Skip to content

Commit 2b7a0fb

Browse files
committed
Use hyphen in image path
1 parent f1e5bc8 commit 2b7a0fb

File tree

148 files changed

+136
-136
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

148 files changed

+136
-136
lines changed

content/posts/2022-12-12-3d_topology.md

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -15,13 +15,13 @@ Red Hat OpenShift Container Platform (OCP) has had monitoring capabilities from
1515
Network Observability brings user interfaces in OpenShift web console administration to filter and visualize your cluster network flows as:
1616

1717
- Graph (top 5 flow rates stacked with total example)
18-
![Graph example]({page.image('3d_topology/graph.png')})
18+
![Graph example]({page.image('3d-topology/graph.png')})
1919

2020
- Table (showing sources and destinations sorted by time)
21-
![Table example]({page.image('3d_topology/table.png')})
21+
![Table example]({page.image('3d-topology/table.png')})
2222

2323
- Topology (using directed graph layout)
24-
![Topology example]({page.image('3d_topology/topology.png')})
24+
![Topology example]({page.image('3d-topology/topology.png')})
2525

2626
If you are interested in Network Observability for your cluster, check [official documentation for installation](https://docs.openshift.com/container-platform/4.12/networking/network_observability/installing-operators.html).
2727

@@ -47,23 +47,23 @@ To arrange components by their ownership
4747

4848
What happens in your network when you deploy a [httpd sample application](https://github.com/sclorg/httpd-ex) ?
4949

50-
![Sample app deployment]({page.image('3d_topology/sample-app-deployment.png')})
50+
![Sample app deployment]({page.image('3d-topology/sample-app-deployment.png')})
5151

5252
You can see that the final deployed pod in blue involved another pod called `httpd-sample-1-build` that pulled the image from `openshift-image-registry` (1), did some DNS resolution for provided image URL (2), pulled it from the resolved external IP (3) before creating our pod through kubernetes services (4).
5353

5454
Finally, some flows are showing between our pod and `openshift-ingress` after opening the hosted page (5).
5555

5656
After moving my time window or waiting a bit, the `httpd-sample-1-build` pod disappears as it's status is now `Completed`.
5757

58-
![Sample app deployed]({page.image('3d_topology/sample-app-deployed.png')})
58+
![Sample app deployed]({page.image('3d-topology/sample-app-deployed.png')})
5959

6060
## Complex representations
6161

6262
Sometimes we need to see more than a single application to troubleshoot network issues or to highlight bandwidth usage at cluster level.
6363

6464
2D network topology may start to show its limits as you need to switch between multiple options and never get an overview into a single render.
6565

66-
![Complex 2D topology]({page.image('3d_topology/huge-topology.png')})
66+
![Complex 2D topology]({page.image('3d-topology/huge-topology.png')})
6767

6868
We can do the following observation from this:
6969
- it is almost impossible to have a good overview of your entire network
@@ -83,7 +83,7 @@ Then go to Topology tab -> Show advanced options -> Display options
8383
From there set Scope option as "Resource" and Layout as "3D".
8484
```
8585

86-
![3D topology building]({page.image('3d_topology/3d-building.png')})
86+
![3D topology building]({page.image('3d-topology/3d-building.png')})
8787

8888
- **Building** drawn by dotted lines represent your `Cluster`
8989
Every internal communication is inside these lines
@@ -100,11 +100,11 @@ They will repeat on each node + namespace combination if the load is distributed
100100
- Finally, **rooms contents** depict `Pods`
101101
These are represented in the proper node + namespace + owner combination according to its kindred
102102

103-
![3D topology ownership]({page.image('3d_topology/3d-ownership.png')})
103+
![3D topology ownership]({page.image('3d-topology/3d-ownership.png')})
104104
This representation emphasizes the entire ownership chain from `Node` to `Pod` passing by `Namespace`.
105105
It also pin up how your load is balanced between nodes.
106106

107-
![3D topology connections]({page.image('3d_topology/3d-connection.png')})
107+
![3D topology connections]({page.image('3d-topology/3d-connection.png')})
108108

109109
The important part of your network traffic is highlighted since lines are less likely to cross than in the 2D view and their size and color differ according to bytes rate.
110110
A thin black line will represent a smaller amount than a heavy red line.
@@ -120,11 +120,11 @@ Feel free to contribute by commenting this post, opening issues in [netobserv co
120120

121121
Tell us more about your expectations, the way you currently solve issues and what could help your daily experience.
122122

123-
![Gallery 1]({page.image('3d_topology/gallery-1.png')})
124-
![Gallery 2]({page.image('3d_topology/gallery-2.png')})
125-
![Gallery 3]({page.image('3d_topology/gallery-3.png')})
126-
![Gallery 4]({page.image('3d_topology/gallery-4.png')})
127-
![Gallery 5]({page.image('3d_topology/gallery-5.png')})
128-
![Gallery 6]({page.image('3d_topology/gallery-6.png')})
129-
![Gallery 7]({page.image('3d_topology/gallery-7.png')})
130-
![Gallery 8]({page.image('3d_topology/gallery-8.png')})
123+
![Gallery 1]({page.image('3d-topology/gallery-1.png')})
124+
![Gallery 2]({page.image('3d-topology/gallery-2.png')})
125+
![Gallery 3]({page.image('3d-topology/gallery-3.png')})
126+
![Gallery 4]({page.image('3d-topology/gallery-4.png')})
127+
![Gallery 5]({page.image('3d-topology/gallery-5.png')})
128+
![Gallery 6]({page.image('3d-topology/gallery-6.png')})
129+
![Gallery 7]({page.image('3d-topology/gallery-7.png')})
130+
![Gallery 8]({page.image('3d-topology/gallery-8.png')})

content/posts/2023-09-12-dns_tracking.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ author: jpinsonneau
99

1010
# Network Observability Per Flow DNS tracking
1111

12-
![logo]({page.image('dns_tracking/dns_tracking_logo.png')})
12+
![logo]({page.image('dns-tracking/dns-tracking-logo.png')})
1313

1414
By: Julien Pinsonneau, Mehul Modi and Mohamed S. Mahmoud
1515

@@ -95,46 +95,46 @@ Open your OCP Console and move to `Administrator view` -> `Observe` ->
9595
Three new filters, `DNS Id`, `DNS Latency` and `DNS Response Code` will be
9696
available in the common section:
9797

98-
![dns filters]({page.image('dns_tracking/dns_filters.png')})
98+
![dns filters]({page.image('dns-tracking/dns-filters.png')})
9999

100100
The first one will allow you to filter on a specific DNS Id (found using `dig`
101101
command or in flow table details) to correlate with your query.
102102

103-
![dns id]({page.image('dns_tracking/dns_id.png')})
103+
![dns id]({page.image('dns-tracking/dns-id.png')})
104104

105105
The second one helps to identify potential performance issues by looking at DNS
106106
resolution latency.
107107

108-
![dns latency more than]({page.image('dns_tracking/dns_latency_more_than.png')})
108+
![dns latency more than]({page.image('dns-tracking/dns-latency-more-than.png')})
109109

110110
The third filter surfaces DNS response codes, which can help detect errors or
111111
unauthorized resolutions.
112112

113-
![dns rcode]({page.image('dns_tracking/dns_response_code.png')})
113+
![dns rcode]({page.image('dns-tracking/dns-response-code.png')})
114114

115115
### Overview
116116

117117
New graphs are introduced in the `advanced options` -> `Manage panels` popup:
118118

119-
![advanced options 1]({page.image('dns_tracking/advanced_options1.png')})
119+
![advanced options 1]({page.image('dns-tracking/advanced-options1.png')})
120120

121121
- Top X average DNS latencies
122122
- Top X DNS response code
123123
- Top X DNS response code stacked with total
124124

125-
![dns graphs 1]({page.image('dns_tracking/dns_graphs1.png')})
126-
![dns graphs 2]({page.image('dns_tracking/dns_graphs2.png')})
125+
![dns graphs 1]({page.image('dns-tracking/dns-graphs1.png')})
126+
![dns graphs 2]({page.image('dns-tracking/dns-graphs2.png')})
127127

128128
### Traffic flows
129129

130130
The table view adds the new DNS columns `Id`, `Latency` and `Response code`,
131131
which are available from the `advanced options` -> `manage columns` popup.
132132

133-
![advanced options 2]({page.image('dns_tracking/advanced_options2.png')})
133+
![advanced options 2]({page.image('dns-tracking/advanced-options2.png')})
134134

135135
The DNS flows display this information in both the table and the side panel:
136136

137-
![dns table]({page.image('dns_tracking/dns_table.png')})
137+
![dns table]({page.image('dns-tracking/dns-table.png')})
138138

139139
## Future support
140140

content/posts/2023-09-12-packet_drops.md

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ author: Amoghrd
88

99
# Network Observability Real-Time Per Flow Packets Drop
1010

11-
![logo]({page.image('packet_drops/packets_drop_logo.png')})
11+
![logo]({page.image('packet-drops/packets-drop-logo.png')})
1212

1313
By: Amogh RD, Julien Pinsonneau and Mohamed S. Mahmoud
1414

@@ -82,7 +82,7 @@ Open your OCP Console and move to
8282

8383
Now, a new query option is available to filter flows by their drop status:
8484

85-
![drop filter query option]({page.image('packet_drops/drop_filter_query_option.png')})
85+
![drop filter query option]({page.image('packet-drops/drop-filter-query-option.png')})
8686

8787
- `Fully dropped` shows the flows that have 100% dropped packets
8888
- `Containing drops` shows the flows having at least one packet dropped
@@ -92,18 +92,18 @@ Now, a new query option is available to filter flows by their drop status:
9292
Two new filters, `Packet drop TCP state` and `Packet drop latest cause` are available
9393
in the common section:
9494

95-
![drop state & cause filters]({page.image('packet_drops/drop_state_cause_filters.png')})
95+
![drop state & cause filters]({page.image('packet-drops/drop-state-cause-filters.png')})
9696

9797
The first one will allow you to set the TCP state filter:
9898

99-
![state filter]({page.image('packet_drops/state_filter.png')})
99+
![state filter]({page.image('packet-drops/state-filter.png')})
100100

101101
- A _LINUX_TCP_STATES_H number like 1, 2, 3
102102
- A _LINUX_TCP_STATES_H TCP name like `ESTABLISHED`, `SYN_SENT`, `SYN_RECV`
103103

104104
The second one will let you pick causes to filter on:
105105

106-
![cause filter]({page.image('packet_drops/cause_filter.png')})
106+
![cause filter]({page.image('packet-drops/cause-filter.png')})
107107

108108
- A _LINUX_DROPREASON_CORE_H number like 2, 3, 4
109109
- A _LINUX_DROPREASON_CORE_H SKB_DROP_REASON name like
@@ -113,7 +113,7 @@ The second one will let you pick causes to filter on:
113113

114114
New graphs are introduced in the `advanced options` -> `manage panels` popup:
115115

116-
![advanced options]({page.image('packet_drops/advanced_options.png')})
116+
![advanced options]({page.image('packet-drops/advanced-options.png')})
117117

118118
- Top X flow dropped rates stacked
119119
- Total dropped rate
@@ -123,28 +123,28 @@ New graphs are introduced in the `advanced options` -> `manage panels` popup:
123123

124124
Select the desired graphs to render them in the overview panel:
125125

126-
![drop graphs 1]({page.image('packet_drops/drop_graphs1.png')})
127-
![drop graphs 2]({page.image('packet_drops/drop_graphs2.png')})
128-
![drop graphs 3]({page.image('packet_drops/drop_graphs3.png')})
126+
![drop graphs 1]({page.image('packet-drops/drop-graphs1.png')})
127+
![drop graphs 2]({page.image('packet-drops/drop-graphs2.png')})
128+
![drop graphs 3]({page.image('packet-drops/drop-graphs3.png')})
129129

130130
Note that you can compare the top drops against total dropped or total traffic
131131
in the last graph using the kebab menu
132-
![drop graph option]({page.image('packet_drops/drop_graph_options.png')})
132+
![drop graph option]({page.image('packet-drops/drop-graph-options.png')})
133133

134134
### Traffic flows
135135

136136
The table view shows the number of `bytes` and `packets` sent in green and the
137137
related numbers dropped in red. Additionally, you can get details about the
138138
drop in the side panel that brings you to the proper documentation.
139139

140-
![drop table]({page.image('packet_drops/drop_table.png')})
140+
![drop table]({page.image('packet-drops/drop-table.png')})
141141

142142
### Topology
143143

144144
Last but not least, the topology view displays edges containing drops in red.
145145
That's useful especially when digging on a specific drop reason between two resources.
146146

147-
![drop topology]({page.image('packet_drops/drop_topology.png')})
147+
![drop topology]({page.image('packet-drops/drop-topology.png')})
148148

149149
## Potential use-case scenarios
150150

@@ -158,20 +158,20 @@ while : ; do curl <another nodeIP>:<unknown port>; sleep 5; done
158158

159159
The drops can be observed on the console as seen below:
160160

161-
![NO_SOCKET drop table]({page.image('packet_drops/NO_SOCKET_table.png')})
161+
![NO_SOCKET drop table]({page.image('packet-drops/NO-SOCKET-table.png')})
162162

163-
![NO_SOCKET drop overview]({page.image('packet_drops/NO_SOCKET_overview.png')})
163+
![NO_SOCKET drop overview]({page.image('packet-drops/NO-SOCKET-overview.png')})
164164

165165
- `OVS_DROP_LAST_ACTION` drop reason: OVS packet drops can be observed on
166166
RHEL9.2 and above. It can be emulated by running the iperf command with
167167
network-policy set to drop on a particular port.
168168
These drops can be observed on the console as seen below:
169169

170-
![OVS drop table]({page.image('packet_drops/OVS_table.png')})
170+
![OVS drop table]({page.image('packet-drops/OVS-table.png')})
171171

172-
![OVS drop topology]({page.image('packet_drops/OVS_topology.png')})
172+
![OVS drop topology]({page.image('packet-drops/OVS-topology.png')})
173173

174-
![OVS drop overview]({page.image('packet_drops/OVS_overview.png')})
174+
![OVS drop overview]({page.image('packet-drops/OVS-overview.png')})
175175

176176
## Resource impact of using PacketDrop
177177

content/posts/2023-10-02-secondary_interface.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ troubleshooting network issues in a Kubernetes cluster.
1717
## Overview of how you can achieve network observability for secondary interface
1818

1919
<p align="center">
20-
<img src="{page.image('secondary_interface/sriov.png')}" alt="logo" width="75%"/>
20+
<img src="{page.image('secondary-interface/sriov.png')}" alt="logo" width="75%"/>
2121
</p>
2222

2323
1. **Multus CNI Plugin**: Multus is a CNI (Container Network Interface) plugin
@@ -151,7 +151,7 @@ By opening the console plugin and looking in the Traffic Flows table and filter
151151
`Network interface name == net1` like the following for TCP flow
152152
packets as an example
153153

154-
<img src="{page.image('secondary_interface/sriov_flow.png')}" alt="logo" width="300%"/>
154+
<img src="{page.image('secondary-interface/sriov-flow.png')}" alt="logo" width="300%"/>
155155

156156
## Feedback
157157

0 commit comments

Comments
 (0)