Optional. List of CIDR ranges to match based on source IP address. At
least one IP block should match. Single IP (e.g., "1.2.3.4") and CIDR
(e.g., "1.2.3.0/24") are supported. Authorization based on source IP
alone should be avoided. The IP addresses of any load balancers or
proxies should be considered untrusted.
Optional. List of CIDR ranges to match based on source IP address. At
least one IP block should match. Single IP (e.g., "1.2.3.4") and CIDR
(e.g., "1.2.3.0/24") are supported. Authorization based on source IP
alone should be avoided. The IP addresses of any load balancers or
proxies should be considered untrusted.
Optional. List of CIDR ranges to match based on source IP address. At
least one IP block should match. Single IP (e.g., "1.2.3.4") and CIDR
(e.g., "1.2.3.0/24") are supported. Authorization based on source IP
alone should be avoided. The IP addresses of any load balancers or
proxies should be considered untrusted.
Optional. List of CIDR ranges to match based on source IP address. At
least one IP block should match. Single IP (e.g., "1.2.3.4") and CIDR
(e.g., "1.2.3.0/24") are supported. Authorization based on source IP
alone should be avoided. The IP addresses of any load balancers or
proxies should be considered untrusted.
Optional. List of peer identities to match for authorization. At least
one principal should match. Each peer can be an exact match, or a
prefix match (example, "namespace/*") or a suffix match (example,
"/service-account") or a presence match "". Authorization based on
the principal name without certificate validation (configured by
ServerTlsPolicy resource) is considered insecure.
Optional. List of peer identities to match for authorization. At least
one principal should match. Each peer can be an exact match, or a
prefix match (example, "namespace/*") or a suffix match (example,
"/service-account") or a presence match "". Authorization based on
the principal name without certificate validation (configured by
ServerTlsPolicy resource) is considered insecure.
Optional. List of peer identities to match for authorization. At least
one principal should match. Each peer can be an exact match, or a
prefix match (example, "namespace/*") or a suffix match (example,
"/service-account") or a presence match "". Authorization based on
the principal name without certificate validation (configured by
ServerTlsPolicy resource) is considered insecure.
Optional. List of peer identities to match for authorization. At least
one principal should match. Each peer can be an exact match, or a
prefix match (example, "namespace/*") or a suffix match (example,
"/service-account") or a presence match "". Authorization based on
the principal name without certificate validation (configured by
ServerTlsPolicy resource) is considered insecure.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-01-28 UTC."],[],[]]