Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 3 of 3 for rebawl (0.22 sec)

  1. architecture/ambient/ztunnel.md

    ## Background and motivation
    
    Motivations to implement ztunnel generally came from two areas.
    
    First, and most importantly, it serves as a means to implement the real goal: waypoints.
    For various reasons outside the scope of this document, there is a desire to move from a sidecar based architecture to a "remote proxy" architecture.
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Thu Apr 25 22:35:16 GMT 2024
    - 16.6K bytes
    - Viewed (0)
  2. common-protos/k8s.io/api/core/v1/generated.proto

      // kubelet.  If the kubelet is configured to verify the apiserver's TLS credentials, it does not mean the
      // connection to the real kubelet is vulnerable to a man in the middle attack (e.g. an attacker could not intercept
      // the actual log data coming from the real kubelet).
      // +optional
      optional bool insecureSkipTLSVerifyBackend = 9;
    }
    
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Mon Mar 11 18:43:24 GMT 2024
    - 255.8K bytes
    - Viewed (0)
  3. common-protos/k8s.io/apimachinery/pkg/apis/meta/v1/generated.proto

      // For example: the master will return an internal IP CIDR only, if the client reaches the server using an internal IP.
      // Server looks at X-Forwarded-For header or X-Real-Ip header or request.RemoteAddr (in that order) to get the client IP.
      // +optional
      repeated ServerAddressByClientCIDR serverAddressByClientCIDRs = 4;
    }
    
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Mon Mar 11 18:43:24 GMT 2024
    - 53.3K bytes
    - Viewed (0)
Back to top