- Sort Score
- Result 10 results
- Languages All
Results 11 - 20 of 73 for zone2 (0.04 sec)
-
cni/pkg/iptables/testdata/tproxy_ipv6.golden
COMMIT * raw -N ISTIO_OUTPUT -N ISTIO_PRERT -A PREROUTING -j ISTIO_PRERT -A OUTPUT -j ISTIO_OUTPUT -A ISTIO_OUTPUT -p udp -m mark --mark 0x539/0xfff -m udp --dport 53 -j CT --zone 1 -A ISTIO_PRERT -p udp -m mark ! --mark 0x539/0xfff -m udp --sport 53 -j CT --zone 1 COMMIT * mangle -N ISTIO_PRERT -N ISTIO_OUTPUT -A PREROUTING -j ISTIO_PRERT -A OUTPUT -j ISTIO_OUTPUT
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Wed Sep 25 20:54:34 UTC 2024 - 3K bytes - Viewed (0) -
cni/pkg/iptables/testdata/default.golden
COMMIT * raw -N ISTIO_OUTPUT -N ISTIO_PRERT -A PREROUTING -j ISTIO_PRERT -A OUTPUT -j ISTIO_OUTPUT -A ISTIO_OUTPUT -p udp -m mark --mark 0x539/0xfff -m udp --dport 53 -j CT --zone 1 -A ISTIO_PRERT -p udp -m mark ! --mark 0x539/0xfff -m udp --sport 53 -j CT --zone 1
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Wed Sep 25 20:54:34 UTC 2024 - 1.3K bytes - Viewed (0) -
cni/pkg/iptables/testdata/tproxy.golden
COMMIT * raw -N ISTIO_OUTPUT -N ISTIO_PRERT -A PREROUTING -j ISTIO_PRERT -A OUTPUT -j ISTIO_OUTPUT -A ISTIO_OUTPUT -p udp -m mark --mark 0x539/0xfff -m udp --dport 53 -j CT --zone 1 -A ISTIO_PRERT -p udp -m mark ! --mark 0x539/0xfff -m udp --sport 53 -j CT --zone 1
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Wed Sep 25 20:54:34 UTC 2024 - 1.5K bytes - Viewed (0) -
tests/postgres_test.go
t.Skip() } type Yasuo struct { ID string `gorm:"default:gen_random_uuid()"` Name string CreatedAt time.Time `gorm:"type:TIMESTAMP WITHOUT TIME ZONE"` UpdatedAt time.Time `gorm:"type:TIMESTAMP WITHOUT TIME ZONE;default:current_timestamp"` } if err := DB.Exec("CREATE EXTENSION IF NOT EXISTS pgcrypto;").Error; err != nil { t.Errorf("Failed to create extension pgcrypto, got error %v", err) }
Registered: Sun Nov 03 09:35:10 UTC 2024 - Last Modified: Sat Oct 08 09:16:32 UTC 2022 - 6.4K bytes - Viewed (0) -
internal/s3select/sql/timestampfuncs.go
return FromInt(int64(t.Minute())), nil case timePartSecond: return FromInt(int64(t.Second())), nil case timePartTimezoneHour: _, zoneOffset := t.Zone() return FromInt(int64(zoneOffset / 3600)), nil case timePartTimezoneMinute: _, zoneOffset := t.Zone() return FromInt(int64((zoneOffset % 3600) / 60)), nil default: // This does not happen return nil, errNotImplemented } }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sun Jan 02 17:15:06 UTC 2022 - 4.8K bytes - Viewed (0) -
cni/pkg/iptables/iptables.go
"-m", "udp", "--dport", "53", "-j", "CT", "--zone", "1", ) // Upstream --> Proxy return packets iptablesBuilder.AppendRule( iptableslog.UndefinedCommand, ChainInpodPrerouting, iptablesconstants.RAW, "-p", "udp", "-m", "mark", "!", "--mark", inpodMark, "-m", "udp", "--sport", "53", "-j", "CT", "--zone", "1", ) }
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Tue Oct 15 15:39:28 UTC 2024 - 23.3K bytes - Viewed (0) -
istioctl/pkg/writer/ztunnel/configdump/api.go
// See the License for the specific language governing permissions and // limitations under the License. package configdump type Locality struct { Region string `json:"region,omitempty"` Zone string `json:"zone,omitempty"` Subzone string `json:"subzone,omitempty"` } type ZtunnelWorkload struct { UID string `json:"uid"` WorkloadIPs []string `json:"workloadIps"`
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Tue Jul 30 17:26:39 UTC 2024 - 6.1K bytes - Viewed (0) -
internal/handlers/forwarder.go
*outReq = *quietReq } } // headerRewriter is responsible for removing hop-by-hop headers and setting forwarding headers type headerRewriter struct{} // Clean up IP in case if it is ipv6 address and it has {zone} information in it, like // "[fe80::d806:a55d:eb1b:49cc%vEthernet (vmxnet3 Ethernet Adapter - Virtual Switch)]:64692" func ipv6fix(clientIP string) string { return strings.Split(clientIP, "%")[0] }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Apr 07 05:42:10 UTC 2023 - 5.6K bytes - Viewed (0) -
cmd/testdata/xl-meta-merge.zip
enabled (CentOS), you can use `firewall-cmd` command to allow traffic to specific ports. Use below commands to allow access to port 9000 ```sh firewall-cmd --get-active-zones ``` This command gets the active zone(s). Now, apply port rules to the relevant zones returned above. For example if the zone is `public`, use ```sh firewall-cmd --zone=public --add-port=9000/tcp --permanent ``` Note that `permanent` makes sure the rules are persistent across firewall start, restart or reload. Finally reload the firewall...
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Mar 08 17:50:48 UTC 2024 - 30.2K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.14.md
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Mon Jun 14 22:06:39 UTC 2021 - 271.5K bytes - Viewed (0)