You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
// well as accept traffic on all the ports associated with the
33
33
// workload. The `Sidecar` configuration provides a way to fine tune the set of
34
34
// ports, protocols that the proxy will accept when forwarding traffic to
35
-
// and from the workload. In addition, it is possible to restrict the set
36
-
// of services that the proxy can reach when forwarding outbound traffic
37
-
// from workload instances.
35
+
// and from the workload.
36
+
//
37
+
// One the common usages of `Sidecar` is to limit the set of configuration for outbound traffic.
38
+
// This configuration scoping, among [other options](/docs/ops/configuration/mesh/configuration-scoping/), is useful to prune
39
+
// out unneeded configuration, to improve scalability of the mesh.
40
+
// A common misunderstanding is that restricting the configuration amounts to *blocking* the traffic.
41
+
// If requests are sent to destinations not included in the scoping, the traffic will be treated as
42
+
// [unmatched traffic](docs/ops/configuration/traffic-management/traffic-routing/#unmatched-traffic), which is often still allowed.
43
+
// The sidecar is not able to enforce an outbound traffic restriction (see [Egress Gateways](/docs/tasks/traffic-management/egress/egress-gateway/) for how to achieve this).
38
44
//
39
45
// Services and configuration in a mesh are organized into one or more
40
46
// namespaces (e.g., a Kubernetes namespace or a CF org/space). A `Sidecar`
0 commit comments