- Sort Score
- Result 10 results
- Languages All
Results 1 - 6 of 6 for blackholed (0.17 sec)
-
pilot/pkg/networking/core/listener_waypoint.go
port = service.Ports[0].Port // Do not return blackhole cluster for service==nil case as there is a legitimate use case for // calling this function with nil service: to route to a pre-defined statically configured cluster // declared as part of the bootstrap. // If blackhole cluster is needed, do the check on the caller side. See gateway and tls.go for examples. }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Jun 14 04:34:37 UTC 2024 - 27.6K bytes - Viewed (0) -
pilot/pkg/networking/core/sidecar_simulation_test.go
ClusterMatched: expectedCluster, }, } // For blackhole, we will 502 where possible instead of blackhole cluster // This only works for HTTP on HTTP if expectedCluster == util.BlackHoleCluster && call.IsHTTP() && isHTTPPort(call.Port) { e.Result.ClusterMatched = "" e.Result.VirtualHostMatched = util.BlackHole } testCalls = append(testCalls, e) }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Jun 13 01:56:28 UTC 2024 - 84.7K bytes - Viewed (0) -
pilot/pkg/networking/util/util.go
) const ( // BlackHoleCluster to catch traffic from routes with unresolved clusters. Traffic arriving here goes nowhere. BlackHoleCluster = "BlackHoleCluster" // BlackHole is the name of the virtual host and route name used to block all traffic BlackHole = "block_all" // PassthroughCluster to forward traffic to the original destination requested. This cluster is used when // traffic does not match any listener in envoy.
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Jun 13 01:56:28 UTC 2024 - 28.5K bytes - Viewed (0) -
pilot/pkg/networking/core/accesslog_test.go
// Make sure it doesn't change between patches if d := cmp.Diff(l1, l2, protocmp.Transform()); d != "" { t.Fatal(d) } // Make sure we have exactly 1 access log fc := xdstest.ExtractFilterChain("virtualOutbound-blackhole", xdstest.ExtractListener("virtualOutbound", l1)) if len(xdstest.ExtractTCPProxy(t, fc).GetAccessLog()) != 1 { t.Fatalf("unexpected access log: %v", xdstest.ExtractTCPProxy(t, fc).GetAccessLog()) } }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Jun 14 04:34:30 UTC 2024 - 19.9K bytes - Viewed (0) -
pilot/pkg/networking/core/listener_builder_test.go
if l == nil { t.Fatalf("failed to find virtual inbound listener") } listenertest.VerifyListener(t, l, listenertest.ListenerTest{ FilterChains: []listenertest.FilterChainTest{ {Name: "virtualInbound-blackhole"}, {Name: "virtualInbound-catchall-http", Type: listenertest.MTLSHTTP}, {Name: "virtualInbound-catchall-http", Type: listenertest.PlainHTTP}, {Name: "virtualInbound", Type: listenertest.MTLSTCP},
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Jun 13 01:56:28 UTC 2024 - 24.7K bytes - Viewed (0) -
pilot/pkg/networking/core/cluster.go
ob, cs := configgen.buildOutboundClusters(cb, proxy, outboundPatcher, services) cacheStats = cacheStats.merge(cs) resources = append(resources, ob...) // Add a blackhole and passthrough cluster for catching traffic to unresolved routes clusters = outboundPatcher.conditionallyAppend(clusters, nil, cb.buildBlackHoleCluster(), cb.buildDefaultPassthroughCluster())
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Jun 13 01:56:28 UTC 2024 - 33K bytes - Viewed (0)