- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 12 for mtls (0.07 sec)
-
manifests/addons/dashboards/istio-workload-dashboard.json
"format": "time_series", "intervalFactor": 1, "legendFormat": "{{ source_workload }}.{{ source_workload_namespace }} : {{ response_code }} (🔐mTLS)", "refId": "A", "step": 2 }, { "datasource": { "type": "prometheus", "uid": "${datasource}" },
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Mar 27 03:47:04 UTC 2024 - 102.7K bytes - Viewed (0) -
manifests/addons/dashboards/istio-service-dashboard.json
"format": "time_series", "intervalFactor": 1, "legendFormat": "{{ source_workload }}.{{ source_workload_namespace }} : {{ response_code }} (🔐mTLS)", "refId": "A", "step": 2 }, { "datasource": { "type": "prometheus", "uid": "${datasource}" },
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Mar 27 03:47:04 UTC 2024 - 111.8K bytes - Viewed (0) -
operator/cmd/mesh/testdata/manifest-generate/output/pilot_default.golden.yaml
name: istio-token {{- end }} {{- if .Values.global.mountMtlsCerts }} # Use the key and cert mounted to /etc/certs/ for the in-cluster mTLS communications. - mountPath: /etc/certs/ name: istio-certs readOnly: true {{- end }} - name: istio-podinfo mountPath: /etc/istio/pod
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Jan 10 05:10:03 UTC 2024 - 102.6K bytes - Viewed (0) -
operator/cmd/mesh/testdata/manifest-generate/data-snapshot.tar.gz
See more details at: https://istio.io/docs/reference/config/security/peer_authentication.html' properties: mtls: description: Mutual TLS settings for workload. properties: mode: description: Defines the mTLS mode used for peer authentication. enum: - UNSET - DISABLE - PERMISSIVE - STRICT type: string type: object portLevelMtls: additionalProperties: properties: mode: description: Defines the mTLS mode used for peer authentication. enum: - UNSET - DISABLE - PERMISSIVE - STRICT type: string type: object...
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Jan 10 05:10:03 UTC 2024 - 198.1K bytes - Viewed (0) -
pilot/pkg/networking/core/gateway_test.go
}, }, { // tcp server is non-istio mtls, no istio-peer-exchange in the alpns name: "tcp server with terminating (non-istio)mutual tls", server: &networking.Server{ Hosts: []string{"httpbin.example.com", "bookinfo.example.com"}, Port: &networking.Port{ Protocol: string(protocol.TLS), }, Tls: &networking.ServerTLSSettings{
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon May 06 04:44:06 UTC 2024 - 144K bytes - Viewed (0) -
tests/integration/pilot/common/routing.go
metadata: name: %s spec: selector: matchLabels: app: %s mtls: mode: %s --- `, app, app, mode) } func globalPeerAuthentication(mode string) string { return fmt.Sprintf(`apiVersion: security.istio.io/v1beta1 kind: PeerAuthentication metadata: name: default spec: mtls: mode: %s --- `, mode) }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed May 08 21:52:51 UTC 2024 - 135.9K bytes - Viewed (0) -
pkg/config/validation/validation_test.go
}, "must have TLS", }, { "tls on HTTP", &networking.Server{ Hosts: []string{"foo.bar.com"}, Port: &networking.Port{Number: 10000, Name: "http", Protocol: "http"}, Tls: &networking.ServerTLSSettings{Mode: networking.ServerTLSSettings_SIMPLE}, }, "cannot have TLS", }, { "tls redirect on HTTP", &networking.Server{
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Apr 30 03:11:45 UTC 2024 - 196K bytes - Viewed (0) -
cluster/gce/gci/configure-helper.sh
# GRPC can work with either UDS or mTLS. params+=("--mode=http-connect") params+=("--server-port=8131") params+=("--agent-namespace=") params+=("--agent-service-account=") params+=("--authentication-audience=") # Need to fix ANP code to allow kubeconfig to be set with mtls. params+=("--kubeconfig=") params+=("--proxy-strategies=destHost,default")
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Jun 10 22:07:47 UTC 2024 - 141.1K bytes - Viewed (0) -
pilot/pkg/networking/core/cluster_test.go
}) // No policy visible, auto-mTLS should set to PERMISSIVE. // For port 8080, (m)TLS settings is automatically added, thus its cluster should have TLS context. // TlsContext is nil because we use socket match instead g.Expect(getTLSContext(t, clusters[0])).To(BeNil()) g.Expect(clusters[0].TransportSocketMatches).To(HaveLen(2)) // For 9090, use the TLS settings are explicitly specified in DR (which disable TLS)
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Jun 13 01:56:28 UTC 2024 - 108.8K bytes - Viewed (0) -
pkg/config/validation/validation.go
if tls.CaCrl != "" || tls.ServerCertificate != "" || tls.PrivateKey != "" || tls.CaCertificates != "" || tls.CredentialName != "" { // Warn for backwards compatibility v = AppendWarningf(v, "%v mode does not use certificates, they will be ignored", tls.Mode) } } if (tls.Mode == networking.ServerTLSSettings_SIMPLE || tls.Mode == networking.ServerTLSSettings_MUTUAL ||
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Jun 12 04:03:33 UTC 2024 - 107.2K bytes - Viewed (0)