Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 24 for Slow (2.92 sec)

  1. architecture/security/docs/sds-flow.svg

    sds-flow.svg...
    SVG Image
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Fri Aug 25 00:43:58 GMT 2023
    - 54.5K bytes
    - Viewed (0)
  2. cni/pkg/repair/repaircontroller.go

    		return c.labelBrokenPod(pod)
    	}
    	return nil
    }
    
    // repairPod actually dynamically repairs a pod. This is done by entering the pods network namespace and setting up rules.
    // This differs from the general CNI plugin flow, which triggers before the pod fully starts.
    // Additionally, we need to jump through hoops to find the network namespace.
    func (c *Controller) repairPod(pod *corev1.Pod) error {
    	m := podsRepaired.With(typeLabel.Value(repairType))
    Go
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Sat Feb 10 00:31:55 GMT 2024
    - 10.4K bytes
    - Viewed (0)
  3. cni/README.md

    This component accomplishes that in the following ways:
    
    1. By installing a separate, very basic "CNI plugin" binary onto the node to forward low-level pod lifecycle events (CmdAdd/CmdDel/etc) from whatever node-level CNI subsystem is in use to this node agent for processing via socket.
    1. By running as a node-level daemonset that:
    
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Fri May 03 19:29:42 GMT 2024
    - 12.3K bytes
    - Viewed (0)
  4. manifests/charts/istio-control/istio-discovery/values.yaml

        # Kubernetes >=v1.11.0 will create two PriorityClass, including system-cluster-critical and
        # system-node-critical, it is better to configure this in order to make sure your Istio pods
        # will not be killed because of low priority class.
        # Refer to https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/#priorityclass
        # for more detail.
        priorityClassName: ""
    
        proxy:
          image: proxyv2
    
    Others
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Mon Apr 22 22:00:40 GMT 2024
    - 20.3K bytes
    - Viewed (0)
  5. architecture/ambient/ztunnel.md

    Additionally, using the redirection mechanism reduces the need for clients to know the destination's ztunnel address.
    
    Below shows an example outbound request. The "target" path is what the client sends, while the "actual" path is the real network flow after redirection.
    
    ```mermaid
    graph LR
        subgraph Client Node
            Client
            CZ["Ztunnel"]
        end
        subgraph Server Node
            Server
            SZ["Ztunnel"]
        end
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Thu Apr 25 22:35:16 GMT 2024
    - 16.6K bytes
    - Viewed (0)
  6. common-protos/k8s.io/api/flowcontrol/v1beta2/generated.proto

    // FlowDistinguisherMethod specifies the method of a flow distinguisher.
    message FlowDistinguisherMethod {
      // `type` is the type of flow distinguisher method
      // The supported types are "ByUser" and "ByNamespace".
      // Required.
      optional string type = 1;
    }
    
    // FlowSchema defines the schema of a group of flows. Note that a flow is made up of a set of inbound API requests with
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Mon Mar 11 18:43:24 GMT 2024
    - 19.4K bytes
    - Viewed (0)
  7. common-protos/k8s.io/api/flowcontrol/v1alpha1/generated.proto

    // FlowDistinguisherMethod specifies the method of a flow distinguisher.
    message FlowDistinguisherMethod {
      // `type` is the type of flow distinguisher method
      // The supported types are "ByUser" and "ByNamespace".
      // Required.
      optional string type = 1;
    }
    
    // FlowSchema defines the schema of a group of flows. Note that a flow is made up of a set of inbound API requests with
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Mon Mar 11 18:43:24 GMT 2024
    - 19.4K bytes
    - Viewed (0)
  8. bin/diff_yaml.py

        print("##", "*" * 25)
    
        for k in sorted(common):
            if q0[k] != q1[k]:
                print("## ", k)
                s0 = yaml.safe_dump(q0[k], default_flow_style=False, indent=2)
                s1 = yaml.safe_dump(q1[k], default_flow_style=False, indent=2)
    
                print(datadiff.diff(s0, s1, fromfile=args.orig, tofile=args.new))
    
        return changed + len(added) + len(removed)
    
    
    def main(args):
    Python
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Wed Mar 03 16:14:57 GMT 2021
    - 4.5K bytes
    - Viewed (0)
  9. architecture/ambient/peer-authentication.md

    The following diagram illustrates the flow of unauthenticated traffic with a `PERMISSIVE` policy:
    
    ```mermaid
    graph TD;
    src[src pod]-->|plaintext port|ztunnel{"ztunnel (L4 policy applied here)"}
    ztunnel{ztunnel}-->|TLS|wp{waypoint}
    wp-->|mTLS|ztunnel
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Wed Aug 09 22:09:18 GMT 2023
    - 3.9K bytes
    - Viewed (0)
  10. manifests/charts/gateway/values.yaml

      # https://kubernetes.io/docs/concepts/storage/volumes/.
      volumeMounts: []
    
      # Configure this to a higher priority class in order to make sure your Istio gateway pods
      # will not be killed because of low priority class.
      # Refer to https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/#priorityclass
      # for more detail.
    Others
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Thu Jan 11 16:55:28 GMT 2024
    - 4.4K bytes
    - Viewed (0)
Back to top