Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 49 for fireballs (0.28 sec)

  1. platforms/core-configuration/model-core/src/test/groovy/org/gradle/internal/reflect/validation/ValidationMessageCheckerTest.groovy

            when:
            render incompatibleAnnotations {
                type('SuperHero').property('fireballs')
                annotatedWith("Boring")
                incompatibleWith("SuperPower")
                includeLink()
            }
    
            then:
            outputEquals """
    Type 'SuperHero' property 'fireballs' is annotated with @Boring but that is not allowed for 'SuperPower' properties.
    
    Registered: Wed Jun 12 18:38:38 UTC 2024
    - Last Modified: Thu Sep 28 09:51:04 UTC 2023
    - 25.5K bytes
    - Viewed (0)
  2. README.md

    ```sh
    ufw allow 9000:9010/tcp
    ```
    
    ### firewall-cmd
    
    For hosts with firewall-cmd enabled (CentOS), you can use `firewall-cmd` command to allow traffic to specific ports. Use below commands to allow access to port 9000
    
    ```sh
    firewall-cmd --get-active-zones
    ```
    
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Fri May 10 00:22:36 UTC 2024
    - 18.3K bytes
    - Viewed (0)
  3. pkg/kubelet/kubelet_network_linux.go

    	// or iptables-nft indicates which version of iptables the system is using
    	KubeIPTablesHintChain utiliptables.Chain = "KUBE-IPTABLES-HINT"
    
    	// KubeFirewallChain is kubernetes firewall rules
    	KubeFirewallChain utiliptables.Chain = "KUBE-FIREWALL"
    )
    
    func (kl *Kubelet) initNetworkUtil() {
    	exec := utilexec.New()
    	iptClients := []utiliptables.Interface{
    		utiliptables.New(exec, utiliptables.ProtocolIPv4),
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Jul 17 20:51:47 UTC 2023
    - 4.3K bytes
    - Viewed (0)
  4. cluster/gce/util.sh

        sleep $((attempt * 5))
      done
    }
    
    # Robustly try to create a firewall rule.
    # $1: The name of firewall rule.
    # $2: IP ranges.
    # $3: Target tags for this firewall rule.
    function create-firewall-rule() {
      detect-project
      local attempt=0
      while true; do
        if ! gcloud compute firewall-rules create "$1" \
          --project "${NETWORK_PROJECT}" \
          --network "${NETWORK}" \
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Jun 12 21:47:17 UTC 2024
    - 161.6K bytes
    - Viewed (0)
  5. pkg/proxy/nftables/helpers_test.go

    	add rule ip testing firewall-allow-check drop
    	add rule ip testing firewall-check ip daddr . meta l4proto . th dport @firewall jump firewall-allow-check
    
    	# svc1
    	add chain ip testing service-ULMVA6XW-ns1/svc1/tcp/p80
    	add rule ip testing service-ULMVA6XW-ns1/svc1/tcp/p80 ip daddr 172.30.0.41 tcp dport 80 ip saddr != 10.0.0.0/8 jump mark-for-masquerade
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Apr 02 09:57:47 UTC 2024
    - 48.5K bytes
    - Viewed (0)
  6. cmd/kubeadm/app/preflight/checks.go

    	klog.V(1).Infoln("validating if the firewall is enabled and active")
    	initSystem, err := initsystem.GetInitSystem()
    	if err != nil {
    		return []error{err}, nil
    	}
    
    	if !initSystem.ServiceExists("firewalld") {
    		return nil, nil
    	}
    
    	if initSystem.ServiceIsActive("firewalld") {
    		err := errors.Errorf("firewalld is active, please ensure ports %v are open or your cluster may not function correctly",
    			fc.ports)
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Jun 03 11:20:55 UTC 2024
    - 39.5K bytes
    - Viewed (0)
  7. releasenotes/notes/47211.yaml

    apiVersion: release-notes/v2
    kind: feature
    area: traffic-management
    
    issue:
      - 47211
    
    releaseNotes:
    - |
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Nov 27 11:06:30 UTC 2023
    - 211 bytes
    - Viewed (0)
  8. cluster/gce/delete-stranded-load-balancers.sh

    result=0
    for x in ${LIST}; do
        if ! gcloud compute --project="${PROJECT}" target-pools get-health "${x}" --region="${REGION}" 2>/dev/null >/dev/null; then
    	echo DELETING "${x}"
    	gcloud compute --project="${PROJECT}" firewall-rules delete "k8s-fw-${x}" -q
    	gcloud compute --project="${PROJECT}" forwarding-rules delete "${x}" --region="${REGION}" -q
    	gcloud compute --project="${PROJECT}" addresses delete "${x}" --region="${REGION}" -q
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Feb 18 05:42:46 UTC 2019
    - 1.4K bytes
    - Viewed (0)
  9. tools/istio-iptables/pkg/capture/run_unspecified.go

    )
    
    // ErrNotImplemented is returned when a requested feature is not implemented.
    var ErrNotImplemented = errors.New("not implemented")
    
    // configureTProxyRoutes configures ip firewall rules to enable TPROXY support.
    // See https://www.envoyproxy.io/docs/envoy/latest/configuration/http/http_filters/original_src_filter
    func configureTProxyRoutes(cfg *config.Config) error {
    	return ErrNotImplemented
    }
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Nov 01 16:18:12 UTC 2023
    - 1.2K bytes
    - Viewed (0)
  10. pkg/proxy/iptables/proxier_test.go

    	fp.syncProxyRules()
    
    	expected := dedent.Dedent(`
    		*filter
    		:KUBE-NODEPORTS - [0:0]
    		:KUBE-SERVICES - [0:0]
    		:KUBE-EXTERNAL-SERVICES - [0:0]
    		:KUBE-FIREWALL - [0:0]
    		:KUBE-FORWARD - [0:0]
    		:KUBE-PROXY-FIREWALL - [0:0]
    		-A KUBE-FIREWALL -m comment --comment "block incoming localnet connections" -d 127.0.0.0/8 ! -s 127.0.0.0/8 -m conntrack ! --ctstate RELATED,ESTABLISHED,DNAT -j DROP
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue May 21 14:39:54 UTC 2024
    - 249.9K bytes
    - Viewed (1)
Back to top