Automator: update istio.io@ reference docs (#11642)

This commit is contained in:
Istio Automation 2022-07-25 19:49:47 -07:00 committed by GitHub
parent 9b829655b3
commit 3aec694fcd
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
10 changed files with 10 additions and 10 deletions

View File

@ -1417,7 +1417,7 @@ Only applies when traffic from all groups (i.e. "*") is being redirected
<td><code>TRUSTED_GATEWAY_CIDR</code></td>
<td>String</td>
<td><code></code></td>
<td>If set, any connections from gateway to Istiod with this CIDR range are treated as trusted for using authenication mechanisms like XFCC. This can only be used when the network where Istiod and the authenticating gateways are running in a trusted/secure network</td>
<td>If set, any connections from gateway to Istiod with this CIDR range are treated as trusted for using authentication mechanisms like XFCC. This can only be used when the network where Istiod and the authenticating gateways are running in a trusted/secure network</td>
</tr>
<tr>
<td><code>UNSAFE_ENABLE_ADMIN_ENDPOINTS</code></td>

View File

@ -7719,7 +7719,7 @@ These environment variables affect the behavior of the <code>istioctl</code> com
<td><code>TRUSTED_GATEWAY_CIDR</code></td>
<td>String</td>
<td><code></code></td>
<td>If set, any connections from gateway to Istiod with this CIDR range are treated as trusted for using authenication mechanisms like XFCC. This can only be used when the network where Istiod and the authenticating gateways are running in a trusted/secure network</td>
<td>If set, any connections from gateway to Istiod with this CIDR range are treated as trusted for using authentication mechanisms like XFCC. This can only be used when the network where Istiod and the authenticating gateways are running in a trusted/secure network</td>
</tr>
<tr>
<td><code>UNSAFE_ENABLE_ADMIN_ENDPOINTS</code></td>

View File

@ -998,7 +998,7 @@ These environment variables affect the behavior of the <code>operator</code> com
<td><code>TRUSTED_GATEWAY_CIDR</code></td>
<td>String</td>
<td><code></code></td>
<td>If set, any connections from gateway to Istiod with this CIDR range are treated as trusted for using authenication mechanisms like XFCC. This can only be used when the network where Istiod and the authenticating gateways are running in a trusted/secure network</td>
<td>If set, any connections from gateway to Istiod with this CIDR range are treated as trusted for using authentication mechanisms like XFCC. This can only be used when the network where Istiod and the authenticating gateways are running in a trusted/secure network</td>
</tr>
<tr>
<td><code>UNSAFE_ENABLE_ADMIN_ENDPOINTS</code></td>

View File

@ -1932,7 +1932,7 @@ Only applies when traffic from all groups (i.e. &#34;*&#34;) is being redirected
<td><code>TRUSTED_GATEWAY_CIDR</code></td>
<td>String</td>
<td><code></code></td>
<td>If set, any connections from gateway to Istiod with this CIDR range are treated as trusted for using authenication mechanisms like XFCC. This can only be used when the network where Istiod and the authenticating gateways are running in a trusted/secure network</td>
<td>If set, any connections from gateway to Istiod with this CIDR range are treated as trusted for using authentication mechanisms like XFCC. This can only be used when the network where Istiod and the authenticating gateways are running in a trusted/secure network</td>
</tr>
<tr>
<td><code>TRUST_DOMAIN</code></td>

View File

@ -1220,7 +1220,7 @@ These environment variables affect the behavior of the <code>pilot-discovery</co
<td><code>TRUSTED_GATEWAY_CIDR</code></td>
<td>String</td>
<td><code></code></td>
<td>If set, any connections from gateway to Istiod with this CIDR range are treated as trusted for using authenication mechanisms like XFCC. This can only be used when the network where Istiod and the authenticating gateways are running in a trusted/secure network</td>
<td>If set, any connections from gateway to Istiod with this CIDR range are treated as trusted for using authentication mechanisms like XFCC. This can only be used when the network where Istiod and the authenticating gateways are running in a trusted/secure network</td>
</tr>
<tr>
<td><code>UNSAFE_ENABLE_ADMIN_ENDPOINTS</code></td>

