mirror of https://github.com/istio/istio.io.git
Automator: update istio.io@ reference docs (#16258)
This commit is contained in:
parent
01b9b546ee
commit
9997707482
|
|
@ -3819,6 +3819,11 @@ The default output is serialized YAML, which can be piped into 'kubectl appl
|
|||
<td>The labels to apply to the workload instances; e.g. -l env=prod,vers=2 (default `[]`)</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>--locality <string></code></td>
|
||||
<td></td>
|
||||
<td>The locality associated with the endpoint. (default ``)</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>--name <string></code></td>
|
||||
<td></td>
|
||||
<td>The name of the workload group (default ``)</td>
|
||||
|
|
|
|||
|
|
@ -4423,6 +4423,20 @@ inside a mesh and how to route to endpoints in each network. For example</p>
|
|||
port: 15443
|
||||
locality: us-east-1a
|
||||
</code></pre>
|
||||
<p>If <code>ENABLE_HCM_INTERNAL_NETWORKS</code> is set to true, MeshNetworks can be used to
|
||||
to explicitly define the networks in Envoy’s internal address configuration.
|
||||
Envoy uses the IPs in the <code>internalAddressConfig</code> to decide whether or not to sanitize
|
||||
Envoy headers. If the IP address is listed an internal, the Envoy headers are not
|
||||
sanitized. As of Envoy 1.33, the default value for <code>internalAddressConfig</code> is set to
|
||||
an empty set. Previously, the default value was the set of all private IPs. Setting
|
||||
the <code>internalAddressConfig</code> to all private IPs (via Envoy’s previous default behavior
|
||||
or via the MeshNetworks) will leave users with an Istio Ingress Gateway potentially
|
||||
vulnerable to <code>x-envoy</code> header manipulation by external sources. More information about
|
||||
this vulnerability can be found here:
|
||||
<a href="https://github.com/envoyproxy/envoy/security/advisories/GHSA-ffhv-fvxq-r6mf">https://github.com/envoyproxy/envoy/security/advisories/GHSA-ffhv-fvxq-r6mf</a>
|
||||
To preserve headers, you must explicitly configure MeshNetworks and set
|
||||
<code>ENABLE_HCM_INTERNAL_NETWORKS</code> to true. Envoy’s <code>internalAddressConfig</code> will be set to
|
||||
the endpointed specified by <code>fromCidr</code>.</p>
|
||||
|
||||
<table class="message-fields">
|
||||
<thead>
|
||||
|
|
|
|||
|
|
@ -3819,6 +3819,11 @@ The default output is serialized YAML, which can be piped into 'kubectl appl
|
|||
<td>The labels to apply to the workload instances; e.g. -l env=prod,vers=2 (default `[]`)</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>--locality <string></code></td>
|
||||
<td></td>
|
||||
<td>The locality associated with the endpoint. (default ``)</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>--name <string></code></td>
|
||||
<td></td>
|
||||
<td>The name of the workload group (default ``)</td>
|
||||
|
|
|
|||
|
|
@ -4423,6 +4423,20 @@ inside a mesh and how to route to endpoints in each network. For example</p>
|
|||
port: 15443
|
||||
locality: us-east-1a
|
||||
</code></pre>
|
||||
<p>If <code>ENABLE_HCM_INTERNAL_NETWORKS</code> is set to true, MeshNetworks can be used to
|
||||
to explicitly define the networks in Envoy’s internal address configuration.
|
||||
Envoy uses the IPs in the <code>internalAddressConfig</code> to decide whether or not to sanitize
|
||||
Envoy headers. If the IP address is listed an internal, the Envoy headers are not
|
||||
sanitized. As of Envoy 1.33, the default value for <code>internalAddressConfig</code> is set to
|
||||
an empty set. Previously, the default value was the set of all private IPs. Setting
|
||||
the <code>internalAddressConfig</code> to all private IPs (via Envoy’s previous default behavior
|
||||
or via the MeshNetworks) will leave users with an Istio Ingress Gateway potentially
|
||||
vulnerable to <code>x-envoy</code> header manipulation by external sources. More information about
|
||||
this vulnerability can be found here:
|
||||
<a href="https://github.com/envoyproxy/envoy/security/advisories/GHSA-ffhv-fvxq-r6mf">https://github.com/envoyproxy/envoy/security/advisories/GHSA-ffhv-fvxq-r6mf</a>
|
||||
To preserve headers, you must explicitly configure MeshNetworks and set
|
||||
<code>ENABLE_HCM_INTERNAL_NETWORKS</code> to true. Envoy’s <code>internalAddressConfig</code> will be set to
|
||||
the endpointed specified by <code>fromCidr</code>.</p>
|
||||
|
||||
<table class="message-fields">
|
||||
<thead>
|
||||
|
|
|
|||
Loading…
Reference in New Issue