Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 227 for much (0.13 sec)

  1. architecture/ambient/ztunnel.md

    * Ensure traffic between mesh workloads is securely encrypted with an Istio identity.
    * Be lightweight enough to not limit adoption.
      * This puts a much tighter budget on CPU, memory, latency, and throughput requirements than traditional Istio sidecars.
    
    Ztunnel was not designed to be a feature-rich data plane.
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Thu Apr 25 22:35:16 GMT 2024
    - 16.6K bytes
    - Viewed (0)
  2. common-protos/k8s.io/api/authorization/v1beta1/generated.proto

      // encountered when an authorizer, such as an external authorizer, doesn't support rules evaluation.
      optional bool incomplete = 3;
    
      // EvaluationError can appear in combination with Rules. It indicates an error occurred during
      // rule evaluation, such as an authorizer that doesn't support rule evaluation, and that
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Mon Mar 11 18:43:24 GMT 2024
    - 11.9K bytes
    - Viewed (0)
  3. cni/README.md

    [containernetworking sample plugin](https://github.com/containernetworking/plugins/tree/main/plugins/sample)
    
    The details for the deployment & installation of this plugin were pretty much lifted directly from the
    [Calico CNI plugin](https://github.com/projectcalico/cni-plugin).
    
    Specifically:
    
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Fri May 03 19:29:42 GMT 2024
    - 12.3K bytes
    - Viewed (0)
  4. common-protos/k8s.io/api/networking/v1alpha1/generated.proto

      // This field is immutable.
      // +optional
      optional k8s.io.api.core.v1.NodeSelector nodeSelector = 1;
    
      // perNodeHostBits defines the number of host bits to be configured per node.
      // A subnet mask determines how much of the address is used for network bits
      // and host bits. For example an IPv4 address of 192.168.0.0/24, splits the
      // address into 24 bits for the network portion and 8 bits for the host portion.
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Mon Mar 11 18:43:24 GMT 2024
    - 6K bytes
    - Viewed (0)
  5. common-protos/k8s.io/api/authorization/v1/generated.proto

      // encountered when an authorizer, such as an external authorizer, doesn't support rules evaluation.
      optional bool incomplete = 3;
    
      // EvaluationError can appear in combination with Rules. It indicates an error occurred during
      // rule evaluation, such as an authorizer that doesn't support rule evaluation, and that
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Mon Mar 11 18:43:24 GMT 2024
    - 11.9K bytes
    - Viewed (0)
  6. architecture/security/istio-agent.md

    1. First, the request is handled by the SDS server. This is mostly just an intermediate translation layer exposing
       the `SecretManager` to Envoy, without much business logic. For each resource requested by Envoy, the SDS server
       will call `SecretManager.GenerateSecret(resourceName)`
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Tue Aug 22 16:45:50 GMT 2023
    - 7.2K bytes
    - Viewed (1)
  7. licenses/cloud.google.com/go/trace/LICENSE

          use, offer to sell, sell, import, and otherwise transfer the Work,
          where such license applies only to those patent claims licensable
          by such Contributor that are necessarily infringed by their
          Contribution(s) alone or by combination of their Contribution(s)
          with the Work to which such Contribution(s) was submitted. If You
          institute patent litigation against any entity (including a
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Tue Nov 01 23:31:22 GMT 2022
    - 11.1K bytes
    - Viewed (0)
  8. licenses/github.com/AdaLogics/go-fuzz-headers/LICENSE

          use, offer to sell, sell, import, and otherwise transfer the Work,
          where such license applies only to those patent claims licensable
          by such Contributor that are necessarily infringed by their
          Contribution(s) alone or by combination of their Contribution(s)
          with the Work to which such Contribution(s) was submitted. If You
          institute patent litigation against any entity (including a
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Mon Jun 28 18:00:28 GMT 2021
    - 11.1K bytes
    - Viewed (0)
  9. licenses/cloud.google.com/go/longrunning/LICENSE

          use, offer to sell, sell, import, and otherwise transfer the Work,
          where such license applies only to those patent claims licensable
          by such Contributor that are necessarily infringed by their
          Contribution(s) alone or by combination of their Contribution(s)
          with the Work to which such Contribution(s) was submitted. If You
          institute patent litigation against any entity (including a
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Tue Nov 01 23:31:22 GMT 2022
    - 11.1K bytes
    - Viewed (0)
  10. licenses/cloud.google.com/go/auth/LICENSE

          use, offer to sell, sell, import, and otherwise transfer the Work,
          where such license applies only to those patent claims licensable
          by such Contributor that are necessarily infringed by their
          Contribution(s) alone or by combination of their Contribution(s)
          with the Work to which such Contribution(s) was submitted. If You
          institute patent litigation against any entity (including a
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Tue Apr 30 13:56:46 GMT 2024
    - 11.1K bytes
    - Viewed (0)
Back to top