Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 118 for MUTUAL (0.24 sec)

  1. pkg/config/analysis/analyzers/testdata/destinationrule-mutual-port.yaml

    # No caCertificates when mode is mutual at port level
    apiVersion: networking.istio.io/v1alpha3
    kind: DestinationRule
    metadata:
      name: db-mtls
    spec:
      host: mydbserver.prod.svc.cluster.local
      trafficPolicy:
        portLevelSettings:
          - port:
              number: 443
            tls:
              mode: MUTUAL
              clientCertificate: /etc/certs/myclientcert.pem
              privateKey: /etc/certs/client_private_key.pem
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Nov 17 12:28:05 UTC 2021
    - 472 bytes
    - Viewed (0)
  2. pkg/config/analysis/analyzers/testdata/destinationrule-mutual-destination.yaml

    # No caCertificates when mode is mutual at destination level
    apiVersion: networking.istio.io/v1alpha3
    kind: DestinationRule
    metadata:
      name: db-mtls
    spec:
      host: mydbserver.prod.svc.cluster.local
      trafficPolicy:
        tls:
          mode: MUTUAL
          clientCertificate: /etc/certs/myclientcert.pem
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Nov 17 12:28:05 UTC 2021
    - 348 bytes
    - Viewed (0)
  3. pkg/config/analysis/analyzers/testdata/destinationrule-compound-mutual-simple.yaml

    # No caCertificates when mode is simple at destination level and MUTUAL at port level
    apiVersion: networking.istio.io/v1alpha3
    kind: DestinationRule
    metadata:
      name: db-mtls
    spec:
      host: mydbserver.prod.svc.cluster.local
      trafficPolicy:
        tls:
          mode: SIMPLE
          clientCertificate: /etc/certs/myclientcert.pem
          privateKey: /etc/certs/client_private_key.pem
        portLevelSettings:
          - port:
              number: 443
            tls:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Nov 17 12:28:05 UTC 2021
    - 638 bytes
    - Viewed (0)
  4. pkg/config/analysis/analyzers/testdata/destinationrule-compound-simple-mutual.yaml

    apiVersion: networking.istio.io/v1alpha3
    kind: DestinationRule
    metadata:
      name: db-mtls
    spec:
      host: mydbserver.prod.svc.cluster.local
      trafficPolicy:
        tls:
          mode: MUTUAL
          clientCertificate: /etc/certs/myclientcert.pem
          privateKey: /etc/certs/client_private_key.pem
        portLevelSettings:
        - port:
            number: 443
          tls:
            mode: SIMPLE
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Nov 17 12:28:05 UTC 2021
    - 599 bytes
    - Viewed (0)
  5. releasenotes/notes/istio-mutual-cred-name.yaml

    apiVersion: release-notes/v2
    kind: bug-fix
    area: traffic-management
    releaseNotes:
    - |
      **Fixed** an issue where using `ISTIO_MUTUAL` TLS mode in Gateways while also setting `credentialName` cause mutual TLS to not be configured.
      This configuration is now rejected, as `ISTIO_MUTUAL` is intended to be used without `credentialName` set.
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Sat Jan 22 06:41:00 UTC 2022
    - 480 bytes
    - Viewed (0)
  6. tests/integration/ambient/testdata/automtls-partial-sidecar-dr-mutual.yaml

    kind: PeerAuthentication
    metadata:
      name: "default"
      annotations:
        test-suite: "automtls-partial-dr-mutual"
    spec:
      mtls:
        mode: STRICT
    ---
    apiVersion: networking.istio.io/v1alpha3
    kind: VirtualService
    metadata:
      name: "multiversion-route"
      annotations:
        test-suite: "automtls-partial-dr-mutual"
    spec:
      hosts:
      - "multiversion"
      http:
      - name: "vistio-route"
        match:
        - uri:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Feb 16 18:55:23 UTC 2023
    - 1.1K bytes
    - Viewed (0)
  7. pkg/config/analysis/analyzers/testdata/destinationrule-with-ca.yaml

    #  caCertificates when mode is mutual at destination level and simple at port level
    apiVersion: networking.istio.io/v1alpha3
    kind: DestinationRule
    metadata:
      name: db-mtls
    spec:
      host: mydbserver.prod.svc.cluster.local
      trafficPolicy:
        tls:
          mode: MUTUAL
          clientCertificate: /etc/certs/myclientcert.pem
          privateKey: /etc/certs/client_private_key.pem
          caCertificates: /etc/certs/root.pem
        portLevelSettings:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Nov 17 12:28:05 UTC 2021
    - 723 bytes
    - Viewed (0)
  8. tests/integration/security/egress_sidecar_tls_origination_test.go

    	"istio.io/istio/pkg/test/framework/resource/config/apply"
    	"istio.io/istio/pkg/test/util/file"
    	ingressutil "istio.io/istio/tests/integration/security/sds_ingress/util"
    )
    
    // TestSidecarMutualTlsOrigination test MUTUAL TLS mode with TLS origination happening at the sidecar.
    // It uses CredentialName set in DestinationRule API to fetch secrets from k8s API server.
    func TestSidecarMutualTlsOrigination(t *testing.T) {
    	// nolint: staticcheck
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Apr 08 22:02:59 UTC 2024
    - 10.4K bytes
    - Viewed (0)
  9. tests/integration/security/testdata/authz/egress-gateway.yaml.tmpl

                hosts: [ "www.company.com" ]
        - to: # checks only a call 443 over istio mutual without JWT
            - operation:
                hosts: [ "{{ .Allowed.ServiceName }}-{{ .Allowed.NamespaceName }}-only.com" ]
          from:
            - source:
                principals: [ "{{ .Allowed.ServiceAccountName }}" ]
        - to: # checks workload can call 443 over istio mutual with JWT
            - operation:
                hosts: [ "jwt-only.com" ]
          from:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Jul 31 15:08:52 UTC 2023
    - 5.2K bytes
    - Viewed (0)
  10. tests/testdata/networking/envoyfilter-without-service/configs.yaml

    # Authentication policy to enable mutual TLS for all services (that have sidecar) in the mesh.
    apiVersion: security.istio.io/v1beta1
    kind: PeerAuthentication
    metadata:
      name: default
      namespace: istio-config
    spec:
      mtls:
        mode: STRICT
    ---
    # Corresponding destination rule to configure client side to use mutual TLS when talking to
    # any service (host) in the mesh.
    apiVersion: networking.istio.io/v1alpha3
    kind: DestinationRule
    metadata:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Jul 13 16:44:49 UTC 2023
    - 1.8K bytes
    - Viewed (0)
Back to top