.

Validation:

  • Enum: [EQ GE LE]

Appears in:

FieldDescription
EQ
GE
LE

OpenTelemetryAccessLogService

OpenTelemetryAccessLogService represents the OTel configuration for access logs. Ref: https://www.envoyproxy.io/docs/envoy/latest/api-v3/extensions/access_loggers/open_telemetry/v3/logs_service.proto

Appears in:

FieldDescriptionDefaultValidation
grpcService CommonAccessLogGrpcServiceSend access logs to gRPC service
body stringOpenTelemetry LogResource fields, following Envoy access logging formatting.
disableBuiltinLabels booleanIf specified, Envoy will not generate built-in resource labels like log_name, zone_name, cluster_name, node_name.

OpenTelemetryTracingConfig

OpenTelemetryTracingConfig represents the top-level Envoy’s OpenTelemetry tracer. See here for more information: https://www.envoyproxy.io/docs/envoy/latest/api-v3/config/trace/v3/opentelemetry.proto.html

Appears in:

FieldDescriptionDefaultValidation
grpcService CommonGrpcServiceSend traces to the gRPC service
serviceName stringThe name for the service. This will be populated in the ResourceSpan Resource attributes
Defaults to the envoy cluster name. Ie: <gateway-name>.<gateway-namespace>
resourceDetectors ResourceDetector arrayAn ordered list of resource detectors. Currently supported values are EnvironmentResourceDetectorMaxProperties: 1
MinProperties: 1
sampler SamplerSpecifies the sampler to be used by the OpenTelemetry tracer. This field can be left empty. In this case, the default Envoy sampling decision is used.
Currently supported values are AlwaysOn
MaxProperties: 1
MinProperties: 1

OutlierDetection

Appears in:

FieldDescriptionDefaultValidation
consecutive5xx integerThe number of consecutive server-side error responses (for HTTP traffic,
5xx responses; for TCP traffic, connection failures; etc.) before an
ejection occurs. Defaults to 5. If this is zero, consecutive 5xx passive
health checks will be disabled. In the future, other types of passive
health checking might be added, but none will be enabled by default.
5Minimum: 0
interval DurationThe time interval between ejection analysis sweeps. This can result in
both new ejections as well as hosts being returned to service. Defaults
to 10s.
10s
baseEjectionTime DurationThe base time that a host is ejected for. The real time is equal to the
base time multiplied by the number of times the host has been ejected.
Defaults to 30s.
30s
maxEjectionPercent integerThe maximum % of an upstream cluster that can be ejected due to outlier
detection. Defaults to 10%.
10Maximum: 100
Minimum: 0

PathRegexRewrite

PathRegexRewrite specifies how to rewrite the URL path.

Appears in:

FieldDescriptionDefaultValidation
pattern stringPattern is the regex pattern that matches the URL path.
The pattern must be a valid RE2 regular expression.
If the HTTPRoute uses a RegularExpression path match, this field can use capture groups
from that match.
MaxLength: 1024
MinLength: 1
substitution stringSubstitution is the replacement string for the matched pattern.
It can include backreferences to captured groups from the pattern (e.g., \1, \2)
or named groups (e.g., \g).
MaxLength: 1024
MinLength: 1

Pod

Configuration for a Kubernetes Pod template.

Appears in:

