- Sort Score
- Result 10 results
- Languages All
Results 41 - 50 of 473 for p443 (0.03 sec)
-
tests/integration/security/filebased_tls_origination/main_test.go
Protocol: protocol.HTTP, ServicePort: 80, WorkloadPort: 8080, }, { // HTTPS port Name: "https", Protocol: protocol.HTTPS, ServicePort: 443, WorkloadPort: 8443, TLS: true, }, }, // Set up TLS certs on the server. This will make the server listen with these credentials. TLSSettings: &common.TLSSettings{
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu May 02 21:29:40 UTC 2024 - 7.3K bytes - Viewed (0) -
tests/integration/iop-remote-integration-test-gateways.yaml
- port: 15021 targetPort: 15021 name: status-port - port: 80 targetPort: 8080 name: http2 - port: 443 targetPort: 8443 name: https # This is the port where sni routing happens - port: 15443 targetPort: 15443 name: tls
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Jun 15 18:17:13 UTC 2022 - 1.6K bytes - Viewed (0) -
operator/cmd/mesh/testdata/manifest-generate/output/helm_values_enablement.golden.yaml
name: istio-egressgateway namespace: istio-system spec: ports: - name: http2 port: 80 protocol: TCP targetPort: 8080 - name: https port: 443 protocol: TCP targetPort: 8443 selector: app: istio-egressgateway istio: egressgateway type: ClusterIP
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Dec 01 22:07:45 UTC 2023 - 6.9K bytes - Viewed (0) -
samples/security/spire/spire-quickstart.yaml
type: NodePort ports: - name: tcp-api port: 8443 protocol: TCP selector: app: spire-server --- # Service definition for SPIRE controller manager webhook. apiVersion: v1 kind: Service metadata: name: spire-controller-manager-webhook-service namespace: spire spec: ports: - name: tcp port: 443 protocol: TCP targetPort: 9443 selector:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Oct 12 16:12:42 UTC 2023 - 32.2K bytes - Viewed (0) -
samples/jwt-server/jwt-server.yaml
apiVersion: v1 kind: Service metadata: name: jwt-server labels: app: jwt-server spec: ports: - name: http port: 8000 targetPort: 8000 - name: https port: 8443 targetPort: 8443 selector: app: jwt-server --- apiVersion: v1 kind: Secret metadata: name: jwt-cert-key-secret # command to generate certificate
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Feb 23 09:47:21 UTC 2024 - 5.1K bytes - Viewed (0) -
cluster/kubemark/pre-existing/config-default.sh
# cluster. # Pre-existing provider expects a MASTER_IP. # If you need to specify a port that's not the default (443), add it to MASTER_IP. # # Example: Connect to the Master on the secure port 6443 # MASTER_IP=192.168.122.5:6443 # MASTER_IP="${MASTER_IP:-}" # The container registry and project given to the kubemark container:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Feb 09 19:04:44 UTC 2021 - 1.3K bytes - Viewed (0) -
staging/src/k8s.io/apiextensions-apiserver/test/integration/ratcheting_test.go
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 28 08:48:22 UTC 2024 - 59.5K bytes - Viewed (0) -
pkg/config/analysis/analyzers/testdata/serviceentry-missing-addresses-protocol.yaml
- "." ports: - number: 443 name: https location: MESH_EXTERNAL resolution: DNS --- apiVersion: networking.istio.io/v1alpha3 kind: ServiceEntry metadata: name: service-entry-test-04 # Expected: validation error missing addresses and protocol namespace: default spec: hosts: - 'istio.io' exportTo: - "." ports: - number: 443 name: https protocol: ""
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Nov 17 12:28:05 UTC 2021 - 2.3K bytes - Viewed (0) -
pkg/config/analysis/analyzers/testdata/incorrect-port-name-external-name-service-type.yaml
spec: externalName: nginx.example.com ports: - name: nginx port: 443 protocol: TCP targetPort: 443 type: ExternalName --- apiVersion: v1 kind: Service metadata: name: nginx-svc2 namespace: nginx-ns2 spec: externalName: nginx.example.com ports: - port: 443 protocol: TCP targetPort: 443 type: ExternalName --- apiVersion: v1 kind: Service metadata:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Dec 09 00:46:04 UTC 2021 - 641 bytes - Viewed (0) -
pkg/config/analysis/analyzers/testdata/gateway-duplicate-certificate.yaml
--- apiVersion: networking.istio.io/v1alpha3 kind: Gateway metadata: name: gateway-01-test-01 namespace: istio-system spec: selector: istio: ingressgateway servers: - port: number: 443 name: https protocol: HTTPS tls: mode: SIMPLE credentialName: "test-01-wildcard-cert" # validation error since have same certificate with gateway-02-test-01 hosts: - "01.test-01.com" ---
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Nov 17 12:28:05 UTC 2021 - 7.1K bytes - Viewed (0)