RBAC
As of Envoy v1.18 the v2 API has been removed and is no longer supported.
If you are upgrading from v2 API config you may wish to view the v2 API documentation:
This extension may be referenced by the qualified name
Note
This extension is intended to be robust against untrusted downstream traffic. It assumes that the upstream is trusted.
Tip
This extension extends and can be used with the following extension category:
[extensions.filters.network.rbac.v3.RBAC proto]
RBAC network filter config.
Header should not be used in rules/shadow_rules in RBAC network filter as this information is only available in .
rules
(config.rbac.v3.RBAC) Specify the RBAC rules to be applied globally. If absent, no enforcing RBAC policy will be applied. If present and empty, DENY.
shadow_rules
() Shadow rules are not enforced by the filter but will emit stats and logs and can be used for rule testing. If absent, no shadow RBAC policy will be applied.
shadow_rules_stat_prefix
stat_prefix
(string, REQUIRED) The prefix to use when emitting statistics.
enforcement_type
() RBAC enforcement strategy. By default RBAC will be enforced only once when the first byte of data arrives from the downstream. When used in conjunction with filters that emit dynamic metadata after decoding every payload (e.g., Mongo, MySQL, Kafka) set the enforcement type to CONTINUOUS to enforce RBAC policies on every message boundary.
Enum extensions.filters.network.rbac.v3.RBAC.EnforcementType
ONE_TIME_ON_FIRST_BYTE
(DEFAULT) Apply RBAC policies when the first byte of data arrives on the connection.
CONTINUOUS