Search Options

Results per page
Sort
Preferred Languages
Advance

Results 31 - 40 of 692 for clusterIPs (0.16 sec)

  1. pkg/proxy/nftables/proxier.go

    		Type:    ipvX_addr,
    		Comment: ptr.To("Active ClusterIPs"),
    	})
    
    	// reject traffic to invalid ports of ClusterIPs.
    	tx.Add(&knftables.Rule{
    		Chain: clusterIPsCheckChain,
    		Rule: knftables.Concat(
    			ipX, "daddr", "@", clusterIPsSet, "reject",
    		),
    		Comment: ptr.To("Reject traffic to invalid ports of ClusterIPs"),
    	})
    
    	// drop traffic to unallocated ClusterIPs.
    	if len(proxier.serviceCIDRs) > 0 {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat Jun 08 13:48:54 UTC 2024
    - 55.5K bytes
    - Viewed (0)
  2. pkg/registry/core/rest/storage_core.go

    	return "start-service-ip-repair-controllers", func(context genericapiserver.PostStartHookContext) error {
    		// We start both repairClusterIPs and repairNodePorts to ensure repair
    		// loops of ClusterIPs and NodePorts.
    		// We run both repair loops using RunUntil public interface.
    		// However, we want to fail liveness/readiness until the first
    		// successful repair loop, so we basically pass appropriate
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Oct 31 21:05:05 UTC 2023
    - 19.1K bytes
    - Viewed (0)
  3. pkg/proxy/conntrack/cleanup_test.go

    		serviceUpdates   proxy.UpdateServiceMapResult
    		endpointsUpdates proxy.UpdateEndpointsMapResult
    
    		result FakeInterface
    	}{
    		{
    			description: "DeletedUDPClusterIPs clears entries for given clusterIPs (only)",
    
    			serviceUpdates: proxy.UpdateServiceMapResult{
    				// Note: this isn't testClusterIP; it's the IP of some
    				// unknown (because deleted) service.
    				DeletedUDPClusterIPs: sets.New("172.30.99.99"),
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Jan 15 18:09:05 UTC 2024
    - 7.6K bytes
    - Viewed (0)
  4. pkg/printers/internalversion/printers_test.go

    							Port:     2233,
    						},
    					},
    					ClusterIPs: []string{"10.9.8.7"},
    				},
    			},
    			{
    				ObjectMeta: metav1.ObjectMeta{Name: "service2"},
    				Spec: api.ServiceSpec{
    					Type: api.ServiceTypeNodePort,
    					Ports: []api.ServicePort{
    						{
    							Protocol: "udp",
    							Port:     5566,
    						},
    					},
    					ClusterIPs: []string{"1.2.3.4"},
    				},
    			},
    		},
    	}
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Jun 11 14:04:15 UTC 2024
    - 218.6K bytes
    - Viewed (0)
  5. tests/integration/pilot/gateway_test.go

    		RequiresLocalControlPlane().
    		Run(func(t framework.TestContext) {
    			c := t.Clusters().Default()
    			var svc *corev1.Service
    			svc, _, err := testKube.WaitUntilServiceEndpointsAreReady(c.Kube(), "istio-system", "istio-ingressgateway")
    			if err != nil {
    				t.Fatalf("error getting ingress gateway svc ips: %v", err)
    			}
    			for _, ip := range svc.Spec.ClusterIPs {
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Jun 06 22:12:34 UTC 2024
    - 17.7K bytes
    - Viewed (0)
  6. pkg/proxy/nftables/proxier_test.go

    		add set ip kube-proxy cluster-ips { type ipv4_addr ; comment "Active ClusterIPs" ; }
    		add chain ip kube-proxy cluster-ips-check
    		add rule ip kube-proxy cluster-ips-check ip daddr @cluster-ips reject comment "Reject traffic to invalid ports of ClusterIPs"
    		add rule ip kube-proxy cluster-ips-check ip daddr { 172.30.0.0/16 } drop comment "Drop traffic to unallocated ClusterIPs"
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat Apr 27 01:31:57 UTC 2024
    - 173.5K bytes
    - Viewed (0)
  7. pkg/proxy/nftables/helpers_test.go

    		add rule ip6 kube-proxy cluster-ips-check ip6 daddr @cluster-ips reject comment "Reject traffic to invalid ports of ClusterIPs"
    		add rule ip6 kube-proxy cluster-ips-check ip6 daddr { fd00:10:96::/112 } drop comment "Drop traffic to unallocated ClusterIPs"
    		add rule ip6 kube-proxy endpoint-2CRNCTTE-ns1/svc1/tcp/p80__fd00.10.180..2.1/80 ip6 saddr fd00:10:180::2:1 jump mark-for-masquerade
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Apr 02 09:57:47 UTC 2024
    - 48.5K bytes
    - Viewed (0)
  8. pkg/registry/core/service/ipallocator/controller/repairip_test.go

    	if len(ips) == 0 {
    		return nil
    	}
    	svc := &v1.Service{
    		ObjectMeta: metav1.ObjectMeta{Namespace: "bar", Name: name},
    		Spec: v1.ServiceSpec{
    			ClusterIP:  ips[0],
    			ClusterIPs: ips,
    			Type:       v1.ServiceTypeClusterIP,
    		},
    	}
    	return svc
    }
    
    func newServiceCIDR(name, primary, secondary string) *networkingv1alpha1.ServiceCIDR {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Oct 31 21:05:06 UTC 2023
    - 20.3K bytes
    - Viewed (0)
  9. pkg/apis/core/types.go

    	// +optional
    	ClusterIP string
    
    	// ClusterIPs identifies all the ClusterIPs assigned to this
    	// service. ClusterIPs are assigned or reserved based on the values of
    	// service.spec.ipFamilies. A maximum of two entries (dual-stack IPs) are
    	// allowed in ClusterIPs. The IPFamily of each ClusterIP must match
    	// values provided in service.spec.ipFamilies. Clients using ClusterIPs must
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed May 29 22:40:29 UTC 2024
    - 268.9K bytes
    - Viewed (0)
  10. pkg/proxy/servicechangetracker_test.go

    	if len(healthCheckNodePorts) != 0 {
    		t.Errorf("expected 0 healthcheck ports, got %v", healthCheckNodePorts)
    	}
    
    	// All services but one were deleted. While you'd expect only the ClusterIPs
    	// from the three deleted services here, we still have the ClusterIP for
    	// the not-deleted service, because one of it's ServicePorts was deleted.
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Apr 24 18:25:29 UTC 2024
    - 33.7K bytes
    - Viewed (0)
Back to top