Search Options

Results per page
Sort
Preferred Languages
Advance

Results 11 - 20 of 65 for cidr (0.14 sec)

  1. cni/pkg/iptables/iptables_linux.go

    		return fmt.Errorf("failed to find 'lo' link: %v", err)
    	}
    
    	// Set up netlink routes for localhost
    	cidrs := []string{"0.0.0.0/0"}
    	if cfg.EnableIPv6 {
    		cidrs = append(cidrs, "0::0/0")
    	}
    	for _, fullCIDR := range cidrs {
    		_, localhostDst, err := net.ParseCIDR(fullCIDR)
    		if err != nil {
    			return fmt.Errorf("parse CIDR: %v", err)
    		}
    
    		netlinkRoutes := []*netlink.Route{
    Go
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Tue Apr 30 22:24:38 GMT 2024
    - 3.3K bytes
    - Viewed (0)
  2. common-protos/k8s.io/api/extensions/v1beta1/generated.proto

    // IPBlock describes a particular CIDR (Ex. "192.168.1.0/24","2001:db8::/64") that is allowed
    // to the pods matched by a NetworkPolicySpec's podSelector. The except entry describes CIDRs
    // that should not be included within this rule.
    message IPBlock {
      // CIDR is a string representing the IP Block
      // Valid examples are "192.168.1.0/24" or "2001:db8::/64"
      optional string cidr = 1;
    
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Mon Mar 11 18:43:24 GMT 2024
    - 45.6K bytes
    - Viewed (0)
  3. istioctl/pkg/workload/workload.go

    		}
    	}
    	// default attributes and service name, namespace, ports, service account, service CIDR
    	overrides := map[string]string{
    		"ISTIO_INBOUND_PORTS":       portBehavior,
    		"ISTIO_NAMESPACE":           wg.Namespace,
    		"ISTIO_SERVICE":             fmt.Sprintf("%s.%s", wg.Name, wg.Namespace),
    		"ISTIO_SERVICE_CIDR":        "*",
    		"ISTIO_LOCAL_EXCLUDE_PORTS": excludePorts,
    		"SERVICE_ACCOUNT":           we.ServiceAccount,
    Go
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Wed Apr 17 20:06:41 GMT 2024
    - 25.5K bytes
    - Viewed (0)
  4. CHANGELOG/CHANGELOG-1.17.md

    - `-- kube-controller-manager`
      `--node-cidr-mask-size-ipv4 int32`     Default: 24. Mask size for IPv4 node-cidr in dual-stack cluster.
    `--node-cidr-mask-size-ipv6 int32`     Default: 64. Mask size for IPv6 node-cidr in dual-stack cluster.
    
        These 2 flags can be used only for dual-stack clusters. For non dual-stack clusters, continue to use  `--node-cidr-mask-size` flag to configure the mask size.
    
    Plain Text
    - Registered: Fri May 03 09:05:14 GMT 2024
    - Last Modified: Thu Jan 28 10:44:33 GMT 2021
    - 346.2K bytes
    - Viewed (1)
  5. CHANGELOG/CHANGELOG-1.3.md

    * AWS kube-up: Allow VPC CIDR to be specified (experimental) ([#23362](https://github.com/kubernetes/kubernetes/pull/23362), [@miguelfrde](https://github.com/miguelfrde))
    * Return "410 Gone" errors via watch stream when using watch cache ([#25369](https://github.com/kubernetes/kubernetes/pull/25369), [@liggitt](https://github.com/liggitt))
    Plain Text
    - Registered: Fri May 03 09:05:14 GMT 2024
    - Last Modified: Thu Dec 24 02:28:26 GMT 2020
    - 84K bytes
    - Viewed (0)
  6. CHANGELOG/CHANGELOG-1.23.md

      1. When configuring a dual-stack cluster, the user must specify both `--node-cidr-mask-size-ipv4` and `--node-cidr-mask-size-ipv6` to set the per-node IP mask sizes, instead of the previous `--node-cidr-mask-size` flag.
      2. The `--node-cidr-mask-size` flag is mutually exclusive with `--node-cidr-mask-size-ipv4` and `--node-cidr-mask-size-ipv6`.
    Plain Text
    - Registered: Fri May 03 09:05:14 GMT 2024
    - Last Modified: Tue Feb 28 21:06:52 GMT 2023
    - 424.5K bytes
    - Viewed (0)
  7. CHANGELOG/CHANGELOG-1.16.md

    - Add possibility to configure controller manager to use IPv6 dual stack:
      use `--cluster-cidr="<cidr1>,<cidr2>"`.
      Notes:
      1. Only the first two CIDRs are used (soft limits for Alpha, might be lifted later on).
      2. Only the "RangeAllocator" (default) is allowed as a value for `--cidr-allocator-type`. Cloud allocators are not compatible with IPv6 dual stack
    Plain Text
    - Registered: Fri May 03 09:05:14 GMT 2024
    - Last Modified: Thu Feb 11 10:00:57 GMT 2021
    - 345.2K bytes
    - Viewed (0)
  8. manifests/charts/istiod-remote/values.yaml

        #
        # The following example defines two networks with different endpoints association methods.
        # For `network1` all endpoints that their IP belongs to the provided CIDR range will be
        # mapped to network1. The gateway for this network example is specified by its public IP
        # address and port.
        # The second network, `network2`, in this example is defined differently with all endpoints
    Others
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Mon Apr 22 22:00:40 GMT 2024
    - 20.2K bytes
    - Viewed (0)
  9. manifests/charts/istio-control/istio-discovery/values.yaml

        #
        # The following example defines two networks with different endpoints association methods.
        # For `network1` all endpoints that their IP belongs to the provided CIDR range will be
        # mapped to network1. The gateway for this network example is specified by its public IP
        # address and port.
        # The second network, `network2`, in this example is defined differently with all endpoints
    Others
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Mon Apr 22 22:00:40 GMT 2024
    - 20.3K bytes
    - Viewed (0)
  10. CHANGELOG/CHANGELOG-1.9.md

    * IPAM controller unifies handling of node pod CIDR range allocation. ([#51374](https://github.com/kubernetes/kubernetes/pull/51374), [@bowei](https://github.com/bowei))
        * It is intended to supersede the logic that is currently in range_allocator
        * and cloud_cidr_allocator. (ALPHA FEATURE)
        * Note: for this change, the other allocators still exist and are the default.
    Plain Text
    - Registered: Fri May 03 09:05:14 GMT 2024
    - Last Modified: Tue Nov 16 10:46:27 GMT 2021
    - 313.7K bytes
    - Viewed (0)
Back to top