Search Options

Results per page
Sort
Preferred Languages
Advance

Results 31 - 40 of 170 for undefined (0.15 sec)

  1. manifests/charts/base/crds/crd-all.gen.yaml

                            Criteria for selecting traffic by their direction.
    
                            Valid Options: CLIENT, SERVER, CLIENT_AND_SERVER
                          enum:
                          - UNDEFINED
                          - CLIENT
                          - SERVER
                          - CLIENT_AND_SERVER
                          type: string
                        ports:
    Others
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Mon Apr 22 20:20:47 GMT 2024
    - 606.1K bytes
    - Viewed (0)
  2. common-protos/k8s.io/api/networking/v1/generated.proto

      // endPort indicates that the range of ports from port to endPort if set, inclusive,
      // should be allowed by the policy. This field cannot be defined if the port field
      // is not defined or if the port field is defined as a named (string) port.
      // The endPort must be equal or greater than port.
      // +optional
      optional int32 endPort = 3;
    }
    
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Mon Mar 11 18:43:24 GMT 2024
    - 25.2K bytes
    - Viewed (0)
  3. common-protos/k8s.io/api/storage/v1beta1/generated.proto

      // The default if the list is empty is "Persistent", which is the usage defined by the
      // CSI specification and implemented in Kubernetes via the usual PV/PVC mechanism.
      //
      // The other mode is "Ephemeral". In this mode, volumes are defined inline inside the pod spec
      // with CSIVolumeSource and their lifecycle is tied to the lifecycle of that pod.
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Mon Mar 11 18:43:24 GMT 2024
    - 24.9K bytes
    - Viewed (0)
  4. common-protos/k8s.io/api/storage/v1alpha1/generated.proto

      // capacity is the value reported by the CSI driver in its GetCapacityResponse
      // for a GetCapacityRequest with topology and parameters that match the
      // previous fields.
      //
      // The semantic is currently (CSI spec 1.2) defined as:
      // The available capacity, in bytes, of the storage that can be used
      // to provision volumes. If not set, that information is currently
      // unavailable.
      //
      // +optional
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Mon Mar 11 18:43:24 GMT 2024
    - 9.4K bytes
    - Viewed (0)
  5. common-protos/k8s.io/api/networking/v1beta1/generated.proto

    // match, then routed to the backend associated with the matching IngressRuleValue.
    message IngressRule {
      // host is the fully qualified domain name of a network host, as defined by RFC 3986.
      // Note the following deviations from the "host" part of the
      // URI as defined in RFC 3986:
      // 1. IPs are not allowed. Currently an IngressRuleValue can only apply to
      //    the IP in the Spec of the parent Ingress.
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Mon Mar 11 18:43:24 GMT 2024
    - 14.9K bytes
    - Viewed (0)
  6. operator/README.md

    - [Component configuration API](https://github.com/istio/api/blob/00671adacbea20f941cb20cce021bc63cbad1840/operator/v1alpha1/operator.proto#L42-L93), for managing
    K8s settings like resources, auto scaling, pod disruption budgets and others defined in the
    [KubernetesResourceSpec](https://github.com/istio/api/blob/00671adacbea20f941cb20cce021bc63cbad1840/operator/v1alpha1/operator.proto#L217-L271)
    for Istio core and addon components.
    - The legacy
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Sun Sep 17 08:27:52 GMT 2023
    - 17.5K bytes
    - Viewed (0)
  7. manifests/charts/README.md

    In the case of the sidecar injector, the namespace label `istio-env: <NAME_OF_ENV>` is used instead
    of the conventional `istio-injected: true`. The name of the environment is defined as the namespace
    where the corresponding control plane components (config, discovery, auto-injection) are running.
    In the examples below, by default this is the `istio-control` namespace. Pod annotations can also
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Wed Feb 07 17:53:24 GMT 2024
    - 6.7K bytes
    - Viewed (0)
  8. operator/cmd/mesh/testdata/manifest-generate/data-snapshot.tar.gz

    range will be # mapped to network1. The gateway for this network example is specified by its public IP # address and port. # The second network, `network2`, in this example is defined differently with all endpoints # retrieved through the specified Multi-Cluster registry being mapped to network2. The # gateway is also defined differently with the name of the gateway service on the remote # cluster. The public IP for the gateway will be determined from that remote service (only # LoadBalancer gateway...
    Others
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Wed Jan 10 05:10:03 GMT 2024
    - 198.1K bytes
    - Viewed (1)
  9. common-protos/k8s.io/api/discovery/v1beta1/generated.proto

      // ports specifies the list of network ports exposed by each endpoint in
      // this slice. Each port must have a unique name. When ports is empty, it
      // indicates that there are no defined ports. When a port is defined with a
      // nil port value, it indicates "all ports". Each slice may include a
      // maximum of 100 ports.
      // +optional
      // +listType=atomic
      repeated EndpointPort ports = 3;
    }
    
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Mon Mar 11 18:43:24 GMT 2024
    - 8K bytes
    - Viewed (0)
  10. architecture/ambient/peer-authentication.md

    The PeerAuthentication resource defines policy for whether or not traffic to a given mesh workload must be mTLS encrypted (through Istio mTLS specifically). While the semantics for sidecars are [relatively well defined](https://istio.io/latest/docs/reference/config/security/peer_authentication/), the architectural differences of ambient workloads have implications for how PeerAuthentication is enforced in that context. This document describes those details.
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Wed Aug 09 22:09:18 GMT 2023
    - 3.9K bytes
    - Viewed (0)
Back to top