Add headers to incoming requests before they are forwarded to an upstream service. If the request already has the header set, the value of the header in the RequestHeaderModifier filter is appended to the value of the header in the request.
Set up a header modifier that adds a my-header: hello request header. Choose between the HTTPRoute for a Gateway API-native way, or GlooTrafficPolicy for more flexible attachment options such as a gateway-level policy.
The name and namespace of the gateway that serves this HTTPRoute. In this example, you use the http Gateway that was created as part of the get started guide.
spec.rules.filters.type
The type of filter that you want to apply to incoming requests. In this example, the RequestHeaderModifier filter is used.
spec.rules.filters.requestHeaderModifier.add
The name and value of the request header that you want to add.
spec.rules.backendRefs
The backend destination you want to forward traffic to. In this example, all traffic is forwarded to the httpbin app that you set up as part of the get started guide.
Note:
The steps in this section use the Envoy-based kgateway proxy. The steps do not work with the agentgateway proxy.
Create an HTTPRoute resource for the route that you want to modify. Note that the example selects the http Gateway that you created before you began.
Send a request to the httpbin app on the headers.example domain and verify that you get back a 200 HTTP response code and that you see the my-header request header.
* Mark bundle as not supporting multiuse
< HTTP/1.1 200 OK
HTTP/1.1 200 OK
...
{
"headers": {
"Accept": [
"*/*"
],
"Host": [
"headers.example:8080"
],
"My-Header": [
"hello"
],
"User-Agent": [
"curl/7.77.0"
],
...
Send another request to the httpbin app. This time, you already include the my-header header in your request. Verify that you get back a 200 HTTP response code and that your my-header header value is appended with the value from the RequestHeaderModifier filter.
Setting headers is similar to adding headers. If the request does not include the header, it is added by the RequestHeaderModifier filter. However, if the request already contains the header, its value is overwritten with the value from the RequestHeaderModifier filter.
Set up a header modifier that sets a my-header: hello request header. Choose between the HTTPRoute for a Gateway API-native way, or GlooTrafficPolicy for more flexible attachment options such as a gateway-level policy.
The name and namespace of the gateway that serves this HTTPRoute. In this example, you use the http Gateway that was created as part of the get started guide.
spec.rules.filters.type
The type of filter that you want to apply to incoming requests. In this example, the RequestHeaderModifier filter is used.
spec.rules.filters.requestHeaderModifier.set
The name and value of the request header that you want to set.
spec.rules.backendRefs
The Kubernetes service you want to forward traffic to. In this example, all traffic is forwarded to the httpbin app that you set up as part of the get started guide.
Note:
The steps in this section use the Envoy-based kgateway proxy. The steps do not work with the agentgateway proxy.
Create an HTTPRoute resource for the route that you want to modify. Note that the example selects the http Gateway that you created before you began.
Create a GlooTrafficPolicy that sets the my-header header value to hello on a request. The following example attaches the GlooTrafficPolicy to the http Gateway.
Send a request to the httpbin app on the headers.example domain. Verify that you get back a 200 HTTP response code and that the my-header: hello header was added.
* Mark bundle as not supporting multiuse
< HTTP/1.1 200 OK
HTTP/1.1 200 OK
...
{
"headers": {
"Accept": [
"*/*"
],
"Host": [
"headers.example:8080"
],
"My-Header": [
"hello"
],
"User-Agent": [
"curl/7.77.0"
],
...
Send another request to the httpbin app. This time, you already include the my-header header in your request. Verify that you get back a 200 HTTP response code and that your my-header header value is overwritten with the value from the RequestHeaderModifier filter.
Set up a header modifier that removes the User-Agent header when requests are sent to the headers.example domain. Choose between the HTTPRoute for a Gateway API-native way, or GlooTrafficPolicy for more flexible attachment options such as a gateway-level policy.
The name and namespace of the gateway that serves this HTTPRoute. In this example, you use the http Gateway that was created as part of the get started guide.
spec.rules.filters.type
The type of filter that you want to apply to incoming requests. In this example, the RequestHeaderModifier filter is used.
spec.rules.filters.requestHeaderModifier.remove
The name of the request header that you want to remove.
spec.rules.backendRefs
The backend destination you want to forward traffic to. In this example, all traffic is forwarded to the httpbin app that you set up as part of the get started guide.
Note:
The steps in this section use the Envoy-based kgateway proxy. The steps do not work with the agentgateway proxy.
Create an HTTPRoute resource for the route that you want to modify. Note that the example selects the http Gateway that you created before you began.
Create a GlooTrafficPolicy that removes the User-Agent header from a request. The following example attaches the GlooTrafficPolicy to the http Gateway.
You can return dynamic information about the request in the request header. For more information, see the Envoy docs for Custom request/response headers.
Keep in mind that some variables are available only at certain times. For example, response codes (%RESPONSE_CODE%) are only available after the response has been sent to the client. If you set a response code in a request header, the value is empty.
You might use some of the following common values in your request or response headers.
Request and response information:
%REQ(:METHOD)% - HTTP method
%REQ(:PATH)% - Request path
%REQ(:AUTHORITY)% - Host header
%REQ(HEADER_NAME)% - Any request header
%RESP(HEADER_NAME)% - Any response header
%RESPONSE_CODE% - HTTP response code
%RESPONSE_FLAGS% - Response flags
Connection information:
%DOWNSTREAM_REMOTE_ADDRESS% - Client IP address with port
%DOWNSTREAM_REMOTE_ADDRESS_WITHOUT_PORT% - Client IP address without port
The steps in this section use the Envoy-based kgateway proxy. The steps do not work with the agentgateway proxy.
Set up a header modifier that sets the X-Client-Ip header with the value of the downstream remote address. Choose between the HTTPRoute for a Gateway API-native way, or GlooTrafficPolicy for more flexible attachment options such as a gateway-level policy.
The name and namespace of the gateway that serves this HTTPRoute. In this example, you use the http Gateway that was created as part of the get started guide.
spec.rules.filters.type
The type of filter that you want to apply to incoming requests. In this example, the RequestHeaderModifier filter is used.
spec.rules.filters.requestHeaderModifier.set
The request header that you want to set. In this example, the x-client-ip header is set to the downstream remote address without the port. For more potential values, see Command operators in the Envoy docs.
spec.rules.backendRefs
The backend destination you want to forward traffic to. In this example, all traffic is forwarded to the httpbin app that you set up as part of the get started guide.
Create an HTTPRoute resource for the route that you want to modify. Note that the example selects the http Gateway that you created before you began.
Create a GlooTrafficPolicy that sets the x-client-ip header to the downstream remote address without the port for a request. For more potential values, see Command operators in the Envoy docs. The following example attaches the GlooTrafficPolicy to the http Gateway.
Send a request to the httpbin app on the headers.example domain. Verify that the X-Client-Ip request header is set to the downstream remote address without the port.