View File

@ -1417,7 +1417,7 @@ Only applies when traffic from all groups (i.e. &#34;*&#34;) is being redirected
<td><code>TRUSTED_GATEWAY_CIDR</code></td>
<td>String</td>
<td><code></code></td>
<td>If set, any connections from gateway to Istiod with this CIDR range are treated as trusted for using authenication mechanisms like XFCC. This can only be used when the network where Istiod and the authenticating gateways are running in a trusted/secure network</td>
<td>If set, any connections from gateway to Istiod with this CIDR range are treated as trusted for using authentication mechanisms like XFCC. This can only be used when the network where Istiod and the authenticating gateways are running in a trusted/secure network</td>
</tr>
<tr>
<td><code>UNSAFE_ENABLE_ADMIN_ENDPOINTS</code></td>

View File

@ -7719,7 +7719,7 @@ These environment variables affect the behavior of the <code>istioctl</code> com
<td><code>TRUSTED_GATEWAY_CIDR</code></td>
<td>String</td>
<td><code></code></td>
<td>If set, any connections from gateway to Istiod with this CIDR range are treated as trusted for using authenication mechanisms like XFCC. This can only be used when the network where Istiod and the authenticating gateways are running in a trusted/secure network</td>
<td>If set, any connections from gateway to Istiod with this CIDR range are treated as trusted for using authentication mechanisms like XFCC. This can only be used when the network where Istiod and the authenticating gateways are running in a trusted/secure network</td>
</tr>
<tr>
<td><code>UNSAFE_ENABLE_ADMIN_ENDPOINTS</code></td>

View File

@ -998,7 +998,7 @@ These environment variables affect the behavior of the <code>operator</code> com
<td><code>TRUSTED_GATEWAY_CIDR</code></td>
<td>String</td>
<td><code></code></td>
<td>If set, any connections from gateway to Istiod with this CIDR range are treated as trusted for using authenication mechanisms like XFCC. This can only be used when the network where Istiod and the authenticating gateways are running in a trusted/secure network</td>
<td>If set, any connections from gateway to Istiod with this CIDR range are treated as trusted for using authentication mechanisms like XFCC. This can only be used when the network where Istiod and the authenticating gateways are running in a trusted/secure network</td>
</tr>
<tr>
<td><code>UNSAFE_ENABLE_ADMIN_ENDPOINTS</code></td>

View File

@ -1932,7 +1932,7 @@ Only applies when traffic from all groups (i.e. &#34;*&#34;) is being redirected
<td><code>TRUSTED_GATEWAY_CIDR</code></td>
<td>String</td>
<td><code></code></td>
<td>If set, any connections from gateway to Istiod with this CIDR range are treated as trusted for using authenication mechanisms like XFCC. This can only be used when the network where Istiod and the authenticating gateways are running in a trusted/secure network</td>
<td>If set, any connections from gateway to Istiod with this CIDR range are treated as trusted for using authentication mechanisms like XFCC. This can only be used when the network where Istiod and the authenticating gateways are running in a trusted/secure network</td>
</tr>
<tr>
<td><code>TRUST_DOMAIN</code></td>

View File

@ -1220,7 +1220,7 @@ These environment variables affect the behavior of the <code>pilot-discovery</co
<td><code>TRUSTED_GATEWAY_CIDR</code></td>
<td>String</td>
<td><code></code></td>
<td>If set, any connections from gateway to Istiod with this CIDR range are treated as trusted for using authenication mechanisms like XFCC. This can only be used when the network where Istiod and the authenticating gateways are running in a trusted/secure network</td>
<td>If set, any connections from gateway to Istiod with this CIDR range are treated as trusted for using authentication mechanisms like XFCC. This can only be used when the network where Istiod and the authenticating gateways are running in a trusted/secure network</td>
</tr>
<tr>
<td><code>UNSAFE_ENABLE_ADMIN_ENDPOINTS</code></td>