- The reverse proxy first intercepts the client's connection.
- It then inspects the destination URL and routes the request to a specific "pod". This pod is responsible for conducting various validation checks on the request.
- If the request passes all validation checks and is deemed non-malicious, it is then relayed to the server.
- Throughout this process, both the proxy and the individual pods generate and maintain logs for tracking and auditing purposes.
47Cid/Castle
Folders and files
| Name | Name | Last commit date | ||
|---|---|---|---|---|
