Sandboxes
We have created a number of sandboxes using Docker Compose that set up environments to test out Envoy’s features and show sample configurations.
These can be used to learn Envoy and model your own configurations.
Before you begin you will need to install the sandbox environment.
The following sandboxes are available:
- Brotli
- Cache filter
- CORS filter
- CSRF filter
- Double proxy (with
mTLS
encryption) - Dynamic configuration (control plane)
- Dynamic configuration (filesystem)
- External authorization (
ext_authz
) filter - Fault injection filter
- Front proxy
- Golang HTTP filter
- Golang network filter
- gRPC bridge
- Gzip
- Jaeger tracing
- Kafka broker
- Load reporting service (
LRS
) - Locality Weighted Load Balancing
- Local Ratelimit
- Lua filter
- Lua cluster specifier
- MySQL filter
- OpenTelemetry tracing
- PostgreSQL filter
- Role Based Access Control (RBAC) - HTTP
- Redis filter
- Route mirroring policies
- Single page React app (with OAuth)
- Skywalking tracing
- Transport layer security (
TLS
) - TLS Inspector Listener Filter
- TLS Server name indication (
SNI
) - User Datagram Protocol (
UDP
) - Wasm C++ filter
- WebSockets
- Zipkin tracing
- Zstd