We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
This is the step in cluster3 of Setup.
According to your scenario, this should be about setup of istio-private-ingressgateway. Below sample describes istio-private-egressgateway.
cat > ./certificate3.conf <<EOF [ req ] encrypt_key = no prompt = no utf8 = yes default_md = sha256 req_extensions = req_ext x509_extensions = req_ext distinguished_name = req_dn [ req_ext ] subjectKeyIdentifier = hash basicConstraints = critical, CA:false keyUsage = critical, digitalSignature, nonRepudiation extendedKeyUsage = serverAuth subjectAltName = critical, @san [req_dn] O=example Inc., department 3 CN=c3.example.com [ san ] URI.1 = spiffe://c3.example.com/istio-private-egressgateway EOF
The text was updated successfully, but these errors were encountered:
No branches or pull requests
This is the step in cluster3 of Setup.
According to your scenario, this should be about setup of istio-private-ingressgateway. Below sample describes istio-private-egressgateway.
cat > ./certificate3.conf <<EOF
[ req ]
encrypt_key = no
prompt = no
utf8 = yes
default_md = sha256
req_extensions = req_ext
x509_extensions = req_ext
distinguished_name = req_dn
[ req_ext ]
subjectKeyIdentifier = hash
basicConstraints = critical, CA:false
keyUsage = critical, digitalSignature, nonRepudiation
extendedKeyUsage = serverAuth
subjectAltName = critical, @san
[req_dn]
O=example Inc., department 3
CN=c3.example.com
[ san ]
URI.1 = spiffe://c3.example.com/istio-private-egressgateway
EOF
The text was updated successfully, but these errors were encountered: