1.38.0 (Pending)
Incompatible behavior changes
Changes that are expected to cause an incompatibility if applicable; deployment changes are likely required
boringssl/fips: The previous flag for specifying FIPS builds (i.e.,
--define=boringssl=fips) will no longer work and has been replaced by--config=boringssl-fips. This change will allow us to better support custom SSL libraries, and will allow FIPS-compliant Envoy to be built with the imminent switch to Bazel bzlmod.ext_proc: The
processing_effect_libhas been moved from the extensions/filters/http/ext_proc namespace to theextensions/filters/common/processing_effectnamespace. All path references within the Envoy codebase have been updated.on_demand: The on-demand filter, when doing on-demand CDS, will no longer do internal redirects after CDS is successful. Filters appearing in the filter chain before the on-demand filter will no longer be invoked twice. This behavior can be temporarily reverted by setting the runtime guard
envoy.reloadable_features.on_demand_cluster_no_recreate_streamtofalse.tcp_proxy: The TCP proxy filter now requires max_early_data_bytes to be explicitly set when using upstream_connect_mode modes other than
IMMEDIATE(i.e.,ON_DOWNSTREAM_DATAorON_DOWNSTREAM_TLS_HANDSHAKE). The field can be set to0to disable early data buffering while still using delayed connection modes. Configurations using these modes withoutmax_early_data_byteswill now fail validation at startup.tls: Set enforce_rsa_key_usage to
trueby default. The handshake will fail if the keyUsage extension is present and incompatible with the TLS usage. In the next version of Envoy, this option will be removed and the enforcing behavior will always be used.
Minor behavior changes
Changes that may cause incompatibilities for some users, but should not for most
compressor: Strong
ETagremoval when compressing now uses the same weakW/check as weaken_etag_on_compress. Previously removal applied only whenETaglength was greater than 2; two-character strong values are now removed as well (the only two-character weak form isW/).dynamic_modules: Now all the dynamic module extension factories (HTTP, network, listener, UDP listener, and so on) will serialize the
google.protobuf.Structconfiguration message to JSON string and pass it to the dynamic module side as the configuration.ext_authz: Added tracking bits for processing effect for request headers and failed open occurrence in the
ExtAuthzLoggingInfo. This new data will be automatically collected and can be accessed viarequestProcessingEffect()andfailedOpen().ext_authz: Changed the behavior of
timeout: 0sin the HTTP ext_authz filter to mean “no timeout” (infinite) instead of immediate timeout. Previously,timeout: 0swould cause requests to fail immediately. This aligns with other Envoy timeout configurations where0means disabled or infinite.ext_proc: Added
received_immediate_responseflag in theExtProcLoggingInfofilter state.happy_eyeballs: Happy Eyeballs handles interleaving of non-IP addresses. The restriction against
additional_addressescontaining non-IP addresses is removed. This behavior can be reverted by setting the runtime guardenvoy.reloadable_features.happy_eyeballs_sort_non_ip_addressestofalse.histograms: Updated libcircllhist to 0.3.2, which changes how bucket bounds are interpreted. This should not impact production monitoring if the number of samples in the histograms is high. Affected tests were adjusted to account for histogram changes.
http: The
route(),clusterInfo()andvirtualHost()methods on the HTTP filter callbacks and stream info interfaces now are refactored to returnOptRef<const T>instead of shared pointers. And additional methodsrouteSharedPtr(),clusterInfoSharedPtr()andvirtualHostSharedPtr()are added to return shared pointers. The shorterroute(),clusterInfo()andvirtualHost()methods are preferred for most use cases where the returned reference is not used beyond the scope of the current function and the caller does not want to manage shared pointer ownership. The new shared pointer methods are intended for use cases where the caller needs to keep the ownerships to the route, cluster, or virtual host.mcp: Changed the default metadata namespace for the MCP filter from
mcp_proxytoenvoy.filters.http.mcp. This change can be reverted by setting the runtime guardenvoy.reloadable_features.mcp_filter_use_new_metadata_namespacetofalse.mcp: Relaxed the MCP filter POST Content-Type check from an exact match on
application/jsonto a prefix match, so thatapplication/json; charset=utf-8and similar media-type parameters are accepted.memory: Replaced the custom timer-based tcmalloc memory release with tcmalloc’s native
ProcessBackgroundActionsandSetBackgroundReleaseRateAPIs. This provides more comprehensive background memory management including per-CPU cache reclamation, cache shuffling, and size class resizing, in addition to memory release. Thetcmalloc.released_by_timerstat has been removed.proto_api_scrubber: If scrub_unknown_fields is set to
truein the ProtoApiScrubberConfig, unknown fields will now be scrubbed. This is disabled by default.ratelimit: Changed the behavior of
timeout: 0sin the HTTP rate limit filter to mean “no timeout” (infinite) instead of immediate timeout. Previously,timeout: 0swould cause requests to fail immediately. This aligns with other Envoy timeout configurations where0means disabled or infinite.stat_sinks: OpenTelemetry SinkConfig stopped reporting empty delta counters and histograms.
