- Sort Score
- Result 10 results
- Languages All
Results 1 - 9 of 9 for TPROXY (0.05 sec)
-
cni/pkg/iptables/testdata/tproxy.golden
-A ISTIO_PRERT ! -d 127.0.0.1/32 -p tcp -i lo -j ACCEPT -A ISTIO_PRERT -p tcp -m tcp --dport 15008 -m mark ! --mark 0x539/0xfff -j TPROXY --on-port 15008 --tproxy-mark 0x111/0xfff -A ISTIO_PRERT -p tcp -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT -A ISTIO_PRERT ! -d 127.0.0.1/32 -p tcp -m mark ! --mark 0x539/0xfff -j TPROXY --on-port 15006 --tproxy-mark 0x111/0xfff
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Wed Sep 25 20:54:34 UTC 2024 - 1.5K bytes - Viewed (0) -
cni/pkg/iptables/testdata/tproxy_ipv6.golden
-A ISTIO_PRERT ! -d 127.0.0.1/32 -p tcp -i lo -j ACCEPT -A ISTIO_PRERT -p tcp -m tcp --dport 15008 -m mark ! --mark 0x539/0xfff -j TPROXY --on-port 15008 --tproxy-mark 0x111/0xfff -A ISTIO_PRERT -p tcp -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT -A ISTIO_PRERT ! -d 127.0.0.1/32 -p tcp -m mark ! --mark 0x539/0xfff -j TPROXY --on-port 15006 --tproxy-mark 0x111/0xfff
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Wed Sep 25 20:54:34 UTC 2024 - 3K bytes - Viewed (0) -
cni/pkg/plugin/plugin_dryrun_test.go
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Tue Aug 27 16:44:45 UTC 2024 - 8.5K bytes - Viewed (0) -
cni/pkg/iptables/iptables.go
"-p", iptablesconstants.TCP, "-i", "lo", "-j", "ACCEPT") // CLI: -A ISTIO_PRERT -p tcp -m tcp --dport <INPORT> -m mark ! --mark 0x539/0xfff -j TPROXY --on-port <INPORT> --on-ip 127.0.0.1 --tproxy-mark 0x111/0xfff // // DESC: Anything heading to <INPORT> that does not have the mark, TPROXY to ztunnel inbound port <INPORT> iptablesBuilder.AppendRule( iptableslog.UndefinedCommand, ChainInpodPrerouting, iptablesconstants.MANGLE,
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Tue Oct 15 15:39:28 UTC 2024 - 23.3K bytes - Viewed (0) -
cni/pkg/iptables/iptables_linux.go
} for _, family := range families { // Equiv: // ip rule add fwmark 0x111/0xfff pref 32764 lookup 100 // // Adds in-pod rules for marking packets with the istio-specific TPROXY mark. // A very similar mechanism is used for sidecar TPROXY. // // TODO largely identical/copied from tools/istio-iptables/pkg/capture/run_linux.go inpodMarkRule := netlink.NewRule() inpodMarkRule.Family = family
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Fri Sep 06 09:44:28 UTC 2024 - 4K bytes - Viewed (0) -
cni/pkg/constants/constants.go
ExcludeNamespaces = "exclude-namespaces" AmbientEnabled = "ambient-enabled" AmbientDNSCapture = "ambient-dns-capture" AmbientIPv6 = "ambient-ipv6" AmbientTPROXYRedirection = "ambient-tproxy-redirection" // Repair RepairEnabled = "repair-enabled" RepairDeletePods = "repair-delete-pods" RepairRepairPods = "repair-repair-pods" RepairLabelPods = "repair-label-pods"
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Fri Aug 16 15:33:47 UTC 2024 - 3K bytes - Viewed (0) -
cni/pkg/iptables/iptables_test.go
name string config func(cfg *Config) ingressMode bool }{ { name: "default", config: func(cfg *Config) { cfg.RedirectDNS = true }, }, { name: "tproxy", config: func(cfg *Config) { cfg.TPROXYRedirection = true cfg.RedirectDNS = true }, }, { name: "ingress", config: func(cfg *Config) { }, ingressMode: true, }, }
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Tue Oct 15 15:39:28 UTC 2024 - 4.1K bytes - Viewed (0) -
cni/pkg/config/config.go
AmbientEnabled bool // Whether ambient DNS capture is enabled AmbientDNSCapture bool // Whether ipv6 is enabled for ambient capture AmbientIPv6 bool // Feature flag to determined whether TPROXY is used for redirection. AmbientTPROXYRedirection bool } // RepairConfig struct defines the Istio CNI race repair configuration type RepairConfig struct { // Whether to enable CNI race repair Enabled bool
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Fri Aug 16 15:33:47 UTC 2024 - 5.7K bytes - Viewed (0) -
cni/README.md
- "sidecar.istio.io/status" exists ### Redirect API The annotation based control is currently only supported in 'sidecar' mode. See plugin/redirect.go for details. - redirectMode allows TPROXY may to be set, required envoy has extra permissions. Default is redirect. - includeIPCidr, excludeIPCidr - includeInboudPorts, excludeInboundPorts - includeOutboutPorts, excludeOutboundPorts - excludeInterfaces
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Wed Jul 17 23:10:17 UTC 2024 - 10.5K bytes - Viewed (0)