Additional HTTP headers

Reverse HTTP proxy and reverse WebSocket proxy add additional headers to every HTTP request proxied from the client.

The information contained in these headers can be useful for logging requests and subsequently debugging problems that arise.

  • X-Forwarded-For
    Example of value: 1.2.3.4, 5.6.7.8

    Contains the IP address from where the request came to the Qrator Labs reverse proxy, as well as a list of any previous IP addresses added to this header, if any.

    If the request that came to the Qrator Labs reverse proxy did not have an X-Forwarded-For header, it will be added. Such a header will only contain the IP address of the user from where the request came.

    If the request that came to Qrator Labs reverse proxy already had an X-Forwarded-For header, the IP address from where the request came will be added to the existing content. So, the header will contain both the user's IP address and the addresses of all the proxies through which the user reached the Qrator Labs reverse proxy. Commas followed by spaces are used as separators.

    Note

    If some hardware on your network also modifies the X-Forwarded-For header before passing the request to the server, it may be difficult to determine which of the listed IP addresses the request came to Qrator Labs from. If you need to specify this accurately, use the X-Qrator-IP-Source header.

  • X-Q-DomId
    Example of value: 11169

    Contains numeric ID of the domain that is being proxied. It is the same as the ID specified in the list of domains in the dashboard, but is specified without the letter d in the HTTP header.

  • X-Qrator-IP-Source
    Example of value: 1.2.3.4

    Contains IP address of the user from where the request came. Matches the first IP address in the X-Forwarded-For header.

  • X-Qrator-RequestID
    Example of value: f4b16a6bf0bcc8bebc394a2824d5d569

    Contains a unique ID of the processed request. If any problem you have detected is related to specific requests, you can provide the IDs of these requests to technical support for detailed review.

  • X-Qrator-TCP-Info
    Example of value: 51890, 69493, 10151

    Contains information about TCP sessions. Consists of three numbers.

    The first number is the sender port from where TCP segments were sent to the Qrator Labs network.

    The second and third numbers are RTT and RTTVar values calculated according to RFC 2988.

expand_less