- Sort Score
- Result 10 results
- Languages All
Results 11 - 20 of 30 for tls (0.22 sec)
-
manifests/charts/istiod-remote/files/profile-demo.yaml
targetPort: 8443 name: https - port: 31400 targetPort: 31400 name: tcp # This is the port where sni routing happens - port: 15443 targetPort: 15443 name: tls resources: requests: cpu: 10m
Others - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Tue Apr 02 22:30:06 GMT 2024 - 2.1K bytes - Viewed (0) -
istioctl/pkg/xds/client.go
// See the License for the specific language governing permissions and // limitations under the License. package xds // xds uses ADSC to call XDS import ( "context" "crypto/tls" "fmt" "strings" discovery "github.com/envoyproxy/go-control-plane/envoy/service/discovery/v3" "google.golang.org/grpc" "google.golang.org/grpc/credentials" "istio.io/istio/istioctl/pkg/clioptions"
Go - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Tue Dec 19 22:42:42 GMT 2023 - 3.7K bytes - Viewed (0) -
istioctl/pkg/clioptions/central.go
"Skip server certificate and domain verification. (NOT SECURE!)") cmd.PersistentFlags().BoolVar(&o.Plaintext, "plaintext", viper.GetBool("PLAINTEXT"), "Use plain-text HTTP/2 when connecting to server (no TLS).") } // ValidateControlPlaneFlags checks arguments for valid values and combinations func (o *CentralControlPlaneOptions) ValidateControlPlaneFlags() error { if o.Xds != "" && o.XdsPodLabel != "" {
Go - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Mon Jun 06 03:39:27 GMT 2022 - 3.2K bytes - Viewed (0) -
cni/pkg/config/config.go
KubeconfigFilename string // The file mode to set when creating the kubeconfig file KubeconfigMode int // CA file for kubeconfig KubeCAFile string // Whether to use insecure TLS in the kubeconfig file SkipTLSVerify bool // KUBERNETES_SERVICE_PROTOCOL K8sServiceProtocol string // KUBERNETES_SERVICE_HOST K8sServiceHost string // KUBERNETES_SERVICE_PORT K8sServicePort string
Go - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Tue Apr 30 22:24:38 GMT 2024 - 5.5K bytes - Viewed (0) -
istioctl/pkg/writer/compare/sds/util.go
import ( "crypto/x509" "encoding/pem" "fmt" "time" envoy_admin "github.com/envoyproxy/go-control-plane/envoy/admin/v3" auth "github.com/envoyproxy/go-control-plane/envoy/extensions/transport_sockets/tls/v3" "istio.io/istio/istioctl/pkg/util/configdump" "istio.io/istio/pkg/log" ) // SecretItemDiff represents a secret that has been diffed between nodeagent and proxy type SecretItemDiff struct {
Go - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Tue Jun 06 15:14:48 GMT 2023 - 6.6K bytes - Viewed (0) -
manifests/charts/gateways/istio-ingress/files/profile-demo.yaml
targetPort: 8443 name: https - port: 31400 targetPort: 31400 name: tcp # This is the port where sni routing happens - port: 15443 targetPort: 15443 name: tls resources: requests: cpu: 10m
Others - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Tue Apr 02 22:30:06 GMT 2024 - 2.1K bytes - Viewed (0) -
istioctl/pkg/kubeinject/testdata/mesh-config.yaml
proxyAdminPort: 15000 # # Zipkin trace collector zipkinAddress: "" # # Statsd metrics collector converts statsd metrics into Prometheus metrics. statsdUdpAddress: "" # # Mutual TLS authentication between sidecars and istio control plane. controlPlaneAuthPolicy: NONE # # Address where istio Pilot service is running
Others - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Thu Jun 15 15:02:17 GMT 2023 - 2.2K bytes - Viewed (0) -
istioctl/pkg/writer/envoy/configdump/testdata/secret/config_dump.json
{ "name": "default", "last_updated": "2023-05-15T01:32:52.262Z", "secret": { "@type": "type.googleapis.com/envoy.extensions.transport_sockets.tls.v3.Secret", "name": "default", "tls_certificate": { "certificate_chain": {
Json - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Tue Jun 06 15:14:48 GMT 2023 - 5.4K bytes - Viewed (0) -
manifests/charts/gateways/istio-egress/NOTES.txt
2. Copy any TLS certificate to the new namespace, and configure the domains. 3. Checking the new gateway work - for example by overriding the IP in /etc/hosts 4. Modify the DNS server to add the A record of the new namespace 5. Check traffic 6. Delete the A record corresponding to the gateway in istio-system 7. Upgrade istio-system, disabling the ingressgateway 8. Delete the domain TLS certs from istio-system.
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Wed Apr 15 21:29:06 GMT 2020 - 1.5K bytes - Viewed (0) -
manifests/charts/gateways/istio-ingress/NOTES.txt
2. Copy any TLS certificate to the new namespace, and configure the domains. 3. Checking the new gateway work - for example by overriding the IP in /etc/hosts 4. Modify the DNS server to add the A record of the new namespace 5. Check traffic 6. Delete the A record corresponding to the gateway in istio-system 7. Upgrade istio-system, disabling the ingressgateway 8. Delete the domain TLS certs from istio-system.
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Wed Apr 15 21:29:06 GMT 2020 - 2K bytes - Viewed (0)