- Sort Score
- Result 10 results
- Languages All
Results 11 - 20 of 65 for cidr (0.14 sec)
-
cni/pkg/iptables/iptables_linux.go
return fmt.Errorf("failed to find 'lo' link: %v", err) } // Set up netlink routes for localhost cidrs := []string{"0.0.0.0/0"} if cfg.EnableIPv6 { cidrs = append(cidrs, "0::0/0") } for _, fullCIDR := range cidrs { _, localhostDst, err := net.ParseCIDR(fullCIDR) if err != nil { return fmt.Errorf("parse CIDR: %v", err) } netlinkRoutes := []*netlink.Route{
Go - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Tue Apr 30 22:24:38 GMT 2024 - 3.3K bytes - Viewed (0) -
common-protos/k8s.io/api/extensions/v1beta1/generated.proto
// IPBlock describes a particular CIDR (Ex. "192.168.1.0/24","2001:db8::/64") that is allowed // to the pods matched by a NetworkPolicySpec's podSelector. The except entry describes CIDRs // that should not be included within this rule. message IPBlock { // CIDR is a string representing the IP Block // Valid examples are "192.168.1.0/24" or "2001:db8::/64" optional string cidr = 1;
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Mon Mar 11 18:43:24 GMT 2024 - 45.6K bytes - Viewed (0) -
istioctl/pkg/workload/workload.go
} } // default attributes and service name, namespace, ports, service account, service CIDR overrides := map[string]string{ "ISTIO_INBOUND_PORTS": portBehavior, "ISTIO_NAMESPACE": wg.Namespace, "ISTIO_SERVICE": fmt.Sprintf("%s.%s", wg.Name, wg.Namespace), "ISTIO_SERVICE_CIDR": "*", "ISTIO_LOCAL_EXCLUDE_PORTS": excludePorts, "SERVICE_ACCOUNT": we.ServiceAccount,
Go - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Wed Apr 17 20:06:41 GMT 2024 - 25.5K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.17.md
- `-- kube-controller-manager` `--node-cidr-mask-size-ipv4 int32` Default: 24. Mask size for IPv4 node-cidr in dual-stack cluster. `--node-cidr-mask-size-ipv6 int32` Default: 64. Mask size for IPv6 node-cidr in dual-stack cluster. These 2 flags can be used only for dual-stack clusters. For non dual-stack clusters, continue to use `--node-cidr-mask-size` flag to configure the mask size.
Plain Text - Registered: Fri May 03 09:05:14 GMT 2024 - Last Modified: Thu Jan 28 10:44:33 GMT 2021 - 346.2K bytes - Viewed (1) -
CHANGELOG/CHANGELOG-1.3.md
* AWS kube-up: Allow VPC CIDR to be specified (experimental) ([#23362](https://github.com/kubernetes/kubernetes/pull/23362), [@miguelfrde](https://github.com/miguelfrde)) * Return "410 Gone" errors via watch stream when using watch cache ([#25369](https://github.com/kubernetes/kubernetes/pull/25369), [@liggitt](https://github.com/liggitt))
Plain Text - Registered: Fri May 03 09:05:14 GMT 2024 - Last Modified: Thu Dec 24 02:28:26 GMT 2020 - 84K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.23.md
1. When configuring a dual-stack cluster, the user must specify both `--node-cidr-mask-size-ipv4` and `--node-cidr-mask-size-ipv6` to set the per-node IP mask sizes, instead of the previous `--node-cidr-mask-size` flag. 2. The `--node-cidr-mask-size` flag is mutually exclusive with `--node-cidr-mask-size-ipv4` and `--node-cidr-mask-size-ipv6`.
Plain Text - Registered: Fri May 03 09:05:14 GMT 2024 - Last Modified: Tue Feb 28 21:06:52 GMT 2023 - 424.5K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.16.md
- Add possibility to configure controller manager to use IPv6 dual stack: use `--cluster-cidr="<cidr1>,<cidr2>"`. Notes: 1. Only the first two CIDRs are used (soft limits for Alpha, might be lifted later on). 2. Only the "RangeAllocator" (default) is allowed as a value for `--cidr-allocator-type`. Cloud allocators are not compatible with IPv6 dual stack
Plain Text - Registered: Fri May 03 09:05:14 GMT 2024 - Last Modified: Thu Feb 11 10:00:57 GMT 2021 - 345.2K bytes - Viewed (0) -
manifests/charts/istiod-remote/values.yaml
# # The following example defines two networks with different endpoints association methods. # For `network1` all endpoints that their IP belongs to the provided CIDR range will be # mapped to network1. The gateway for this network example is specified by its public IP # address and port. # The second network, `network2`, in this example is defined differently with all endpoints
Others - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Mon Apr 22 22:00:40 GMT 2024 - 20.2K bytes - Viewed (0) -
manifests/charts/istio-control/istio-discovery/values.yaml
# # The following example defines two networks with different endpoints association methods. # For `network1` all endpoints that their IP belongs to the provided CIDR range will be # mapped to network1. The gateway for this network example is specified by its public IP # address and port. # The second network, `network2`, in this example is defined differently with all endpoints
Others - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Mon Apr 22 22:00:40 GMT 2024 - 20.3K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.9.md
* IPAM controller unifies handling of node pod CIDR range allocation. ([#51374](https://github.com/kubernetes/kubernetes/pull/51374), [@bowei](https://github.com/bowei)) * It is intended to supersede the logic that is currently in range_allocator * and cloud_cidr_allocator. (ALPHA FEATURE) * Note: for this change, the other allocators still exist and are the default.
Plain Text - Registered: Fri May 03 09:05:14 GMT 2024 - Last Modified: Tue Nov 16 10:46:27 GMT 2021 - 313.7K bytes - Viewed (0)