Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 6 of 6 for loadBalancerVIPs (0.16 sec)

  1. pkg/proxy/serviceport.go

    func (bsvcPortInfo *BaseServicePortInfo) ExternalIPs() []net.IP {
    	return bsvcPortInfo.externalIPs
    }
    
    // LoadBalancerVIPs is part of ServicePort interface.
    func (bsvcPortInfo *BaseServicePortInfo) LoadBalancerVIPs() []net.IP {
    	return bsvcPortInfo.loadBalancerVIPs
    }
    
    // ExternalPolicyLocal is part of ServicePort interface.
    func (bsvcPortInfo *BaseServicePortInfo) ExternalPolicyLocal() bool {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Jan 09 08:17:56 UTC 2024
    - 10.7K bytes
    - Viewed (0)
  2. pkg/proxy/servicechangetracker_test.go

    					bsvcPortInfo.loadBalancerVIPs = makeIPs("10.1.2.4")
    				}),
    				makeServicePortName("ns1", "load-balancer", "port4", v1.ProtocolUDP): makeTestServiceInfo("172.16.55.11", 8676, "UDP", 0, func(bsvcPortInfo *BaseServicePortInfo) {
    					bsvcPortInfo.loadBalancerVIPs = makeIPs("10.1.2.4")
    				}),
    			},
    		},
    		{
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Apr 24 18:25:29 UTC 2024
    - 33.7K bytes
    - Viewed (0)
  3. pkg/proxy/conntrack/cleanup.go

    			conntrackCleanupServiceIPs.Insert(svcInfo.ClusterIP().String())
    			for _, extIP := range svcInfo.ExternalIPs() {
    				conntrackCleanupServiceIPs.Insert(extIP.String())
    			}
    			for _, lbIP := range svcInfo.LoadBalancerVIPs() {
    				conntrackCleanupServiceIPs.Insert(lbIP.String())
    			}
    			nodePort := svcInfo.NodePort()
    			if svcInfo.Protocol() == v1.ProtocolUDP && nodePort != 0 {
    				conntrackCleanupServiceNodePorts.Insert(nodePort)
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Jan 15 18:09:05 UTC 2024
    - 5.2K bytes
    - Viewed (0)
  4. pkg/proxy/nftables/proxier.go

    				for _, lbip := range svcInfo.LoadBalancerVIPs() {
    					sources = append(sources, ",", lbip.String())
    				}
    			}
    			tx.Add(&knftables.Rule{
    				Chain: fwChain,
    				Rule: knftables.Concat(
    					ipX, "saddr", "!=", "{", sources, "}",
    					"drop",
    				),
    			})
    		}
    
    		// Capture load-balancer ingress.
    		for _, lbip := range svcInfo.LoadBalancerVIPs() {
    			if hasEndpoints {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat Jun 08 13:48:54 UTC 2024
    - 55.5K bytes
    - Viewed (0)
  5. pkg/proxy/iptables/proxier.go

    		// create a firewall chain.
    		loadBalancerTrafficChain := externalTrafficChain
    		fwChain := svcInfo.firewallChainName
    		usesFWChain := hasEndpoints && len(svcInfo.LoadBalancerVIPs()) > 0 && len(svcInfo.LoadBalancerSourceRanges()) > 0
    		if usesFWChain {
    			loadBalancerTrafficChain = fwChain
    		}
    
    		var internalTrafficFilterTarget, internalTrafficFilterComment string
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue May 21 14:39:54 UTC 2024
    - 65.1K bytes
    - Viewed (0)
  6. pkg/proxy/ipvs/proxier.go

    			} else {
    				proxier.logger.Error(err, "Failed to sync service", "servicePortName", svcPortName, "virtualServer", serv)
    			}
    		}
    
    		// Capture load-balancer ingress.
    		for _, ingress := range svcInfo.LoadBalancerVIPs() {
    			// ipset call
    			entry = &utilipset.Entry{
    				IP:       ingress.String(),
    				Port:     svcInfo.Port(),
    				Protocol: protocol,
    				SetType:  utilipset.HashIPPort,
    			}
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Apr 28 15:51:23 UTC 2024
    - 77.7K bytes
    - Viewed (0)
Back to top