Traffic processing

With Gloo Edge, you can configure the gateway listener along with custom Envoy filters to process the traffic that enters into and out of your environment. By mutating requests to and responses from your upstream services, you can decouple and scale your services more dynamically.

For an overview of gateway, virtual service, and upstream configurations, see Traffic management.


Types of request processing

Review the following types of request processing that you can do, and see the linked guides for more configuration details.

Transformations

Transformations can be applied to VirtualHosts, Routes, and WeightedDestinations parts of a Gloo Edge Virtual Service custom resource. Example transformations include the following.

For example steps, see the Transformation guides.

Direct response and redirects

Not all requests should be sent to an Upstream destination. Review the following situations in which you might use a direct response or redirect.

Faults

Faults are a way to test the resilience of your services by injecting faults (errors and delays) into a percentage of your requests. Gloo Edge can do this automatically by following this guide.

Timeouts and retries

Gloo Edge will attempt to send requests to the proper Upstream, but there may be times when that Upstream service is unable to handle additional requests. The timeout and retry portions of the options section for a route define how long to wait for a response from the Upstream service and what type of retry strategy should be used.

      options:
        timeout: '20s'
        retries:
          retryOn: 'connect-failure'
          numRetries: 3
          perTryTimeout: '5s'

More information about configuring the timeout and retry can be found in their respective guides.

Traffic shadowing

You can control the rollout of changes using canary releases or blue-green deployments with Upstream Groups. The downside to using either feature is that your are working with live traffic. Real clients are consuming the new version of your service, with potentially negative consequences. An alternative is to shadow the client traffic to your new release, while still processing the original request normally. Traffic shadowing makes a copy of an incoming request and sends it out-of-band to the new version of your service, without altering the original request.


Inheritance rules

In general, options that you set in a parent object are inherited by a child object. Then, the child has both its own options and those of its parent appended. If the option in the child and parent conflict, the child option takes precedence and overwrites the parent option. You can change this behavior by setting the inheritTransformation option to false in the children objects.

Examples of parent and child objects:

For examples of inherited options, see the following guides:


Filter flow

The order that Envoy applies filters to traffic impacts how you configure your Gloo Edge resources. Review the following video and diagrams to understand the filter flow in Gloo Edge.

For more information on configuring traffic filters, see the Transformation guides.

Video overview of the filter flow

Filter flow description

Review the following diagram of how Gloo Edge filters traffic, depending on what you configure. Notes on the filter policies that you can configure:

Figure: Filter flow.
  1. External auth: When you enable the external authorization and authentication service in Gloo Edge Enterprise, you can secure access to your apps with authentication tools like OIDC, API keys, OAuth2, or OPA. External auth is used to organize the flow in this diagram so that you can quickly see how traffic can be manipulated before or after requiring the client to log in. For more information, see Authentication and authorization.
  2. Before or after external auth: You can configure several traffic filters either before, after, or both before and after a client request is authorized.
    • JWT: You can verify a JSON web token (JWT) signature, check the claims, and add them to new headers. To set JWT before and/or after external auth, use the JwtStaged setting. For more information, see JWT and access control.
    • Transformation: Apply transformation templates to the header or body request. If the body is a JSON payload, you can also extract values from it. The clearRouteCache setting clears the route that was initially selected by the HTTP connection manager, with the final route selected when the request reaches the Router filter. To set transformations before and/or after external auth, use the stagedTransformation setting. For more information, see Transformations.
    • Rate limiting: Rate limiting can take place before or after external auth. You can use the SetStyle API to build complex rules for rate limiting. For more information, see Rate limiting.
  3. Filters only before external auth: Review the information about other filters that you can apply only before external auth.
  4. Filters only after external auth: Review the information about other filters that you can apply only after external auth.
  5. Router: With the router filter, you can configure many different settings before the request reaches your upstream service, such as the following. For more information, see the route proto reference.
    • Add or remove request headers
    • Add or remove response headers
    • Set upstream timeouts
    • Rewrite prefixes
    • Automatically rewrite hosts
    • Rewrite with regular expressions (regex)
    • Retry policies
    • Detect outliers
    • Shadow or mirror requests