- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 35 for CIDR (0.03 sec)
-
common-protos/k8s.io/api/networking/v1alpha1/generated.proto
option go_package = "k8s.io/api/networking/v1alpha1"; // ClusterCIDR represents a single configuration for per-Node Pod CIDR // allocations when the MultiCIDRRangeAllocator is enabled (see the config for // kube-controller-manager). A cluster may have any number of ClusterCIDR // resources, all of which will be considered when allocating a CIDR for a // Node. A ClusterCIDR is eligible to be used for a given Node when the node
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 6K bytes - Viewed (0) -
cni/pkg/plugin/sidecar_redirect.go
} return nil } func validateCIDRList(cidrs string) error { if len(cidrs) > 0 { for _, cidr := range strings.Split(cidrs, ",") { if _, err := netip.ParsePrefix(cidr); err != nil { return fmt.Errorf("failed parsing cidr '%s': %v", cidr, err) } } } return nil } func splitPorts(portsString string) []string { return strings.Split(portsString, ",") }
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Fri Jan 26 20:34:28 UTC 2024 - 10.6K bytes - Viewed (0) -
istioctl/pkg/writer/envoy/configdump/listener.go
m = map[string]*matcher.Matcher_OnMatch{} for _, rm := range ip.GetRangeMatchers() { for _, r := range rm.Ranges { cidr := r.AddressPrefix pl := r.PrefixLen.GetValue() if pl != 32 && pl != 128 { cidr += fmt.Sprintf("/%d", pl) } m[cidr] = rm.OnMatch } } default: panic("unhandled") } } outputs := []string{} for k, v := range m {
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Wed Nov 29 12:37:14 UTC 2023 - 18.1K bytes - Viewed (0) -
common/scripts/kind_provisioner.sh
} function cidr_to_ips() { CIDR="$1" # cidr_to_ips returns a list of single IPs from a CIDR. We skip 1000 (since they are likely to be allocated # already to other services), then pick the next 100. python3 - <<EOF from ipaddress import ip_network, IPv6Network; from itertools import islice; net = ip_network('$CIDR') net_bits = 128 if type(net) == IPv6Network else 32;
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Wed Aug 21 04:47:23 UTC 2024 - 17.2K bytes - Viewed (0) -
common-protos/k8s.io/apimachinery/pkg/apis/meta/v1/generated.proto
optional GroupVersionForDiscovery preferredVersion = 3; // a map of client CIDR to server address that is serving this group. // This is to help clients reach servers in the most network-efficient way possible. // Clients can use the appropriate server address as per the CIDR that they match. // In case of multiple matches, clients should use the longest matching CIDR. // The server returns only those CIDRs that it thinks that the client can match.
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 53.3K bytes - Viewed (0) -
cni/pkg/iptables/iptables_linux.go
} } for _, fullCIDR := range cidrs { _, localhostDst, err := net.ParseCIDR(fullCIDR) if err != nil { return fmt.Errorf("parse CIDR: %v", err) } netlinkRoutes := []*netlink.Route{ // In routing table ${INBOUND_TPROXY_ROUTE_TABLE}, create a single default rule to route all traffic to // the loopback interface.
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Fri Sep 06 09:44:28 UTC 2024 - 4K bytes - Viewed (0) -
common-protos/k8s.io/api/networking/v1/generated.proto
} // IPBlock describes a particular CIDR (Ex. "192.168.1.0/24","2001:db8::/64") that is allowed // to the pods matched by a NetworkPolicySpec's podSelector. The except entry describes CIDRs // that should not be included within this rule. message IPBlock { // cidr is a string representing the IPBlock // Valid examples are "192.168.1.0/24" or "2001:db8::/64" optional string cidr = 1;
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 25.2K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.17.md
- `-- kube-controller-manager` `--node-cidr-mask-size-ipv4 int32` Default: 24. Mask size for IPv4 node-cidr in dual-stack cluster. `--node-cidr-mask-size-ipv6 int32` Default: 64. Mask size for IPv6 node-cidr in dual-stack cluster. These 2 flags can be used only for dual-stack clusters. For non dual-stack clusters, continue to use `--node-cidr-mask-size` flag to configure the mask size.
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Thu Jan 28 10:44:33 UTC 2021 - 346.2K bytes - Viewed (1) -
common-protos/k8s.io/api/extensions/v1beta1/generated.proto
// IPBlock describes a particular CIDR (Ex. "192.168.1.0/24","2001:db8::/64") that is allowed // to the pods matched by a NetworkPolicySpec's podSelector. The except entry describes CIDRs // that should not be included within this rule. message IPBlock { // CIDR is a string representing the IP Block // Valid examples are "192.168.1.0/24" or "2001:db8::/64" optional string cidr = 1;
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 45.6K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.23.md
1. When configuring a dual-stack cluster, the user must specify both `--node-cidr-mask-size-ipv4` and `--node-cidr-mask-size-ipv6` to set the per-node IP mask sizes, instead of the previous `--node-cidr-mask-size` flag. 2. The `--node-cidr-mask-size` flag is mutually exclusive with `--node-cidr-mask-size-ipv4` and `--node-cidr-mask-size-ipv6`.
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Tue Feb 28 21:06:52 UTC 2023 - 424.5K bytes - Viewed (0)