stat_sinks: OpenTelemetry SinkConfig stopped reporting empty delta counters and histograms.
upstream: EDS host metadata comparison during
updateDynamicHostListnow uses a cached metadata hash instead ofMessageDifferencer::Equivalent. The hash is computed once when metadata is set, making per-host comparison O(1). In rare cases where two semantically equivalent metadata messages have different serializations, this may cause a spurious metadata update (false positive) but will never miss an actual change.
Bug fixes
Changes expected to improve the state of the world and are unlikely to have negative effects
access_log: Fixed a crash on listener removal with a process-level access log rate limiter ProcessRateLimitFilter.
contrib: Fixed a segfault from a timer thread-safety violation, a ring buffer overflow, and incorrect alpha calculation in the
peak_ewmaload balancer.drop_overload: Fixed a bug where
drop_overloadfailed to use cached EDS resources.dynamic_modules: Fixed a bug where dynamic module extensions do not handle the
google.protobuf.Structconfiguration properly as the API definition requires. The dynamic module extension factories now serialize theStructto JSON string and pass the string to the dynamic module side as the configuration.dynamic_modules: Fixed a bug where dynamic module filter may result in a incomplete body being sent to upstream or downstream when some filters before or after the dynamic module filter in the chain buffered the body and the dynamic module filter did not.
dynamic_modules: Fixed the dynamic modules network filter to always set a local close reason when closing connections. This resolves an error when a dynamic modules network filter closes a connection that has an HTTP filter present.
ext_authz: Fixed a bug where headers from a denied authorization response (non-200) were not properly propagated to the client.
ext_authz: Fixed the HTTP ext_authz client to respect
status_on_errorconfiguration when the authorization server returns a 5xx error or when HTTP call failures occur. Previously, these error scenarios always returned 403 Forbidden regardless of the configured error status.ext_proc: Fixed a bug that prevented two ext_proc filters from being configured in the same filter chain. This change can be reverted by setting the runtime guard
envoy.reloadable_features.ext_proc_inject_data_with_state_updatetofalse.ext_proc: Fixed message-valued CEL attribute serialization (for example
xds.virtual_host_metadata) to use protobuf text format instead of debug string output. This restores ext_proc compatibility with protobuf 30+ where debug-string output is intentionally not parseable (for examplegoo.gle/debugonlyprefixes). This change can be reverted by setting runtime guardenvoy.reloadable_features.cel_message_serialize_text_formattofalse.formatter: Added support for the
UPSTREAM_LOCAL_CLOSE_REASONlog formatter.formatter: Fixed the log formatter in HTTP router upstream logs by correctly setting the downstream connection’s
ConnectionInfoProviderin theStreamInfo.header_mutation: Fixed an issue where query parameter values added via
query_parameter_mutationswere not URL-encoded, allowing query parameter injection attacks. Values from formatters like%REQ(header)%are now properly URL-encoded when added to the query string. This behavior is controlled by the runtime guardenvoy.reloadable_features.header_mutation_url_encode_query_params.health_check: Fixed a race condition where active health checks could start before required upstream TLS SDS secrets were fetched, causing intermittent health check failures #43116. This fix can be disabled by setting runtime guard
envoy.reloadable_features.health_check_after_cluster_warmingtofalse.hot_restart: Fixed hot restart for listeners with a network namespace in the address. Previously, socket hand-off didn’t work cleanly because the namespace was not included in the
PassListenSocketrequest, causing the parent to always fall back to binding a new socket.http: Fixed a potential file descriptor leak where HTTP/1.1 connections with zombie streams (waiting for codec completion) would not be properly closed when in draining state. This could occur when a response was sent before the request was fully received, causing connections to remain open indefinitely. This change can be reverted by setting the runtime guard
envoy.reloadable_features.http1_close_connection_on_zombie_stream_completetofalse.http: Fixed an issue where filter chain execution could continue on HTTP streams that had been reset but not yet destroyed. This could cause use-after-free conditions when filter callbacks were invoked on filters that had already received
onDestroy(). The fix ensures thatdecodeHeaders(),decodeData(),decodeTrailers(), anddecodeMetadata()are blocked after a downstream reset.http: Fixed crash if a downstream watermark is hit by network filter writes before the HTTP codec is created.
