Interface ClusterConfigOrBuilder

  • All Superinterfaces:
    com.google.protobuf.MessageLiteOrBuilder, com.google.protobuf.MessageOrBuilder
    All Known Implementing Classes:
    ClusterConfig, ClusterConfig.Builder

    public interface ClusterConfigOrBuilder
    extends com.google.protobuf.MessageOrBuilder
    • Method Summary

      All Methods Instance Methods Abstract Methods 
      Modifier and Type Method Description
      boolean getAllowCoalescedConnections()
      [#not-implemented-hide:] If true allow HTTP/2 and HTTP/3 connections to be reused for requests to different origins than the connection was initially created for.
      boolean getAllowInsecureClusterOptions()
      If true allow the cluster configuration to disable the auto_sni and auto_san_validation options in the :ref:`cluster's upstream_http_protocol_options <envoy_v3_api_field_config.cluster.v3.Cluster.upstream_http_protocol_options>`
      DnsCacheConfig getDnsCacheConfig()
      The DNS cache configuration that the cluster will attach to.
      DnsCacheConfigOrBuilder getDnsCacheConfigOrBuilder()
      The DNS cache configuration that the cluster will attach to.
      boolean hasDnsCacheConfig()
      The DNS cache configuration that the cluster will attach to.
      • Methods inherited from interface com.google.protobuf.MessageLiteOrBuilder

        isInitialized
      • Methods inherited from interface com.google.protobuf.MessageOrBuilder

        findInitializationErrors, getAllFields, getDefaultInstanceForType, getDescriptorForType, getField, getInitializationErrorString, getOneofFieldDescriptor, getRepeatedField, getRepeatedFieldCount, getUnknownFields, hasField, hasOneof
    • Method Detail

      • hasDnsCacheConfig

        boolean hasDnsCacheConfig()
         The DNS cache configuration that the cluster will attach to. Note this configuration must
         match that of associated :ref:`dynamic forward proxy HTTP filter configuration
         <envoy_v3_api_field_extensions.filters.http.dynamic_forward_proxy.v3.FilterConfig.dns_cache_config>`.
         
        .envoy.extensions.common.dynamic_forward_proxy.v3.DnsCacheConfig dns_cache_config = 1 [(.validate.rules) = { ... }
        Returns:
        Whether the dnsCacheConfig field is set.
      • getDnsCacheConfig

        DnsCacheConfig getDnsCacheConfig()
         The DNS cache configuration that the cluster will attach to. Note this configuration must
         match that of associated :ref:`dynamic forward proxy HTTP filter configuration
         <envoy_v3_api_field_extensions.filters.http.dynamic_forward_proxy.v3.FilterConfig.dns_cache_config>`.
         
        .envoy.extensions.common.dynamic_forward_proxy.v3.DnsCacheConfig dns_cache_config = 1 [(.validate.rules) = { ... }
        Returns:
        The dnsCacheConfig.
      • getDnsCacheConfigOrBuilder

        DnsCacheConfigOrBuilder getDnsCacheConfigOrBuilder()
         The DNS cache configuration that the cluster will attach to. Note this configuration must
         match that of associated :ref:`dynamic forward proxy HTTP filter configuration
         <envoy_v3_api_field_extensions.filters.http.dynamic_forward_proxy.v3.FilterConfig.dns_cache_config>`.
         
        .envoy.extensions.common.dynamic_forward_proxy.v3.DnsCacheConfig dns_cache_config = 1 [(.validate.rules) = { ... }
      • getAllowInsecureClusterOptions

        boolean getAllowInsecureClusterOptions()
         If true allow the cluster configuration to disable the auto_sni and auto_san_validation options
         in the :ref:`cluster's upstream_http_protocol_options
         <envoy_v3_api_field_config.cluster.v3.Cluster.upstream_http_protocol_options>`
         
        bool allow_insecure_cluster_options = 2;
        Returns:
        The allowInsecureClusterOptions.
      • getAllowCoalescedConnections

        boolean getAllowCoalescedConnections()
         [#not-implemented-hide:]
         If true allow HTTP/2 and HTTP/3 connections to be reused for requests to different
         origins than the connection was initially created for. This will only happen when the
         resolved address for the new connection matches the peer address of the connection and
         the TLS certificate is also valid for the new hostname. For example, if a connection
         has previously been established to foo.example.com at IP 1.2.3.4 with a certificate
         that is valid for `*.example.com`, then this connection could be used for requests to
         bar.example.com if that also resolved to 1.2.3.4.
         .. note::
           By design, this feature will maximize reuse of connections. This means that instead
           opening a new connection when an existing connection reaches the maximum number of
           concurrent streams, requests will instead be sent to the existing connection.
           TODO(alyssawilk) implement request queueing in connections.
         .. note::
           The coalesced connections might be to upstreams that would not be otherwise
           selected by Envoy. See the section `Connection Reuse in RFC 7540
           <https://datatracker.ietf.org/doc/html/rfc7540#section-9.1.1>`_
         
        bool allow_coalesced_connections = 3;
        Returns:
        The allowCoalescedConnections.