FieldDescriptionDefaultValidation
extraLabels object (keys:string, values:string)Additional labels to add to the Pod object metadata.
If the same label is present on Gateway.spec.infrastructure.labels, the Gateway takes precedence.
extraAnnotations object (keys:string, values:string)Additional annotations to add to the Pod object metadata.
If the same annotation is present on Gateway.spec.infrastructure.annotations, the Gateway takes precedence.
securityContext PodSecurityContextThe pod security context. See
https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.26/#podsecuritycontext-v1-core
for details.
imagePullSecrets LocalObjectReference arrayAn optional list of references to secrets in the same namespace to use for
pulling any of the images used by this Pod spec. See
https://kubernetes.io/docs/concepts/containers/images/#specifying-imagepullsecrets-on-a-pod
for details.
nodeSelector object (keys:string, values:string)A selector which must be true for the pod to fit on a node. See
https://kubernetes.io/docs/concepts/configuration/assign-pod-node/ for
details.
affinity AffinityIf specified, the pod’s scheduling constraints. See
https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.26/#affinity-v1-core
for details.
tolerations Toleration arraydo not use slice of pointers: https://github.com/kubernetes/code-generator/issues/166
If specified, the pod’s tolerations. See
https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.26/#toleration-v1-core
for details.
gracefulShutdown GracefulShutdownSpecIf specified, the pod’s graceful shutdown spec.
terminationGracePeriodSeconds integerIf specified, the pod’s termination grace period in seconds. See
https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.26/#pod-v1-core
for details
Maximum: 3.1536e+07
Minimum: 0
startupProbe ProbeIf specified, the pod’s startup probe. A probe of container startup readiness.
Container will be only be added to service endpoints if the probe succeeds. See
https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.26/#probe-v1-core
for details.
readinessProbe ProbeIf specified, the pod’s readiness probe. Periodic probe of container service readiness.
Container will be removed from service endpoints if the probe fails. See
https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.26/#probe-v1-core
for details.
livenessProbe ProbeIf specified, the pod’s liveness probe. Periodic probe of container service readiness.
Container will be restarted if the probe fails. See
https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.26/#probe-v1-core
for details.
topologySpreadConstraints TopologySpreadConstraint arrayIf specified, the pod’s topology spread constraints. See
https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.26/#topologyspreadconstraint-v1-core
for details.
extraVolumes Volume arrayAdditional volumes to add to the pod. See
https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.26/#volume-v1-core
for details.
priorityClassName stringIf specified, the pod’s PriorityClass. See
https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.26/#podspec-v1-core
for details

Port

Appears in:

FieldDescriptionDefaultValidation
port integerThe port number to match on the GatewayMaximum: 65535
Minimum: 1
nodePort integerThe NodePort to be used for the service. If not specified, a random port
will be assigned by the Kubernetes API server.
Maximum: 65535
Minimum: 1

ProcessingMode

ProcessingMode defines how the filter should interact with the request/response streams

Appears in:

FieldDescriptionDefaultValidation
requestHeaderMode stringRequestHeaderMode determines how to handle the request headersSENDEnum: [DEFAULT SEND SKIP]
responseHeaderMode stringResponseHeaderMode determines how to handle the response headersSENDEnum: [DEFAULT SEND SKIP]
requestBodyMode stringRequestBodyMode determines how to handle the request bodyNONEEnum: [NONE STREAMED BUFFERED BUFFERED_PARTIAL FULL_DUPLEX_STREAMED]
responseBodyMode stringResponseBodyMode determines how to handle the response bodyNONEEnum: [NONE STREAMED BUFFERED BUFFERED_PARTIAL FULL_DUPLEX_STREAMED]
requestTrailerMode stringRequestTrailerMode determines how to handle the request trailersSKIPEnum: [DEFAULT SEND SKIP]
responseTrailerMode stringResponseTrailerMode determines how to handle the response trailersSKIPEnum: [DEFAULT SEND SKIP]

ProxyDeployment

ProxyDeployment configures the Proxy deployment in Kubernetes.

Appears in:

FieldDescriptionDefaultValidation
replicas integerThe number of desired pods.
If omitted, behavior will be managed by the K8s control plane, and will default to 1.
If you are using an HPA, make sure to not explicitly define this.
K8s reference: https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#replicas
Minimum: 0
strategy DeploymentStrategyThe deployment strategy to use to replace existing pods with new
ones. The Kubernetes default is a RollingUpdate with 25% maxUnavailable,
25% maxSurge.

E.g., to recreate pods, minimizing resources for the rollout but causing downtime:
strategy:
type: Recreate
E.g., to roll out as a RollingUpdate but with non-default parameters:
strategy:
type: RollingUpdate
rollingUpdate:
maxSurge: 100%

ProxyProtocolConfig

ProxyProtocolConfig configures the PROXY protocol listener filter. The presence of this configuration enables PROXY protocol support.

Appears in:

RateLimit

RateLimit defines a rate limiting policy.

