Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 80 for etc (0.11 sec)

  1. docker/Dockerfile.distroless

    FROM ubuntu:noble as ubuntu_source
    
    # Modify contents of container
    COPY --from=distroless_source /etc/ /home/etc
    COPY --from=distroless_source /home/nonroot /home/nonroot
    RUN echo istio-proxy:x:1337: >> /home/etc/group
    RUN echo istio-proxy:x:1337:1337:istio-proxy:/nonexistent:/sbin/nologin >> /home/etc/passwd
    
    # Customize distroless with the following:
    # - password file
    # - groups file
    # - /home/nonroot directory
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Wed May 08 18:50:51 GMT 2024
    - 836 bytes
    - Viewed (0)
  2. manifests/charts/istio-control/istio-discovery/files/grpc-agent.yaml

        # UDS channel between istioagent and gRPC client for XDS/SDS
        - mountPath: /etc/istio/proxy
          name: istio-xds
        - mountPath: /var/run/secrets/tokens
          name: istio-token
        {{- if .Values.global.mountMtlsCerts }}
        # Use the key and cert mounted to /etc/certs/ for the in-cluster mTLS communications.
        - mountPath: /etc/certs/
          name: istio-certs
          readOnly: true
        {{- end }}
    Others
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Fri Apr 26 16:51:17 GMT 2024
    - 12.1K bytes
    - Viewed (0)
  3. manifests/charts/istio-control/istio-discovery/files/gateway-injection-template.yaml

          name: istio-data
        # SDS channel between istioagent and Envoy
        - mountPath: /etc/istio/proxy
          name: istio-envoy
        - mountPath: /var/run/secrets/tokens
          name: istio-token
        {{- if .Values.global.mountMtlsCerts }}
        # Use the key and cert mounted to /etc/certs/ for the in-cluster mTLS communications.
        - mountPath: /etc/certs/
          name: istio-certs
          readOnly: true
        {{- end }}
    Others
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Tue Feb 27 16:55:16 GMT 2024
    - 8.6K bytes
    - Viewed (0)
  4. manifests/charts/gateways/istio-ingress/templates/deployment.yaml

              # Use the key and cert mounted to /etc/certs/ for the in-cluster mTLS communications.
              - name: istio-certs
                mountPath: /etc/certs
                readOnly: true
              {{- end }}
              - mountPath: /var/lib/istio/data
                name: istio-data
              - name: podinfo
                mountPath: /etc/istio/pod
              {{- range $gateway.secretVolumes }}
    Others
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Thu Apr 18 18:16:49 GMT 2024
    - 12.1K bytes
    - Viewed (1)
  5. manifests/charts/gateways/istio-ingress/files/profile-openshift.yaml

    # The OpenShift profile provides a basic set of settings to run Istio on OpenShift
    # CNI must be installed.
    cni:
      cniBinDir: /var/lib/cni/bin
      cniConfDir: /etc/cni/multus/net.d
      chained: false
      cniConfFileName: "istio-cni.conf"
      logLevel: info
      provider: "multus"
    global:
      platform: openshift
    pilot:
      cni:
        enabled: true
        provider: "multus"
    Others
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Wed Apr 10 12:37:25 GMT 2024
    - 594 bytes
    - Viewed (0)
  6. manifests/charts/istiod-remote/files/profile-openshift.yaml

    # The OpenShift profile provides a basic set of settings to run Istio on OpenShift
    # CNI must be installed.
    cni:
      cniBinDir: /var/lib/cni/bin
      cniConfDir: /etc/cni/multus/net.d
      chained: false
      cniConfFileName: "istio-cni.conf"
      logLevel: info
      provider: "multus"
    global:
      platform: openshift
    pilot:
      cni:
        enabled: true
        provider: "multus"
    Others
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Wed Apr 10 12:37:25 GMT 2024
    - 594 bytes
    - Viewed (0)
  7. manifests/charts/istiod-remote/files/profile-openshift-ambient.yaml

    meshConfig:
      defaultConfig:
        proxyMetadata:
          ISTIO_META_ENABLE_HBONE: "true"
    global:
      platform: openshift
    cni:
      ambient:
        enabled: true
      cniBinDir: /var/lib/cni/bin
      cniConfDir: /etc/cni/multus/net.d
      chained: false
      cniConfFileName: "istio-cni.conf"
      logLevel: info
      provider: "multus"
    pilot:
      cni:
        enabled: true
        provider: "multus"
      variant: distroless
      env:
    Others
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Sat May 04 01:17:57 GMT 2024
    - 955 bytes
    - Viewed (0)
  8. bin/build_ztunnel.sh

        else
          echo "No directory at ${ZTUNNEL_DIR}"
          return
        fi
      fi
      if [[ "${BUILD_ZTUNNEL_REPO:-}" == "" ]]; then
        return
      fi
    
      if ! which cargo; then
        echo "the rust toolchain (cargo, etc) is required for building ztunnel"
        return 1
      fi
    
      pushd "${BUILD_ZTUNNEL_REPO}"
      cargo build --profile="${BUILD_ZTUNNEL_PROFILE:-dev}" ${BUILD_ZTUNNEL_TARGET:+--target=${BUILD_ZTUNNEL_TARGET}}
    
    Shell Script
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Tue Apr 02 21:46:06 GMT 2024
    - 5K bytes
    - Viewed (0)
  9. cni/README.md

    # Istio CNI Node Agent
    
    The Istio CNI Node Agent is responsible for several things
    
    - Install an Istio CNI plugin binary on each node's filesystem, updating that node's CNI config in e.g (`/etc/cni/net.d`), and watching the config and binary paths to reinstall if things are modified.
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Fri May 03 19:29:42 GMT 2024
    - 12.3K bytes
    - Viewed (0)
  10. manifests/charts/istiod-remote/files/gateway-injection-template.yaml

          name: istio-data
        # SDS channel between istioagent and Envoy
        - mountPath: /etc/istio/proxy
          name: istio-envoy
        - mountPath: /var/run/secrets/tokens
          name: istio-token
        {{- if .Values.global.mountMtlsCerts }}
        # Use the key and cert mounted to /etc/certs/ for the in-cluster mTLS communications.
        - mountPath: /etc/certs/
          name: istio-certs
          readOnly: true
        {{- end }}
    Others
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Tue Feb 27 16:55:16 GMT 2024
    - 8.6K bytes
    - Viewed (0)
Back to top