Search Options

Results per page
Sort
Preferred Languages
Advance

Results 71 - 80 of 530 for Envoy (0.04 sec)

  1. samples/ratelimit/local-rate-limit-service.yaml

              filterChain:
                filter:
                  name: "envoy.filters.network.http_connection_manager"
          patch:
            operation: INSERT_BEFORE
            value:
              name: envoy.filters.http.local_ratelimit
              typed_config:
                "@type": type.googleapis.com/udpa.type.v1.TypedStruct
                type_url: type.googleapis.com/envoy.extensions.filters.http.local_ratelimit.v3.LocalRateLimit
                value:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Aug 31 08:22:09 UTC 2023
    - 3.1K bytes
    - Viewed (0)
  2. releasenotes/notes/filter-order.yaml

    apiVersion: release-notes/v2
    kind: bug-fix
    area: traffic-management
    releaseNotes:
      - |
        **Improved** the ordering of HTTP and TCP envoy filters to improve consistency
    upgradeNotes:
      - title: "Envoy filter ordering"
        content: |
          This change impacts internal implementation of how Envoy "filters" are ordered. These filters run in order to implement various functionality.
          
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri Sep 15 18:28:50 UTC 2023
    - 895 bytes
    - Viewed (0)
  3. pilot/pkg/security/authz/builder/testdata/tcp/audit-both-http-tcp-out.yaml

    name: envoy.filters.network.rbac
    typedConfig:
      '@type': type.googleapis.com/envoy.extensions.filters.network.rbac.v3.RBAC
      rules:
        action: LOG
        policies:
          ns[foo]-policy[httpbin-audit]-rule[0]:
            permissions:
            - andRules:
                rules:
                - orRules:
                    rules:
                    - destinationPort: 80
                - notRule:
                    orRules:
                      rules:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue Oct 17 16:35:46 UTC 2023
    - 4.8K bytes
    - Viewed (0)
  4. pilot/pkg/security/authz/builder/testdata/http/extended-custom-grpc-provider-no-namespace-out2.yaml

    name: envoy.filters.http.ext_authz
    typedConfig:
      '@type': type.googleapis.com/envoy.extensions.filters.http.ext_authz.v3.ExtAuthz
      failureModeAllow: true
      filterEnabledMetadata:
        filter: envoy.filters.http.rbac
        path:
        - key: istio_ext_authz_shadow_effective_policy_id
        value:
          stringMatch:
            prefix: istio-ext-authz
      grpcService:
        envoyGrpc:
          authority: my-custom-ext-authz.foo.svc.cluster.local
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Mar 25 10:39:25 UTC 2024
    - 589 bytes
    - Viewed (0)
  5. istioctl/pkg/writer/envoy/configdump/testdata/routes/empty-gateway/configdump.json

    {
     "configs": [
      {
       "@type": "type.googleapis.com/envoy.admin.v3.RoutesConfigDump",
       "static_route_configs": [
        {
         "route_config": {
          "@type": "type.googleapis.com/envoy.config.route.v3.RouteConfiguration",
          "virtual_hosts": [
           {
            "name": "backend",
            "domains": [
             "*"
            ],
            "routes": [
             {
              "match": {
               "prefix": "/healthz/ready"
              },
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Nov 29 12:37:14 UTC 2023
    - 1.1K bytes
    - Viewed (0)
  6. pilot/pkg/networking/core/extension/wasmplugin_test.go

    package extension
    
    import (
    	"testing"
    
    	core "github.com/envoyproxy/go-control-plane/envoy/config/core/v3"
    	httpwasm "github.com/envoyproxy/go-control-plane/envoy/extensions/filters/http/wasm/v3"
    	networkwasm "github.com/envoyproxy/go-control-plane/envoy/extensions/filters/network/wasm/v3"
    	wasmextension "github.com/envoyproxy/go-control-plane/envoy/extensions/wasm/v3"
    	"github.com/google/go-cmp/cmp"
    	"google.golang.org/protobuf/testing/protocmp"
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed May 15 09:02:11 UTC 2024
    - 5.6K bytes
    - Viewed (0)
  7. samples/extauthz/README.md

    # Ext Authz Service
    
    [Ext Authz server](cmd/extauthz) implements the external server for the [Envoy ext_authz filter](https://www.envoyproxy.io/docs/envoy/v1.16.0/intro/arch_overview/security/ext_authz_filter)
    as an example of integrating custom authorization system into Istio.
    
    The Ext Authz server supports authorization check request using either HTTP (port 8000) or gRPC v2/v3 (port 9000) API and
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Sep 21 13:52:47 UTC 2023
    - 4.1K bytes
    - Viewed (0)
  8. pilot/pkg/model/wasm.go

    package model
    
    import (
    	core "github.com/envoyproxy/go-control-plane/envoy/config/core/v3"
    	wasm "github.com/envoyproxy/go-control-plane/envoy/extensions/wasm/v3"
    )
    
    // ConstructVMConfig constructs a VM config.
    func ConstructVMConfig(name string) *wasm.PluginConfig_VmConfig {
    	return &wasm.PluginConfig_VmConfig{
    		VmConfig: &wasm.VmConfig{
    			Runtime: "envoy.wasm.runtime.null",
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu May 04 03:49:23 UTC 2023
    - 1.1K bytes
    - Viewed (0)
  9. releasenotes/notes/no_extension_lookup_by_name.yaml

    area: traffic-management
    releaseNotes:
      - |
        **Removed** support for looking up Envoy extensions in `EnvoyFilter` configuration by name without the typed config URL.
    
    upgradeNotes:
      - title: EnvoyFilter must specify the type URL for an Envoy extension injection.
        content: |
          Previously, Istio permitted a lookup of the extension in `EnvoyFilter` by its internal Envoy name alone. To see if you are affected,
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Jun 26 21:20:37 UTC 2023
    - 712 bytes
    - Viewed (0)
  10. pilot/pkg/features/xds.go

    	// EnableMysqlFilter enables injection of `envoy.filters.network.mysql_proxy` in the filter chain.
    	// Pilot injects this outbound filter if the service port name is `mysql`.
    	EnableMysqlFilter = env.Register(
    		"PILOT_ENABLE_MYSQL_FILTER",
    		false,
    		"EnableMysqlFilter enables injection of `envoy.filters.network.mysql_proxy` in the filter chain.",
    	).Get()
    
    	// EnableRedisFilter enables injection of `envoy.filters.network.redis_proxy` in the filter chain.
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Sat Feb 24 06:18:36 UTC 2024
    - 3.4K bytes
    - Viewed (0)
Back to top