Appears in:

FieldDescriptionDefaultValidation
local LocalRateLimitPolicyLocal defines a local rate limiting policy.
global RateLimitPolicyGlobal defines a global rate limiting policy using an external service.

RateLimitDescriptor

RateLimitDescriptor defines a descriptor for rate limiting. A descriptor is a group of entries that form a single rate limit rule.

Appears in:

FieldDescriptionDefaultValidation
entries RateLimitDescriptorEntry arrayEntries are the individual components that make up this descriptor.
When translated to Envoy, these entries combine to form a single descriptor.
MinItems: 1

RateLimitDescriptorEntry

RateLimitDescriptorEntry defines a single entry in a rate limit descriptor. Only one entry type may be specified.

Appears in:

FieldDescriptionDefaultValidation
type RateLimitDescriptorEntryTypeType specifies what kind of rate limit descriptor entry this is.Enum: [Generic Header RemoteAddress Path]
generic RateLimitDescriptorEntryGenericGeneric contains the configuration for a generic key-value descriptor entry.
This field must be specified when Type is Generic.
header stringHeader specifies a request header to extract the descriptor value from.
This field must be specified when Type is Header.
MinLength: 1

RateLimitDescriptorEntryType

Underlying type: string

RateLimitDescriptorEntryType defines the type of a rate limit descriptor entry.

Validation:

  • Enum: [Generic Header RemoteAddress Path]

Appears in:

FieldDescription
GenericRateLimitDescriptorEntryTypeGeneric represents a generic key-value descriptor entry.
HeaderRateLimitDescriptorEntryTypeHeader represents a descriptor entry that extracts its value from a request header.
RemoteAddressRateLimitDescriptorEntryTypeRemoteAddress represents a descriptor entry that uses the client’s IP address as its value.
PathRateLimitDescriptorEntryTypePath represents a descriptor entry that uses the request path as its value.

RateLimitPolicy

RateLimitPolicy defines a global rate limiting policy using an external service.

Appears in:

FieldDescriptionDefaultValidation
descriptors RateLimitDescriptor arrayDescriptors define the dimensions for rate limiting.
These values are passed to the rate limit service which applies configured limits based on them.
Each descriptor represents a single rate limit rule with one or more entries.
MinItems: 1
extensionRef NamespacedObjectReferenceExtensionRef references a GatewayExtension that provides the global rate limit service.

RateLimitProvider

RateLimitProvider defines the configuration for a RateLimit service provider.

Appears in:

FieldDescriptionDefaultValidation
grpcService ExtGrpcServiceGrpcService is the GRPC service that will handle the rate limiting.
domain stringDomain identifies a rate limiting configuration for the rate limit service.
All rate limit requests must specify a domain, which enables the configuration
to be per application without fear of overlap (e.g., “api”, “web”, “admin”).
failOpen booleanFailOpen determines if requests are limited when the rate limit service is unavailable.
Defaults to true, meaning requests are allowed upstream and not limited if the rate limit service is unavailable.
true
timeout DurationTimeout provides an optional timeout value for requests to the rate limit service.
For rate limiting, prefer using this timeout rather than setting the generic timeout on the GrpcService.
See envoy issue for more info.
100ms
xRateLimitHeaders XRateLimitHeadersStandardXRateLimitHeaders configures the standard version to use for X-RateLimit headers emitted.
See envoy docs for more info.
Disabled by default.
OffEnum: [Off DraftVersion03]

RemoteJWKS

Appears in:

FieldDescriptionDefaultValidation
url stringURL is the URL of the remote JWKS server, it must be a full FQDN with protocol, host and path.
For example, https://example.com/keys
MaxLength: 2048
MinLength: 1
backendRef BackendObjectReferenceBackendRef is reference to the backend of the JWKS server.
cacheDuration DurationDuration after which the cached JWKS expires.
If unspecified, the default cache duration is 5 minutes.

RequestDecompression

RequestDecompression enables request gzip decompression.

Appears in:

FieldDescriptionDefaultValidation
disable PolicyDisableDisables decompression.

ResourceDetector

ResourceDetector defines the list of supported ResourceDetectors

Validation:

  • MaxProperties: 1
  • MinProperties: 1

Appears in:

FieldDescriptionDefaultValidation
environmentResourceDetector EnvironmentResourceDetectorConfig

ResponseCompression

ResponseCompression configures response compression.

