mirror of https://github.com/istio/istio.io.git
Automator: update istio.io@ reference docs (#16653)
This commit is contained in:
parent
7529d4a102
commit
34705c9e64
|
|
@ -1301,6 +1301,18 @@ Only applies when traffic from all groups (i.e. "*") is being redirected
|
|||
<td><code></code></td>
|
||||
<td>Comma separated list of potentially insecure kubeconfig authentication options that are allowed for multicluster authentication.Support values: all authProviders (`gcp`, `azure`, `exec`, `openstack`), `clientKey`, `clientCertificate`, `tokenFile`, and `exec`.</td>
|
||||
</tr>
|
||||
<tr id='pilot-ip-autoallocate-ipv4-prefix'>
|
||||
<td><a href='#pilot-ip-autoallocate-ipv4-prefix'><code>PILOT_IP_AUTOALLOCATE_IPV4_PREFIX</code></a></td>
|
||||
<td>String</td>
|
||||
<td><code>240.240.0.0/16</code></td>
|
||||
<td>The CIDR range/prefix to use for auto-allocated IPv4 addresses. This should be a private range, and not conflict with any other IPs in the cluster.</td>
|
||||
</tr>
|
||||
<tr id='pilot-ip-autoallocate-ipv6-prefix'>
|
||||
<td><a href='#pilot-ip-autoallocate-ipv6-prefix'><code>PILOT_IP_AUTOALLOCATE_IPV6_PREFIX</code></a></td>
|
||||
<td>String</td>
|
||||
<td><code>2001:2::/48</code></td>
|
||||
<td>The CIDR range/prefix to use for auto-allocated IPv6 addresses. This should be a private range, and not conflict with any other IPs in the cluster.</td>
|
||||
</tr>
|
||||
<tr id='pilot-jwt-enable-remote-jwks'>
|
||||
<td><a href='#pilot-jwt-enable-remote-jwks'><code>PILOT_JWT_ENABLE_REMOTE_JWKS</code></a></td>
|
||||
<td>String</td>
|
||||
|
|
|
|||
|
|
@ -9224,6 +9224,18 @@ Only applies when traffic from all groups (i.e. "*") is being redirected
|
|||
<td><code></code></td>
|
||||
<td>Comma separated list of potentially insecure kubeconfig authentication options that are allowed for multicluster authentication.Support values: all authProviders (`gcp`, `azure`, `exec`, `openstack`), `clientKey`, `clientCertificate`, `tokenFile`, and `exec`.</td>
|
||||
</tr>
|
||||
<tr id='pilot-ip-autoallocate-ipv4-prefix'>
|
||||
<td><a href='#pilot-ip-autoallocate-ipv4-prefix'><code>PILOT_IP_AUTOALLOCATE_IPV4_PREFIX</code></a></td>
|
||||
<td>String</td>
|
||||
<td><code>240.240.0.0/16</code></td>
|
||||
<td>The CIDR range/prefix to use for auto-allocated IPv4 addresses. This should be a private range, and not conflict with any other IPs in the cluster.</td>
|
||||
</tr>
|
||||
<tr id='pilot-ip-autoallocate-ipv6-prefix'>
|
||||
<td><a href='#pilot-ip-autoallocate-ipv6-prefix'><code>PILOT_IP_AUTOALLOCATE_IPV6_PREFIX</code></a></td>
|
||||
<td>String</td>
|
||||
<td><code>2001:2::/48</code></td>
|
||||
<td>The CIDR range/prefix to use for auto-allocated IPv6 addresses. This should be a private range, and not conflict with any other IPs in the cluster.</td>
|
||||
</tr>
|
||||
<tr id='pilot-jwt-enable-remote-jwks'>
|
||||
<td><a href='#pilot-jwt-enable-remote-jwks'><code>PILOT_JWT_ENABLE_REMOTE_JWKS</code></a></td>
|
||||
<td>String</td>
|
||||
|
|
|
|||
|
|
@ -1679,6 +1679,18 @@ Only applies when traffic from all groups (i.e. "*") is being redirected
|
|||
<td><code></code></td>
|
||||
<td>Comma separated list of potentially insecure kubeconfig authentication options that are allowed for multicluster authentication.Support values: all authProviders (`gcp`, `azure`, `exec`, `openstack`), `clientKey`, `clientCertificate`, `tokenFile`, and `exec`.</td>
|
||||
</tr>
|
||||
<tr id='pilot-ip-autoallocate-ipv4-prefix'>
|
||||
<td><a href='#pilot-ip-autoallocate-ipv4-prefix'><code>PILOT_IP_AUTOALLOCATE_IPV4_PREFIX</code></a></td>
|
||||
<td>String</td>
|
||||
<td><code>240.240.0.0/16</code></td>
|
||||
<td>The CIDR range/prefix to use for auto-allocated IPv4 addresses. This should be a private range, and not conflict with any other IPs in the cluster.</td>
|
||||
</tr>
|
||||
<tr id='pilot-ip-autoallocate-ipv6-prefix'>
|
||||
<td><a href='#pilot-ip-autoallocate-ipv6-prefix'><code>PILOT_IP_AUTOALLOCATE_IPV6_PREFIX</code></a></td>
|
||||
<td>String</td>
|
||||
<td><code>2001:2::/48</code></td>
|
||||
<td>The CIDR range/prefix to use for auto-allocated IPv6 addresses. This should be a private range, and not conflict with any other IPs in the cluster.</td>
|
||||
</tr>
|
||||
<tr id='pilot-jwt-enable-remote-jwks'>
|
||||
<td><a href='#pilot-jwt-enable-remote-jwks'><code>PILOT_JWT_ENABLE_REMOTE_JWKS</code></a></td>
|
||||
<td>String</td>
|
||||
|
|
|
|||
|
|
@ -268,17 +268,17 @@ If it is not installed already, you can install it via your OS's package man
|
|||
<tr>
|
||||
<td><code>--log_caller <string></code></td>
|
||||
<td></td>
|
||||
<td>Comma-separated list of scopes for which to include caller information, scopes can be any of [ads, adsc, all, analysis, authn, authorization, ca, controllers, default, delta, deltaadsc, file, fullpush, gateway, grpc, grpcgen, ip-autoallocate, klog, krt, kube, model, monitoring, pkica, pkira, probes, processing, retry, rootcertrotator, secretcontroller, security, serverca, serviceentry, spiffe, status, tag-watcher, trustBundle, untaint, validation, validationController, validationServer, wasm, wle] (default ``)</td>
|
||||
<td>Comma-separated list of scopes for which to include caller information, scopes can be any of [ads, adsc, all, analysis, authn, authorization, ca, controllers, default, delta, deltaadsc, file, fullpush, gateway, grpc, grpcgen, ip-autoallocate, klog, krt, kube, model, monitoring, pkica, pkira, probes, processing, retry, rootcertrotator, secretcontroller, security, serverca, serviceentry, spiffe, status, trustBundle, untaint, validation, validationController, validationServer, wasm, wle] (default ``)</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>--log_output_level <string></code></td>
|
||||
<td></td>
|
||||
<td>Comma-separated minimum per-scope logging level of messages to output, in the form of <scope>:<level>,<scope>:<level>,... where scope can be one of [ads, adsc, all, analysis, authn, authorization, ca, controllers, default, delta, deltaadsc, file, fullpush, gateway, grpc, grpcgen, ip-autoallocate, klog, krt, kube, model, monitoring, pkica, pkira, probes, processing, retry, rootcertrotator, secretcontroller, security, serverca, serviceentry, spiffe, status, tag-watcher, trustBundle, untaint, validation, validationController, validationServer, wasm, wle] and level can be one of [debug, info, warn, error, fatal, none] (default ``)</td>
|
||||
