Envoy
A high-performance L7 proxy and service mesh data plane for managing, securing, and observing service-to-service traffic.
What is envoy image?
The envoy image runs Envoy Proxy, a modern, high-performance edge and service proxy originally built for cloud-native and microservices architectures. Envoy operates at layer 7 and provides advanced traffic management features such as dynamic service discovery, load balancing, retries, circuit breaking, rate limiting, and fault injection. It natively supports HTTP/1.1, HTTP/2, gRPC, and TLS, and exposes rich metrics and tracing integrations via Prometheus, OpenTelemetry, and other observability systems. Envoy is commonly used as an API gateway, sidecar proxy in service meshes, or as a centralized ingress/egress proxy. In containerized and Kubernetes environments, Envoy is a foundational component of service meshes like Istio and Consul, enabling fine-grained traffic control and deep visibility without modifying application code.
How to use this image
The envoy image is typically run with a static or dynamic configuration file that defines listeners, clusters, routes, and filters. It can be used standalone, embedded in a service mesh, or deployed as an edge proxy.
Run Envoy with a mounted configuration file:
Example envoy.yaml (simplified):
Envoy listens on application-defined ports (10000 above) and exposes an admin interface on port 9901 for stats and health. Logs are written to stdout. For production, configuration is often managed dynamically via xDS APIs or baked into images for reproducibility.
Image variants
Published under envoyproxy/envoy, the image includes:
Envoy releases frequently introduce new filters and protocol features; production environments should pin versions and validate config compatibility during upgrades.
.avif)