Search Options

Results per page
Sort
Preferred Languages
Advance

Results 21 - 30 of 86 for VIP (0.31 sec)

  1. pilot/pkg/serviceregistry/kube/controller/ambient/ambientindex_workloadentry_test.go

    	s.assertWorkloads(t, "", workloadapi.WorkloadStatus_HEALTHY, "name1", "name2", "name3")
    	s.assertWorkloads(t, s.addrXdsName("127.0.0.1"), workloadapi.WorkloadStatus_HEALTHY, "name1")
    	// Now we should be able to look up a VIP as well
    	s.assertWorkloads(t, s.addrXdsName("10.0.0.1"), workloadapi.WorkloadStatus_HEALTHY, "name1", "name2")
    	// We should get an event for the two WEs and the selecting service impacted
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed May 08 01:04:50 UTC 2024
    - 15.6K bytes
    - Viewed (0)
  2. pkg/proxy/apis/config/types.go

    	// sourceVip is the IP address of the source VIP endpoint used for
    	// NAT when loadbalancing
    	SourceVip string
    	// enableDSR tells kube-proxy whether HNS policies should be created
    	// with DSR
    	EnableDSR bool
    	// rootHnsEndpointName is the name of hnsendpoint that is attached to
    	// l2bridge for root network namespace
    	RootHnsEndpointName string
    	// forwardHealthCheckVip forwards service VIP for health check port on
    	// Windows
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Apr 18 13:25:06 UTC 2024
    - 13K bytes
    - Viewed (0)
  3. tools/istio-iptables/pkg/capture/run.go

    		"-o", "lo", "-s", constants.IPVersionSpecific, "-j", constants.RETURN)
    
    	for _, uid := range split(cfg.cfg.ProxyUID) {
    		// Redirect app calls back to itself via Envoy when using the service VIP
    		// e.g. appN => Envoy (client) => Envoy (server) => appN.
    		// nolint: lll
    		if redirectDNS {
    			// When DNS is enabled, we skip this for port 53. This ensures we do not have:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Jun 06 03:53:23 UTC 2024
    - 35.4K bytes
    - Viewed (0)
  4. pkg/proxy/winkernel/proxier.go

    				}
    			}
    			// For Overlay networks 'SourceVIP' on an Load balancer Policy can either be chosen as
    			// a) Source VIP configured on kube-proxy (or)
    			// b) Node IP of the current node
    			//
    			// For L2Bridge network the Source VIP is always the NodeIP of the current node and the same
    			// would be configured on kube-proxy as SourceVIP
    			//
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Apr 18 13:25:06 UTC 2024
    - 59K bytes
    - Viewed (0)
  5. src/internal/reflectlite/all_test.go

    		if s != test.s {
    			t.Errorf("#%d: have %#q, want %#q", i, s, test.s)
    		}
    	}
    }
    
    func TestPtrSetNil(t *testing.T) {
    	var i int32 = 1234
    	ip := &i
    	vip := ValueOf(&ip)
    	vip.Elem().Set(Zero(vip.Elem().Type()))
    	if ip != nil {
    		t.Errorf("got non-nil (%d), want nil", *ip)
    	}
    }
    
    func TestMapSetNil(t *testing.T) {
    	m := make(map[string]int)
    	vm := ValueOf(&m)
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu Nov 16 19:26:08 UTC 2023
    - 24.2K bytes
    - Viewed (0)
  6. pkg/proxy/nftables/proxier.go

    				if cidr.Contains(proxier.nodeIP) {
    					allowFromNode = true
    				}
    			}
    			// For VIP-like LBs, the VIP is often added as a local
    			// address (via an IP route rule).  In that case, a request
    			// from a node to the VIP will not hit the loadbalancer but
    			// will loop back with the source IP set to the VIP.  We
    			// need the following rules to allow requests from this node.
    			if allowFromNode {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat Jun 08 13:48:54 UTC 2024
    - 55.5K bytes
    - Viewed (0)
  7. pkg/proxy/iptables/proxier.go

    				if cidr.Contains(proxier.nodeIP) {
    					allowFromNode = true
    				}
    			}
    			// For VIP-like LBs, the VIP is often added as a local
    			// address (via an IP route rule).  In that case, a request
    			// from a node to the VIP will not hit the loadbalancer but
    			// will loop back with the source IP set to the VIP.  We
    			// need the following rules to allow requests from this node.
    			if allowFromNode {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue May 21 14:39:54 UTC 2024
    - 65.1K bytes
    - Viewed (0)
  8. pkg/proxy/serviceport.go

    	// StickyMaxAgeSeconds returns service max connection age
    	StickyMaxAgeSeconds() int
    	// ExternalIPs returns service ExternalIPs
    	ExternalIPs() []net.IP
    	// LoadBalancerVIPs returns service LoadBalancerIPs which are VIP mode
    	LoadBalancerVIPs() []net.IP
    	// Protocol returns service protocol.
    	Protocol() v1.Protocol
    	// LoadBalancerSourceRanges returns service LoadBalancerSourceRanges if present empty array if not
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Jan 09 08:17:56 UTC 2024
    - 10.7K bytes
    - Viewed (0)
  9. manifests/charts/istio-control/istio-discovery/files/grpc-agent.yaml

        {{- end }}
        {{- range $key, $value := .ProxyConfig.ProxyMetadata }}
        - name: {{ $key }}
          value: "{{ $value }}"
        {{- end }}
        # grpc uses xds:/// to resolve – no need to resolve VIP
        - name: ISTIO_META_DNS_CAPTURE
          value: "false"
        - name: DISABLE_ENVOY
          value: "true"
        {{with .Values.global.imagePullPolicy }}imagePullPolicy: "{{.}}"{{end}}
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri Apr 26 16:51:17 UTC 2024
    - 12.1K bytes
    - Viewed (0)
  10. pilot/pkg/networking/core/listener_waypoint.go

    	})
    	return filters
    }
    
    func buildWaypointInboundHTTPRouteConfig(lb *ListenerBuilder, svc *model.Service, cc inboundChainConfig) *route.RouteConfiguration {
    	// TODO: Policy binding via VIP+Host is inapplicable for direct pod access.
    	if svc == nil {
    		return buildSidecarInboundHTTPRouteConfig(lb, cc)
    	}
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri Jun 14 04:34:37 UTC 2024
    - 27.6K bytes
    - Viewed (0)
Back to top