Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 19 for dark (0.18 sec)

  1. manifests/addons/dashboards/istio-service-dashboard.json

                "mode": "absolute",
                "steps": [
                  {
                    "color": "dark-red",
                    "value": null
                  },
                  {
                    "color": "dark-yellow",
                    "value": 0.95
                  },
                  {
                    "color": "dark-green",
                    "value": 0.99
                  }
                ]
              },
    Json
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Wed Mar 27 03:47:04 GMT 2024
    - 111.8K bytes
    - Viewed (0)
  2. manifests/addons/dashboards/istio-performance-dashboard.json

              "refId": "A",
              "step": 2
            }
          ],
          "title": "Goroutines",
          "type": "timeseries"
        }
      ],
      "refresh": "",
      "schemaVersion": 38,
      "style": "dark",
      "tags": [],
      "templating": {
        "list": [
          {
            "hide": 0,
            "includeAll": false,
            "multi": false,
            "name": "datasource",
            "options": [],
    Json
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Wed Mar 27 03:47:04 GMT 2024
    - 39.6K bytes
    - Viewed (0)
  3. cni/pkg/plugin/testdata/custom-uid-tproxy.txt.golden

    -A PREROUTING -p tcp -m mark --mark 1337 -j CONNMARK --save-mark
    -A OUTPUT -p tcp -o lo -m mark --mark 1337 -j RETURN
    -A OUTPUT ! -d 127.0.0.1/32 -p tcp -o lo -m owner --uid-owner 1000670000 -j MARK --set-mark 1338
    -A OUTPUT ! -d 127.0.0.1/32 -p tcp -o lo -m owner --gid-owner 1000670001 -j MARK --set-mark 1338
    -A OUTPUT -p tcp -m connmark --mark 1337 -j CONNMARK --restore-mark
    -I ISTIO_INBOUND 1 -p tcp -m mark --mark 1337 -j RETURN
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Wed Apr 26 16:39:28 GMT 2023
    - 2K bytes
    - Viewed (0)
  4. cni/pkg/iptables/testdata/default.golden

    iptables -t mangle -A ISTIO_PRERT ! -d 127.0.0.1/32 -p tcp -m mark ! --mark 0x539/0xfff -j TPROXY --on-port 15006 --tproxy-mark 0x111/0xfff
    iptables -t mangle -A ISTIO_OUTPUT -m connmark --mark 0x111/0xfff -j CONNMARK --restore-mark --nfmask 0xffffffff --ctmask 0xffffffff
    iptables -t nat -A ISTIO_OUTPUT ! -o lo -p udp -m udp --dport 53 -j REDIRECT --to-port 15053
    iptables -t nat -A ISTIO_OUTPUT -p tcp -m mark --mark 0x111/0xfff -j ACCEPT
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Fri Jan 26 20:34:28 GMT 2024
    - 1.4K bytes
    - Viewed (0)
  5. cni/pkg/iptables/iptables_linux.go

    		//
    		// Adds in-pod rules for marking packets with the istio-specific TPROXY mark.
    		// A very similar mechanism is used for sidecar TPROXY.
    		//
    		// TODO largely identical/copied from tools/istio-iptables/pkg/capture/run_linux.go
    		inpodMarkRule := netlink.NewRule()
    		inpodMarkRule.Family = family
    		inpodMarkRule.Table = RouteTableInbound
    		inpodMarkRule.Mark = InpodTProxyMark
    		inpodMarkRule.Mask = InpodTProxyMask
    Go
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Tue Apr 30 22:24:38 GMT 2024
    - 3.3K bytes
    - Viewed (0)
  6. cni/pkg/nodeagent/constants/constants.go

    // See the License for the specific language governing permissions and
    // limitations under the License.
    
    package constants
    
    const (
    	// In the below, we add the fwmask to ensure only that mark can match
    
    	DNSCapturePort              = 15053
    	ZtunnelInboundPort          = 15008
    	ZtunnelOutboundPort         = 15001
    	ZtunnelInboundPlaintextPort = 15006
    	ProbeIPSet                  = "istio-inpod-probes"
    Go
    - Registered: Wed Apr 10 22:53:08 GMT 2024
    - Last Modified: Fri Jan 26 20:34:28 GMT 2024
    - 887 bytes
    - Viewed (0)
  7. operator/cmd/mesh/testdata/manifest-generate/data-snapshot.tar.gz

    "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": false, "alignLevel": null } } ], "refresh": "5s", "schemaVersion": 18, "style": "dark", "tags": [], "templating": { "list": [ { "current": { "selected": true, "text": "default", "value": "default" }, "hide": 0, "includeAll": false, "label": null, "multi": false, "name": "datasource", "options": [], "query": "prometheus", "queryValue":...
    Others
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Wed Jan 10 05:10:03 GMT 2024
    - 198.1K bytes
    - Viewed (1)
  8. cni/pkg/iptables/testdata/default_ipv6.golden

    iptables -t mangle -A ISTIO_PRERT -p tcp -m tcp --dport 15008 -m mark ! --mark 0x539/0xfff -j TPROXY --on-port 15008 --tproxy-mark 0x111/0xfff
    iptables -t mangle -A ISTIO_PRERT -p tcp -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
    iptables -t mangle -A ISTIO_PRERT ! -d 127.0.0.1/32 -p tcp -m mark ! --mark 0x539/0xfff -j TPROXY --on-port 15006 --tproxy-mark 0x111/0xfff
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Fri Jan 26 20:34:28 GMT 2024
    - 2.9K bytes
    - Viewed (0)
  9. cni/pkg/plugin/testdata/tproxy.txt.golden

    -A PREROUTING -p tcp -m mark --mark 1337 -j CONNMARK --save-mark
    -A OUTPUT -p tcp -o lo -m mark --mark 1337 -j RETURN
    -A OUTPUT ! -d 127.0.0.1/32 -p tcp -o lo -m owner --uid-owner 1337 -j MARK --set-mark 1338
    -A OUTPUT ! -d 127.0.0.1/32 -p tcp -o lo -m owner --gid-owner 1337 -j MARK --set-mark 1338
    -A OUTPUT -p tcp -m connmark --mark 1337 -j CONNMARK --restore-mark
    -I ISTIO_INBOUND 1 -p tcp -m mark --mark 1337 -j RETURN
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Thu Feb 16 22:54:20 GMT 2023
    - 1.9K bytes
    - Viewed (0)
  10. cni/pkg/iptables/iptables.go

    	// From here on, we should be only inserting rules into our custom chains.
    
    	// CLI: -A ISTIO_PRERT -m mark --mark 0x539/0xfff -j CONNMARK --set-xmark 0x111/0xfff
    	//
    	// DESC: If we have a packet mark, set a connmark.
    	iptablesBuilder.AppendRule(iptableslog.UndefinedCommand, ChainInpodPrerouting, iptablesconstants.MANGLE, "-m", "mark",
    		"--mark", inpodMark,
    		"-j", "CONNMARK",
    		"--set-xmark", inpodTproxyMark)
    
    Go
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Tue May 07 19:54:50 GMT 2024
    - 19.7K bytes
    - Viewed (0)
Back to top