<td>Comma-separated minimum per-scope logging level of messages to output, in the form of <scope>:<level>,<scope>:<level>,... where scope can be one of [ads, adsc, all, analysis, authn, authorization, ca, controllers, default, delta, deltaadsc, file, fullpush, gateway, grpc, grpcgen, ip-autoallocate, klog, krt, kube, model, monitoring, pkica, pkira, probes, processing, retry, rootcertrotator, secretcontroller, security, serverca, serviceentry, spiffe, status, trustBundle, untaint, validation, validationController, validationServer, wasm, wle] and level can be one of [debug, info, warn, error, fatal, none] (default ``)</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>--log_stacktrace_level <string></code></td>
|
||||
<td></td>
|
||||
<td>Comma-separated minimum per-scope logging level at which stack traces are captured, in the form of <scope>:<level>,<scope:level>,... where scope can be one of [ads, adsc, all, analysis, authn, authorization, ca, controllers, default, delta, deltaadsc, file, fullpush, gateway, grpc, grpcgen, ip-autoallocate, klog, krt, kube, model, monitoring, pkica, pkira, probes, processing, retry, rootcertrotator, secretcontroller, security, serverca, serviceentry, spiffe, status, tag-watcher, trustBundle, untaint, validation, validationController, validationServer, wasm, wle] and level can be one of [debug, info, warn, error, fatal, none] (default `default:none`)</td>
|
||||
<td>Comma-separated minimum per-scope logging level at which stack traces are captured, in the form of <scope>:<level>,<scope:level>,... where scope can be one of [ads, adsc, all, analysis, authn, authorization, ca, controllers, default, delta, deltaadsc, file, fullpush, gateway, grpc, grpcgen, ip-autoallocate, klog, krt, kube, model, monitoring, pkica, pkira, probes, processing, retry, rootcertrotator, secretcontroller, security, serverca, serviceentry, spiffe, status, trustBundle, untaint, validation, validationController, validationServer, wasm, wle] and level can be one of [debug, info, warn, error, fatal, none] (default `default:none`)</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>--log_target <stringArray></code></td>
|
||||
|
|
@ -1257,6 +1257,18 @@ Only applies when traffic from all groups (i.e. "*") is being redirected
|
|||
<td><code></code></td>
|
||||
<td>Comma separated list of potentially insecure kubeconfig authentication options that are allowed for multicluster authentication.Support values: all authProviders (`gcp`, `azure`, `exec`, `openstack`), `clientKey`, `clientCertificate`, `tokenFile`, and `exec`.</td>
|
||||
</tr>
|
||||
<tr id='pilot-ip-autoallocate-ipv4-prefix'>
|
||||
<td><a href='#pilot-ip-autoallocate-ipv4-prefix'><code>PILOT_IP_AUTOALLOCATE_IPV4_PREFIX</code></a></td>
|
||||
<td>String</td>
|
||||
<td><code>240.240.0.0/16</code></td>
|
||||
<td>The CIDR range/prefix to use for auto-allocated IPv4 addresses. This should be a private range, and not conflict with any other IPs in the cluster.</td>
|
||||
</tr>
|
||||
<tr id='pilot-ip-autoallocate-ipv6-prefix'>
|
||||
<td><a href='#pilot-ip-autoallocate-ipv6-prefix'><code>PILOT_IP_AUTOALLOCATE_IPV6_PREFIX</code></a></td>
|
||||
<td>String</td>
|
||||
<td><code>2001:2::/48</code></td>
|
||||
<td>The CIDR range/prefix to use for auto-allocated IPv6 addresses. This should be a private range, and not conflict with any other IPs in the cluster.</td>
|
||||
</tr>
|
||||
<tr id='pilot-jwt-enable-remote-jwks'>
|
||||
<td><a href='#pilot-jwt-enable-remote-jwks'><code>PILOT_JWT_ENABLE_REMOTE_JWKS</code></a></td>
|
||||
<td>String</td>
|
||||
|
|
|
|||
|
|
@ -1301,6 +1301,18 @@ Only applies when traffic from all groups (i.e. "*") is being redirected
|
|||
<td><code></code></td>
|
||||
<td>Comma separated list of potentially insecure kubeconfig authentication options that are allowed for multicluster authentication.Support values: all authProviders (`gcp`, `azure`, `exec`, `openstack`), `clientKey`, `clientCertificate`, `tokenFile`, and `exec`.</td>
|
||||
</tr>
|
||||
<tr id='pilot-ip-autoallocate-ipv4-prefix'>
|
||||
<td><a href='#pilot-ip-autoallocate-ipv4-prefix'><code>PILOT_IP_AUTOALLOCATE_IPV4_PREFIX</code></a></td>
|
||||
<td>String</td>
|
||||
<td><code>240.240.0.0/16</code></td>
|
||||
<td>The CIDR range/prefix to use for auto-allocated IPv4 addresses. This should be a private range, and not conflict with any other IPs in the cluster.</td>
|
||||
</tr>
|
||||
<tr id='pilot-ip-autoallocate-ipv6-prefix'>
|
||||
<td><a href='#pilot-ip-autoallocate-ipv6-prefix'><code>PILOT_IP_AUTOALLOCATE_IPV6_PREFIX</code></a></td>
|
||||
<td>String</td>
|
||||
<td><code>2001:2::/48</code></td>
|
||||
<td>The CIDR range/prefix to use for auto-allocated IPv6 addresses. This should be a private range, and not conflict with any other IPs in the cluster.</td>
|
||||
</tr>
|
||||
<tr id='pilot-jwt-enable-remote-jwks'>
|
||||
<td><a href='#pilot-jwt-enable-remote-jwks'><code>PILOT_JWT_ENABLE_REMOTE_JWKS</code></a></td>
|
||||
<td>String</td>
|
||||
|
|
|
|||
|
|
@ -9224,6 +9224,18 @@ Only applies when traffic from all groups (i.e. "*") is being redirected
|
|||
<td><code></code></td>
|
||||
<td>Comma separated list of potentially insecure kubeconfig authentication options that are allowed for multicluster authentication.Support values: all authProviders (`gcp`, `azure`, `exec`, `openstack`), `clientKey`, `clientCertificate`, `tokenFile`, and `exec`.</td>
|
||||
</tr>
|
||||
<tr id='pilot-ip-autoallocate-ipv4-prefix'>
|
||||
<td><a href='#pilot-ip-autoallocate-ipv4-prefix'><code>PILOT_IP_AUTOALLOCATE_IPV4_PREFIX</code></a></td>
|
||||
<td>String</td>
|
||||
<td><code>240.240.0.0/16</code></td>
|
||||
<td>The CIDR range/prefix to use for auto-allocated IPv4 addresses. This should be a private range, and not conflict with any other IPs in the cluster.</td>
|
||||
</tr>
|
||||
<tr id='pilot-ip-autoallocate-ipv6-prefix'>
|
||||
<td><a href='#pilot-ip-autoallocate-ipv6-prefix'><code>PILOT_IP_AUTOALLOCATE_IPV6_PREFIX</code></a></td>
|
||||
<td>String</td>
|
||||
<td><code>2001:2::/48</code></td>
|
||||
<td>The CIDR range/prefix to use for auto-allocated IPv6 addresses. This should be a private range, and not conflict with any other IPs in the cluster.</td>
|
||||
</tr>
|
||||
<tr id='pilot-jwt-enable-remote-jwks'>
|
||||
<td><a href='#pilot-jwt-enable-remote-jwks'><code>PILOT_JWT_ENABLE_REMOTE_JWKS</code></a></td>
|
||||
<td>String</td>
|
||||
|
|
|
|||
|
|
@ -1679,6 +1679,18 @@ Only applies when traffic from all groups (i.e. "*") is being redirected
|
|||
<td><code></code></td>
|
||||
<td>Comma separated list of potentially insecure kubeconfig authentication options that are allowed for multicluster authentication.Support values: all authProviders (`gcp`, `azure`, `exec`, `openstack`), `clientKey`, `clientCertificate`, `tokenFile`, and `exec`.</td>
|
||||
</tr>
|
||||
<tr id='pilot-ip-autoallocate-ipv4-prefix'>
|
||||
<td><a href='#pilot-ip-autoallocate-ipv4-prefix'><code>PILOT_IP_AUTOALLOCATE_IPV4_PREFIX</code></a></td>
|
||||
<td>String</td>
|
||||
<td><code>240.240.0.0/16</code></td>
|
||||
<td>The CIDR range/prefix to use for auto-allocated IPv4 addresses. This should be a private range, and not conflict with any other IPs in the cluster.</td>
|
||||
</tr>
|
||||
<tr id='pilot-ip-autoallocate-ipv6-prefix'>
|
||||
<td><a href='#pilot-ip-autoallocate-ipv6-prefix'><code>PILOT_IP_AUTOALLOCATE_IPV6_PREFIX</code></a></td>
|
||||
<td>String</td>
|
||||
<td><code>2001:2::/48</code></td>
|
||||
<td>The CIDR range/prefix to use for auto-allocated IPv6 addresses. This should be a private range, and not conflict with any other IPs in the cluster.</td>
|
||||
</tr>
|
||||
<tr id='pilot-jwt-enable-remote-jwks'>
|
||||
<td><a href='#pilot-jwt-enable-remote-jwks'><code>PILOT_JWT_ENABLE_REMOTE_JWKS</code></a></td>
|
||||
<td>String</td>
|
||||
|
|
|
|||
|
|
@ -268,17 +268,17 @@ If it is not installed already, you can install it via your OS's package man
|
|||
<tr>
|
||||
<td><code>--log_caller <string></code></td>
|
||||
<td></td>
|
||||
<td>Comma-separated list of scopes for which to include caller information, scopes can be any of [ads, adsc, all, analysis, authn, authorization, ca, controllers, default, delta, deltaadsc, file, fullpush, gateway, grpc, grpcgen, ip-autoallocate, klog, krt, kube, model, monitoring, pkica, pkira, probes, processing, retry, rootcertrotator, secretcontroller, security, serverca, serviceentry, spiffe, status, tag-watcher, trustBundle, untaint, validation, validationController, validationServer, wasm, wle] (default ``)</td>
|
||||
<td>Comma-separated list of scopes for which to include caller information, scopes can be any of [ads, adsc, all, analysis, authn, authorization, ca, controllers, default, delta, deltaadsc, file, fullpush, gateway, grpc, grpcgen, ip-autoallocate, klog, krt, kube, model, monitoring, pkica, pkira, probes, processing, retry, rootcertrotator, secretcontroller, security, serverca, serviceentry, spiffe, status, trustBundle, untaint, validation, validationController, validationServer, wasm, wle] (default ``)</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>--log_output_level <string></code></td>
|
||||
<td></td>
|
||||
<td>Comma-separated minimum per-scope logging level of messages to output, in the form of <scope>:<level>,<scope>:<level>,... where scope can be one of [ads, adsc, all, analysis, authn, authorization, ca, controllers, default, delta, deltaadsc, file, fullpush, gateway, grpc, grpcgen, ip-autoallocate, klog, krt, kube, model, monitoring, pkica, pkira, probes, processing, retry, rootcertrotator, secretcontroller, security, serverca, serviceentry, spiffe, status, tag-watcher, trustBundle, untaint, validation, validationController, validationServer, wasm, wle] and level can be one of [debug, info, warn, error, fatal, none] (default ``)</td>
|
||||
