- Sort Score
- Result 10 results
- Languages All
Results 1 - 7 of 7 for Agent (0.12 sec)
-
architecture/security/istio-agent.md
# Istio Agent This document describes the internal architecture of Istio agent. ## High Level overview ![High Level overview](docs/overview.svg) At a high level, the Istio agent acts as an intermediate proxy between Istiod and Envoy. This is done at two levels. For distributing workload certificates, Envoy will send [SDS](https://www.envoyproxy.io/docs/envoy/latest/configuration/security/secret)
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Tue Aug 22 16:45:50 GMT 2023 - 7.2K bytes - Viewed (1) -
.gitignore
istio.VERSION LICENSES.txt # Proxy generated proxy config in integration test tests/integration/component/proxy/envoy.conf **/var/run/secrets/ # Certs generated by testing security/cmd/node_agent/na/cert_file security/cmd/node_agent/na/pkey # istioctl bash completion file tools/istioctl.bash vendor # Contains the built artifacts out/ etc/ var/ # Go compiled tests *.test # Profiles *.prof
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Tue Jun 14 16:23:45 GMT 2022 - 1K bytes - Viewed (0) -
istioctl/pkg/writer/envoy/configdump/testdata/endpoint/emptyfilter_output.txt
NAME STATUS LOCALITY CLUSTER 127.0.0.1:15020 HEALTHY agent 10.244.0.156:9402 HEALTHY outbound|9402||cert-manager-istio-csr-metrics.cert-manager.svc.cluster.local 10.244.0.156:6443 HEALTHY outbound|443||cert-manager-istio-csr.cert-manager.svc.cluster.local
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Fri Apr 21 14:17:23 GMT 2023 - 4.5K bytes - Viewed (0) -
istioctl/pkg/proxyconfig/testdata/config_dump_summary.txt
Envoy Version: 0.0.0 NAME SERVICE FQDN PORT SUBSET DIRECTION TYPE DESTINATION RULE cluster/agent cluster/agent - - - STATIC
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Wed Jan 03 23:08:06 GMT 2024 - 2.2K bytes - Viewed (0) -
manifests/charts/README.md
As an extreme, the goal is to be possible to run Istio workloads in a cluster without installing any Istio component in that cluster. Currently, the minimum we require is the security provider (node agent or citadel). ### Install Istio CRDs This is the first step of the installation. Please do not remove or edit any CRD - config currently requires
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Wed Feb 07 17:53:24 GMT 2024 - 6.7K bytes - Viewed (0) -
CODEOWNERS
/pkg/dns/ @istio/wg-networking-maintainers /pkg/envoy/ @istio/wg-networking-maintainers /pkg/istio-agent/ @istio/wg-networking-maintainers @istio/wg-security-maintainers /pkg/keepalive/ @istio/wg-networking-maintainers
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Mon Apr 22 19:22:33 GMT 2024 - 7.2K bytes - Viewed (0) -
README.md
- [security](security/). This directory contains [security](https://istio.io/latest/docs/concepts/security/) related code, including Citadel (acting as Certificate Authority), citadel agent, etc. - [istio/proxy](https://github.com/istio/proxy). The Istio proxy contains extensions to the [Envoy proxy](https://github.com/envoyproxy/envoy) (in the form of
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Fri Jan 26 15:28:59 GMT 2024 - 6.6K bytes - Viewed (0)