You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Please vote on this issue by adding a 馃憤 reaction to the original issue to help the community and maintainers prioritize this request. Searching for pre-existing feature requests helps us consolidate datapoints for identical requirements into a single place, thank you!
Please do not leave "+1" or other comments that do not add relevant new information or questions, they generate extra noise for issue followers and do not help prioritize the request.
If you are interested in working on this issue or have submitted a pull request, please leave a comment.
Is your feature request related to a problem? Please describe.
We have a multi-tenancy backend where identities and roles are embedded inside the request header. Default Envoy's HTTPConnectionManager header size is 60KB but we need a lot more than that. However, after tinkering with escape-hatch configurations with custom listeners and cluster, we couldn't figure out what was needed to make it work.
Feature Description
Allow configurable max_request_header_size(defined here) as part of the ServiceDefault or ProxyDefault manifest
Use Case(s)
Systems that use a lot of headers
Contributions
After tinkering with Consul for a bit, i found that command/connect/envoy/bootstrap_config.go contains the template for such listener. Happy to contribute if I can get a confirmation that that's where I should be editting though.
The text was updated successfully, but these errors were encountered:
Community Note
Is your feature request related to a problem? Please describe.
We have a multi-tenancy backend where identities and roles are embedded inside the request header. Default Envoy's HTTPConnectionManager header size is 60KB but we need a lot more than that. However, after tinkering with escape-hatch configurations with custom listeners and cluster, we couldn't figure out what was needed to make it work.
Feature Description
Allow configurable
max_request_header_size
(defined here) as part of the ServiceDefault or ProxyDefault manifestUse Case(s)
Systems that use a lot of headers
Contributions
After tinkering with Consul for a bit, i found that
command/connect/envoy/bootstrap_config.go
contains the template for such listener. Happy to contribute if I can get a confirmation that that's where I should be editting though.The text was updated successfully, but these errors were encountered: