Automator: update istio.io@ reference docs (#16653)

This commit is contained in:
Istio Automation 2025-07-10 22:20:32 -04:00 committed by GitHub
parent 7529d4a102
commit 34705c9e64
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
8 changed files with 102 additions and 6 deletions

View File

@ -1301,6 +1301,18 @@ Only applies when traffic from all groups (i.e. "*") is being redirected
<td><code></code></td>
<td>Comma separated list of potentially insecure kubeconfig authentication options that are allowed for multicluster authentication.Support values: all authProviders (`gcp`, `azure`, `exec`, `openstack`), `clientKey`, `clientCertificate`, `tokenFile`, and `exec`.</td>
</tr>
<tr id='pilot-ip-autoallocate-ipv4-prefix'>
<td><a href='#pilot-ip-autoallocate-ipv4-prefix'><code>PILOT_IP_AUTOALLOCATE_IPV4_PREFIX</code></a></td>
<td>String</td>
<td><code>240.240.0.0/16</code></td>
<td>The CIDR range/prefix to use for auto-allocated IPv4 addresses. This should be a private range, and not conflict with any other IPs in the cluster.</td>
</tr>
<tr id='pilot-ip-autoallocate-ipv6-prefix'>
<td><a href='#pilot-ip-autoallocate-ipv6-prefix'><code>PILOT_IP_AUTOALLOCATE_IPV6_PREFIX</code></a></td>
<td>String</td>
<td><code>2001:2::/48</code></td>
<td>The CIDR range/prefix to use for auto-allocated IPv6 addresses. This should be a private range, and not conflict with any other IPs in the cluster.</td>
</tr>
<tr id='pilot-jwt-enable-remote-jwks'>
<td><a href='#pilot-jwt-enable-remote-jwks'><code>PILOT_JWT_ENABLE_REMOTE_JWKS</code></a></td>
<td>String</td>

View File

@ -9224,6 +9224,18 @@ Only applies when traffic from all groups (i.e. &#34;*&#34;) is being redirected
<td><code></code></td>
<td>Comma separated list of potentially insecure kubeconfig authentication options that are allowed for multicluster authentication.Support values: all authProviders (`gcp`, `azure`, `exec`, `openstack`), `clientKey`, `clientCertificate`, `tokenFile`, and `exec`.</td>
</tr>
<tr id='pilot-ip-autoallocate-ipv4-prefix'>
<td><a href='#pilot-ip-autoallocate-ipv4-prefix'><code>PILOT_IP_AUTOALLOCATE_IPV4_PREFIX</code></a></td>
<td>String</td>
<td><code>240.240.0.0/16</code></td>
<td>The CIDR range/prefix to use for auto-allocated IPv4 addresses. This should be a private range, and not conflict with any other IPs in the cluster.</td>
</tr>
<tr id='pilot-ip-autoallocate-ipv6-prefix'>
<td><a href='#pilot-ip-autoallocate-ipv6-prefix'><code>PILOT_IP_AUTOALLOCATE_IPV6_PREFIX</code></a></td>
<td>String</td>
<td><code>2001:2::/48</code></td>
<td>The CIDR range/prefix to use for auto-allocated IPv6 addresses. This should be a private range, and not conflict with any other IPs in the cluster.</td>
</tr>
<tr id='pilot-jwt-enable-remote-jwks'>
<td><a href='#pilot-jwt-enable-remote-jwks'><code>PILOT_JWT_ENABLE_REMOTE_JWKS</code></a></td>
<td>String</td>

View File

@ -1679,6 +1679,18 @@ Only applies when traffic from all groups (i.e. &#34;*&#34;) is being redirected
<td><code></code></td>
<td>Comma separated list of potentially insecure kubeconfig authentication options that are allowed for multicluster authentication.Support values: all authProviders (`gcp`, `azure`, `exec`, `openstack`), `clientKey`, `clientCertificate`, `tokenFile`, and `exec`.</td>
</tr>
<tr id='pilot-ip-autoallocate-ipv4-prefix'>
<td><a href='#pilot-ip-autoallocate-ipv4-prefix'><code>PILOT_IP_AUTOALLOCATE_IPV4_PREFIX</code></a></td>
<td>String</td>
<td><code>240.240.0.0/16</code></td>
<td>The CIDR range/prefix to use for auto-allocated IPv4 addresses. This should be a private range, and not conflict with any other IPs in the cluster.</td>
</tr>
<tr id='pilot-ip-autoallocate-ipv6-prefix'>
<td><a href='#pilot-ip-autoallocate-ipv6-prefix'><code>PILOT_IP_AUTOALLOCATE_IPV6_PREFIX</code></a></td>
<td>String</td>
<td><code>2001:2::/48</code></td>
<td>The CIDR range/prefix to use for auto-allocated IPv6 addresses. This should be a private range, and not conflict with any other IPs in the cluster.</td>
</tr>
<tr id='pilot-jwt-enable-remote-jwks'>
<td><a href='#pilot-jwt-enable-remote-jwks'><code>PILOT_JWT_ENABLE_REMOTE_JWKS</code></a></td>
<td>String</td>

