Sandboxes
We have created a number of sandboxes using Docker Compose that set up environments to test out Envoy’s features and show sample configurations.
These can be used to learn Envoy and model your own configurations.
Before you begin you will need to install the sandbox environment.
The following sandboxes are available:
- Brotli
- Cache filter
- CORS filter
- CSRF filter
- Double proxy (with
mTLS
encryption) - Dynamic configuration (filesystem)
- Dynamic configuration (control plane)
- External authorization (
ext_authz
) filter - Fault injection filter
- Front proxy
- Golang HTTP filter
- Golang network filter
- gRPC bridge
- Gzip
- Jaeger native tracing
- Jaeger tracing
- Kafka broker
- Load reporting service (
LRS
) - Locality Weighted Load Balancing
- Local Ratelimit
- Lua Cluster Specifier
- Lua filter
- MySQL filter
- OpenTelemetry tracing
- PostgreSQL filter
- Role Based Access Control (RBAC) - HTTP
- Redis filter
- Route mirroring policies
- Single page React app (with OAuth)
- Skywalking tracing
- TLS Inspector Listener Filter
- TLS Server name indication (
SNI
) - Transport layer security (
TLS
) - User Datagram Protocol (
UDP
) - Wasm C++ filter
- WebSockets
- Windows based Front proxy
- Zipkin tracing
- Zstd