Appears in:

FieldDescriptionDefaultValidation
disable PolicyDisableDisables compression.

ResponseFlagFilter

Underlying type: struct

ResponseFlagFilter filters based on response flags. Based on: https://www.envoyproxy.io/docs/envoy/v1.33.0/api-v3/config/accesslog/v3/accesslog.proto#config-accesslog-v3-responseflagfilter

Appears in:

Retry

Retry defines the retry policy

Appears in:

FieldDescriptionDefaultValidation
retryOn RetryOnCondition arrayRetryOn specifies the conditions under which a retry should be attempted.Enum: [5xx gateway-error reset reset-before-request connect-failure envoy-ratelimited retriable-4xx refused-stream retriable-status-codes http3-post-connect-failure cancelled deadline-exceeded internal resource-exhausted unavailable]
MinItems: 1
attempts integerAttempts specifies the number of retry attempts for a request.
Defaults to 1 attempt if not set.
A value of 0 effectively disables retries.
1Minimum: 0
perTryTimeout DurationPerTryTimeout specifies the timeout per retry attempt (incliding the initial attempt).
If a global timeout is configured on a route, this timeout must be less than the global
route timeout.
It is specified as a sequence of decimal numbers, each with optional fraction and a unit suffix, such as “1s” or “500ms”.
statusCodes HTTPRouteRetryStatusCode arrayStatusCodes specifies the HTTP status codes in the range 400-599 that should be retried in addition
to the conditions specified in RetryOn.
Maximum: 599
MinItems: 1
Minimum: 400
backoffBaseInterval DurationBackoffBaseInterval specifies the base interval used with a fully jittered exponential back-off between retries.
Defaults to 25ms if not set.
Given a backoff base interval B and retry number N, the back-off for the retry is in the range [0, (2^N-1)*B].
The backoff interval is capped at a max of 10 times the base interval.
E.g., given a value of 25ms, the first retry will be delayed randomly by 0-24ms, the 2nd by 0-74ms,
the 3rd by 0-174ms, and so on, and capped to a max of 10 times the base interval (250ms).
25ms

RetryBackoff

Appears in:

FieldDescriptionDefaultValidation
baseInterval DurationBaseInterval specifies the base interval used with a fully jittered exponential back-off between retries.
maxInterval DurationMaxInterval specifies the maximum interval between retry attempts.
Defaults to 10 times the BaseInterval if not set.

RetryOnCondition

Underlying type: string

RetryOnCondition specifies the condition under which retry takes place.

Validation:

  • Enum: [5xx gateway-error reset reset-before-request connect-failure envoy-ratelimited retriable-4xx refused-stream retriable-status-codes http3-post-connect-failure cancelled deadline-exceeded internal resource-exhausted unavailable]

Appears in:

RetryPolicy

Underlying type: struct

Specifies the retry policy of remote data source when fetching fails. Ref: https://www.envoyproxy.io/docs/envoy/latest/api-v3/config/core/v3/base.proto#envoy-v3-api-msg-config-core-v3-retrypolicy

Appears in:

Sampler

Sampler defines the list of supported Samplers

Validation:

  • MaxProperties: 1
  • MinProperties: 1

Appears in:

FieldDescriptionDefaultValidation
alwaysOnConfig AlwaysOnConfig

SdsBootstrap

SdsBootstrap configures the SDS instance that is provisioned from a Kubernetes Gateway.

Appears in:

FieldDescriptionDefaultValidation
logLevel stringLog level for SDS. Options include “info”, “debug”, “warn”, “error”, “panic” and “fatal”.
Default level is “info”.

SdsContainer

SdsContainer configures the container running SDS sidecar.

Appears in:

FieldDescriptionDefaultValidation
image ImageThe SDS container image. See
https://kubernetes.io/docs/concepts/containers/images/
for details.
securityContext SecurityContextThe security context for this container. See
https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.26/#securitycontext-v1-core
for details.
resources ResourceRequirementsThe compute resources required by this container. See
https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
for details.
bootstrap SdsBootstrapInitial SDS container configuration.

