Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 22 for masquerading (0.18 sec)

  1. pkg/proxy/nftables/helpers_test.go

    	add chain ip testing mark-for-masquerade
    	add rule ip testing mark-for-masquerade mark set mark or 0x4000
    	add chain ip testing masquerading
    	add rule ip testing masquerading mark and 0x4000 == 0 return
    	add rule ip testing masquerading mark set mark xor 0x4000
    	add rule ip testing masquerading masquerade fully-random
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Apr 02 09:57:47 UTC 2024
    - 48.5K bytes
    - Viewed (0)
  2. pkg/proxy/nftables/README.md

        the possible paths.
    
      - Masquerading has to happen in the `postrouting` hook, because "masquerade" means "SNAT
        to the IP of the interface the packet is going out on", so it has to happen after the
        final routing decision. (We don't need to masquerade packets that are going to a host
        network IP, because masquerading is about ensuring that the packet eventually gets
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Jan 21 14:37:56 UTC 2024
    - 5.9K bytes
    - Viewed (0)
  3. pkg/proxy/nftables/proxier_test.go

    		add chain ip kube-proxy mark-for-masquerade
    		add rule ip kube-proxy mark-for-masquerade mark set mark or 0x4000
    		add chain ip kube-proxy masquerading
    		add rule ip kube-proxy masquerading mark and 0x4000 == 0 return
    		add rule ip kube-proxy masquerading mark set mark xor 0x4000
    		add rule ip kube-proxy masquerading masquerade fully-random
    		add chain ip kube-proxy services
    		add chain ip kube-proxy service-endpoints-check
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat Apr 27 01:31:57 UTC 2024
    - 173.5K bytes
    - Viewed (0)
  4. pkg/proxy/nftables/proxier.go

    	clusterIPsCheckChain = "cluster-ips-check"
    
    	// LoadBalancerSourceRanges handling
    	firewallIPsMap     = "firewall-ips"
    	firewallCheckChain = "firewall-check"
    
    	// masquerading
    	markMasqChain     = "mark-for-masquerade"
    	masqueradingChain = "masquerading"
    )
    
    // NewDualStackProxier creates a MetaProxier instance, with IPv4 and IPv6 proxies.
    func NewDualStackProxier(
    	ctx context.Context,
    	syncPeriod time.Duration,
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat Jun 08 13:48:54 UTC 2024
    - 55.5K bytes
    - Viewed (0)
  5. pkg/proxy/ipvs/proxier.go

    			// results in the service VIP being picked as the source IP to reach
    			// a VIP. This leads to a connection from VIP:<random port> to
    			// VIP:<service port>.
    			// Always masquerading OUTPUT (node-originating) traffic with a VIP
    			// source ip and service port destination fixes the outgoing connections.
    			proxier.natRules.Write(
    				args, "src,dst",
    				"-j", string(kubeMarkMasqChain))
    		}
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Apr 28 15:51:23 UTC 2024
    - 77.7K bytes
    - Viewed (0)
  6. pkg/proxy/iptables/proxier_test.go

    			// not just local ones. In reality, if the packet actually left
    			// the cluster, it would have to get masqueraded, but since we can
    			// avoid doing that in the short-circuit case, and not masquerading
    			// is more useful, we avoid masquerading.
    			output: "10.180.0.2:80, 10.180.1.2:80",
    			masq:   false,
    		},
    		{
    			name:     "node to ClusterIP with eTP:Local",
    			sourceIP: testNodeIP,
    			destIP:   "172.30.0.42",
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue May 21 14:39:54 UTC 2024
    - 249.9K bytes
    - Viewed (0)
  7. src/cmd/go/internal/modfetch/codehost/git.go

    	// because we want to avoid ever importing a commit that isn't
    	// reachable from refs/tags/* or refs/heads/* or HEAD.
    	// Both Gerrit and GitHub expose every CL/PR as a named ref,
    	// and we don't want those commits masquerading as being real
    	// pseudo-versions in the main repo.
    	if r.fetchLevel <= fetchSome && ref != "" && hash != "" && !r.local {
    		r.fetchLevel = fetchSome
    		var refspec string
    		if ref == "HEAD" {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Mar 11 22:10:38 UTC 2024
    - 27.4K bytes
    - Viewed (0)
  8. CHANGELOG/CHANGELOG-1.2.md

    * Allow setting the Host header in a httpGet probe ([#24292](https://github.com/kubernetes/kubernetes/pull/24292), [@errm](https://github.com/errm))
    * Bridge off-cluster traffic into services by masquerading. ([#24429](https://github.com/kubernetes/kubernetes/pull/24429), [@cjcullen](https://github.com/cjcullen))
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Dec 04 06:36:19 UTC 2020
    - 41.4K bytes
    - Viewed (0)
  9. pkg/proxy/iptables/proxier.go

    	proxier.natRules.Write(
    		"-A", string(kubePostroutingChain),
    		"-m", "mark", "!", "--mark", fmt.Sprintf("%s/%s", proxier.masqueradeMark, proxier.masqueradeMark),
    		"-j", "RETURN",
    	)
    	// Clear the mark to avoid re-masquerading if the packet re-traverses the network stack.
    	proxier.natRules.Write(
    		"-A", string(kubePostroutingChain),
    		"-j", "MARK", "--xor-mark", proxier.masqueradeMark,
    	)
    	masqRule := []string{
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue May 21 14:39:54 UTC 2024
    - 65.1K bytes
    - Viewed (0)
  10. CHANGELOG/CHANGELOG-1.3.md

    * Incremental improvements to kubelet e2e tests ([#24426](https://github.com/kubernetes/kubernetes/pull/24426), [@pwittrock](https://github.com/pwittrock))
    * Bridge off-cluster traffic into services by masquerading. ([#24429](https://github.com/kubernetes/kubernetes/pull/24429), [@cjcullen](https://github.com/cjcullen))
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Dec 24 02:28:26 UTC 2020
    - 84K bytes
    - Viewed (0)
Back to top