http: Fixed upstream client to not close connection when idle timeout fires before the connection is established. This change can be reverted by setting the runtime guard
envoy.reloadable_features.codec_client_enable_idle_timer_only_when_connectedtofalse.http_11_proxy: Fixed bug where providing an empty inner socket config would cause Envoy to crash.
json: Fixed an off-by-one write in
JsonEscaper::escapeString()that could corrupt the string null terminator when the input string ends with a control character.load_report: Fixed a race condition during load-report shutdown with the ADS stream by introducing proper cleanup of the gRPC stream.
mcp_router: Fixed MCP router to support session-less backends that do not return
mcp-session-idheaders. Previously, this caused a spurious 500 error.network: Fixed a crash in
Utility::getAddressWithPortwhen called with a scoped IPv6 address (e.g.,fe80::1%eth0).oauth2: Fixed OAuth2 refresh requests so host rewriting no longer overrides the original
Hostheader value.odcds: Fixed a bug where using OD-CDS in tcp_proxy over ADS would not work in some cases. This change could be reverted temporarily by setting the runtime guard
envoy.reloadable_features.tcp_proxy_odcds_over_ads_fixtofalse.odcds: Fixed a crash (SIGABRT) when destroying OdCDS handles on worker threads. The handle no longer holds a direct reference to the subscription, preventing thread-safety issues during destruction. The subscription now persists in ClusterManagerImpl and is looked up by a config source key.
overload_manager: Fixed a resource leak in global connection limit tracking that caused permanent connection rejections when using load shedding (e.g.,
envoy.load_shed_points.tcp_listener_accept). When connections were rejected due to load shedding after passing the global connection limit check, the allocated connection limit resource was not released, causing the connection counter to become incorrect and leading tofailed_updatesin the resource monitor. This resulted in permanent connection rejections even after load subsided. The fix ensures that connection limit resources are properly released when connections are rejected due to load shedding. Also added defensive resource cleanup for edge cases where address processing fails (e.g.,localAddress()orpeerAddress()errors).ratelimit: Fixed a bug in the gRPC rate limit client where the client could get into a bad state if the callbacks were not properly released after a request completion, leading to potential use-after-free issues. The fix ensures that callbacks and request references are cleared after completion, and adds assertions to enforce correct usage patterns.
rbac: Fixed RBAC header matcher to validate each header value individually instead of concatenating multiple header values into a single string. This prevents potential bypasses when requests contain multiple values for the same header. The new behavior is enabled by the runtime guard
envoy.reloadable_features.rbac_match_headers_individually.release: Published contrib binaries now include the
-contribsuffix in their version string.scoped_rds: Fixed a bug where SRDS subscriptions would never start when a listener with scoped routes was added after server initialization completed. The
SrdsFactoryinterface was incorrectly using the server-level init manager instead of the listener-level init manager, causing the SRDS init target to be silently discarded.spiffe: Reduced the number of file watches needed by trust_bundles when the validator is used in multiple places. Added support for watched_directory to support Kubernetes environments that rely on atomic symbolic file updates. Added content hashing during file watching to handle excessive watch notifications.
tls: Fixed on-demand TLS selector to enforce session resumption settings.
upstream: Fixed an out-of-bounds issue in ThreadAwareLoadBalancerBase that could occur during mid-batch EDS host updates due to eagerly calling refresh() before the deferred priority state resize.
watch-dog: Fixed a bug where the worker thread watchdogs were configured using the main thread’s configuration. This change can be reverted by setting the runtime guard
envoy.restart_features.worker_threads_watchdog_fixtofalse.xds: Fixed a bug where in delta-xDS when xDS-Failover is configured (gated by the experimental
envoy.restart_features.xds_failover_supportruntime guard), in some cases the initial_resource_versions field was not updated correctly when attempting to reconnect to the xDS server.
