- Sort Score
- Result 10 results
- Languages All
Results 31 - 40 of about 10,000 for egress (0.43 sec)
-
common-protos/k8s.io/api/extensions/v1beta1/generated.proto
// +optional repeated NetworkPolicyEgressRule egress = 3; // List of rule types that the NetworkPolicy relates to. // Valid options are ["Ingress"], ["Egress"], or ["Ingress", "Egress"]. // If this field is not specified, it will default based on the existence of Ingress or Egress rules; // policies that contain an Egress section are assumed to affect Egress, and all policies
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 45.6K bytes - Viewed (0) -
pkg/controlplane/apiserver/options/options_test.go
"--bind-address=192.168.10.20", "--client-ca-file=/client-ca", "--cors-allowed-origins=10.10.10.100,10.10.10.200", "--contention-profiling=true", "--egress-selector-config-file=/var/run/kubernetes/egress-selector/connectivity.yaml", "--enable-aggregator-routing=true", "--enable-priority-and-fairness=false", "--enable-logs-handler=false", "--etcd-keyfile=/var/run/kubernetes/etcd.key",
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Jun 07 17:57:37 UTC 2024 - 10.7K bytes - Viewed (0) -
pilot/pkg/networking/core/cluster_tls.go
tls = tls.DeepCopy() tls.SubjectAltNames = opts.serviceAccounts } if tls.CredentialName != "" { // If credential name is specified at Destination Rule config and originating node is egress gateway, create // SDS config for egress gateway to fetch key/cert at gateway agent. sec_model.ApplyCustomSDSToClientCommonTLSContext(tlsContext.CommonTlsContext, tls, cb.credentialSocketExist) } else {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Apr 18 19:09:43 UTC 2024 - 19.2K bytes - Viewed (0) -
pkg/test/framework/components/echo/common/deployment/namespace.go
} // Restrict egress from this namespace to only those endpoints in the same Echos. cfg := t.ConfigIstio().New() cfg.Eval(ns.Name(), map[string]any{ "Namespaces": namespaces, }, ` apiVersion: networking.istio.io/v1alpha3 kind: Sidecar metadata: name: restrict-to-namespace spec: egress: - hosts: - "istio-system/*" {{ range $ns := .Namespaces }}
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon May 20 16:01:31 UTC 2024 - 6.1K bytes - Viewed (0) -
Makefile.core.mk
CHARTS = gateway default ztunnel istio-operator base "gateways/istio-ingress" "gateways/istio-egress" "istio-control/istio-discovery" istiod-remote istio-cni copy-templates: rm manifests/charts/istiod-remote/templates/* rm manifests/charts/gateways/istio-egress/templates/* # gateway charts cp -r manifests/charts/gateways/istio-ingress/templates/* manifests/charts/gateways/istio-egress/templates
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sun Jun 02 19:53:04 UTC 2024 - 23.2K bytes - Viewed (0) -
manifests/charts/gateways/istio-egress/values.yaml
# Set this to "external" if and only if you want the egress gateway to # act as a transparent SNI gateway that routes mTLS/TLS traffic to # external services defined using service entries, where the service # entry has resolution set to DNS, has one or more endpoints with # network field set to "external". By default its set to "" so that # the egress gateway sees the same set of endpoints as the sidecars
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Feb 27 16:55:16 UTC 2024 - 12.4K bytes - Viewed (0) -
cmd/kube-apiserver/app/options/options_test.go
"--client-ca-file=/client-ca", "--cloud-config=/cloud-config", "--cloud-provider=azure", "--cors-allowed-origins=10.10.10.100,10.10.10.200", "--contention-profiling=true", "--egress-selector-config-file=/var/run/kubernetes/egress-selector/connectivity.yaml", "--enable-aggregator-routing=true", "--enable-priority-and-fairness=false", "--enable-logs-handler=false",
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Jun 07 17:57:37 UTC 2024 - 12.7K bytes - Viewed (0) -
tests/integration/security/policy_attachment_only/main_test.go
numTrustedProxies: 1 # Needed for X-Forwarded-For (See https://istio.io/latest/docs/ops/configuration/traffic-management/network-topologies/) ` } })). // Create namespaces first. This way, echo can correctly configure egress to all namespaces. SetupParallel( namespace.Setup(&echo1NS, namespace.Config{Prefix: "echo1", Inject: true}), namespace.Setup(&serverNS, namespace.Config{Prefix: "servers", Inject: true}), ). SetupParallel(
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Jan 10 01:47:52 UTC 2024 - 2.9K bytes - Viewed (0) -
staging/src/k8s.io/api/extensions/v1beta1/generated.proto
// +listType=atomic repeated NetworkPolicyEgressRule egress = 3; // List of rule types that the NetworkPolicy relates to. // Valid options are ["Ingress"], ["Egress"], or ["Ingress", "Egress"]. // If this field is not specified, it will default based on the existence of Ingress or Egress rules; // policies that contain an Egress section are assumed to affect Egress, and all policies
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Mar 28 15:34:11 UTC 2024 - 45.4K bytes - Viewed (0) -
pilot/pkg/networking/core/listener_test.go
// Verify that an implicit catch all egress listener will not bind to privileged ports // if proxy is not using Iptables and cannot bind to privileged ports (1-1023). // // It is very common for the catch all egress listener to match services on ports 80 and 443. // Therefore, the default behavior should not force users to start from looking for a workaround. t.Run("implicit catch all egress listener", func(t *testing.T) {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Jun 13 01:56:28 UTC 2024 - 93.6K bytes - Viewed (0)