@@ -26,12 +26,12 @@ import (
2626
2727// Network policy controller provides both ingress and egress filtering for the pods as per the defined network
2828// policies. Two different types of iptables chains are used. Each pod running on the node which either
29- // requires ingress or egress filtering gets a pod specific chian . Each network policy has a iptable chain, which
30- // has rules expreessed through ipsets matching source and destination pod ip's. In the FORWARD chain of the
29+ // requires ingress or egress filtering gets a pod specific chains . Each network policy has a iptable chain, which
30+ // has rules expressed through ipsets matching source and destination pod ip's. In the FORWARD chain of the
3131// filter table a rule is added to jump the traffic originating (in case of egress network policy) from the pod
32- // or destined (in case of ingress network policy) to the pod to the pod specific iptable chain. Each
33- // pod specifc iptable chain has rules to jump to the network polices chains, that pod matches. So packet
34- // originating/destined from/to pod goes throuh fitler table's, FORWARD chain, followed by pod specific chain,
32+ // or destined (in case of ingress network policy) to the pod specific iptable chain. Each
33+ // pod specific iptable chain has rules to jump to the network polices chains, that pod matches. So packet
34+ // originating/destined from/to pod goes through fitler table's, FORWARD chain, followed by pod specific chain,
3535// followed by one or more network policy chains, till there is a match which will accept the packet, or gets
3636// dropped by the rule in the pod chain, if there is no match.
3737
0 commit comments