Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 508 for clusterIPs (0.16 sec)

  1. pkg/api/service/warnings_test.go

    	service := func(clusterIPs []string) *api.Service {
    		svc := api.Service{
    			ObjectMeta: metav1.ObjectMeta{
    				Name:      "svc-test",
    				Namespace: "ns",
    			},
    			Spec: api.ServiceSpec{
    				Type: api.ServiceTypeClusterIP,
    			},
    		}
    
    		if len(clusterIPs) > 0 {
    			svc.Spec.ClusterIP = clusterIPs[0]
    			svc.Spec.ClusterIPs = clusterIPs
    		}
    		return &svc
    	}
    
    	tests := []struct {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Jul 26 22:57:57 UTC 2023
    - 10.4K bytes
    - Viewed (0)
  2. pkg/registry/core/service/storage/alloc.go

    	// if there is no slice to work with
    	if service.Spec.ClusterIPs == nil {
    		service.Spec.ClusterIPs = make([]string, 0, len(service.Spec.IPFamilies))
    	}
    
    	for i, ipFamily := range service.Spec.IPFamilies {
    		if i > (len(service.Spec.ClusterIPs) - 1) {
    			service.Spec.ClusterIPs = append(service.Spec.ClusterIPs, "" /* just a marker */)
    		}
    
    		toAlloc[ipFamily] = service.Spec.ClusterIPs[i]
    	}
    
    	// allocate
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Oct 31 21:05:05 UTC 2023
    - 37.3K bytes
    - Viewed (0)
  3. pkg/registry/core/service/storage/storage.go

    		return
    	}
    
    	// This was an update operation
    
    	// ClusterIPs were cleared by an old client which was trying to patch
    	// some field and didn't provide ClusterIPs
    	if len(oldSvc.Spec.ClusterIPs) > 0 && len(newSvc.Spec.ClusterIPs) == 0 {
    		// if ClusterIP is the same, then it is an old client trying to
    		// patch service and didn't provide ClusterIPs
    		if oldSvc.Spec.ClusterIP == newSvc.Spec.ClusterIP {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Apr 11 13:09:33 UTC 2024
    - 22.3K bytes
    - Viewed (0)
  4. pkg/registry/core/service/ipallocator/controller/repair_test.go

    			Spec: corev1.ServiceSpec{
    				ClusterIP:  "192.168.1.1",
    				ClusterIPs: []string{"192.168.1.1"},
    				IPFamilies: []corev1.IPFamily{corev1.IPv4Protocol},
    			},
    		},
    		&corev1.Service{
    			ObjectMeta: metav1.ObjectMeta{Namespace: "two", Name: "two"},
    			Spec: corev1.ServiceSpec{
    				ClusterIP:  "192.168.1.100",
    				ClusterIPs: []string{"192.168.1.100"},
    				IPFamilies: []corev1.IPFamily{corev1.IPv4Protocol},
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat Sep 30 15:46:06 UTC 2023
    - 21.1K bytes
    - Viewed (0)
  5. pkg/apis/core/helper/helpers_test.go

    			input: core.ServiceSpec{
    				ClusterIPs: nil,
    			},
    
    			output: false,
    		},
    		{
    			name: "headless service",
    			input: core.ServiceSpec{
    				ClusterIP:  "None",
    				ClusterIPs: []string{"None"},
    			},
    			output: false,
    		},
    		// true cases
    		{
    			name: "one ipv4",
    			input: core.ServiceSpec{
    				ClusterIP:  "1.2.3.4",
    				ClusterIPs: []string{"1.2.3.4"},
    			},
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat Oct 28 07:31:28 UTC 2023
    - 9.2K bytes
    - Viewed (0)
  6. pkg/proxy/util/utils_test.go

    			service: v1.Service{
    				Spec: v1.ServiceSpec{
    					ClusterIPs: []string{"10.0.0.10"},
    					IPFamilies: []v1.IPFamily{v1.IPv4Protocol},
    				},
    			},
    		},
    
    		{
    			name:           "service single stack ipv4. want ipv6",
    			requestFamily:  v1.IPv6Protocol,
    			expectedResult: "",
    			service: v1.Service{
    				Spec: v1.ServiceSpec{
    					ClusterIPs: []string{"10.0.0.10"},
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon May 20 11:57:43 UTC 2024
    - 17.1K bytes
    - Viewed (0)
  7. pkg/proxy/nftables/README.md

        routed away from there, there's nothing to do.)
    
      - We install a `reject` rule for ClusterIPs matching `@cluster-ips` set and a `drop`
        rule for ClusterIPs belonging to any of the ServiceCIDRs in `forward` and `output` hook, with a 
        higher (i.e. less urgent) priority than the DNAT chains making sure all valid
        traffic directed for ClusterIPs is already DNATed. Drop rule will only
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Jan 21 14:37:56 UTC 2024
    - 5.9K bytes
    - Viewed (0)
  8. staging/src/k8s.io/api/testdata/HEAD/core.v1.Service.json

    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Mar 04 06:46:00 UTC 2024
    - 2.9K bytes
    - Viewed (0)
  9. pkg/registry/core/service/ipallocator/controller/repairip.go

    //   creating the corresponding IPAddress objects
    // * IPAddress objects with wrong references or labels
    //
    // Logs about:
    // * ClusterIPs that do not match the currently configured range
    //
    // There is a one-to-one relation between Service ClusterIPs and IPAddresses.
    // The bidirectional relation is achieved using the following fields:
    // Service.Spec.Cluster == IPAddress.Name AND IPAddress.ParentRef == Service
    //
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat May 04 18:33:12 UTC 2024
    - 24.7K bytes
    - Viewed (0)
  10. pkg/api/service/warnings.go

    	}
    
    	if helper.IsServiceIPSet(service) {
    		for i, clusterIP := range service.Spec.ClusterIPs {
    			warnings = append(warnings, getWarningsForIP(field.NewPath("spec").Child("clusterIPs").Index(i), clusterIP)...)
    		}
    	}
    
    	for i, externalIP := range service.Spec.ExternalIPs {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Jul 26 22:57:57 UTC 2023
    - 4.2K bytes
    - Viewed (0)
Back to top