- Sort Score
- Result 10 results
- Languages All
Results 31 - 40 of 937 for conntrack (0.39 sec)
-
pkg/kubelet/prober/scale_test.go
// TCP sockets goes through a TIME-WAIT state (default 60 sec) before being freed, // causing conntrack entries and ephemeral ports to be hold for 60 seconds // despite the probe may have finished in less than 1 second. // If the rate of probes is higher than the rate the OS recycles the ports used, // it can consume a considerable number of ephemeral ports or conntrack entries. // These tests verify that after certain period the probes keep working, if the probes
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Aug 16 16:33:01 UTC 2023 - 8.2K bytes - Viewed (0) -
pkg/proxy/metrics/metrics.go
// by iptables which were marked INVALID by conntrack. iptablesCTStateInvalidDroppedPacketsDescription = metrics.NewDesc( "kubeproxy_iptables_ct_state_invalid_dropped_packets_total", "packets dropped by iptables to work around conntrack problems", nil, nil, metrics.ALPHA, "") IPTablesCTStateInvalidDroppedNFAcctCounter = "ct_state_invalid_dropped_pkts"
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 21 14:39:54 UTC 2024 - 13.7K bytes - Viewed (0) -
tools/istio-iptables/pkg/capture/run.go
} } // Split UDP DNS traffic to separate conntrack zones addConntrackZoneDNSUDP(f.WithTable(constants.RAW), proxyUID, proxyGID, dnsServersV4, dnsServersV6, captureAllDNS) } // addConntrackZoneDNSUDP is a helper function to add iptables rules to split DNS traffic // in two separate conntrack zones to avoid issues with UDP conntrack race conditions.
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Jun 06 03:53:23 UTC 2024 - 35.4K bytes - Viewed (0) -
cmd/kubeadm/app/preflight/checks_linux.go
func addExecChecks(checks []Checker, execer utilsexec.Interface) []Checker { checks = append(checks, InPathCheck{executable: "crictl", mandatory: false, exec: execer}, InPathCheck{executable: "conntrack", mandatory: true, exec: execer}, InPathCheck{executable: "ip", mandatory: true, exec: execer}, InPathCheck{executable: "iptables", mandatory: true, exec: execer},
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed May 29 06:58:01 UTC 2024 - 3.1K bytes - Viewed (0) -
pkg/proxy/conntrack/fake.go
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ package conntrack import ( "fmt" v1 "k8s.io/api/core/v1" "k8s.io/apimachinery/pkg/util/sets" ) // FakeInterface implements Interface by just recording entries that have been cleared. type FakeInterface struct {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Jan 26 04:15:49 UTC 2024 - 2.9K bytes - Viewed (0) -
tools/istio-iptables/pkg/capture/testdata/inbound-ports-wildcard-tproxy.golden
iptables -t mangle -A ISTIO_TPROXY ! -d 127.0.0.1/32 -p tcp -j TPROXY --tproxy-mark 1337/0xffffffff --on-port 15006 iptables -t mangle -A PREROUTING -p tcp -j ISTIO_INBOUND iptables -t mangle -A ISTIO_INBOUND -p tcp -m conntrack --ctstate RELATED,ESTABLISHED -j ISTIO_DIVERT iptables -t mangle -A ISTIO_INBOUND -p tcp -j ISTIO_TPROXY iptables -t nat -A OUTPUT -p tcp -j ISTIO_OUTPUT iptables -t nat -A ISTIO_OUTPUT -o lo -s 127.0.0.6/32 -j RETURN
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Mar 11 17:46:23 UTC 2024 - 2.3K bytes - Viewed (0) -
pkg/proxy/ipvs/proxier.go
metrics.SyncProxyRulesNoLocalEndpointsTotal.WithLabelValues("external").Set(float64(proxier.serviceNoLocalEndpointsExternal.Len())) // Finish housekeeping, clear stale conntrack entries for UDP Services conntrack.CleanStaleEntries(proxier.conntrack, proxier.svcPortMap, serviceUpdateResult, endpointUpdateResult) } // writeIptablesRules write all iptables rules to proxier.natRules or proxier.FilterRules that ipvs proxier needed
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Apr 28 15:51:23 UTC 2024 - 77.7K bytes - Viewed (0) -
pkg/proxy/nftables/proxier.go
proxier.logger.Error(err, "Error syncing healthcheck endpoints") } // Finish housekeeping, clear stale conntrack entries for UDP Services conntrack.CleanStaleEntries(proxier.conntrack, proxier.svcPortMap, serviceUpdateResult, endpointUpdateResult) }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat Jun 08 13:48:54 UTC 2024 - 55.5K bytes - Viewed (0) -
tools/istio-iptables/pkg/capture/testdata/tproxy.golden
iptables -t mangle -A ISTIO_TPROXY ! -d 127.0.0.1/32 -p tcp -j TPROXY --tproxy-mark 1337/0xffffffff --on-port 15006 iptables -t mangle -A PREROUTING -p tcp -j ISTIO_INBOUND iptables -t mangle -A ISTIO_INBOUND -p tcp -m conntrack --ctstate RELATED,ESTABLISHED -j ISTIO_DIVERT iptables -t mangle -A ISTIO_INBOUND -p tcp -j ISTIO_TPROXY iptables -t nat -A OUTPUT -p tcp -j ISTIO_OUTPUT iptables -t nat -A ISTIO_OUTPUT -o lo -s 127.0.0.6/32 -j RETURN
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Jun 06 03:53:23 UTC 2024 - 6.8K bytes - Viewed (0) -
cni/pkg/iptables/iptables.go
"--tproxy-mark", inpodTproxyMark, ) // CLI: -A ISTIO_PRERT -p tcp -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT // // DESC: Anything that's already in conntrack as an established connection, accept iptablesBuilder.AppendRule( iptableslog.UndefinedCommand, ChainInpodPrerouting, iptablesconstants.MANGLE, "-p", "tcp", "-m", "conntrack", "--ctstate", "RELATED,ESTABLISHED", "-j", "ACCEPT", )
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri May 31 21:45:18 UTC 2024 - 19.9K bytes - Viewed (0)