Removed config or runtime
Normally occurs at the end of the deprecation period
tcp_proxy: Removed runtime guard
envoy.reloadable_features.tcp_proxy_set_idle_timer_immediately_on_new_connectionand legacy code path.
New features
a2a: Added parsing support for the A2A (Agent2Agent) protocol, enabling parsing of A2A JSON-RPC messages.
access_log: Added stats customization support for the access logger.
access_log: Added support for gauges in the stats access logger.
admin: Added
filterquery parameter support to the/clustersendpoint. The parameter accepts a RE2 regular expression to filter clusters by name. Compatible with theformatparameter for both text and JSON output (e.g.,/clusters?filter=service&format=json).cel: Added functionality to reevaluate CEL expressions that attempt to read response path data on the request path once the data is available. Allows CEL matching based on both request and response headers. This may cause a behavior change for matchers that previously would silently fail to match due to attempting to match response headers in the request path. This behavior can be reverted by setting the runtime guard
envoy.reloadable_features.enable_cel_response_path_matchingtofalse.compressor: Added weaken_etag_on_compress to the compressor filter. When enabled in
response_direction_config, strongETagresponse headers are weakened (W/prefix) instead of removed when compression is applied, allowing caches and conditional requests to work while indicating the body was modified by compression. When bothweaken_etag_on_compressanddisable_on_etag_headerare true, the new field takes precedence.config: Added support for set_node_on_first_message_only to Delta-xDS. Guarded by runtime flag
envoy.reloadable_features.xds_legacy_delta_skip_subsequent_node.connection: Add support for closing connections when they stay above the buffer high watermark for a configured time. This can be enabled by setting the per_connection_buffer_high_watermark_timeout field on the listener and per_connection_buffer_high_watermark_timeout field on the cluster. By default, the timeout is disabled.
content_parsers: Added envoy.content_parsers.json content parser for extracting values from JSON content using JSON path selectors. Can be used by filters that need to parse structured JSON data and extract specific fields into metadata.
dynamic modules: Added connection state and flow control ABI callbacks for the dynamic module network filter, including
read_disable,read_enabled,get_connection_state,enable_half_close,is_half_close_enabled,get_buffer_limit,set_buffer_limits, andabove_high_watermark.dynamic modules: Added drain and shutdown lifecycle hooks for bootstrap dynamic modules.
dynamic modules: Added socket property getter and SSL/TLS information ABI callbacks for the dynamic module listener filter, including
get_requested_server_name,get_detected_transport_protocol,get_requested_application_protocols,get_ja3_hash,get_ja4_hash,is_ssl,get_ssl_uri_sans,get_ssl_dns_sans, andget_ssl_subject.dynamic modules: Added support for dynamic modules authors to register any combination of HTTP, network, listener, UDP listener, and bootstrap filters in the Rust SDK.
dynamic modules: Introduced the extended ABI forward compatibility mechanism for dynamic modules where modules built with an SDK version can be loaded by Envoy binaries of the next Envoy version. For example, a module built with the v1.38 SDK can now be loaded by an Envoy binary of v1.39.
dynamic_modules: Added TLS certificate validator support for dynamic modules, enabling custom TLS certificate validation to be implemented in dynamic modules.
dynamic_modules: Added cluster support for dynamic modules, enabling custom service discovery and host management to be implemented in dynamic modules.
dynamic_modules: Added load balancing policies support for dynamic modules, enabling custom load balancing algorithms to be implemented in dynamic modules.
dynamic_modules: Added tracer support for dynamic modules, enabling custom distributed tracing backends to be implemented in dynamic modules.
dynamic_modules: Added HTTP callout support for dynamic module listener filters, enabling listener filters to initiate asynchronous HTTP requests to upstream clusters and receive responses via the
send_http_calloutABI callback andon_listener_filter_http_callout_doneevent hook.dynamic_modules: Added
get_host_health_by_addressABI callback for dynamic module load balancers, providing O(1) host health lookup by address string using the cross-priority host map.dynamic_modules: Added
on_host_membership_updateevent hook andget_member_update_host_addresscallback for dynamic module load balancers, enabling modules to receive notifications when hosts are added or removed from the cluster and inspect the affected host addresses.dynamic_modules: Added
write_to_socketandclose_socketABI callbacks for the dynamic module listener filter, enabling protocol negotiation use cases such as Postgres SSL and MySQL handshake at the listener filter level.dynamic_modules: Added a process-wide function registry to the dynamic modules ABI. Modules can register functions by name via
envoy_dynamic_module_callback_register_functionand other modules can resolve them viaenvoy_dynamic_module_callback_get_function, enabling zero-copy cross-module interactions analogous todlsym.dynamic_modules: Added a process-wide shared data registry to the dynamic modules ABI.
