Search Options

Results per page
Sort
Preferred Languages
Advance

Results 11 - 20 of 24 for ServiceCIDRs (0.37 sec)

  1. pkg/proxy/nftables/README.md

        routed away from there, there's nothing to do.)
    
      - We install a `reject` rule for ClusterIPs matching `@cluster-ips` set and a `drop`
        rule for ClusterIPs belonging to any of the ServiceCIDRs in `forward` and `output` hook, with a 
        higher (i.e. less urgent) priority than the DNAT chains making sure all valid
        traffic directed for ClusterIPs is already DNATed. Drop rule will only
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Jan 21 14:37:56 UTC 2024
    - 5.9K bytes
    - Viewed (0)
  2. pkg/registry/core/service/ipallocator/controller/repairip.go

    		cidrQueue: workqueue.NewTypedRateLimitingQueueWithConfig(
    			workqueue.DefaultTypedControllerRateLimiter[string](),
    			workqueue.TypedRateLimitingQueueConfig[string]{Name: "servicecidrs"},
    		),
    		svcQueue: workqueue.NewTypedRateLimitingQueueWithConfig(
    			workqueue.DefaultTypedControllerRateLimiter[string](),
    			workqueue.TypedRateLimitingQueueConfig[string]{Name: "services"},
    		),
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat May 04 18:33:12 UTC 2024
    - 24.7K bytes
    - Viewed (0)
  3. pkg/proxy/config/config.go

    // notifications about ServiceCIDR object changes.
    type ServiceCIDRHandler interface {
    	// OnServiceCIDRsChanged is called whenever a change is observed
    	// in any of the ServiceCIDRs, and provides complete list of service cidrs.
    	OnServiceCIDRsChanged(cidrs []string)
    }
    
    // ServiceCIDRConfig tracks a set of service configurations.
    type ServiceCIDRConfig struct {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Apr 22 05:08:41 UTC 2024
    - 15.1K bytes
    - Viewed (0)
  4. api/discovery/aggregated_v2beta1.json

                    "get",
                    "list",
                    "patch",
                    "update",
                    "watch"
                  ]
                },
                {
                  "resource": "servicecidrs",
                  "responseKind": {
                    "group": "",
                    "kind": "ServiceCIDR",
                    "version": ""
                  },
                  "scope": "Cluster",
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Mar 08 04:18:56 UTC 2024
    - 55.4K bytes
    - Viewed (0)
  5. api/discovery/aggregated_v2.json

                    "get",
                    "list",
                    "patch",
                    "update",
                    "watch"
                  ]
                },
                {
                  "resource": "servicecidrs",
                  "responseKind": {
                    "group": "",
                    "kind": "ServiceCIDR",
                    "version": ""
                  },
                  "scope": "Cluster",
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Mar 12 17:29:14 UTC 2024
    - 55.4K bytes
    - Viewed (0)
  6. pkg/proxy/nftables/proxier_test.go

    	// invocation into a Run() method.
    	nftablesFamily := knftables.IPv4Family
    	podCIDR := "10.0.0.0/8"
    	serviceCIDRs := "172.30.0.0/16"
    	if ipFamily == v1.IPv6Protocol {
    		nftablesFamily = knftables.IPv6Family
    		podCIDR = "fd00:10::/64"
    		serviceCIDRs = "fd00:10:96::/112"
    	}
    	detectLocal := proxyutil.NewDetectLocalByCIDR(podCIDR)
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat Apr 27 01:31:57 UTC 2024
    - 173.5K bytes
    - Viewed (0)
  7. cmd/kube-proxy/app/server.go

    		informers.WithTweakListOptions(func(options *metav1.ListOptions) {
    			options.LabelSelector = labelSelector.String()
    		}))
    
    	// Create configs (i.e. Watches for Services, EndpointSlices and ServiceCIDRs)
    	// Note: RegisterHandler() calls need to happen before creation of Sources because sources
    	// only notify on changes, and the initial update (on process start) may be lost if no handlers
    	// are registered yet.
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Apr 26 13:27:41 UTC 2024
    - 46.8K bytes
    - Viewed (0)
  8. api/openapi-spec/v3/apis__networking.k8s.io__v1alpha1_openapi.json

                "type": "string"
              },
              "items": {
                "description": "items is the list of ServiceCIDRs.",
                "items": {
                  "allOf": [
                    {
                      "$ref": "#/components/schemas/io.k8s.api.networking.v1alpha1.ServiceCIDR"
                    }
                  ],
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Mar 08 04:18:56 UTC 2024
    - 196.5K bytes
    - Viewed (0)
  9. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/policy.go

    		eventsRule(),
    	}
    	if utilfeature.DefaultFeatureGate.Enabled(features.MultiCIDRServiceAllocator) {
    		nodeProxierRules = append(nodeProxierRules, rbacv1helpers.NewRule("list", "watch").Groups(networkingGroup).Resources("servicecidrs").RuleOrDie())
    	}
    
    	nodeProxierRules = append(nodeProxierRules, rbacv1helpers.NewRule("list", "watch").Groups(discoveryGroup).Resources("endpointslices").RuleOrDie())
    	roles = append(roles, rbacv1.ClusterRole{
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Mar 08 19:25:10 UTC 2024
    - 34.4K bytes
    - Viewed (0)
  10. pkg/proxy/winkernel/proxier.go

    	proxier.mu.Unlock()
    
    	// Sync unconditionally - this is called once per lifetime.
    	proxier.syncProxyRules()
    }
    
    // OnServiceCIDRsChanged is called whenever a change is observed
    // in any of the ServiceCIDRs, and provides complete list of service cidrs.
    func (proxier *Proxier) OnServiceCIDRsChanged(_ []string) {}
    
    func (proxier *Proxier) cleanupAllPolicies() {
    	for svcName, svc := range proxier.svcPortMap {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Apr 18 13:25:06 UTC 2024
    - 59K bytes
    - Viewed (0)
Back to top