- Sort Score
- Result 10 results
- Languages All
Results 31 - 40 of 89 for egressgateway (0.32 sec)
-
manifests/charts/gateways/istio-egress/files/profile-demo.yaml
pilot: autoscaleEnabled: false traceSampling: 100 resources: requests: cpu: 10m memory: 100Mi gateways: istio-egressgateway: autoscaleEnabled: false resources: requests: cpu: 10m memory: 40Mi istio-ingressgateway: autoscaleEnabled: false ports:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Apr 02 22:30:06 UTC 2024 - 2.1K bytes - Viewed (0) -
manifests/charts/ztunnel/files/profile-demo.yaml
pilot: autoscaleEnabled: false traceSampling: 100 resources: requests: cpu: 10m memory: 100Mi gateways: istio-egressgateway: autoscaleEnabled: false resources: requests: cpu: 10m memory: 40Mi istio-ingressgateway: autoscaleEnabled: false ports:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Apr 02 22:30:06 UTC 2024 - 2.1K bytes - Viewed (0) -
tests/integration/ambient/untaint/main_test.go
env: PILOT_ENABLE_NODE_UNTAINT_CONTROLLERS: "true" ztunnel: terminationGracePeriodSeconds: 5 env: SECRET_TTL: 5m gateways: istio-ingressgateway: enabled: false istio-egressgateway: enabled: false ` }, cert.CreateCASecretAlt)). Teardown(untaintNodes). Run() } func taintNodes(t resource.Context) error {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Apr 17 14:58:41 UTC 2024 - 3.2K bytes - Viewed (0) -
istioctl/pkg/proxystatus/proxystatus.go
istioctl proxy-status # Retrieve sync status for Envoys in a specific namespace istioctl proxy-status --namespace foo # Retrieve sync diff for a single Envoy and Istiod istioctl proxy-status istio-egressgateway-59585c5b9c-ndc59.istio-system # SECURITY OPTIONS # Retrieve proxy status information directly from the control plane, using token security
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sat Apr 13 05:23:38 UTC 2024 - 6.2K bytes - Viewed (0) -
istioctl/pkg/internaldebug/internal-debug.go
`, Example: ` # Retrieve sync status for all Envoys in a mesh istioctl x internal-debug syncz # Retrieve sync diff for a single Envoy and Istiod istioctl x internal-debug syncz istio-egressgateway-59585c5b9c-ndc59.istio-system # SECURITY OPTIONS # Retrieve syncz debug information directly from the control plane, using token security
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Mar 15 04:16:55 UTC 2024 - 6.9K bytes - Viewed (0) -
pkg/config/analysis/analyzers/testdata/gateway-custom-ingressgateway-badport.yaml
# Gateway with non-standard IngressGateway # apiVersion: networking.istio.io/v1alpha3 kind: Gateway metadata: name: httpbin-gateway spec: selector: myapp: private-ingressgateway servers: - port: number: 8004 name: http2 protocol: HTTP hosts: - "*" --- apiVersion: v1 kind: Pod metadata: labels: myapp: private-ingressgateway name: my-ingressgateway-1234 spec:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Jun 04 08:48:06 UTC 2024 - 674 bytes - Viewed (0) -
pkg/config/analysis/analyzers/testdata/gateway-custom-ingressgateway-translation.yaml
# Gateway with non-standard IngressGateway # apiVersion: networking.istio.io/v1alpha3 kind: Gateway metadata: name: httpbin-gateway spec: selector: myapp: private-ingressgateway servers: - port: number: 80 name: http2 protocol: HTTP hosts: - "*" --- apiVersion: v1 kind: Pod metadata: labels: myapp: private-ingressgateway name: my-ingressgateway-1234 spec:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Jun 04 08:48:06 UTC 2024 - 672 bytes - Viewed (0) -
pkg/config/analysis/analyzers/testdata/gateway-custom-ingressgateway-badport-notarget.yaml
# Gateway with non-standard IngressGateway # apiVersion: networking.istio.io/v1alpha3 kind: Gateway metadata: name: httpbin-gateway spec: selector: myapp: private-ingressgateway servers: - port: number: 8004 name: http2 protocol: HTTP hosts: - "*" --- apiVersion: v1 kind: Pod metadata: labels: myapp: private-ingressgateway name: my-ingressgateway-1234 spec:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Jun 04 08:48:06 UTC 2024 - 653 bytes - Viewed (0) -
tests/integration/pilot/gw_topology_test.go
kind: Service metadata: name: custom-gateway labels: istio: ingressgateway spec: ports: - port: 80 targetPort: 8080 name: http selector: istio: ingressgateway --- apiVersion: apps/v1 kind: Deployment metadata: name: custom-gateway spec: selector: matchLabels: istio: ingressgateway template: metadata: annotations:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Apr 08 22:02:59 UTC 2024 - 8K bytes - Viewed (0) -
pkg/test/datasets/validation/dataset/networking-v1-Gateway.yaml
# Routes TCP traffic through the ingressgateway Gateway to service A. apiVersion: networking.istio.io/v1 kind: Gateway metadata: name: valid-gateway spec: selector: # DO NOT CHANGE THESE LABELS # The ingressgateway is defined in install/kubernetes/helm/istio/values.yaml # with these labels istio: ingressgateway servers: - port: number: 31400 protocol: TCP name: tcp hosts:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Apr 01 14:30:05 UTC 2024 - 460 bytes - Viewed (0)