dynamic_modules: Added admin handler API to the bootstrap extension dynamic modules ABI, enabling modules to register custom admin HTTP endpoints.
dynamic_modules: Added caching for remotely fetched dynamic modules. Since
newDynamicModuleFromByteswrites modules to a deterministic path based on SHA256, subsequent config updates referencing the same SHA256 load from the existing file, avoiding redundant HTTP fetches.dynamic_modules: Added configurable metrics_namespace field to
DynamicModuleConfig. This allows users to customize the prefix used for all metrics created by dynamic modules. Metrics now appear with the standardenvoy_prefix followed by the namespace in prometheus output (e.g.envoy_myapp_requests_total). The legacy behavior (stripping the namespace prefix from prometheus output) can be restored by setting the runtime guardenvoy.reloadable_features.dynamic_modules_strip_custom_stat_prefixtotrue.dynamic_modules: Added custom metrics (counters, gauges, histograms) support to load balancer dynamic modules. Modules can now define metrics during configuration and record them during host selection.
dynamic_modules: Added dynamic module input matcher extension that allows implementing custom matching logic in external languages (Rust, Go, C) via dynamic modules.
dynamic_modules: Added filter state read/write support for dynamic module cert validators, allowing modules to set and get string values in the connection’s filter state during certificate chain verification.
dynamic_modules: Added init manager integration to the dynamic modules bootstrap extension ABI. An init target is automatically registered for every bootstrap extension, blocking traffic until the module signals readiness via
signal_init_complete.dynamic_modules: Added listener lifecycle event callbacks to the bootstrap dynamic module extension. Modules can opt in via
enable_listener_lifecycleto receiveon_listener_add_or_updateandon_listener_removalnotifications when listeners change in theListenerManager.dynamic_modules: Added metrics definition and update support for bootstrap dynamic modules.
dynamic_modules: Added server lifecycle callbacks (
on_server_initialized,on_drain_started,on_shutdown) for dynamic module custom clusters, enabling modules to react to server readiness, drain, and shutdown events.dynamic_modules: Added support for fetching dynamic module binaries from remote HTTP sources via
module.remoteinDynamicModuleConfig. The module is downloaded asynchronously during listener initialization with SHA256 verification, written to a temporary file, and loaded viadlopen. If the remote fetch fails, the filter is not installed and requests pass through (fail-open).dynamic_modules: Added support for loading dynamic module binaries from local file paths via the new module field in
DynamicModuleConfig. This allows specifying an absolute path to a.sofile viamodule.local.filenameas an alternative to the name-based search path.dynamic_modules: Added timer API to the bootstrap extension dynamic modules ABI.
dynamic_modules: Added typed filter state support for dynamic module HTTP and network filters. This allows modules to set and get filter state objects using registered
StreamInfo::FilterState::ObjectFactoryinstances, enabling interoperability with built-in Envoy filters that expect specific typed objects.dynamic_modules: Added upstream HTTP TCP bridge extension for dynamic modules. This enables modules to transform HTTP requests into raw TCP data for upstream connections and convert TCP responses back into HTTP responses via explicit send callbacks. See envoy.upstreams.http.dynamic_modules.
dynamic_modules: Changed the
detailsparameter incluster_lb_async_host_selection_completeABI callback from rawconst char*andsize_ttoenvoy_dynamic_module_type_module_bufferfor consistency with the ABI style guide.dynamic_modules: Network filter read and write buffers now persist after
on_read/on_writecallbacks, allowing modules to access buffered data fromon_scheduledand other callbacks. Addedenvoy_dynamic_module_callback_network_filter_get_cluster_host_countto query cluster host counts by name, enabling scale-to-zero and custom load balancing decisions in network filters.dynamic_modules: Rust SDK now provides an opt-in
CatchUnwindwrapper for filter callbacks. When a wrapped callback panics, Envoy logs the panic and returns a fail-closed error (e.g. HTTP 500, stream reset, connection close) instead of aborting the process.ext_authz: Added path_override to the HTTP ext_authz filter. When set, the request path sent to the authorization service is replaced entirely by this value. Only one of
path_prefixorpath_overridemay be set; validation fails at config load if both are specified.ext_proc: Added allow_content_length_header to allow the ext_proc filter to preserve the original
Content-Lengthheader or let ext_proc server modify it as needed.filters: Added filters to update the filter state in a listener filter.
formatter: Added
%UPSTREAM_DETECTED_CLOSE_TYPE%and%DOWNSTREAM_DETECTED_CLOSE_TYPE%to expose the detected close type of downstream and upstream connections. The possible values areNormal,LocalReset, andRemoteReset.formatter: Added
QUERY_PARAMSsupport for substitution formatter to log all query params. They can either be logged in their original form or decoded.formatter: Added
SPAN_IDaccess log formatter to log the span ID of the active (downstream) span for a request, complementing the existingTRACE_IDformatter.formatter: Added extensions for %FILE_CONTENT(/path/to/file)% and %SECRET(name)%.
formatter: Added new access log formatters for tracking upstream hosts and connection IDs attempted during request processing:
%UPSTREAM_HOSTS_ATTEMPTED%,%UPSTREAM_HOSTS_ATTEMPTED_WITHOUT_PORT%,%UPSTREAM_HOST_NAMES_ATTEMPTED%,%UPSTREAM_HOST_NAMES_ATTEMPTED_WITHOUT_PORT%, and%UPSTREAM_CONNECTION_IDS_ATTEMPTED%. These are useful for debugging retry behavior and understanding which hosts were tried before a successful connection or final failure.formatter: Added the new access log formatter
DOWNSTREAM_LOCAL_CLOSE_REASON.formatter: Extended
*_WITHOUT_PORTaddress formatters to accept an optionalMASK_PREFIX_LENparameter that masks IP addresses and returns them in CIDR notation (e.g.,%DOWNSTREAM_REMOTE_ADDRESS_WITHOUT_PORT(16)%returns10.1.0.0/16for client IP10.1.10.23).geoip: Added
asn_orgfield to geo_field_keys to populate a header with the autonomous system organization name from the MaxMind ASN database.golang: Added
DownstreamSslConnection()method to the Golang HTTP filter’sStreamInfointerface, providing access to SSL/TLS connection information for the downstream connection. This includes peer certificate details (subject, issuer, serial number, SANs, validity), TLS version, cipher suite, and PEM-encoded certificates. This achieves feature parity with the Lua filter’sdownstreamSslConnection()functionality.http: Added envoy.filters.http.sse_to_metadata filter for extracting values from Server-Sent Events (SSE) streams and writing them to dynamic metadata. Useful for capturing token usage metrics from LLM API responses. Supports pluggable content parsers for different SSE data formats.
http: Added file_server http filter to allow responding with file contents from the filesystem.
http: Fixed an issue where filter chain execution could continue on HTTP streams that had been reset but not yet destroyed. This could cause use-after-free conditions when filter callbacks were invoked on filters that had already received
onDestroy(). The fix ensures thatdecodeHeaders(),decodeData(),decodeTrailers(), anddecodeMetadata()are blocked after a downstream reset.http2: Added max_header_field_size_kb to configure the maximum wire-encoded size in KiB of an individual HPACK-encoded header field that the HTTP/2 codec will accept. This allows increasing the default nghttp2 per-header limit of 64 KiB on the wire when larger single headers need to be supported.
http_11_proxy: Added ability to configure a default proxy address that is used when the proxy address is not configured via metadata.
http_filter: Added support for clear route cache in the set_filter_state http filter. When
clear_route_cacheis set, the filter will clear the route cache for the current request after applying filter state updates. This is necessary if the route configuration may depend on the filter state values set.http_service: Added the ability for request_headers_to_add to use a formatter extension that can retrieve secrets, for including authentication tokens. This support is added for all uses of this message, including the open telemetry,
ext_proc, andzipkintracers.listener_manager: Added
ListenerUpdateCallbacksinterface toListenerManager, similar to the existingClusterUpdateCallbacksonClusterManager.lua: Added set() to the Lua filter state API, allowing Lua scripts to create and store filter state objects dynamically using registered object factories.
