Replies: 1 comment
-
We are also seeing this behavior. We are using gloo and linkerd and both with and without ingress mode our x-forwarded-for headers end up containing internal IP addresses rather than the IP of the client. Inspecting our logs the header is set properly coming out of envoy inside gloo but is overwritten it seems by linkerd when it egresses the gloo proxy pod, so our services only end up seeing the internal gloo ip addresses. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
In order to try the retries and timeout feature, i injected our ingress-nginx controller with side car as per mentioned in https://linkerd.io/2/tasks/using-ingress/#nginx
Everything seemed to work fine at first, but when i saw our application log http_x_forwarded_for and remote_addr headers did not contain the actual client ip but containerd 127.0.0.1, any idea how to avoid this?
Beta Was this translation helpful? Give feedback.
All reactions