Skip to content

Conversation

@sg00dwin
Copy link

No description provided.

@sg00dwin
Copy link
Author

@benjaminapetersen ^^

benjaminapetersen pushed a commit that referenced this pull request Aug 25, 2015
Structure pod container logs into table view
@benjaminapetersen benjaminapetersen merged commit 8ba5fb3 into benjaminapetersen:bpeterse/console-logs Aug 25, 2015
@sg00dwin sg00dwin deleted the console-logs branch August 25, 2015 19:24
@sg00dwin sg00dwin restored the console-logs branch September 1, 2015 15:35
@sg00dwin sg00dwin deleted the console-logs branch October 23, 2015 17:00
benjaminapetersen pushed a commit that referenced this pull request Jul 8, 2016
Docker-only containers (eg, "docker run foobar") get attached to lbr0, and
their traffic flows from lbr0 -> vlinuxbr -> vovsbr -> br0.  To ensure that
docker-only containers can access the rest of the world through tun0, we
need to pass their traffic along instead of dropping it in table #3:

 cookie=0x0, duration=12307.238s, table=0, n_packets=292, n_bytes=23330, actions=learn(table=7,hard_timeout=900,priority=200,NXM_OF_ETH_DST[]=NXM_OF_ETH_SRC[],load:NXM_NX_TUN_IPV4_SRC[]->NXM_NX_TUN_IPV4_DST[],output:NXM_OF_IN_PORT[]),goto_table:1
 cookie=0x0, duration=12307.227s, table=1, n_packets=165, n_bytes=13199, actions=goto_table:3
 <drop due to no match>

Add a rule allowing traffic from vovsbr to jump from table #3 to table #4,
where it will get directed to the right place (either other pods or tun0).
benjaminapetersen pushed a commit that referenced this pull request Jun 19, 2017
Refactor controller initialization (round #3)
benjaminapetersen pushed a commit that referenced this pull request Oct 25, 2017
Suppress Strict-Transport-Security header for http requests
It is only emitted for https.

bug 1501133
https://bugzilla.redhat.com/show_bug.cgi?id=1501133
see comment #3
benjaminapetersen pushed a commit that referenced this pull request Oct 25, 2017
Automatic merge from submit-queue (batch tested with PRs 16888, 16911, 16913, 16904).

Router - hsts for "edge" or "reencrypt" only

Suppress Strict-Transport-Security header for http requests
It is only emitted for https.

bug 1501133
https://bugzilla.redhat.com/show_bug.cgi?id=1501133
see comment #3
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants