Search Options

Results per page
Sort
Preferred Languages
Advance

Results 41 - 50 of 73 for withPanels (2.54 sec)

  1. cni/pkg/log/uds.go

    	// processes interleave.
    	l.mu.Lock()
    	defer l.mu.Unlock()
    	for _, m := range messages {
    		logger := pluginLog
    		// For any k/v pairs, add them back
    		for k, v := range m.Arbitrary {
    			logger = logger.WithLabels(k, v)
    		}
    		// There is no fatal log from CNI plugin
    		switch m.Level {
    		case "debug":
    			logger.LogWithTime(istiolog.DebugLevel, m.Msg, m.Time)
    		case "info":
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Jun 12 16:26:28 UTC 2024
    - 4.7K bytes
    - Viewed (0)
  2. cni/pkg/repair/repaircontroller.go

    // Additionally, we need to jump through hoops to find the network namespace.
    func (c *Controller) repairPod(pod *corev1.Pod) error {
    	m := podsRepaired.With(typeLabel.Value(repairType))
    	log := repairLog.WithLabels("pod", pod.Namespace+"/"+pod.Name)
    	key := types.NamespacedName{Name: pod.Name, Namespace: pod.Namespace}
    	// We will get an event every time the pod changes. The repair is not instantaneous, though -- it will only recover
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Sat Feb 10 00:31:55 UTC 2024
    - 10.4K bytes
    - Viewed (0)
  3. cni/pkg/log/uds_test.go

    	istiolog.FindScope("default").SetOutputLevel(istiolog.DebugLevel)
    	istiolog.Debug("debug log")
    	istiolog.Info("info log")
    	istiolog.Warn("warn log")
    	istiolog.Error("error log")
    	istiolog.WithLabels("key", 2).Infof("with labels")
    	// This will error because stdout cannot sync, but the UDS part should sync
    	// Ideally we would fail if the UDS part fails but the error library makes it kind of tricky
    	_ = istiolog.Sync()
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Jun 12 16:26:28 UTC 2024
    - 4.1K bytes
    - Viewed (0)
  4. pkg/security/mock.go

    	token := checkToken(ctx, at)
    	cert := checkCert(ctx, ac)
    	id := []string{spiffe.Identity{
    		TrustDomain:    "cluster.local",
    		Namespace:      "fake-namespace",
    		ServiceAccount: "fake-sa",
    	}.String()}
    	log.WithLabels("name", f.Name, "cert", cert, "token", token).Infof("authentication complete")
    	if cert == nil {
    		f.Successes.Inc()
    		return &Caller{
    			AuthSource: AuthSourceClientCertificate,
    			Identities: id,
    		}, nil
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue May 23 17:08:31 UTC 2023
    - 4.5K bytes
    - Viewed (0)
  5. staging/src/k8s.io/client-go/applyconfigurations/admissionregistration/v1/validatingadmissionpolicybinding.go

    	b.ensureObjectMetaApplyConfigurationExists()
    	b.DeletionGracePeriodSeconds = &value
    	return b
    }
    
    // WithLabels puts the entries into the Labels field in the declarative configuration
    // and returns the receiver, so that objects can be build by chaining "With" function invocations.
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Mar 06 00:00:21 UTC 2024
    - 13.3K bytes
    - Viewed (0)
  6. staging/src/k8s.io/client-go/applyconfigurations/admissionregistration/v1beta1/validatingadmissionpolicybinding.go

    	b.ensureObjectMetaApplyConfigurationExists()
    	b.DeletionGracePeriodSeconds = &value
    	return b
    }
    
    // WithLabels puts the entries into the Labels field in the declarative configuration
    // and returns the receiver, so that objects can be build by chaining "With" function invocations.
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Jul 21 20:56:23 UTC 2023
    - 13.3K bytes
    - Viewed (0)
  7. security/pkg/nodeagent/cache/secretcache.go

    			}
    			cacheLog.WithLabels("ttl", time.Until(c.ExpireTime)).Info("returned workload trust anchor from cache")
    
    		} else {
    			ns = &security.SecretItem{
    				ResourceName:     resourceName,
    				CertificateChain: c.CertificateChain,
    				PrivateKey:       c.PrivateKey,
    				ExpireTime:       c.ExpireTime,
    				CreatedTime:      c.CreatedTime,
    			}
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Mar 04 08:29:46 UTC 2024
    - 28.2K bytes
    - Viewed (0)
  8. pkg/kube/krt/informer.go

    	o := buildCollectionOptions(opts...)
    	if o.name == "" {
    		o.name = fmt.Sprintf("NewInformer[%v]", ptr.TypeName[I]())
    	}
    	h := &informer[I]{
    		inf:            c,
    		log:            log.WithLabels("owner", o.name),
    		collectionName: o.name,
    		id:             nextUID(),
    		eventHandlers:  &handlers[I]{},
    		augmentation:   o.augmentation,
    		synced:         make(chan struct{}),
    	}
    
    	go func() {
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Jun 10 11:01:46 UTC 2024
    - 6.1K bytes
    - Viewed (0)
  9. pkg/test/echo/server/endpoint/http.go

    	id := uuid.New()
    	remoteAddr, _, err := net.SplitHostPort(r.RemoteAddr)
    	if err != nil {
    		epLog.Warnf("failed to get host from remote address: %s", err)
    	}
    	epLog.WithLabels("remoteAddr", remoteAddr, "method", r.Method, "url", r.URL, "host", r.Host, "headers", r.Header, "id", id).Infof("%v Request", r.Proto)
    	if h.Port == nil {
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue May 23 16:20:31 UTC 2023
    - 12.8K bytes
    - Viewed (0)
  10. security/pkg/server/ca/server.go

    	if caller == nil || err != nil {
    		s.monitoring.AuthnError.Increment()
    		return nil, status.Error(codes.Unauthenticated, "request authenticate failure")
    	}
    
    	serverCaLog := serverCaLog.WithLabels("client", security.GetConnectionAddress(ctx))
    	// By default, we will use the callers identity for the certificate
    	sans := caller.Identities
    	crMetadata := request.Metadata.GetFields()
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue May 28 17:35:26 UTC 2024
    - 8K bytes
    - Viewed (0)
Back to top