- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 18 for masquerading (0.2 sec)
-
pkg/proxy/nftables/helpers_test.go
add chain ip testing mark-for-masquerade add rule ip testing mark-for-masquerade mark set mark or 0x4000 add chain ip testing masquerading add rule ip testing masquerading mark and 0x4000 == 0 return add rule ip testing masquerading mark set mark xor 0x4000 add rule ip testing masquerading masquerade fully-random
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Apr 02 09:57:47 UTC 2024 - 48.5K bytes - Viewed (0) -
pkg/proxy/nftables/README.md
the possible paths. - Masquerading has to happen in the `postrouting` hook, because "masquerade" means "SNAT to the IP of the interface the packet is going out on", so it has to happen after the final routing decision. (We don't need to masquerade packets that are going to a host network IP, because masquerading is about ensuring that the packet eventually gets
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Jan 21 14:37:56 UTC 2024 - 5.9K bytes - Viewed (0) -
pkg/proxy/nftables/proxier_test.go
add chain ip kube-proxy mark-for-masquerade add rule ip kube-proxy mark-for-masquerade mark set mark or 0x4000 add chain ip kube-proxy masquerading add rule ip kube-proxy masquerading mark and 0x4000 == 0 return add rule ip kube-proxy masquerading mark set mark xor 0x4000 add rule ip kube-proxy masquerading masquerade fully-random add chain ip kube-proxy services add chain ip kube-proxy service-endpoints-check
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat Apr 27 01:31:57 UTC 2024 - 173.5K bytes - Viewed (0) -
pkg/proxy/nftables/proxier.go
clusterIPsCheckChain = "cluster-ips-check" // LoadBalancerSourceRanges handling firewallIPsMap = "firewall-ips" firewallCheckChain = "firewall-check" // masquerading markMasqChain = "mark-for-masquerade" masqueradingChain = "masquerading" ) // NewDualStackProxier creates a MetaProxier instance, with IPv4 and IPv6 proxies. func NewDualStackProxier( ctx context.Context, syncPeriod time.Duration,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat Jun 08 13:48:54 UTC 2024 - 55.5K bytes - Viewed (0) -
pkg/proxy/ipvs/proxier.go
// results in the service VIP being picked as the source IP to reach // a VIP. This leads to a connection from VIP:<random port> to // VIP:<service port>. // Always masquerading OUTPUT (node-originating) traffic with a VIP // source ip and service port destination fixes the outgoing connections. proxier.natRules.Write( args, "src,dst", "-j", string(kubeMarkMasqChain)) }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Apr 28 15:51:23 UTC 2024 - 77.7K bytes - Viewed (0) -
src/cmd/go/internal/modfetch/codehost/git.go
// because we want to avoid ever importing a commit that isn't // reachable from refs/tags/* or refs/heads/* or HEAD. // Both Gerrit and GitHub expose every CL/PR as a named ref, // and we don't want those commits masquerading as being real // pseudo-versions in the main repo. if r.fetchLevel <= fetchSome && ref != "" && hash != "" && !r.local { r.fetchLevel = fetchSome var refspec string if ref == "HEAD" {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Mar 11 22:10:38 UTC 2024 - 27.4K bytes - Viewed (0) -
pkg/proxy/iptables/proxier_test.go
// not just local ones. In reality, if the packet actually left // the cluster, it would have to get masqueraded, but since we can // avoid doing that in the short-circuit case, and not masquerading // is more useful, we avoid masquerading. output: "10.180.0.2:80, 10.180.1.2:80", masq: false, }, { name: "node to ClusterIP with eTP:Local", sourceIP: testNodeIP, destIP: "172.30.0.42",
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 21 14:39:54 UTC 2024 - 249.9K bytes - Viewed (1) -
pkg/proxy/iptables/proxier.go
proxier.natRules.Write( "-A", string(kubePostroutingChain), "-m", "mark", "!", "--mark", fmt.Sprintf("%s/%s", proxier.masqueradeMark, proxier.masqueradeMark), "-j", "RETURN", ) // Clear the mark to avoid re-masquerading if the packet re-traverses the network stack. proxier.natRules.Write( "-A", string(kubePostroutingChain), "-j", "MARK", "--xor-mark", proxier.masqueradeMark, ) masqRule := []string{
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 21 14:39:54 UTC 2024 - 65.1K bytes - Viewed (0) -
common-protos/k8s.io/api/core/v1/generated.proto
// of balancing the service traffic between nodes, and so each node will deliver // traffic only to the node-local endpoints of the service, without masquerading // the client source IP. (Traffic mistakenly sent to a node with no endpoints will // be dropped.) The default value, "Cluster", uses the standard behavior of
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 255.8K bytes - Viewed (0) -
pkg/apis/core/types.go
// of balancing the service traffic between nodes, and so each node will deliver // traffic only to the node-local endpoints of the service, without masquerading // the client source IP. (Traffic mistakenly sent to a node with no endpoints will // be dropped.) The default value, "Cluster", uses the standard behavior of
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed May 29 22:40:29 UTC 2024 - 268.9K bytes - Viewed (0)