SecretReference

SecretReference identifies a Kubernetes secret containing authentication data.

Appears in:

FieldDescriptionDefaultValidation
name ObjectNameName of the secret containing htpasswd data.
namespace NamespaceNamespace of the secret. If not specified, defaults to the namespace of the TrafficPolicy.
Note that a secret in a different namespace requires a ReferenceGrant to be accessible.
MaxLength: 63
MinLength: 1
Pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
key stringKey in the secret that contains the htpasswd data.
Defaults to “.htpasswd” if not specified.
.htpasswdMinLength: 1

SelfManagedGateway

Appears in:

ServerHeaderTransformation

Underlying type: string

ServerHeaderTransformation determines how the server header is transformed.

Appears in:

FieldDescription
OverwriteOverwriteServerHeaderTransformation overwrites the server header.
AppendIfAbsentAppendIfAbsentServerHeaderTransformation appends to the server header if it’s not present.
PassThroughPassThroughServerHeaderTransformation passes through the server header unchanged.

Service

Configuration for a Kubernetes Service.

Appears in:

FieldDescriptionDefaultValidation
type ServiceTypeThe Kubernetes Service type.Enum: [ClusterIP NodePort LoadBalancer ExternalName]
clusterIP stringThe manually specified IP address of the service, if a randomly assigned
IP is not desired. See
https://kubernetes.io/docs/concepts/services-networking/service/#choosing-your-own-ip-address
and
https://kubernetes.io/docs/concepts/services-networking/service/#headless-services
on the implications of setting clusterIP.
extraLabels object (keys:string, values:string)Additional labels to add to the Service object metadata.
If the same label is present on Gateway.spec.infrastructure.labels, the Gateway takes precedence.
extraAnnotations object (keys:string, values:string)Additional annotations to add to the Service object metadata.
If the same annotation is present on Gateway.spec.infrastructure.annotations, the Gateway takes precedence.
ports Port arrayAdditional configuration for the service ports.
The actual port numbers are specified in the Gateway resource.
externalTrafficPolicy stringExternalTrafficPolicy defines the external traffic policy for the service.
Valid values are Cluster and Local. Default value is Cluster.

ServiceAccount

Appears in:

FieldDescriptionDefaultValidation
extraLabels object (keys:string, values:string)Additional labels to add to the ServiceAccount object metadata.
extraAnnotations object (keys:string, values:string)Additional annotations to add to the ServiceAccount object metadata.
If the same annotation is present on Gateway.spec.infrastructure.annotations, the Gateway takes precedence.

SlowStart

Appears in:

FieldDescriptionDefaultValidation
window DurationRepresents the size of slow start window.
If set, the newly created host remains in slow start mode starting from its creation time
for the duration of slow start window.
aggression stringThis parameter controls the speed of traffic increase over the slow start window. Defaults to 1.0,
so that endpoint would get linearly increasing amount of traffic.
When increasing the value for this parameter, the speed of traffic ramp-up increases non-linearly.
The value of aggression parameter should be greater than 0.0.
By tuning the parameter, is possible to achieve polynomial or exponential shape of ramp-up curve.

During slow start window, effective weight of an endpoint would be scaled with time factor and aggression:
new_weight = weight * max(min_weight_percent, time_factor ^ (1 / aggression)),
where time_factor=(time_since_start_seconds / slow_start_time_seconds).

As time progresses, more and more traffic would be sent to endpoint, which is in slow start window.
Once host exits slow start, time_factor and aggression no longer affect its weight.
minWeightPercent integerMinimum weight percentage of an endpoint during slow start.Maximum: 100
Minimum: 0

SourceIP

Appears in:

StaticBackend

StaticBackend references a static list of hosts.

Appears in:

FieldDescriptionDefaultValidation
hosts Host arrayHosts is a list of hosts to use for the backend.MinItems: 1
appProtocol AppProtocolAppProtocol is the application protocol to use when communicating with the backend.Enum: [http2 grpc grpc-web kubernetes.io/h2c kubernetes.io/ws]

StatsConfig

Configuration for the stats server.

Appears in:

FieldDescriptionDefaultValidation
enabled booleanWhether to expose metrics annotations and ports for scraping metrics.
routePrefixRewrite stringThe Envoy stats endpoint to which the metrics are written
enableStatsRoute booleanEnables an additional route to the stats cluster defaulting to /stats
statsRoutePrefixRewrite stringThe Envoy stats endpoint with general metrics for the additional stats route
matcher StatsMatcherMatcher configures inclusion or exclusion lists for Envoy stats.
Only one of inclusionList or exclusionList may be set.
If unset, Envoy’s default stats emission behavior applies.
MaxProperties: 1
MinProperties: 1

StatsMatcher

StatsMatcher specifies either an inclusion or exclusion list for Envoy stats. See Envoy’s envoy.config.metrics.v3.StatsMatcher for details.

Validation:

  • MaxProperties: 1
  • MinProperties: 1

Appears in:

FieldDescriptionDefaultValidation
inclusionList StringMatcher arrayinclusionList specifies which stats to include, using string matchers.MaxItems: 16
exclusionList StringMatcher arrayexclusionList specifies which stats to exclude, using string matchers.MaxItems: 16

StatusCodeFilter

Underlying type: ComparisonFilter

StatusCodeFilter filters based on HTTP status code. Based on: https://www.envoyproxy.io/docs/envoy/v1.33.0/api-v3/config/accesslog/v3/accesslog.proto#envoy-v3-api-msg-config-accesslog-v3-statuscodefilter

Appears in:

TCPKeepalive

See Envoy documentation for more details.

Appears in:

FieldDescriptionDefaultValidation
keepAliveProbes integerMaximum number of keep-alive probes to send before dropping the connection.Minimum: 0
keepAliveTime DurationThe number of seconds a connection needs to be idle before keep-alive probes start being sent.
keepAliveInterval DurationThe number of seconds between keep-alive probes.

TLS

Appears in:

FieldDescriptionDefaultValidation
secretRef LocalObjectReferenceReference to the TLS secret containing the certificate, key, and optionally the root CA.
files TLSFilesFile paths to certificates local to the proxy.
wellKnownCACertificates WellKnownCACertificatesTypeWellKnownCACertificates specifies whether to use a well-known set of CA
certificates for validating the backend’s certificate chain. Currently,
only the system certificate pool is supported via SDS.
insecureSkipVerify booleanInsecureSkipVerify originates TLS but skips verification of the backend’s certificate.
WARNING: This is an insecure option that should only be used if the risks are understood.
sni stringThe SNI domains that should be considered for TLS connectionMinLength: 1
verifySubjectAltNames string arrayVerify that the Subject Alternative Name in the peer certificate is one of the specified values.
note that a root_ca must be provided if this option is used.
parameters TLSParametersGeneral TLS parameters. See the envoy docs
for more information on the meaning of these values.
alpnProtocols string arraySet Application Level Protocol Negotiation
If empty, defaults to [“h2”, “http/1.1”].
allowRenegotiation booleanAllow Tls renegotiation, the default value is false.
TLS renegotiation is considered insecure and shouldn’t be used unless absolutely necessary.
simpleTLS booleanIf the TLS config has the tls cert and key provided, kgateway uses it to perform mTLS by default.
Set simpleTLS to true to disable mTLS in favor of server-only TLS (one-way TLS), even if kgateway has the client cert.
If unset, defaults to false.

TLSFiles

Appears in:

FieldDescriptionDefaultValidation
tlsCertificate stringMinLength: 1
tlsKey stringMinLength: 1
rootCA stringMinLength: 1

TLSParameters

Appears in:

FieldDescriptionDefaultValidation
minVersion TLSVersionMinimum TLS version.Enum: [AUTO 1.0 1.1 1.2 1.3]
maxVersion TLSVersionMaximum TLS version.Enum: [AUTO 1.0 1.1 1.2 1.3]
cipherSuites string array
ecdhCurves string array

TLSVersion

Underlying type: string

TLSVersion defines the TLS version.

Validation:

  • Enum: [AUTO 1.0 1.1 1.2 1.3]

Appears in:

FieldDescription
AUTO
1.0
1.1
1.2
1.3

TokenBucket

TokenBucket defines the configuration for a token bucket rate-limiting mechanism. It controls the rate at which tokens are generated and consumed for a specific operation.

Appears in:

FieldDescriptionDefaultValidation
maxTokens integerMaxTokens specifies the maximum number of tokens that the bucket can hold.
This value must be greater than or equal to 1.
It determines the burst capacity of the rate limiter.
Minimum: 1
tokensPerFill integerTokensPerFill specifies the number of tokens added to the bucket during each fill interval.
If not specified, it defaults to 1.
This controls the steady-state rate of token generation.
1Minimum: 1
fillInterval DurationFillInterval defines the time duration between consecutive token fills.
This value must be a valid duration string (e.g., “1s”, “500ms”).
It determines the frequency of token replenishment.

Tracing

Tracing represents the top-level Envoy’s tracer. Ref: https://www.envoyproxy.io/docs/envoy/latest/api-v3/extensions/filters/network/http_connection_manager/v3/http_connection_manager.proto#extensions-filters-network-http-connection-manager-v3-httpconnectionmanager-tracing

Appears in:

FieldDescriptionDefaultValidation
provider TracingProviderProvider defines the upstream to which envoy sends tracesMaxProperties: 1
MinProperties: 1
clientSampling integerTarget percentage of requests managed by this HTTP connection manager that will be force traced if the x-client-trace-id header is set. Defaults to 100%Maximum: 100
Minimum: 0
randomSampling integerTarget percentage of requests managed by this HTTP connection manager that will be randomly selected for trace generation, if not requested by the client or not forced. Defaults to 100%Maximum: 100
Minimum: 0
overallSampling integerTarget percentage of requests managed by this HTTP connection manager that will be traced after all other sampling checks have been applied (client-directed, force tracing, random sampling). Defaults to 100%Maximum: 100
Minimum: 0
verbose booleanWhether to annotate spans with additional data. If true, spans will include logs for stream events. Defaults to false
maxPathTagLength integerMaximum length of the request path to extract and include in the HttpUrl tag. Used to truncate lengthy request paths to meet the needs of a tracing backend. Default: 256Minimum: 1
attributes CustomAttribute arrayA list of attributes with a unique name to create attributes for the active span.MaxProperties: 2
MinProperties: 1
spawnUpstreamSpan booleanCreate separate tracing span for each upstream request if true. Defaults to false
Link to envoy docs for more info

TracingProvider

TracingProvider defines the list of providers for tracing

Validation:

  • MaxProperties: 1
  • MinProperties: 1

Appears in:

FieldDescriptionDefaultValidation
openTelemetry OpenTelemetryTracingConfigTracing contains various settings for Envoy’s OTel tracer.

TrafficPolicy

FieldDescriptionDefaultValidation
apiVersion stringgateway.kgateway.dev/v1alpha1
kind stringTrafficPolicy
kind stringKind is a string value representing the REST resource this object represents.
Servers may infer this from the endpoint the client submits requests to.
Cannot be updated.
In CamelCase.
More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
apiVersion stringAPIVersion defines the versioned schema of this representation of an object.
Servers should convert recognized schemas to the latest internal value, and
may reject unrecognized values.
More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
metadata ObjectMetaRefer to Kubernetes API documentation for fields of metadata.
spec TrafficPolicySpec
status PolicyStatus

TrafficPolicySpec

TrafficPolicySpec defines the desired state of a traffic policy.

Appears in:

