Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 6 of 6 for blackholed (0.17 sec)

  1. pilot/pkg/networking/core/listener_waypoint.go

    		port = service.Ports[0].Port
    
    		// Do not return blackhole cluster for service==nil case as there is a legitimate use case for
    		// calling this function with nil service: to route to a pre-defined statically configured cluster
    		// declared as part of the bootstrap.
    		// If blackhole cluster is needed, do the check on the caller side. See gateway and tls.go for examples.
    	}
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri Jun 14 04:34:37 UTC 2024
    - 27.6K bytes
    - Viewed (0)
  2. pilot/pkg/networking/core/sidecar_simulation_test.go

    							ClusterMatched: expectedCluster,
    						},
    					}
    					// For blackhole, we will 502 where possible instead of blackhole cluster
    					// This only works for HTTP on HTTP
    					if expectedCluster == util.BlackHoleCluster && call.IsHTTP() && isHTTPPort(call.Port) {
    						e.Result.ClusterMatched = ""
    						e.Result.VirtualHostMatched = util.BlackHole
    					}
    					testCalls = append(testCalls, e)
    				}
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Jun 13 01:56:28 UTC 2024
    - 84.7K bytes
    - Viewed (0)
  3. pilot/pkg/networking/util/util.go

    )
    
    const (
    	// BlackHoleCluster to catch traffic from routes with unresolved clusters. Traffic arriving here goes nowhere.
    	BlackHoleCluster = "BlackHoleCluster"
    	// BlackHole is the name of the virtual host and route name used to block all traffic
    	BlackHole = "block_all"
    	// PassthroughCluster to forward traffic to the original destination requested. This cluster is used when
    	// traffic does not match any listener in envoy.
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Jun 13 01:56:28 UTC 2024
    - 28.5K bytes
    - Viewed (0)
  4. pilot/pkg/networking/core/accesslog_test.go

    	// Make sure it doesn't change between patches
    	if d := cmp.Diff(l1, l2, protocmp.Transform()); d != "" {
    		t.Fatal(d)
    	}
    	// Make sure we have exactly 1 access log
    	fc := xdstest.ExtractFilterChain("virtualOutbound-blackhole", xdstest.ExtractListener("virtualOutbound", l1))
    	if len(xdstest.ExtractTCPProxy(t, fc).GetAccessLog()) != 1 {
    		t.Fatalf("unexpected access log: %v", xdstest.ExtractTCPProxy(t, fc).GetAccessLog())
    	}
    }
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri Jun 14 04:34:30 UTC 2024
    - 19.9K bytes
    - Viewed (0)
  5. pilot/pkg/networking/core/listener_builder_test.go

    	if l == nil {
    		t.Fatalf("failed to find virtual inbound listener")
    	}
    	listenertest.VerifyListener(t, l, listenertest.ListenerTest{
    		FilterChains: []listenertest.FilterChainTest{
    			{Name: "virtualInbound-blackhole"},
    			{Name: "virtualInbound-catchall-http", Type: listenertest.MTLSHTTP},
    			{Name: "virtualInbound-catchall-http", Type: listenertest.PlainHTTP},
    			{Name: "virtualInbound", Type: listenertest.MTLSTCP},
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Jun 13 01:56:28 UTC 2024
    - 24.7K bytes
    - Viewed (0)
  6. pilot/pkg/networking/core/cluster.go

    		ob, cs := configgen.buildOutboundClusters(cb, proxy, outboundPatcher, services)
    		cacheStats = cacheStats.merge(cs)
    		resources = append(resources, ob...)
    		// Add a blackhole and passthrough cluster for catching traffic to unresolved routes
    		clusters = outboundPatcher.conditionallyAppend(clusters, nil, cb.buildBlackHoleCluster(), cb.buildDefaultPassthroughCluster())
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Jun 13 01:56:28 UTC 2024
    - 33K bytes
    - Viewed (0)
Back to top