matching: Added local reply matcher input to distinguish Envoy generated local replies from upstream responses. This matcher input returns
truefor local replies andfalsefor upstream responses, enablingcustom_responsefilter policies to selectively apply only to locally generated error responses.matching: Added an optional
fieldparameter to FilterStateInput. When set,FilterStateInputcallsgetField()on the filter state object instead ofserializeAsString(), enabling direct matching on individual fields within composite filter state objects such as proxy protocol TLVs stored viatlv_location: FILTER_STATE.mcp: Added HTTP DELETE session termination support to the MCP filter. DELETE requests with an
MCP-Session-Idheader are now recognized as valid MCP traffic inREJECT_NO_MCPmode.mcp: Added options
propagate_trace_contextandpropagate_baggagefor extractingtraceparent,tracestate, and baggage from MCP parameters, respectively.mcp_json_rest_bridge: Added support for MCP
tools/callrequest transcoding. Support fortools/listandtools/callresponse transcoding is planned. This filter is currently a work-in-progress and not recommended for production use.mcp_json_rest_bridge: Added support for MCP
tools/callresponse transcoding. Support fortools/listis planned. This filter is currently a work-in-progress and not recommended for production use.mcp_json_rest_bridge: Added support for MCP session negotiation, including
initializeandnotifications/initializedmethods. This filter is currently a work-in-progress and not recommended for production use.mcp_json_rest_bridge: Added the MCP JSON REST Bridge HTTP filter configuration to transcode MCP JSON-RPC requests into standard JSON-REST HTTP requests.
mcp_router: Added statistics to the MCP router filter for observability into request routing, fanout operations, and error conditions.
mcp_router: Added SSE (Server-Sent Events) streaming support for MCP backend responses. The router now handles SSE responses from backends for
tools/callwith direct pass-through streaming, and supports SSE aggregation for fanout operations (tools/list,initialize) with incremental event parsing.mcp_router: Added SSE response support for MCP
prompts/listfanout aggregation.mcp_router: Added SSE response support for MCP
resources/listfanout aggregation.mcp_router: Added support for MCP
resources/templates/listmethod with fanout aggregation.mcp_router: Added support for MCP client-to-server notification methods
notifications/cancelledandnotifications/roots/list_changed.mcp_router: Added support for MCP completion method
completion/completewith routing based onref/promptorref/resource.mcp_router: Added support for MCP logging method
logging/setLevel.mcp_router: Added support for MCP prompt methods
prompts/listandprompts/get.mcp_router: Added support for MCP resource methods
resources/list,resources/read,resources/subscribe, andresources/unsubscribe.memory: Added
soft_memory_limit_bytes,max_per_cpu_cache_size_bytes, andmax_unfreed_memory_bytesfields to MemoryAllocatorManager for fine-grained control of tcmalloc memory management.network: Added access logging support for network filters, similar to HTTP filters, by allowing network filters to register as access logger instances.
network_filter: Added support for
on_downstream_data(see on_downstream_data) to the set_filter_state network filter, allowing connection filter state to be populated after first receiving data from the downstream connection.oauth2: Added
TLS_CLIENT_AUTHfor the OAuth2 HTTP filter to support RFC 8705 mutual TLS client authentication. In this modetoken_secretis optional and ignored, and the token endpoint cluster must be configured with mTLS.outlier_detection: Added detect_degraded_hosts to enable passive degraded host detection. When enabled, outlier detection marks hosts as degraded when they return the
x-envoy-degradedheader. Degraded hosts are deprioritized in load balancing but remain in rotation (not ejected). The degraded state is cleared using the same backoff algorithm as ejection. Defaults tofalse.overload_manager: Added ShrinkHeapConfig typed configuration for the
envoy.overload_actions.shrink_heapoverload action. This allows operators to configure the timer interval (timer_interval, minimum 1s, default 10s) and the memory release threshold (max_unfreed_memory_bytes, default 100MB) passed totcmalloc::MallocExtension::ReleaseMemoryToSystem().ratelimit: Added
RemoteAddressMatchaction to the rate limit filter. This action will generate a descriptor based on the remote address of the downstream connection by matching it against specified CIDR ranges with support for inversion and formatter substitution.ratelimit: Added per-descriptor
x-ratelimit-*headers support. See the x_ratelimit_option field documentation for more details.ratelimit: Added support for shadow mode in the local rate limit filter.