<td>Comma-separated minimum per-scope logging level of messages to output, in the form of <scope>:<level>,<scope>:<level>,... where scope can be one of [ads, adsc, all, analysis, authn, authorization, ca, controllers, default, delta, deltaadsc, file, fullpush, gateway, grpc, grpcgen, ip-autoallocate, klog, krt, kube, model, monitoring, pkica, pkira, probes, processing, retry, rootcertrotator, secretcontroller, security, serverca, serviceentry, spiffe, status, trustBundle, untaint, validation, validationController, validationServer, wasm, wle] and level can be one of [debug, info, warn, error, fatal, none] (default ``)</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>--log_stacktrace_level <string></code></td>
|
||||
<td></td>
|
||||
<td>Comma-separated minimum per-scope logging level at which stack traces are captured, in the form of <scope>:<level>,<scope:level>,... where scope can be one of [ads, adsc, all, analysis, authn, authorization, ca, controllers, default, delta, deltaadsc, file, fullpush, gateway, grpc, grpcgen, ip-autoallocate, klog, krt, kube, model, monitoring, pkica, pkira, probes, processing, retry, rootcertrotator, secretcontroller, security, serverca, serviceentry, spiffe, status, tag-watcher, trustBundle, untaint, validation, validationController, validationServer, wasm, wle] and level can be one of [debug, info, warn, error, fatal, none] (default `default:none`)</td>
|
||||
<td>Comma-separated minimum per-scope logging level at which stack traces are captured, in the form of <scope>:<level>,<scope:level>,... where scope can be one of [ads, adsc, all, analysis, authn, authorization, ca, controllers, default, delta, deltaadsc, file, fullpush, gateway, grpc, grpcgen, ip-autoallocate, klog, krt, kube, model, monitoring, pkica, pkira, probes, processing, retry, rootcertrotator, secretcontroller, security, serverca, serviceentry, spiffe, status, trustBundle, untaint, validation, validationController, validationServer, wasm, wle] and level can be one of [debug, info, warn, error, fatal, none] (default `default:none`)</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>--log_target <stringArray></code></td>
|
||||
|
|
@ -1257,6 +1257,18 @@ Only applies when traffic from all groups (i.e. "*") is being redirected
|
|||
<td><code></code></td>
|
||||
<td>Comma separated list of potentially insecure kubeconfig authentication options that are allowed for multicluster authentication.Support values: all authProviders (`gcp`, `azure`, `exec`, `openstack`), `clientKey`, `clientCertificate`, `tokenFile`, and `exec`.</td>
|
||||
</tr>
|
||||
<tr id='pilot-ip-autoallocate-ipv4-prefix'>
|
||||
<td><a href='#pilot-ip-autoallocate-ipv4-prefix'><code>PILOT_IP_AUTOALLOCATE_IPV4_PREFIX</code></a></td>
|
||||
<td>String</td>
|
||||
<td><code>240.240.0.0/16</code></td>
|
||||
<td>The CIDR range/prefix to use for auto-allocated IPv4 addresses. This should be a private range, and not conflict with any other IPs in the cluster.</td>
|
||||
</tr>
|
||||
<tr id='pilot-ip-autoallocate-ipv6-prefix'>
|
||||
<td><a href='#pilot-ip-autoallocate-ipv6-prefix'><code>PILOT_IP_AUTOALLOCATE_IPV6_PREFIX</code></a></td>
|
||||
<td>String</td>
|
||||
<td><code>2001:2::/48</code></td>
|
||||
<td>The CIDR range/prefix to use for auto-allocated IPv6 addresses. This should be a private range, and not conflict with any other IPs in the cluster.</td>
|
||||
</tr>
|
||||
<tr id='pilot-jwt-enable-remote-jwks'>
|
||||
<td><a href='#pilot-jwt-enable-remote-jwks'><code>PILOT_JWT_ENABLE_REMOTE_JWKS</code></a></td>
|
||||
<td>String</td>
|
||||
|
|
|
|||
Loading…
Reference in New Issue