FieldDescriptionDefaultValidation
targetRefs LocalPolicyTargetReferenceWithSectionName arrayTargetRefs specifies the target resources by reference to attach the policy to.MaxItems: 16
MinItems: 1
targetSelectors LocalPolicyTargetSelectorWithSectionName arrayTargetSelectors specifies the target selectors to select resources to attach the policy to.
transformation TransformationPolicyTransformation is used to mutate and transform requests and responses
before forwarding them to the destination.
extProc ExtProcPolicyExtProc specifies the external processing configuration for the policy.
extAuth ExtAuthPolicyExtAuth specifies the external authentication configuration for the policy.
This controls what external server to send requests to for authentication.
rateLimit RateLimitRateLimit specifies the rate limiting configuration for the policy.
This controls the rate at which requests are allowed to be processed.
cors CorsPolicyCors specifies the CORS configuration for the policy.
csrf CSRFPolicyCsrf specifies the Cross-Site Request Forgery (CSRF) policy for this traffic policy.
headerModifiers HeaderModifiersHeaderModifiers defines the policy to modify request and response headers.
autoHostRewrite booleanAutoHostRewrite rewrites the Host header to the DNS name of the selected upstream.
NOTE: This field is only honored for HTTPRoute targets.
NOTE: If autoHostRewrite is set on a route that also has a URLRewrite filter
configured to override the hostname, the hostname value will be used and autoHostRewrite will be ignored.
buffer BufferBuffer can be used to set the maximum request size that will be buffered.
Requests exceeding this size will return a 413 response.
timeouts TimeoutsTimeouts defines the timeouts for requests
It is applicable to HTTPRoutes and ignored for other targeted kinds.
retry RetryRetry defines the policy for retrying requests.
It is applicable to HTTPRoutes, Gateway listeners and XListenerSets, and ignored for other targeted kinds.
rbac AuthorizationRBAC specifies the role-based access control configuration for the policy.
This defines the rules for authorization based on roles and permissions.
RBAC policies applied at different attachment points in the configuration
hierarchy are not cumulative, and only the most specific policy is enforced. This means an RBAC policy
attached to a route will override any RBAC policies applied to the gateway or listener.
jwt JWTAuthenticationJWT specifies the JWT authentication configuration for the policy.
This defines the JWT providers and their configurations.
urlRewrite URLRewriteUrlRewrite specifies URL rewrite rules for matching requests.
NOTE: This field is only honored for HTTPRoute targets.
compression CompressionCompression configures response compression (per-route) and request/response
decompression (listener-level insertion triggered by route enable).
The response compression configuration is only honored for HTTPRoute targets.
basicAuth BasicAuthPolicyBasicAuth specifies the HTTP basic authentication configuration for the policy.
This controls authentication using username/password credentials in the Authorization header.

Transform

Transform defines the operations to be performed by the transformation. These operations may include changing the actual request/response but may also cause side effects. Side effects may include setting info that can be used in future steps (e.g. dynamic metadata) and can cause envoy to buffer.

Appears in:

FieldDescriptionDefaultValidation
set HeaderTransformation arraySet is a list of headers and the value they should be set to.MaxItems: 16
add HeaderTransformation arrayAdd is a list of headers to add to the request and what that value should be set to.
If there is already a header with these values then append the value as an extra entry.
MaxItems: 16
remove string arrayRemove is a list of header names to remove from the request/response.MaxItems: 16
body BodyTransformationBody controls both how to parse the body and if needed how to set.
If empty, body will not be buffered.

TransformationPolicy

TransformationPolicy config is used to modify envoy behavior at a route level. These modifications can be performed on the request and response paths.

Appears in:

FieldDescriptionDefaultValidation
request TransformRequest is used to modify the request path.
response TransformResponse is used to modify the response path.

URLRewrite

URLRewrite specifies URL rewrite rules using regular expressions. This allows more flexible and advanced path rewriting based on regex patterns.

Appears in:

FieldDescriptionDefaultValidation
pathRegex PathRegexRewritePath specifies the path rewrite configuration.

UpgradeConfig

UpgradeConfig represents configuration for HTTP upgrades.

Appears in:

FieldDescriptionDefaultValidation
enabledUpgrades string arrayList of upgrade types to enable (e.g. “websocket”, “CONNECT”, etc.)MinItems: 1

ValidationMode

Underlying type: string

Appears in:

FieldDescription
StrictA valid token, issued by a configured issuer, must be present.
This is the default option.
AllowMissingIf a token exists, validate it.
Warning: this allows requests without a JWT token.

XRateLimitHeadersStandard

Underlying type: string

XRateLimitHeadersStandard controls how XRateLimit headers will emitted.

Appears in:

FieldDescription
OffXRateLimitHeaderOff disables emitting of XRateLimit headers.
DraftVersion03XRateLimitHeaderDraftV03 outputs headers as described in draft RFC version 03.