When Jitera runs behind a reverse proxy, load balancer, or CDN, the application sees the proxy’s IP address instead of the real client IP. This affects security features (rate limiting, IP blocking), audit logging, and compliance. Trusted proxy configuration tells Jitera which proxy IP addresses to trust, allowing it to read the real client IP from theDocumentation Index
Fetch the complete documentation index at: https://docs.jitera.ai/llms.txt
Use this file to discover all available pages before exploring further.
X-Forwarded-For header.
Two-Layer Trust Chain
Client IP preservation requires trust configuration at two layers of the request path:| Layer | Setting | Location |
|---|---|---|
| Kong ingress | kong.env.trusted_ips | Helm values |
| Jitera application | proxies.yaml + ENABLE_PROXY_FROM_X_HEADER | charts/jitera/extra_config/ + Helm values |
Kong Ingress Trusted IPs
The chart ships withkong.env.trusted_ips: "0.0.0.0/0,::/0", which makes Kong accept x-real-ip / X-Forwarded-For headers from any source. For production, narrow this to the CIDR of the load balancer sitting in front of Kong:
Configuration Methods
| Method | Security | Use Case |
|---|---|---|
| Explicit IP trust list | High | Production — only specific proxy IPs are trusted |
| X-Forwarded-For header trust | Medium | Development/testing — trusts the header from any source |
Explicit IP Trust List (Recommended)
Define exactly which IP addresses are allowed to provide client IP information by creating a proxy configuration file. Step 1: Createcharts/jitera/extra_config/proxies.yaml:
X-Forwarded-For header when the request originates from an IP address listed in proxies.yaml.
The
proxies.yaml file ships empty by default. You must add your infrastructure’s proxy IP ranges for trusted proxy to take effect.X-Forwarded-For Header Trust
For development or fully controlled internal networks, you can enable header-based trust without an explicit IP list:IP Address Formats
proxies.yaml supports the following formats:
| Format | Example | Use Case |
|---|---|---|
| IPv4 single | 192.168.1.1 | Specific load balancer |
| IPv4 CIDR | 10.0.0.0/8 | Network range |
| IPv6 single | 2001:db8::1 | Specific IPv6 proxy |
| IPv6 CIDR | 2001:db8::/32 | IPv6 network range |
Examples by Infrastructure
- AWS (EKS)
- Azure (AKS)
- On-Premises
- Cloudflare CDN
AWS Application Load Balancers operate within your VPC’s private IP ranges:
Helm Values Reference
| Parameter | Type | Default | Description |
|---|---|---|---|
automation.env.ENABLE_PROXY_FROM_X_HEADER | boolean | false | Trust X-Forwarded-For header from any source. Set to true only for development. |
charts/jitera/extra_config/proxies.yaml (not a Helm value). For the complete Helm configuration reference, see Automation Environment Variables.

