- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 72 for nftables (0.15 sec)
-
pkg/proxy/nftables/proxier.go
{filterOutputChain, knftables.FilterType, knftables.OutputHook, knftables.DNATPriority + "-10"}, {filterOutputPostDNATChain, knftables.FilterType, knftables.OutputHook, knftables.DNATPriority + "+10"}, {natPreroutingChain, knftables.NATType, knftables.PreroutingHook, knftables.DNATPriority}, {natOutputChain, knftables.NATType, knftables.OutputHook, knftables.DNATPriority},
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat Jun 08 13:48:54 UTC 2024 - 55.5K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.31.md
- The iptables mode of kube-proxy now tracks accepted packets that are destined for node-ports on localhost by introducing `kubeproxy_iptables_localhost_nodeports_accepted_packets_total` metric.
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Jun 12 20:34:14 UTC 2024 - 60.3K bytes - Viewed (0) -
hack/local-up-cluster.sh
# jump through hoops to avoid removing docker/containerd # when installing nftables and kmod, as those docker/containerd # packages depend on iptables dpkg -r --force-depends iptables && \ apt -y --fix-broken install && \ apt -y install nftables kmod && \ apt -y install iptables } function tolerate_cgroups_v2 {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat May 25 02:33:52 UTC 2024 - 53.3K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.3.md
- [Other notable changes](#other-notable-changes) - [v1.3.9](#v139) - [Downloads](#downloads) - [Changelog since v1.3.8](#changelog-since-v138) - [Other notable changes](#other-notable-changes-1) - [v1.3.8](#v138) - [Downloads](#downloads-1) - [Changelog since v1.3.7](#changelog-since-v137) - [Other notable changes](#other-notable-changes-2) - [v1.3.7](#v137)
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Dec 24 02:28:26 UTC 2020 - 84K bytes - Viewed (0) -
pkg/proxy/ipvs/proxier.go
filteredCIDRs = append(filteredCIDRs, cidr) } } return filteredCIDRs } // iptablesJumpChain is tables of iptables chains that ipvs proxier used to install iptables or cleanup iptables. // `to` is the iptables chain we want to operate. // `from` is the source iptables chain var iptablesJumpChain = []struct { table utiliptables.Table from utiliptables.Chain to utiliptables.Chain
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Apr 28 15:51:23 UTC 2024 - 77.7K bytes - Viewed (0) -
pkg/proxy/iptables/proxier.go
// NewProxier returns a new Proxier given an iptables Interface instance. // Because of the iptables logic, it is assumed that there is only a single Proxier active on a machine. // An error will be returned if iptables fails to update or acquire the initial lock. // Once a proxier is created, it will keep iptables up to date in the background and // will not terminate if a particular iptables call fails. func NewProxier(ctx context.Context,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 21 14:39:54 UTC 2024 - 65.1K bytes - Viewed (0) -
src/runtime/map.go
// hitprobe = # of entries to check when looking up a present key // missprobe = # of entries to check when looking up an absent key // // Keep in mind this data is for maximally loaded tables, i.e. just // before the table grows. Typical tables will be somewhat less loaded. import ( "internal/abi" "internal/goarch" "internal/runtime/atomic" "runtime/internal/math" "unsafe" ) const (
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 29 17:58:53 UTC 2024 - 57.6K bytes - Viewed (0) -
platforms/documentation/docs/src/docs/css/javadoc.css
* Best for small tables or for complex tables for tables with cells that span * rows and columns, when the "striped" style does not work well. * * striped: * Borders around the table and vertical borders between cells, striped rows, * vertical margins, styled caption. * Best for tables that have a header row, and a body containing a series of simple rows. */ table.borderless,
Registered: Wed Jun 12 18:38:38 UTC 2024 - Last Modified: Tue Apr 09 14:25:49 UTC 2024 - 50.5K bytes - Viewed (0) -
pilot/pkg/networking/core/listener.go
// do not care what the listener's capture mode setting is. The proxy does not use iptables bind.bindToPort = true } else if egressListener.IstioListener != nil { if egressListener.IstioListener.CaptureMode == networking.CaptureMode_NONE { // proxy uses iptables redirect or tproxy. IF mode is not set // for older proxies, it defaults to iptables redirect. If the // listener's capture mode specifies NONE, then the proxy wants
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon May 06 04:44:06 UTC 2024 - 55.1K bytes - Viewed (0) -
src/reflect/type.go
return true } // The same algorithm applies in both cases, but the // method tables for an interface type and a concrete type // are different, so the code is duplicated. // In both cases the algorithm is a linear scan over the two // lists - T's methods and V's methods - simultaneously. // Since method tables are stored in a unique sorted order // (alphabetical, with no duplicate method names), the scan
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 29 17:58:53 UTC 2024 - 85.5K bytes - Viewed (0)