Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 5 of 5 for tablet (0.16 sec)

  1. cni/pkg/iptables/iptables_linux.go

    		}
    
    		netlinkRoutes := []*netlink.Route{
    			// In routing table ${INBOUND_TPROXY_ROUTE_TABLE}, create a single default rule to route all traffic to
    			// the loopback interface.
    			// Equiv: "ip route add local 0.0.0.0/0 dev lo table 100"
    			{
    				Dst:       localhostDst,
    				Scope:     netlink.SCOPE_HOST,
    				Type:      unix.RTN_LOCAL,
    				Table:     RouteTableInbound,
    				LinkIndex: loopbackLink.Attrs().Index,
    			},
    Go
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Tue Apr 30 22:24:38 GMT 2024
    - 3.3K bytes
    - Viewed (0)
  2. manifests/charts/base/templates/validatingadmissionpolicy.yaml

              )
            )
    ---
    apiVersion: admissionregistration.k8s.io/v1
    kind: ValidatingAdmissionPolicyBinding
    metadata:
      name: "stable-channel-default-policy-binding.istio.io"
    spec:
      policyName: "stable-channel-default-policy.istio.io"
      validationActions: [Deny]
    Others
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Mon Apr 29 21:07:45 GMT 2024
    - 1.7K bytes
    - Viewed (0)
  3. cni/pkg/iptables/iptables.go

    	//
    	// Extreme corner case:
    	// If for some reason your host had both binaries, and you were injecting out-of-band
    	// iptables rules within a pod context into `legacy` tables, but your host context preferred
    	// `nft`, we would still inject our rules in-pod into nft tables, which is a bit wonky.
    	//
    	// But that's stunningly unlikely (and would still work either way)
    	iptVer, err := ext.DetectIptablesVersion(false)
    	if err != nil {
    Go
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Tue May 07 19:54:50 GMT 2024
    - 19.7K bytes
    - Viewed (0)
  4. manifests/charts/istio-control/istio-discovery/templates/validatingadmissionpolicy.yaml

              )
            )
    ---
    apiVersion: admissionregistration.k8s.io/v1
    kind: ValidatingAdmissionPolicyBinding
    metadata:
      name: "stable-channel-policy-binding{{- if not (eq .Values.revision "") }}-{{ .Values.revision }}{{- end }}-{{ .Values.global.istioNamespace }}.istio.io"
    spec:
      policyName: "stable-channel-policy{{- if not (eq .Values.revision "") }}-{{ .Values.revision }}{{- end }}-{{ .Values.global.istioNamespace }}.istio.io"
    Others
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Mon Apr 29 21:07:45 GMT 2024
    - 2.1K bytes
    - Viewed (0)
  5. manifests/charts/istio-cni/templates/daemonset.yaml

                capabilities:
                  drop:
                  - ALL
                  add:
                  # CAP_NET_ADMIN is required to allow ipset and route table access
                  - NET_ADMIN
                  # CAP_NET_RAW is required to allow iptables mutation of the `nat` table
                  - NET_RAW
                  # CAP_SYS_ADMIN is required for both ambient and repair, in order to open
    Others
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Fri May 03 19:29:42 GMT 2024
    - 9.4K bytes
    - Viewed (0)
Back to top