- Sort Score
- Result 10 results
- Languages All
Results 1 - 9 of 9 for p80 (0.03 sec)
-
pkg/util/iptables/testing/parse_test.go
rule: `-A KUBE-NODEPORTS -m comment --comment "ns2/svc2:p80 health check node port" -m tcp -p tcp --dport 30000 -j ACCEPT`, parsed: &Rule{ Raw: `-A KUBE-NODEPORTS -m comment --comment "ns2/svc2:p80 health check node port" -m tcp -p tcp --dport 30000 -j ACCEPT`, Chain: iptables.Chain("KUBE-NODEPORTS"), Comment: &IPTablesValue{Value: "ns2/svc2:p80 health check node port"},
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Dec 19 01:20:51 UTC 2023 - 26K bytes - Viewed (0) -
pkg/proxy/nftables/helpers_test.go
add rule ip testing external-42NFTM6N-ns2/svc2/tcp/p80 ip saddr 10.0.0.0/8 goto service-42NFTM6N-ns2/svc2/tcp/p80 comment "short-circuit pod traffic" add rule ip testing external-42NFTM6N-ns2/svc2/tcp/p80 fib saddr type local jump mark-for-masquerade comment "masquerade local traffic" add rule ip testing external-42NFTM6N-ns2/svc2/tcp/p80 fib saddr type local goto service-42NFTM6N-ns2/svc2/tcp/p80 comment "short-circuit local traffic"
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Apr 02 09:57:47 UTC 2024 - 48.5K bytes - Viewed (0) -
pkg/proxy/iptables/proxier_test.go
-A KUBE-SEP-SXIVWICOYRO3J4NJ -m comment --comment ns1/svc1:p80 -s 10.180.0.1 -j KUBE-MARK-MASQ -A KUBE-SEP-SXIVWICOYRO3J4NJ -m comment --comment ns1/svc1:p80 -m tcp -p tcp -j DNAT --to-destination 10.180.0.1:80 -A KUBE-SEP-UKSFD7AGPMPPLUHC -m comment --comment ns4/svc4:p80 -s 10.180.0.4 -j KUBE-MARK-MASQ
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 21 14:39:54 UTC 2024 - 249.9K bytes - Viewed (0) -
pkg/proxy/nftables/proxier_test.go
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat Apr 27 01:31:57 UTC 2024 - 173.5K bytes - Viewed (0) -
pkg/controller/endpointslicemirroring/metrics/cache_test.go
) func TestNumEndpointsAndSlices(t *testing.T) { c := NewCache(int32(100)) p80 := int32(80) p443 := int32(443) pmKey80443 := endpointsliceutil.NewPortMapKey([]discovery.EndpointPort{{Port: &p80}, {Port: &p443}}) pmKey80 := endpointsliceutil.NewPortMapKey([]discovery.EndpointPort{{Port: &p80}}) spCacheEfficient := NewEndpointPortCache()
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Jul 11 18:08:12 UTC 2023 - 2.6K bytes - Viewed (0) -
pkg/proxy/winkernel/proxier_test.go
svcPortName1 := proxy.ServicePortName{ NamespacedName: makeNSN("ns1", "svc1"), Port: "p80", Protocol: v1.ProtocolTCP, } svcIP2 := "10.20.30.42" svcPort2 := 80 svcNodePort2 := 3002 svcPortName2 := proxy.ServicePortName{ NamespacedName: makeNSN("ns1", "svc2"), Port: "p80", Protocol: v1.ProtocolTCP, } makeServiceMap(proxier,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Jan 28 14:30:51 UTC 2024 - 30.2K bytes - Viewed (0) -
pkg/proxy/ipvs/proxier_test.go
} }), ) populateEndpointSlices(fp, makeTestEndpointSlice("ns1", "p80", 1, func(eps *discovery.EndpointSlice) { eps.Endpoints = []discovery.Endpoint{{ Addresses: []string{svcInfo.epIP}, }} eps.Ports = []discovery.EndpointPort{{ Name: ptr.To("p80"), Port: ptr.To[int32](80), Protocol: ptr.To(v1.ProtocolUDP), }} }), )
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat Apr 27 01:31:57 UTC 2024 - 186.8K bytes - Viewed (0) -
pkg/proxy/endpointslicecache_test.go
t.Errorf("endpointInfoByServicePort does not match. Want: %+v, Got: %+v", tc.expectedMap, got) } }) } } func TestEsDataChanged(t *testing.T) { p80 := int32(80) p443 := int32(443) port80 := discovery.EndpointPort{Port: &p80, Name: ptr.To("http"), Protocol: ptr.To(v1.ProtocolTCP)} port443 := discovery.EndpointPort{Port: &p443, Name: ptr.To("https"), Protocol: ptr.To(v1.ProtocolTCP)}
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Apr 29 21:07:21 UTC 2024 - 24.9K bytes - Viewed (0) -
pkg/proxy/nftables/proxier.go
} return name } // servicePortChainNameBase returns the base name for a chain for the given ServicePort. // This is something like "HASH-namespace/serviceName/protocol/portName", e.g, // "ULMVA6XW-ns1/svc1/tcp/p80". func servicePortChainNameBase(servicePortName *proxy.ServicePortName, protocol string) string { // nftables chains can contain the characters [A-Za-z0-9_./-] (but must start with // a letter, underscore, or dot). //
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat Jun 08 13:48:54 UTC 2024 - 55.5K bytes - Viewed (0)