Search Options

Results per page
Sort
Preferred Languages
Advance

Results 191 - 200 of 225 for destinationFile (0.2 sec)

  1. pilot/pkg/networking/core/cluster_traffic_policy.go

    	"istio.io/istio/pilot/pkg/util/protoconv"
    	"istio.io/istio/pkg/config/protocol"
    	"istio.io/istio/pkg/log"
    )
    
    // applyTrafficPolicy applies the trafficPolicy defined within destinationRule,
    // which can be called for both outbound and inbound cluster, but only connection pool will be applied to inbound cluster.
    func (cb *ClusterBuilder) applyTrafficPolicy(opts buildClusterOpts) {
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue Apr 23 05:38:57 UTC 2024
    - 20K bytes
    - Viewed (0)
  2. pilot/pkg/networking/core/gateway.go

    			if len(push.Mesh.OutboundClusterStatName) != 0 {
    				statPrefix = telemetry.BuildStatPrefix(push.Mesh.OutboundClusterStatName, string(service.Hostname), "", port, 0, &service.Attributes)
    			}
    			destinationRule := CastDestinationRule(proxy.SidecarScope.DestinationRule(
    				model.TrafficDirectionOutbound, proxy, service.Hostname).GetRule())
    
    			// First, we build the standard cluster. We match on the SNI matching the cluster name
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon May 06 04:44:06 UTC 2024
    - 46.4K bytes
    - Viewed (0)
  3. pilot/pkg/networking/grpcgen/grpcgen_test.go

    		},
    	})
    	if mtls {
    		// Client side.
    		_, _ = store.Create(config.Config{
    			Meta: config.Meta{
    				GroupVersionKind: gvk.DestinationRule,
    				Name:             svcname,
    				Namespace:        "test",
    			},
    			Spec: &networking.DestinationRule{
    				Host: svcname + ".test.svc.cluster.local",
    				TrafficPolicy: &networking.TrafficPolicy{Tls: &networking.ClientTLSSettings{
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Mar 28 09:04:02 UTC 2024
    - 16.9K bytes
    - Viewed (0)
  4. istioctl/pkg/analyze/analyze.go

    		"Suppress reporting a message code on a specific resource. Values are supplied in the form "+
    			`<code>=<resource> (e.g. '--suppress "IST0102=DestinationRule primary-dr.default"'). Can be repeated. `+
    			`You can include the wildcard character '*' to support a partial match (e.g. '--suppress "IST0102=DestinationRule *.default" ).`)
    	analysisCmd.PersistentFlags().DurationVar(&analysisTimeout, "timeout", 30*time.Second,
    		"The duration to wait before failing")
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue Apr 02 08:32:06 UTC 2024
    - 17K bytes
    - Viewed (0)
  5. pilot/pkg/networking/core/cluster_tls.go

    	}
    	// Hack to avoid egress sds cluster config generation for sidecar when
    	// CredentialName is set in DestinationRule without a workloadSelector.
    	// We do not want to support CredentialName setting in non workloadSelector based DestinationRules, because
    	// that would result in the CredentialName being supplied to all the sidecars which the DestinationRule is scoped to,
    	// resulting in delayed startup of sidecars who do not have access to the credentials.
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Apr 18 19:09:43 UTC 2024
    - 19.2K bytes
    - Viewed (0)
  6. tests/integration/pilot/gw_topology_test.go

    				"imagePullPolicy": t.Settings().Image.PullPolicy,
    			}
    
    			// we only apply to config clusters
    			// make custom gateway in same ns as app, so we can apply the destination rule
    			// otherwise, the destinationrule will be ignorred by the `restrict-to-namespace` sidecar
    			gatewayNs := apps.Namespace
    			t.ConfigIstio().Eval(gatewayNs.Name(), templateParams, `apiVersion: v1
    kind: Service
    metadata:
      name: custom-gateway
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Apr 08 22:02:59 UTC 2024
    - 8K bytes
    - Viewed (0)
  7. tests/integration/pilot/multicluster_test.go

    `, apps.B.Config().ClusterLocalFQDN()))
    					},
    				},
    				{
    					"subsets",
    					func(t framework.TestContext) {
    						cfg := tmpl.EvaluateOrFail(t, `
    apiVersion: networking.istio.io/v1beta1
    kind: DestinationRule
    metadata:
      name: mysvc-dr
    spec:
      host: {{.host}}
      subsets:
    {{- range .dst }}
      - name: {{ .Config.Cluster.Name }}
        labels:
          topology.istio.io/cluster: {{ .Config.Cluster.Name }}
    {{- end }}
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Apr 08 22:02:59 UTC 2024
    - 8.2K bytes
    - Viewed (0)
  8. pilot/pkg/features/experimental.go

    	EnableEnhancedResourceScoping = env.Register("ENABLE_ENHANCED_RESOURCE_SCOPING", true,
    		"If enabled, meshConfig.discoverySelectors will limit the CustomResource configurations(like Gateway,VirtualService,DestinationRule,Ingress, etc)"+
    			"that can be processed by pilot. This will also restrict the root-ca certificate distribution.").Get()
    
    	EnableLeaderElection = env.Register("ENABLE_LEADER_ELECTION", true,
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue May 14 17:02:38 UTC 2024
    - 10.2K bytes
    - Viewed (0)
  9. tests/integration/security/file_mounted_certs/main_test.go

    }
    
    func setupApps(ctx resource.Context, customNs namespace.Getter, customCfg *[]echo.Config) error {
    	appsNamespace := customNs.Get()
    
    	// Server certificate has "server.file-mounted.svc" in SANs; Same is expected in DestinationRule.subjectAltNames for the test Echo server
    	// This cert is going to be used as a server and "client" certificate on the "Echo Server"'s side
    	err := CreateCustomSecret(ctx, ServerSecretName, appsNamespace, ServerCertsPath)
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu May 02 21:29:40 UTC 2024
    - 13.4K bytes
    - Viewed (0)
  10. pilot/pkg/xds/endpoints/ep_filters.go

    	for _, gateway := range gateways {
    		gatewayWeights[gateway] += weightPerGateway
    	}
    }
    
    // EndpointsWithMTLSFilter removes all endpoints that do not handle mTLS. This is determined by looking at
    // auto-mTLS, DestinationRule, and PeerAuthentication to determine if we would send mTLS to these endpoints.
    // Note there is no guarantee these destinations *actually* handle mTLS; just that we are configured to send mTLS to them.
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed May 29 01:17:58 UTC 2024
    - 9.1K bytes
    - Viewed (0)
Back to top