Sandboxes
Contributing
If there are other sandboxes you would like to see demonstrated here please open a ticket on github.
The Envoy project welcomes contributions and would be happy to review a Pull Request with the necessary changes should you be able to create one.
See the sandbox developer documentation for more information about creating your own sandbox.
Compatibility
As the examples use the pre-built Envoy Docker images they should work on the following architectures:
x86_64
ARM 64
Some of the examples may use pre-built (x86) binaries and will therefore have more limited compatibility.
We have created a number of sandboxes using Docker Compose that set up environments to test out Envoy’s features and show sample configurations.
These can be used to learn Envoy and model your own configurations.
Before you begin you will need to install the sandbox environment.
The following sandboxes are available:
- Brotli
- Cache filter
- CORS filter
- CSRF filter
- Double proxy (with mTLS encryption)
- Dynamic configuration (filesystem)
- Dynamic configuration (control plane)
- External authorization (ext_authz) filter
- Fault injection filter
- Front proxy
- gRPC bridge
- Gzip
- Jaeger native tracing
- Jaeger tracing
- Load reporting service (LRS)
- Locality Weighted Load Balancing
- Local Ratelimit
- Lua filter
- MySQL filter
- PostgreSQL filter
- Redis filter
- SkyWalking tracing
- TLS Inspector Listener Filter
- TLS Server name indication (SNI)
- Transport layer security (TLS)
- User Datagram Protocol (UDP)
- Wasm C++ filter
- WebSockets
- Windows based Front proxy
- Zipkin tracing
- Zstd