redis: Added support for
BITFIELD_ROinredis_proxy.resource_monitors: Added cgroup v2 support to the CPU utilization resource monitor. The monitor now automatically detects and selects between cgroup v1 and v2 at runtime by checking available cgroup files on the system. This enables the resource monitor to work correctly in both cgroup v1 and v2 environments without configuration changes.
reverse_tunnel: Added optional tenant isolation support to the reverse tunnel network filter. When
enable_tenant_isolationis set, Envoy scopes cached reverse tunnel sockets with composite<tenant>@<node>and<tenant>@<cluster>identifiers and rejects handshake headers that already contain the@delimiter to prevent ambiguous lookups.sse_parser: Extended the SSE parser utility to support all standard SSE fields:
id,event(asevent_type), andretry, in addition to the existingdatafield. Theretryfield is parsed as auint32_tand only accepts values consisting of ASCII digits per the SSE specification.stat_sinks: Added support for exporting OpenTelemetry metrics via HTTP. The new
http_servicefield in SinkConfig enables direct OTLP metrics export to backends that only accept HTTP (Dynatrace, Datadog, Elastic), without requiring an intermediate collector sidecar.stats: Added support for cluster-level stats matcher, allowing more granular control over which stats are enabled and reported at the cluster level. This the stats matcher could be configured via the xDS API dynamically on a per-cluster basis. See envoy.stats_matcher for more details.
stats: Added support to limit the number of metrics stored in each scope within the stats library.
stats: The admin prometheus stats endpoint now supports the protobuf exposition format, and will automatically use it if the request contains the correct Accept header, or if query parameter
prom_protobuf=1is set. In a prometheus scrape configuration, addPrometheusPrototoscrape_protocolsto use the protobuf format. Additionally, when using the protobuf exposition format, the admin prometheus stats endpoint now supports native histograms when using the prometheus protobuf exposition format, using query/stats/prometheus?histogram_buckets=prometheusnative.tcp_proxy: Added proxy_protocol_tlv_merge_policy to control how TLVs in
proxy_protocol_tlvsare merged with existing PROXY protocol state. SupportsADD_IF_ABSENT(default),OVERWRITE_BY_TYPE_IF_EXISTS_OR_ADD, andAPPEND_IF_EXISTS_OR_ADD.tcp_proxy: Added an option to emit a log entry when the connection is accepted.
tls: Added a per-connection filter state object to select a workload trust domain in the SPIFFE validator in the multi-tenant deployments.
tls: Added support for fetching certificates on-demand via SDS in the upstream TLS transport socket using the extension on-demand certificate selector.
tls: Enhanced TLS certificate validation failure messages for CRL-related errors in access logs. The
%DOWNSTREAM_TRANSPORT_FAILURE_REASON%and%UPSTREAM_TRANSPORT_FAILURE_REASON%access log formatters now include the certificate’s CRL Distribution Point (CRLDP) information when CRL validation fails. For errors such asCRL for certificate was not provided,CRL has expired,CRL is not yet valid, orcertificate revoked, the error message now includes the certificate’s CRL distribution points (e.g.,X509_verify_cert: certificate verification error at depth 0: certificate revocation check against provided CRLs failed: unable to get certificate CRL, certificate CRL distribution points: [http://crl.example.com/ca.crl, http://backup-crl.example.com/ca.crl]). This provides better visibility into CRL validation failures and helps operators identify connectivity or CRL server issues without requiring debug-level logging.tls: Extended TLS certificate compression (RFC 8879): added brotli to QUIC (which already supported zlib), and added brotli and zlib to TCP TLS. Controlled by runtime flag
envoy.reloadable_features.tls_certificate_compression_brotli(defaults totrue). When disabled, QUIC retains zlib-only compression, while TCP TLS has no compression.tracers: Added log events to spans created by the OpenTelemetry tracer.
upstream: Coalesced load balancer rebuilds during EDS batch host updates. When multiple priorities change in a single batch, each LB level (LoadBalancerBase, ZoneAwareLoadBalancerBase, EdfLoadBalancerBase, ThreadAwareLoadBalancerBase) now defers expensive per-priority recalculations to a single pass after the batch completes, reducing CPU spikes on large clusters. This behavior can be reverted by setting the runtime guard
envoy.reloadable_features.coalesce_lb_rebuilds_on_batch_updatetofalse.