- Sort Score
- Result 10 results
- Languages All
Results 21 - 30 of 86 for VIP (0.03 sec)
-
pilot/pkg/serviceregistry/kube/controller/ambient/ambientindex_workloadentry_test.go
s.assertWorkloads(t, "", workloadapi.WorkloadStatus_HEALTHY, "name1", "name2", "name3") s.assertWorkloads(t, s.addrXdsName("127.0.0.1"), workloadapi.WorkloadStatus_HEALTHY, "name1") // Now we should be able to look up a VIP as well s.assertWorkloads(t, s.addrXdsName("10.0.0.1"), workloadapi.WorkloadStatus_HEALTHY, "name1", "name2") // We should get an event for the two WEs and the selecting service impacted
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed May 08 01:04:50 UTC 2024 - 15.6K bytes - Viewed (0) -
pkg/proxy/apis/config/types.go
// sourceVip is the IP address of the source VIP endpoint used for // NAT when loadbalancing SourceVip string // enableDSR tells kube-proxy whether HNS policies should be created // with DSR EnableDSR bool // rootHnsEndpointName is the name of hnsendpoint that is attached to // l2bridge for root network namespace RootHnsEndpointName string // forwardHealthCheckVip forwards service VIP for health check port on // Windows
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Apr 18 13:25:06 UTC 2024 - 13K bytes - Viewed (0) -
tools/istio-iptables/pkg/capture/run.go
"-o", "lo", "-s", constants.IPVersionSpecific, "-j", constants.RETURN) for _, uid := range split(cfg.cfg.ProxyUID) { // Redirect app calls back to itself via Envoy when using the service VIP // e.g. appN => Envoy (client) => Envoy (server) => appN. // nolint: lll if redirectDNS { // When DNS is enabled, we skip this for port 53. This ensures we do not have:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Jun 06 03:53:23 UTC 2024 - 35.4K bytes - Viewed (0) -
pkg/proxy/winkernel/proxier.go
} } // For Overlay networks 'SourceVIP' on an Load balancer Policy can either be chosen as // a) Source VIP configured on kube-proxy (or) // b) Node IP of the current node // // For L2Bridge network the Source VIP is always the NodeIP of the current node and the same // would be configured on kube-proxy as SourceVIP //
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Apr 18 13:25:06 UTC 2024 - 59K bytes - Viewed (0) -
src/internal/reflectlite/all_test.go
if s != test.s { t.Errorf("#%d: have %#q, want %#q", i, s, test.s) } } } func TestPtrSetNil(t *testing.T) { var i int32 = 1234 ip := &i vip := ValueOf(&ip) vip.Elem().Set(Zero(vip.Elem().Type())) if ip != nil { t.Errorf("got non-nil (%d), want nil", *ip) } } func TestMapSetNil(t *testing.T) { m := make(map[string]int) vm := ValueOf(&m)
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu Nov 16 19:26:08 UTC 2023 - 24.2K bytes - Viewed (0) -
pkg/proxy/nftables/proxier.go
if cidr.Contains(proxier.nodeIP) { allowFromNode = true } } // For VIP-like LBs, the VIP is often added as a local // address (via an IP route rule). In that case, a request // from a node to the VIP will not hit the loadbalancer but // will loop back with the source IP set to the VIP. We // need the following rules to allow requests from this node. if allowFromNode {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat Jun 08 13:48:54 UTC 2024 - 55.5K bytes - Viewed (0) -
pkg/proxy/iptables/proxier.go
if cidr.Contains(proxier.nodeIP) { allowFromNode = true } } // For VIP-like LBs, the VIP is often added as a local // address (via an IP route rule). In that case, a request // from a node to the VIP will not hit the loadbalancer but // will loop back with the source IP set to the VIP. We // need the following rules to allow requests from this node. if allowFromNode {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 21 14:39:54 UTC 2024 - 65.1K bytes - Viewed (0) -
pkg/proxy/serviceport.go
// StickyMaxAgeSeconds returns service max connection age StickyMaxAgeSeconds() int // ExternalIPs returns service ExternalIPs ExternalIPs() []net.IP // LoadBalancerVIPs returns service LoadBalancerIPs which are VIP mode LoadBalancerVIPs() []net.IP // Protocol returns service protocol. Protocol() v1.Protocol // LoadBalancerSourceRanges returns service LoadBalancerSourceRanges if present empty array if not
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Jan 09 08:17:56 UTC 2024 - 10.7K bytes - Viewed (0) -
manifests/charts/istio-control/istio-discovery/files/grpc-agent.yaml
{{- end }} {{- range $key, $value := .ProxyConfig.ProxyMetadata }} - name: {{ $key }} value: "{{ $value }}" {{- end }} # grpc uses xds:/// to resolve – no need to resolve VIP - name: ISTIO_META_DNS_CAPTURE value: "false" - name: DISABLE_ENVOY value: "true" {{with .Values.global.imagePullPolicy }}imagePullPolicy: "{{.}}"{{end}}
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Apr 26 16:51:17 UTC 2024 - 12.1K bytes - Viewed (0) -
pilot/pkg/networking/core/listener_waypoint.go
}) return filters } func buildWaypointInboundHTTPRouteConfig(lb *ListenerBuilder, svc *model.Service, cc inboundChainConfig) *route.RouteConfiguration { // TODO: Policy binding via VIP+Host is inapplicable for direct pod access. if svc == nil { return buildSidecarInboundHTTPRouteConfig(lb, cc) }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Jun 14 04:34:37 UTC 2024 - 27.6K bytes - Viewed (0)