Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 7 of 7 for pathes (0.44 sec)

  1. architecture/ambient/peer-authentication.md

      portLevelMtls:
        9090:
          mode: PERMISSIVE
    ```
    
    will be translated into this `Authorization`:
    
    ```yaml
    action: DENY
    groups:
    - rules:
      - matches:
        - notPrincipals:
          - presence: {}
    - rules:
      - matches:
        - notDestinationPorts:
          - 9090
    name: converted_peer_authentication_strict-and-permissive-mtls
    scope: WORKLOAD_SELECTOR
    ```
    
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Wed Aug 09 22:09:18 GMT 2023
    - 3.9K bytes
    - Viewed (0)
  2. cni/test/testdata/pre/non_json.conf

    "This is not json"
    
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Thu Nov 19 23:19:19 GMT 2020
    - 60 bytes
    - Viewed (0)
  3. common-protos/k8s.io/api/rbac/v1/generated.proto

      // Since non-resource URLs are not namespaced, this field is only applicable for ClusterRoles referenced from a ClusterRoleBinding.
      // Rules can either apply to API resources (such as "pods" or "secrets") or non-resource URL paths (such as "/api"),  but not both.
      // +optional
      repeated string nonResourceURLs = 5;
    }
    
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Mon Mar 11 18:43:24 GMT 2024
    - 7.6K bytes
    - Viewed (0)
  4. common-protos/k8s.io/api/networking/v1alpha1/generated.proto

    // Node.  A ClusterCIDR is eligible to be used for a given Node when the node
    // selector matches the node in question and has free CIDRs to allocate.  In
    // case of multiple matching ClusterCIDR resources, the allocator will attempt
    // to break ties using internal heuristics, but any ClusterCIDR whose node
    // selector matches the Node may be used.
    message ClusterCIDR {
      // Standard object's metadata.
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Mon Mar 11 18:43:24 GMT 2024
    - 6K bytes
    - Viewed (0)
  5. common-protos/k8s.io/api/rbac/v1alpha1/generated.proto

      // Since non-resource URLs are not namespaced, this field is only applicable for ClusterRoles referenced from a ClusterRoleBinding.
      // Rules can either apply to API resources (such as "pods" or "secrets") or non-resource URL paths (such as "/api"),  but not both.
      // +optional
      repeated string nonResourceURLs = 6;
    }
    
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Mon Mar 11 18:43:24 GMT 2024
    - 8.5K bytes
    - Viewed (0)
  6. common-protos/k8s.io/api/rbac/v1beta1/generated.proto

      // Since non-resource URLs are not namespaced, this field is only applicable for ClusterRoles referenced from a ClusterRoleBinding.
      // Rules can either apply to API resources (such as "pods" or "secrets") or non-resource URL paths (such as "/api"),  but not both.
      // +optional
      repeated string nonResourceURLs = 5;
    }
    
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Mon Mar 11 18:43:24 GMT 2024
    - 8.6K bytes
    - Viewed (0)
  7. architecture/security/istio-agent.md

       while also keeping file watchers on them. Envoy proxy then connects to istio-agent's SDS Server through the defined socket path and gets the cryptographic materials of the certificate files served by the SDS API.
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Tue Aug 22 16:45:50 GMT 2023
    - 7.2K bytes
    - Viewed (1)
Back to top