-
Notifications
You must be signed in to change notification settings - Fork 12
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add X-Forwarded-Proto: https
header via VirtualService
#926
Comments
Breaking this task down into:
|
Step 1 ✔️ |
Step 2: |
X-Forwarded-Proto: https
header via EnvoyFilter
X-Forwarded-Proto: https
header via VirtualService
Trino won't support authentication unless TLS is configured. However, it allows (and recommends) terminating TLS at the load balancer, so it will trust that the connection was secured if it sees an
X-Forwarded-Proto: https
header.Istio is automatically encrypting all cluster traffic on the service mesh, but it does so completely transparently. Thus, we need to explicitly set the proxy header to let Trino know our traffic is indeed encrypted – even though clients will be using standard HTTP protocol when they connect.
The text was updated successfully, but these errors were encountered: