Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 4 of 4 for seni (2.04 sec)

  1. pilot/pkg/xds/delta.go

    	}
    	// Anytime we get a CDS request on reconnect, we should always push EDS as well.
    	// It is always the server's responsibility to send EDS after CDS, regardless if
    	// Envoy asks for it or not (See https://github.com/envoyproxy/envoy/issues/33607 for more details).
    	// Without this logic, there are cases where the clusters we send could stay warming forever,
    	// expecting an EDS response. Note that in SotW, Envoy sends an EDS request after the delayed
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri Jun 14 04:34:37 UTC 2024
    - 25.6K bytes
    - Viewed (0)
  2. pilot/pkg/model/endpointshards.go

    					needPush = true
    				}
    				newIstioEndpoints = append(newIstioEndpoints, nie)
    			} else {
    				// If the endpoint does not exist in shards that means it is a
    				// new endpoint. Always send new healthy endpoints.
    				// Also send new unhealthy endpoints when SendUnhealthyEndpoints is enabled.
    				// This is OK since we disable panic threshold when SendUnhealthyEndpoints is enabled.
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri Jun 14 04:34:37 UTC 2024
    - 15.6K bytes
    - Viewed (0)
  3. cmd/object-multipart-handlers.go

    	"github.com/minio/mux"
    	"github.com/minio/pkg/v3/policy"
    	"github.com/minio/sio"
    )
    
    // Multipart objectAPIHandlers
    
    // NewMultipartUploadHandler - New multipart upload.
    // Notice: The S3 client can send secret keys in headers for encryption related jobs,
    // the handler should ensure to remove these keys before sending them to the object layer.
    // Currently these keys are:
    //   - X-Amz-Server-Side-Encryption-Customer-Key
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Fri Jun 14 13:28:35 UTC 2024
    - 38.8K bytes
    - Viewed (0)
  4. pilot/pkg/model/gateway.go

    // will use route name https.<portNumber>.<portName>.<gatewayName>.<namespace>. HTTPS servers using SNI passthrough or
    // non-HTTPS servers (e.g., TCP+TLS) with SNI passthrough will be setup as opaque TCP proxies without terminating
    // the SSL connection. They would inspect the SNI header and forward to the appropriate upstream as opaque TCP.
    //
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri Jun 14 04:34:37 UTC 2024
    - 26K bytes
    - Viewed (0)
Back to top