Generated by GPT-5-mini| Envoy (software) | |
|---|---|
| Name | Envoy |
| Title | Envoy (software) |
| Developer | Lyft |
| Initial release | 2016 |
| Programming language | C++ |
| License | Apache License |
| Repository | GitHub |
Envoy (software) Envoy is an open-source edge and service proxy designed for cloud-native microservices architectures, created to improve network reliability and observability in distributed systems. It acts as a high-performance reverse proxy, load balancer, and service mesh data plane component, integrating with orchestration and service-discovery systems to support modern continuous delivery workflows. Envoy is widely adopted across technology organizations for traffic management, telemetry, and resilience in production environments.
Envoy is a high-performance proxy originally developed by Lyft to address scalability challenges in large-scale web services and mobile backends, later contributed to Cloud Native Computing Foundation. It provides advanced Layer 7 routing capabilities, gRPC support, and platform integrations used by Netflix, Google, IBM, Red Hat, and other enterprises. Envoy functions as a sidecar proxy in Kubernetes-based deployments, as an edge proxy for content delivery networks, and as a gateway for API management platforms.
Envoy's architecture centers on a single-process, multi-threaded design written in C++ with asynchronous I/O and event-driven programming influenced by NGINX and HAProxy. Key components include the listener and filter chain for handling inbound connections, the connection manager that implements protocol handling (HTTP/1.1, HTTP/2, HTTP/3/QUIC), and the cluster manager that manages upstream connection pools and load balancing policies. The control plane integrates with service-discovery systems such as Consul, Eureka, and cloud provider registries, often through the xDS APIs defined by the Cloud Native Computing Foundation. Envoy exposes admin APIs for runtime configuration, metrics, and tracing, and integrates with control planes like Istio, Linkerd, and HashiCorp solutions.
Envoy implements advanced routing features including weighted traffic splitting, header- and path-based routing, and protocol-aware retries inspired by circuit breaker patterns used in resilient distributed systems. It supports observability through OpenTelemetry, Zipkin, Jaeger, and Prometheus instrumentation, enabling detailed tracing, metrics, and access logs for SRE and DevOps teams. Security features include TLS termination, mutual TLS (mTLS) integration with SPIFFE/SPIRE, and robust authentication/authorization filters compatible with OAuth 2.0 and JWT workflows. Envoy also offers global rate limiting, connection mirroring for canary testing, and advanced health-checking mechanics used in continuous deployment pipelines.
Envoy is deployed as a sidecar in Kubernetes pods, as a standalone ingress controller, and at the edge of data centers for API gateway use cases. It integrates with orchestration platforms such as Kubernetes, Mesos, and Nomad, and cloud services from Amazon Web Services, Microsoft Azure, and Google Cloud Platform. Typical control-plane integrations include Istio for service-mesh management, Contour for ingress, and Consul for service discovery. Continuous integration systems like Jenkins, GitLab CI, and CircleCI often use Envoy to validate routing and resilience during canary deployments and blue-green deployment strategies.
Envoy emphasizes low latency and high throughput via connection pooling, HTTP/2 multiplexing, and thread-local dispatch to minimize contention under load. Its architecture supports horizontal scaling patterns used by Netflix and Lyft to handle millions of requests per second, leveraging upstream protocols such as HTTP/2 and QUIC to improve resource utilization. Benchmarks often compare Envoy against NGINX and HAProxy in terms of request-per-second performance, CPU efficiency, and connection churn under real-world microservice topologies. Techniques such as outlier detection, circuit breaking, and dynamic load balancing help Envoy maintain availability during partial failures common in large-scale cloud environments.
Envoy integrates tightly with identity frameworks like SPIFFE and certificate management systems provided by HashiCorp Vault and cloud key management services. It supports TLS, mTLS, JWT validation, and external authorization via filters compatible with Open Policy Agent. For observability, Envoy emits rich metrics compatible with Prometheus, distributed traces with OpenTelemetry and Jaeger, and structured access logs that feed into ELK Stack and Splunk pipelines. Its admin APIs provide runtime inspection and debugging useful for SRE teams during incident response and postmortem analyses.
Envoy was first released in 2016 by Lyft to address scaling issues in their microservices platform and quickly gained attention in the open-source community. In subsequent years it joined the Cloud Native Computing Foundation as part of the growing ecosystem around Kubernetes and service meshes. Major milestones include the addition of HTTP/2 and gRPC proxying, xDS API standardization for control-plane interoperability, integration with service-mesh projects like Istio, and experimental support for QUIC/HTTP/3 driven by protocol developments at IETF. The project has attracted contributions from major vendors including Google, IBM, Microsoft, and independent maintainers across the open source landscape, evolving through community governance and corporate sponsorship.
Category:Free software Category:Proxy servers Category:Cloud Native Computing Foundation projects