View File

@ -268,17 +268,17 @@ If it is not installed already, you can install it via your OS&#39;s package man
<tr>
<td><code>--log_caller &lt;string&gt;</code></td>
<td></td>
<td>Comma-separated list of scopes for which to include caller information, scopes can be any of [ads, adsc, all, analysis, authn, authorization, ca, controllers, default, delta, deltaadsc, file, fullpush, gateway, grpc, grpcgen, ip-autoallocate, klog, krt, kube, model, monitoring, pkica, pkira, probes, processing, retry, rootcertrotator, secretcontroller, security, serverca, serviceentry, spiffe, status, tag-watcher, trustBundle, untaint, validation, validationController, validationServer, wasm, wle] (default ``)</td>
<td>Comma-separated list of scopes for which to include caller information, scopes can be any of [ads, adsc, all, analysis, authn, authorization, ca, controllers, default, delta, deltaadsc, file, fullpush, gateway, grpc, grpcgen, ip-autoallocate, klog, krt, kube, model, monitoring, pkica, pkira, probes, processing, retry, rootcertrotator, secretcontroller, security, serverca, serviceentry, spiffe, status, trustBundle, untaint, validation, validationController, validationServer, wasm, wle] (default ``)</td>
</tr>
<tr>
<td><code>--log_output_level &lt;string&gt;</code></td>
<td></td>
<td>Comma-separated minimum per-scope logging level of messages to output, in the form of &lt;scope&gt;:&lt;level&gt;,&lt;scope&gt;:&lt;level&gt;,... where scope can be one of [ads, adsc, all, analysis, authn, authorization, ca, controllers, default, delta, deltaadsc, file, fullpush, gateway, grpc, grpcgen, ip-autoallocate, klog, krt, kube, model, monitoring, pkica, pkira, probes, processing, retry, rootcertrotator, secretcontroller, security, serverca, serviceentry, spiffe, status, tag-watcher, trustBundle, untaint, validation, validationController, validationServer, wasm, wle] and level can be one of [debug, info, warn, error, fatal, none] (default ``)</td>
<td>Comma-separated minimum per-scope logging level of messages to output, in the form of &lt;scope&gt;:&lt;level&gt;,&lt;scope&gt;:&lt;level&gt;,... where scope can be one of [ads, adsc, all, analysis, authn, authorization, ca, controllers, default, delta, deltaadsc, file, fullpush, gateway, grpc, grpcgen, ip-autoallocate, klog, krt, kube, model, monitoring, pkica, pkira, probes, processing, retry, rootcertrotator, secretcontroller, security, serverca, serviceentry, spiffe, status, trustBundle, untaint, validation, validationController, validationServer, wasm, wle] and level can be one of [debug, info, warn, error, fatal, none] (default ``)</td>
</tr>
<tr>
<td><code>--log_stacktrace_level &lt;string&gt;</code></td>
<td></td>
<td>Comma-separated minimum per-scope logging level at which stack traces are captured, in the form of &lt;scope&gt;:&lt;level&gt;,&lt;scope:level&gt;,... where scope can be one of [ads, adsc, all, analysis, authn, authorization, ca, controllers, default, delta, deltaadsc, file, fullpush, gateway, grpc, grpcgen, ip-autoallocate, klog, krt, kube, model, monitoring, pkica, pkira, probes, processing, retry, rootcertrotator, secretcontroller, security, serverca, serviceentry, spiffe, status, tag-watcher, trustBundle, untaint, validation, validationController, validationServer, wasm, wle] and level can be one of [debug, info, warn, error, fatal, none] (default `default:none`)</td>
<td>Comma-separated minimum per-scope logging level at which stack traces are captured, in the form of &lt;scope&gt;:&lt;level&gt;,&lt;scope:level&gt;,... where scope can be one of [ads, adsc, all, analysis, authn, authorization, ca, controllers, default, delta, deltaadsc, file, fullpush, gateway, grpc, grpcgen, ip-autoallocate, klog, krt, kube, model, monitoring, pkica, pkira, probes, processing, retry, rootcertrotator, secretcontroller, security, serverca, serviceentry, spiffe, status, trustBundle, untaint, validation, validationController, validationServer, wasm, wle] and level can be one of [debug, info, warn, error, fatal, none] (default `default:none`)</td>
</tr>
<tr>
<td><code>--log_target &lt;stringArray&gt;</code></td>
@ -1257,6 +1257,18 @@ Only applies when traffic from all groups (i.e. &#34;*&#34;) is being redirected
<td><code></code></td>
<td>Comma separated list of potentially insecure kubeconfig authentication options that are allowed for multicluster authentication.Support values: all authProviders (`gcp`, `azure`, `exec`, `openstack`), `clientKey`, `clientCertificate`, `tokenFile`, and `exec`.</td>
</tr>
<tr id='pilot-ip-autoallocate-ipv4-prefix'>
<td><a href='#pilot-ip-autoallocate-ipv4-prefix'><code>PILOT_IP_AUTOALLOCATE_IPV4_PREFIX</code></a></td>
<td>String</td>
<td><code>240.240.0.0/16</code></td>
<td>The CIDR range/prefix to use for auto-allocated IPv4 addresses. This should be a private range, and not conflict with any other IPs in the cluster.</td>
</tr>
<tr id='pilot-ip-autoallocate-ipv6-prefix'>
<td><a href='#pilot-ip-autoallocate-ipv6-prefix'><code>PILOT_IP_AUTOALLOCATE_IPV6_PREFIX</code></a></td>
<td>String</td>
<td><code>2001:2::/48</code></td>
<td>The CIDR range/prefix to use for auto-allocated IPv6 addresses. This should be a private range, and not conflict with any other IPs in the cluster.</td>
</tr>
<tr id='pilot-jwt-enable-remote-jwks'>
<td><a href='#pilot-jwt-enable-remote-jwks'><code>PILOT_JWT_ENABLE_REMOTE_JWKS</code></a></td>
<td>String</td>

View File

@ -1301,6 +1301,18 @@ Only applies when traffic from all groups (i.e. &#34;*&#34;) is being redirected
<td><code></code></td>
<td>Comma separated list of potentially insecure kubeconfig authentication options that are allowed for multicluster authentication.Support values: all authProviders (`gcp`, `azure`, `exec`, `openstack`), `clientKey`, `clientCertificate`, `tokenFile`, and `exec`.</td>
</tr>
<tr id='pilot-ip-autoallocate-ipv4-prefix'>
<td><a href='#pilot-ip-autoallocate-ipv4-prefix'><code>PILOT_IP_AUTOALLOCATE_IPV4_PREFIX</code></a></td>
<td>String</td>
<td><code>240.240.0.0/16</code></td>
<td>The CIDR range/prefix to use for auto-allocated IPv4 addresses. This should be a private range, and not conflict with any other IPs in the cluster.</td>
</tr>
<tr id='pilot-ip-autoallocate-ipv6-prefix'>
<td><a href='#pilot-ip-autoallocate-ipv6-prefix'><code>PILOT_IP_AUTOALLOCATE_IPV6_PREFIX</code></a></td>
<td>String</td>
<td><code>2001:2::/48</code></td>
<td>The CIDR range/prefix to use for auto-allocated IPv6 addresses. This should be a private range, and not conflict with any other IPs in the cluster.</td>
</tr>
<tr id='pilot-jwt-enable-remote-jwks'>
<td><a href='#pilot-jwt-enable-remote-jwks'><code>PILOT_JWT_ENABLE_REMOTE_JWKS</code></a></td>
<td>String</td>

View File

@ -9224,6 +9224,18 @@ Only applies when traffic from all groups (i.e. &#34;*&#34;) is being redirected
<td><code></code></td>
<td>Comma separated list of potentially insecure kubeconfig authentication options that are allowed for multicluster authentication.Support values: all authProviders (`gcp`, `azure`, `exec`, `openstack`), `clientKey`, `clientCertificate`, `tokenFile`, and `exec`.</td>
</tr>
<tr id='pilot-ip-autoallocate-ipv4-prefix'>
<td><a href='#pilot-ip-autoallocate-ipv4-prefix'><code>PILOT_IP_AUTOALLOCATE_IPV4_PREFIX</code></a></td>
<td>String</td>
<td><code>240.240.0.0/16</code></td>
<td>The CIDR range/prefix to use for auto-allocated IPv4 addresses. This should be a private range, and not conflict with any other IPs in the cluster.</td>
</tr>
<tr id='pilot-ip-autoallocate-ipv6-prefix'>
<td><a href='#pilot-ip-autoallocate-ipv6-prefix'><code>PILOT_IP_AUTOALLOCATE_IPV6_PREFIX</code></a></td>
<td>String</td>
<td><code>2001:2::/48</code></td>
<td>The CIDR range/prefix to use for auto-allocated IPv6 addresses. This should be a private range, and not conflict with any other IPs in the cluster.</td>
</tr>
<tr id='pilot-jwt-enable-remote-jwks'>
<td><a href='#pilot-jwt-enable-remote-jwks'><code>PILOT_JWT_ENABLE_REMOTE_JWKS</code></a></td>
<td>String</td>

View File

@ -1679,6 +1679,18 @@ Only applies when traffic from all groups (i.e. &#34;*&#34;) is being redirected
<td><code></code></td>
<td>Comma separated list of potentially insecure kubeconfig authentication options that are allowed for multicluster authentication.Support values: all authProviders (`gcp`, `azure`, `exec`, `openstack`), `clientKey`, `clientCertificate`, `tokenFile`, and `exec`.</td>
</tr>
<tr id='pilot-ip-autoallocate-ipv4-prefix'>
<td><a href='#pilot-ip-autoallocate-ipv4-prefix'><code>PILOT_IP_AUTOALLOCATE_IPV4_PREFIX</code></a></td>
<td>String</td>
<td><code>240.240.0.0/16</code></td>
<td>The CIDR range/prefix to use for auto-allocated IPv4 addresses. This should be a private range, and not conflict with any other IPs in the cluster.</td>
</tr>
<tr id='pilot-ip-autoallocate-ipv6-prefix'>
<td><a href='#pilot-ip-autoallocate-ipv6-prefix'><code>PILOT_IP_AUTOALLOCATE_IPV6_PREFIX</code></a></td>
<td>String</td>
<td><code>2001:2::/48</code></td>
<td>The CIDR range/prefix to use for auto-allocated IPv6 addresses. This should be a private range, and not conflict with any other IPs in the cluster.</td>
</tr>
<tr id='pilot-jwt-enable-remote-jwks'>
<td><a href='#pilot-jwt-enable-remote-jwks'><code>PILOT_JWT_ENABLE_REMOTE_JWKS</code></a></td>
<td>String</td>

View File

@ -268,17 +268,17 @@ If it is not installed already, you can install it via your OS&#39;s package man
<tr>
<td><code>--log_caller &lt;string&gt;</code></td>
<td></td>
<td>Comma-separated list of scopes for which to include caller information, scopes can be any of [ads, adsc, all, analysis, authn, authorization, ca, controllers, default, delta, deltaadsc, file, fullpush, gateway, grpc, grpcgen, ip-autoallocate, klog, krt, kube, model, monitoring, pkica, pkira, probes, processing, retry, rootcertrotator, secretcontroller, security, serverca, serviceentry, spiffe, status, tag-watcher, trustBundle, untaint, validation, validationController, validationServer, wasm, wle] (default ``)</td>
<td>Comma-separated list of scopes for which to include caller information, scopes can be any of [ads, adsc, all, analysis, authn, authorization, ca, controllers, default, delta, deltaadsc, file, fullpush, gateway, grpc, grpcgen, ip-autoallocate, klog, krt, kube, model, monitoring, pkica, pkira, probes, processing, retry, rootcertrotator, secretcontroller, security, serverca, serviceentry, spiffe, status, trustBundle, untaint, validation, validationController, validationServer, wasm, wle] (default ``)</td>
</tr>
<tr>
<td><code>--log_output_level &lt;string&gt;</code></td>
<td></td>
<td>Comma-separated minimum per-scope logging level of messages to output, in the form of &lt;scope&gt;:&lt;level&gt;,&lt;scope&gt;:&lt;level&gt;,... where scope can be one of [ads, adsc, all, analysis, authn, authorization, ca, controllers, default, delta, deltaadsc, file, fullpush, gateway, grpc, grpcgen, ip-autoallocate, klog, krt, kube, model, monitoring, pkica, pkira, probes, processing, retry, rootcertrotator, secretcontroller, security, serverca, serviceentry, spiffe, status, tag-watcher, trustBundle, untaint, validation, validationController, validationServer, wasm, wle] and level can be one of [debug, info, warn, error, fatal, none] (default ``)</td>
<td>Comma-separated minimum per-scope logging level of messages to output, in the form of &lt;scope&gt;:&lt;level&gt;,&lt;scope&gt;:&lt;level&gt;,... where scope can be one of [ads, adsc, all, analysis, authn, authorization, ca, controllers, default, delta, deltaadsc, file, fullpush, gateway, grpc, grpcgen, ip-autoallocate, klog, krt, kube, model, monitoring, pkica, pkira, probes, processing, retry, rootcertrotator, secretcontroller, security, serverca, serviceentry, spiffe, status, trustBundle, untaint, validation, validationController, validationServer, wasm, wle] and level can be one of [debug, info, warn, error, fatal, none] (default ``)</td>
</tr>
<tr>
<td><code>--log_stacktrace_level &lt;string&gt;</code></td>
<td></td>
<td>Comma-separated minimum per-scope logging level at which stack traces are captured, in the form of &lt;scope&gt;:&lt;level&gt;,&lt;scope:level&gt;,... where scope can be one of [ads, adsc, all, analysis, authn, authorization, ca, controllers, default, delta, deltaadsc, file, fullpush, gateway, grpc, grpcgen, ip-autoallocate, klog, krt, kube, model, monitoring, pkica, pkira, probes, processing, retry, rootcertrotator, secretcontroller, security, serverca, serviceentry, spiffe, status, tag-watcher, trustBundle, untaint, validation, validationController, validationServer, wasm, wle] and level can be one of [debug, info, warn, error, fatal, none] (default `default:none`)</td>
<td>Comma-separated minimum per-scope logging level at which stack traces are captured, in the form of &lt;scope&gt;:&lt;level&gt;,&lt;scope:level&gt;,... where scope can be one of [ads, adsc, all, analysis, authn, authorization, ca, controllers, default, delta, deltaadsc, file, fullpush, gateway, grpc, grpcgen, ip-autoallocate, klog, krt, kube, model, monitoring, pkica, pkira, probes, processing, retry, rootcertrotator, secretcontroller, security, serverca, serviceentry, spiffe, status, trustBundle, untaint, validation, validationController, validationServer, wasm, wle] and level can be one of [debug, info, warn, error, fatal, none] (default `default:none`)</td>
</tr>
<tr>
<td><code>--log_target &lt;stringArray&gt;</code></td>
@ -1257,6 +1257,18 @@ Only applies when traffic from all groups (i.e. &#34;*&#34;) is being redirected
<td><code></code></td>
<td>Comma separated list of potentially insecure kubeconfig authentication options that are allowed for multicluster authentication.Support values: all authProviders (`gcp`, `azure`, `exec`, `openstack`), `clientKey`, `clientCertificate`, `tokenFile`, and `exec`.</td>
</tr>
<tr id='pilot-ip-autoallocate-ipv4-prefix'>
<td><a href='#pilot-ip-autoallocate-ipv4-prefix'><code>PILOT_IP_AUTOALLOCATE_IPV4_PREFIX</code></a></td>
<td>String</td>
<td><code>240.240.0.0/16</code></td>
<td>The CIDR range/prefix to use for auto-allocated IPv4 addresses. This should be a private range, and not conflict with any other IPs in the cluster.</td>
</tr>
<tr id='pilot-ip-autoallocate-ipv6-prefix'>
<td><a href='#pilot-ip-autoallocate-ipv6-prefix'><code>PILOT_IP_AUTOALLOCATE_IPV6_PREFIX</code></a></td>
<td>String</td>
<td><code>2001:2::/48</code></td>
<td>The CIDR range/prefix to use for auto-allocated IPv6 addresses. This should be a private range, and not conflict with any other IPs in the cluster.</td>
</tr>
<tr id='pilot-jwt-enable-remote-jwks'>
<td><a href='#pilot-jwt-enable-remote-jwks'><code>PILOT_JWT_ENABLE_REMOTE_JWKS</code></a></td>
<td>String</td>