Skip to content

Conversation

@Inode1
Copy link
Contributor

@Inode1 Inode1 commented Nov 3, 2025

What type of PR is this?

What this PR does / why we need it:

Currently, Envoy Gateway configures the HTTP listener with UuidRequestIdConfig and pack_trace_reason set to true by default. This changes the generated x-request-id format from UUID v8 to UUID v4.

Add options to settings requestidextension in CTP

Which issue(s) this PR fixes:

Fixes #6750

Release Notes: Yes/No

@Inode1 Inode1 requested a review from a team as a code owner November 3, 2025 15:25
@codecov
Copy link

codecov bot commented Nov 3, 2025

Codecov Report

✅ All modified and coverable lines are covered by tests.
✅ Project coverage is 72.33%. Comparing base (f65d853) to head (fef8a88).

Additional details and impacted files
@@            Coverage Diff             @@
##             main    #7421      +/-   ##
==========================================
- Coverage   72.33%   72.33%   -0.01%     
==========================================
  Files         232      232              
  Lines       34114    34128      +14     
==========================================
+ Hits        24678    24686       +8     
- Misses       7666     7671       +5     
- Partials     1770     1771       +1     

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.
  • 📦 JS Bundle Analysis: Save yourself from yourself by tracking and limiting bundle sizes in JS merges.

@Inode1
Copy link
Contributor Author

Inode1 commented Nov 3, 2025

/retest

1 similar comment
@Inode1
Copy link
Contributor Author

Inode1 commented Nov 4, 2025

/retest

@Inode1 Inode1 force-pushed the feat-request-id-extension branch from c163766 to c5b435d Compare November 4, 2025 15:27
@Inode1
Copy link
Contributor Author

Inode1 commented Nov 4, 2025

/retest

Copy link
Member

@sudiptob2 sudiptob2 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hey Thanks!
In the issue you discussed about adding this under EnvoyProxy.spec.telemetry. But this implementation adds it under ClientTrafficPolicy. Is this expected?

Add opt-out field in EnvoyProxy.spec.telemetry.tracing:

Signed-off-by: i.makarychev <[email protected]>
Signed-off-by: i.makarychev <[email protected]>
@zirain zirain force-pushed the feat-request-id-extension branch from c5b435d to fef8a88 Compare November 20, 2025 23:33
// RequestIDExtension defines configuration for Envoy's request ID extension.
//
// +optional
RequestIDExtension *RequestIDExtensionSettings `json:"requestIdExtension,omitempty"`
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

imo this should live in EnvoyProxy.Spec.Telemetry.Tracing

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

is this tracing specific? if not perfer to .spec.telemetry.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If we put this field under EnvoyProxy.Spec.Telemetry.Tracing, we must also set a provider,
otherwise it will fail here. That’s why I initially handled it in CTP (to set it per listener), but if that’s not ideal, I agree with @zirain that placing this field under EnvoyProxy.Spec.spec.telemetry is the better option.
WDYT?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'll bring this up in the community meeting tomorrow of whether to add this in CTP where we have

RequestID *RequestIDAction `json:"requestID,omitempty"`
or EP where telemetry exists

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@arkodg Hi, any updates?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

we're trying to build consensus on whether x-request-id setting should like here in CTP or should be under telemetry in EnvoyProxy, ptal @envoyproxy/gateway-maintainers

@Inode1
Copy link
Contributor Author

Inode1 commented Nov 30, 2025

/retest

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Add opt-out UuidRequestIdConfig in HCM to prevent x-request-id modifications

4 participants