44[id="network-observability-netobserv-cli-reference_{context}"]
55= Network Observability CLI usage
66
7- You can use the Network Observability CLI (`oc netobserv`) to pass command line arguments to capture flows data and packets data for further analysis, enable Network Observability Operator features or pass configuration options to the eBPF agent and `flowlogs-pipeline` .
7+ You can use the Network Observability CLI (`oc netobserv`) to pass command line arguments to capture flows data, packets data, and metrics for further analysis and enable features supported by the Network Observability Operator .
88
99[id="cli-syntax_{context}"]
1010== Syntax
@@ -62,45 +62,45 @@ $ oc netobserv flows [<feature_option>] [<command_options>]
6262|--enable_pkt_drop| enable packet drop | false
6363|--enable_rtt| enable RTT tracking | false
6464|--enable_udn_mapping| enable User Defined Network mapping | false
65- |--get-subnets| get subnets informations | false
65+ |--get-subnets| get subnets information | false
6666|--background| run in background | false
6767|--copy| copy the output files locally | prompt
6868|--log-level| components logs | info
6969|--max-time| maximum capture time | 5m
7070|--max-bytes| maximum capture bytes | 50000000 = 50MB
7171|--action| filter action | Accept
7272|--cidr| filter CIDR | 0.0.0.0/0
73- |--direction| filter direction | n/a
74- |--dport| filter destination port | n/a
75- |--dport_range| filter destination port range | n/a
76- |--dports| filter on either of two destination ports | n/a
73+ |--direction| filter direction | -
74+ |--dport| filter destination port | -
75+ |--dport_range| filter destination port range | -
76+ |--dports| filter on either of two destination ports | -
7777|--drops| filter flows with only dropped packets | false
78- |--icmp_code| filter ICMP code | n/a
79- |--icmp_type| filter ICMP type | n/a
80- |--node-selector| capture on specific nodes | n/a
81- |--peer_ip| filter peer IP | n/a
82- |--peer_cidr| filter peer CIDR | n/a
83- |--port_range| filter port range | n/a
84- |--port| filter port | n/a
85- |--ports| filter on either of two ports | n/a
86- |--protocol| filter protocol | n/a
87- |--regexes| filter flows using regular expression | n/a
88- |--sport_range| filter source port range | n/a
89- |--sport| filter source port | n/a
90- |--sports| filter on either of two source ports | n/a
91- |--tcp_flags| filter TCP flags | n/a
92- |--interfaces| interfaces to monitor | n/a
78+ |--icmp_code| filter ICMP code | -
79+ |--icmp_type| filter ICMP type | -
80+ |--node-selector| capture on specific nodes | -
81+ |--peer_ip| filter peer IP | -
82+ |--peer_cidr| filter peer CIDR | -
83+ |--port_range| filter port range | -
84+ |--port| filter port | -
85+ |--ports| filter on either of two ports | -
86+ |--protocol| filter protocol | -
87+ |--regexes| filter flows using regular expression | -
88+ |--sport_range| filter source port range | -
89+ |--sport| filter source port | -
90+ |--sports| filter on either of two source ports | -
91+ |--tcp_flags| filter TCP flags | -
92+ |--interfaces| interfaces to monitor | -
9393|===
9494
9595.Example running flows capture on TCP protocol and port 49051 with PacketDrop and RTT features enabled:
9696[source,terminal]
9797----
98- $ oc netobserv flows --enable_pkt_drop=true --enable_rtt=true --enable_filter=true --action=Accept --cidr=0.0.0.0/0 --protocol=TCP --port=49051
98+ $ oc netobserv flows --enable_pkt_drop --enable_rtt --enable_filter --action=Accept --cidr=0.0.0.0/0 --protocol=TCP --port=49051
9999----
100100[id="cli-reference-packet-capture-options_{context}"]
101101== Packets capture options
102- You can filter packets capture data as same as flows capture using the filters.
103- Note that the features, such as packets drop, DNS, RTT, and network events, are only available for flows and metrics capture.
102+ You can filter packets capture data the as same as flows capture by using the filters.
103+ Certain features, such as packets drop, DNS, RTT, and network events, are only available for flows and metrics capture.
104104
105105.`oc netobserv packets` syntax
106106[source,terminal]
@@ -117,25 +117,25 @@ $ oc netobserv packets [<option>]
117117|--max-bytes| maximum capture bytes | 50000000 = 50MB
118118|--action| filter action | Accept
119119|--cidr| filter CIDR | 0.0.0.0/0
120- |--direction| filter direction | n/a
121- |--dport| filter destination port | n/a
122- |--dport_range| filter destination port range | n/a
123- |--dports| filter on either of two destination ports | n/a
120+ |--direction| filter direction | -
121+ |--dport| filter destination port | -
122+ |--dport_range| filter destination port range | -
123+ |--dports| filter on either of two destination ports | -
124124|--drops| filter flows with only dropped packets | false
125- |--icmp_code| filter ICMP code | n/a
126- |--icmp_type| filter ICMP type | n/a
127- |--node-selector| capture on specific nodes | n/a
128- |--peer_ip| filter peer IP | n/a
129- |--peer_cidr| filter peer CIDR | n/a
130- |--port_range| filter port range | n/a
131- |--port| filter port | n/a
132- |--ports| filter on either of two ports | n/a
133- |--protocol| filter protocol | n/a
134- |--regexes| filter flows using regular expression | n/a
135- |--sport_range| filter source port range | n/a
136- |--sport| filter source port | n/a
137- |--sports| filter on either of two source ports | n/a
138- |--tcp_flags| filter TCP flags | n/a
125+ |--icmp_code| filter ICMP code | -
126+ |--icmp_type| filter ICMP type | -
127+ |--node-selector| capture on specific nodes | -
128+ |--peer_ip| filter peer IP | -
129+ |--peer_cidr| filter peer CIDR | -
130+ |--port_range| filter port range | -
131+ |--port| filter port | -
132+ |--ports| filter on either of two ports | -
133+ |--protocol| filter protocol | -
134+ |--regexes| filter flows using regular expression | -
135+ |--sport_range| filter source port range | -
136+ |--sport| filter source port | -
137+ |--sports| filter on either of two source ports | -
138+ |--tcp_flags| filter TCP flags | -
139139|===
140140
141141.Example running packets capture on TCP protocol and port 49051:
@@ -162,33 +162,33 @@ $ oc netobserv metrics [<option>]
162162|--enable_pkt_drop| enable packet drop | false
163163|--enable_rtt| enable RTT tracking | false
164164|--enable_udn_mapping| enable User Defined Network mapping | false
165- |--get-subnets| get subnets informations | false
165+ |--get-subnets| get subnets information | false
166166|--action| filter action | Accept
167167|--cidr| filter CIDR | 0.0.0.0/0
168- |--direction| filter direction | n/a
169- |--dport| filter destination port | n/a
170- |--dport_range| filter destination port range | n/a
171- |--dports| filter on either of two destination ports | n/a
168+ |--direction| filter direction | -
169+ |--dport| filter destination port | -
170+ |--dport_range| filter destination port range | -
171+ |--dports| filter on either of two destination ports | -
172172|--drops| filter flows with only dropped packets | false
173- |--icmp_code| filter ICMP code | n/a
174- |--icmp_type| filter ICMP type | n/a
175- |--node-selector| capture on specific nodes | n/a
176- |--peer_ip| filter peer IP | n/a
177- |--peer_cidr| filter peer CIDR | n/a
178- |--port_range| filter port range | n/a
179- |--port| filter port | n/a
180- |--ports| filter on either of two ports | n/a
181- |--protocol| filter protocol | n/a
182- |--regexes| filter flows using regular expression | n/a
183- |--sport_range| filter source port range | n/a
184- |--sport| filter source port | n/a
185- |--sports| filter on either of two source ports | n/a
186- |--tcp_flags| filter TCP flags | n/a
187- |--interfaces| interfaces to monitor | n/a
173+ |--icmp_code| filter ICMP code | -
174+ |--icmp_type| filter ICMP type | -
175+ |--node-selector| capture on specific nodes | -
176+ |--peer_ip| filter peer IP | -
177+ |--peer_cidr| filter peer CIDR | -
178+ |--port_range| filter port range | -
179+ |--port| filter port | -
180+ |--ports| filter on either of two ports | -
181+ |--protocol| filter protocol | -
182+ |--regexes| filter flows using regular expression | -
183+ |--sport_range| filter source port range | -
184+ |--sport| filter source port | -
185+ |--sports| filter on either of two source ports | -
186+ |--tcp_flags| filter TCP flags | -
187+ |--interfaces| interfaces to monitor | -
188188|===
189189
190- .Example running metrics capture for TCP drops:
190+ .Example running metrics capture for TCP drops
191191[source,terminal]
192192----
193- $ oc netobserv metrics --enable_pkt_drop=true --enable_filter=true --protocol=TCP
193+ $ oc netobserv metrics --enable_pkt_drop --enable_filter --protocol=TCP
194194----
0 commit comments