Search Options

Results per page
Sort
Preferred Languages
Advance

Results 21 - 30 of 227 for tcp (0.03 sec)

  1. cni/test/testdata/env_vars.sh

    # shellcheck disable=SC2034
    KUBE_DNS_SERVICE_PORT=53
    # shellcheck disable=SC2034
    KUBE_DNS_PORT_53_TCP_PROTO=tcp
    # shellcheck disable=SC2034
    KUBE_DNS_PORT_53_UDP=udp://10.110.0.10:53
    # shellcheck disable=SC2034
    KUBE_DNS_PORT_53_UDP_PROTO=udp
    # shellcheck disable=SC2034
    KUBERNETES_PORT_443_TCP_PROTO=tcp
    # shellcheck disable=SC2034
    KUBERNETES_PORT_443_TCP_ADDR=10.110.0.1
    # shellcheck disable=SC2034
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Thu Nov 19 23:19:19 UTC 2020
    - 1.9K bytes
    - Viewed (0)
  2. cni/pkg/iptables/testdata/ingress.golden

    COMMIT
    * nat
    -N ISTIO_OUTPUT
    -N ISTIO_PRERT
    -A OUTPUT -j ISTIO_OUTPUT
    -A PREROUTING -j ISTIO_PRERT
    -A ISTIO_OUTPUT -d 169.254.7.127 -p tcp -m tcp -j ACCEPT
    -A ISTIO_OUTPUT -p tcp -m mark --mark 0x111/0xfff -j ACCEPT
    -A ISTIO_OUTPUT ! -d 127.0.0.1/32 -o lo -j ACCEPT
    -A ISTIO_OUTPUT ! -d 127.0.0.1/32 -p tcp -m mark ! --mark 0x539/0xfff -j REDIRECT --to-ports 15001
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Tue Oct 15 15:39:28 UTC 2024
    - 580 bytes
    - Viewed (0)
  3. istioctl/pkg/writer/envoy/configdump/listener.go

    const (
    	// HTTPListener identifies a listener as being of HTTP type by the presence of an HTTP connection manager filter
    	HTTPListener = wellknown.HTTPConnectionManager
    
    	// TCPListener identifies a listener as being of TCP type by the presence of TCP proxy filter
    	TCPListener = wellknown.TCPProxy
    
    	IPMatcher = "type.googleapis.com/xds.type.matcher.v3.IPMatcher"
    )
    
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Wed Nov 29 12:37:14 UTC 2023
    - 18.1K bytes
    - Viewed (0)
  4. docs/en/docs/deployment/https.md

    After this, the client and the server have an **encrypted TCP connection**, this is what TLS provides. And then they can use that connection to start the actual **HTTP communication**.
    
    And that's what **HTTPS** is, it's just plain **HTTP** inside a **secure TLS connection** instead of a pure (unencrypted) TCP connection.
    
    /// tip
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Tue Aug 06 04:48:30 UTC 2024
    - 12K bytes
    - Viewed (0)
  5. internal/http/check_port_test.go

    	if runtime.GOOS != "linux" {
    		t.Skip()
    	}
    
    	l, err := net.Listen("tcp", "localhost:0") // ask kernel for a free port.
    	if err != nil {
    		t.Fatal(err)
    	}
    	defer l.Close()
    
    	port := l.Addr().(*net.TCPAddr).Port
    
    	testCases := []struct {
    		host        string
    		port        int
    		expectedErr error
    	}{
    		{"", port, fmt.Errorf("listen tcp :%v: bind: address already in use", port)},
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Wed May 03 21:12:25 UTC 2023
    - 1.9K bytes
    - Viewed (0)
  6. istioctl/pkg/writer/ztunnel/configdump/testdata/dump.json

          "nativeTunnel": true,
          "status": "Healthy",
          "clusterId": "Kubernetes"
        },
        "/10.244.1.10": {
          "workloadIps": [
            "10.244.1.10"
          ],
          "protocol": "TCP",
          "uid": "Kubernetes//Pod/httpbin/httpbin-65975d4c6f-jr69n",
          "name": "httpbin-65975d4c6f-jr69n",
          "namespace": "httpbin",
          "trustDomain": "cluster.local",
          "serviceAccount": "httpbin",
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Tue Apr 16 03:28:36 UTC 2024
    - 33.1K bytes
    - Viewed (0)
  7. docs/features/connections.md

     * Don't start a new attempt until 250 ms after the most recent attempt was started.
     * Keep whichever TCP connection succeeds first and cancel all the others.
     * Race TCP only. Only attempt a TLS handshake on the winning TCP connection.
    
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Mon Feb 21 03:33:59 UTC 2022
    - 5.4K bytes
    - Viewed (0)
  8. docs/ru/docs/deployment/https.md

    * Шифрование соединения происходит **на уровне протокола TCP**.
        * Протокол TCP находится на один уровень **ниже протокола HTTP**.
        * Поэтому **проверка сертификатов и шифрование** происходит **до HTTP**.
    * **TCP не знает о "доменах"**, но знает об IP-адресах.
        * Информация о **запрашиваемом домене** извлекается из запроса **на уровне HTTP**.
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Tue Aug 06 04:48:30 UTC 2024
    - 20.7K bytes
    - Viewed (0)
  9. docs/pt/docs/deployment/https.md

    * A criptografia da conexão acontece no nível TCP.
        * Essa é uma camada abaixo do HTTP.
        * Portanto, o manuseio do certificado e da criptografia é feito antes do HTTP.
    * O TCP não sabe sobre "domínios". Apenas sobre endereços IP.
        * As informações sobre o domínio solicitado vão nos dados HTTP.
    * Os certificados HTTPS “certificam” um determinado domínio, mas o protocolo e a encriptação acontecem ao nível do TCP, antes de sabermos de que domínio se trata.
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Tue Aug 06 04:48:30 UTC 2024
    - 3.9K bytes
    - Viewed (0)
  10. istioctl/pkg/writer/envoy/configdump/listener_test.go

    							{
    								Name: wellknown.HTTPConnectionManager,
    							},
    						},
    					},
    				},
    			},
    			expect: true,
    		},
    		{
    			desc: "http-tcp-type-match",
    			inFilter: &ListenerFilter{
    				Type: "HTTP+TCP",
    			},
    			inListener: &listener.Listener{
    				FilterChains: []*listener.FilterChain{{
    					Filters: []*listener.Filter{
    						{
    							Name: wellknown.TCPProxy,
    						},
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Mon Sep 11 15:29:30 UTC 2023
    - 4.1K bytes
    - Viewed (0)
Back to top