- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 25 for rules (0.16 sec)
-
docs/bucket/replication/setup_ilm_expiry_replication.sh
exit 1 fi ## Check if ILM expiry rules replicated sleep 30s ./mc ilm rule list siteb/bucket count=$(./mc ilm rule list siteb/bucket --json | jq '.config.Rules | length') if [ $count -ne 1 ]; then echo "BUG: ILM expiry rules not replicated to 'siteb'" exit 1 fi ## Check replication of rules content expDays=$(./mc ilm rule list siteb/bucket --json | jq '.config.Rules[0].Expiration.Days')
Shell Script - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Fri Apr 26 00:31:12 GMT 2024 - 12.7K bytes - Viewed (0) -
cni/pkg/iptables/iptables_linux.go
inpodMarkRule.Mark = InpodTProxyMark inpodMarkRule.Mask = InpodTProxyMask inpodMarkRule.Priority = 32764 rules = append(rules, inpodMarkRule) } for _, rule := range rules { log.Debugf("Iterating netlink rule : %+v", rule) if err := f(rule); err != nil { return fmt.Errorf("failed to configure netlink rule: %w", err) } } return nil } func AddLoopbackRoutes(cfg *Config) error {
Go - Registered: Wed May 01 22:53:12 GMT 2024 - Last Modified: Tue Apr 30 22:24:38 GMT 2024 - 3.3K bytes - Viewed (0) -
cni/pkg/iptables/iptables.go
// Append our rules here builder := cfg.appendHostRules(hostSNATIP, hostSNATIPV6) log.Info("Adding host netnamespace iptables rules") if err := cfg.executeCommands(builder); err != nil { log.Errorf("failed to add host netnamespace iptables rules: %v", err) return err } return nil }
Go - Registered: Wed May 01 22:53:12 GMT 2024 - Last Modified: Tue Apr 30 22:24:38 GMT 2024 - 19.6K bytes - Viewed (0) -
cmd/site-replication.go
} else { rMap[id] = rl } } var rules []lifecycle.Rule for _, rule := range rMap { rules = append(rules, rule) } // no rules, return if len(rules) == 0 { return []byte{}, nil } // get final list for write finalLcCfg := lifecycle.Lifecycle{ XMLName: xmlName, Rules: rules, ExpiryUpdatedAt: &updatedAt, }
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Thu Apr 25 15:50:16 GMT 2024 - 184.1K bytes - Viewed (1) -
cni/pkg/nodeagent/net.go
} // pod is removed from the mesh, but is still running. remove iptables rules log.Debugf("calling DeleteInpodRules.") if err := s.netnsRunner(openNetns, func() error { return s.iptablesConfigurator.DeleteInpodRules() }); err != nil { log.Errorf("failed to delete inpod rules %v", err) return fmt.Errorf("failed to delete inpod rules %w", err) }
Go - Registered: Wed May 01 22:53:12 GMT 2024 - Last Modified: Tue Apr 30 22:24:38 GMT 2024 - 12.2K bytes - Viewed (1) -
cni/pkg/nodeagent/server.go
} // Create hostprobe rules now, in the host netns // Later we will reuse this same configurator inside the pod netns for adding other rules iptablesConfigurator.DeleteHostRules() if err := iptablesConfigurator.CreateHostRulesForHealthChecks(&HostProbeSNATIP, &HostProbeSNATIPV6); err != nil { return nil, fmt.Errorf("error initializing the host rules for health checks: %w", err) }
Go - Registered: Wed May 01 22:53:12 GMT 2024 - Last Modified: Tue Apr 30 22:24:38 GMT 2024 - 7.2K bytes - Viewed (0) -
cni/README.md
- and the other end is in ztunnel's pod and setting up iptables rules to funnel traffic thru that socket "tube" to ztunnel and back. This effectively behaves like ztunnel is an in-pod sidecar, without actually requiring the injection of ztunnel as a sidecar into the pod manifest, or mutatating the application pod in any way.
Plain Text - Registered: Wed May 01 22:53:12 GMT 2024 - Last Modified: Tue Apr 30 22:24:38 GMT 2024 - 12.3K bytes - Viewed (0) -
istioctl/pkg/writer/ztunnel/configdump/api.go
type ZtunnelPolicy struct { Name string `json:"name"` Namespace string `json:"namespace"` Scope string `json:"scope"` Action string `json:"action"` Rules [][][]*PolicyMatch `json:"rules"` } type ZtunnelDump struct { Workloads map[string]*ZtunnelWorkload `json:"workloads"` Services map[string]*ZtunnelService `json:"services"`
Go - Registered: Wed May 01 22:53:12 GMT 2024 - Last Modified: Thu Apr 25 02:16:06 GMT 2024 - 5.2K bytes - Viewed (0) -
cni/pkg/ipset/ipset.go
// superset of type `list:set` - we can then query the superset directly in iptables (with the same rule), // and iptables will be smart enough to pick the correct underlying set (v4 or v6, based on context), // reducing the # of rules we need. // // BUT netlink lib doesn't support adding things to `list:set` types yet, and current tagged release
Go - Registered: Wed May 01 22:53:12 GMT 2024 - Last Modified: Tue Apr 30 22:24:38 GMT 2024 - 3.9K bytes - Viewed (0) -
doc/go_spec.html
<li> A "for" statement with <a href="#For_range">"range" clause</a> may iterate over integer values from zero to an upper limit. </li> </ul> <h3 id="Type_unification_rules">Type unification rules</h3> <p> The type unification rules describe if and how two types unify. The precise details are relevant for Go implementations, affect the specifics of error messages (such as whether
HTML - Registered: Tue Apr 30 11:13:12 GMT 2024 - Last Modified: Fri Apr 26 00:39:16 GMT 2024 - 279.6K bytes - Viewed (0)