- Sort Score
- Result 10 results
- Languages All
Results 1 - 5 of 5 for tablet (0.16 sec)
-
cni/pkg/iptables/iptables_linux.go
} netlinkRoutes := []*netlink.Route{ // In routing table ${INBOUND_TPROXY_ROUTE_TABLE}, create a single default rule to route all traffic to // the loopback interface. // Equiv: "ip route add local 0.0.0.0/0 dev lo table 100" { Dst: localhostDst, Scope: netlink.SCOPE_HOST, Type: unix.RTN_LOCAL, Table: RouteTableInbound, LinkIndex: loopbackLink.Attrs().Index, },
Go - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Tue Apr 30 22:24:38 GMT 2024 - 3.3K bytes - Viewed (0) -
manifests/charts/base/templates/validatingadmissionpolicy.yaml
Others - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Mon Apr 29 21:07:45 GMT 2024 - 1.7K bytes - Viewed (0) -
cni/pkg/iptables/iptables.go
// // Extreme corner case: // If for some reason your host had both binaries, and you were injecting out-of-band // iptables rules within a pod context into `legacy` tables, but your host context preferred // `nft`, we would still inject our rules in-pod into nft tables, which is a bit wonky. // // But that's stunningly unlikely (and would still work either way) iptVer, err := ext.DetectIptablesVersion(false) if err != nil {
Go - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Tue May 07 19:54:50 GMT 2024 - 19.7K bytes - Viewed (0) -
manifests/charts/istio-control/istio-discovery/templates/validatingadmissionpolicy.yaml
) ) --- apiVersion: admissionregistration.k8s.io/v1 kind: ValidatingAdmissionPolicyBinding metadata: name: "stable-channel-policy-binding{{- if not (eq .Values.revision "") }}-{{ .Values.revision }}{{- end }}-{{ .Values.global.istioNamespace }}.istio.io" spec: policyName: "stable-channel-policy{{- if not (eq .Values.revision "") }}-{{ .Values.revision }}{{- end }}-{{ .Values.global.istioNamespace }}.istio.io"
Others - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Mon Apr 29 21:07:45 GMT 2024 - 2.1K bytes - Viewed (0) -
manifests/charts/istio-cni/templates/daemonset.yaml
capabilities: drop: - ALL add: # CAP_NET_ADMIN is required to allow ipset and route table access - NET_ADMIN # CAP_NET_RAW is required to allow iptables mutation of the `nat` table - NET_RAW # CAP_SYS_ADMIN is required for both ambient and repair, in order to open
Others - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Fri May 03 19:29:42 GMT 2024 - 9.4K bytes - Viewed (0)