Skip to content

Commit fd14538

Browse files
authored
Regenerate docs (#2020)
1 parent aee8a07 commit fd14538

File tree

9 files changed

+186
-59
lines changed

9 files changed

+186
-59
lines changed

api/flowcollector/v1beta2/flowcollector_types.go

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -363,10 +363,8 @@ type FlowCollectorEBPF struct {
363363
// `logLevel` defines the log level for the NetObserv eBPF Agent
364364
LogLevel string `json:"logLevel,omitempty"`
365365

366-
// Privileged mode for the eBPF Agent container. When ignored or set to `false`, the operator sets
367-
// granular capabilities (BPF, PERFMON, NET_ADMIN) to the container.
368-
// If for some reason these capabilities cannot be set, such as if an old kernel version not knowing CAP_BPF
369-
// is in use, then you can turn on this mode for more global privileges.
366+
// Privileged mode for the eBPF Agent container. When set to `true`, the agent is able to capture more traffic, including from secondary interfaces.
367+
// When ignored or set to `false`, the operator sets granular capabilities (BPF, PERFMON, NET_ADMIN) to the container.
370368
// Some agent features require the privileged mode, such as packet drops tracking (see `features`) and SR-IOV support.
371369
// +optional
372370
Privileged bool `json:"privileged,omitempty"`

bundle/manifests/flows.netobserv.io_flowcollectors.yaml

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1556,10 +1556,8 @@ spec:
15561556
type: object
15571557
privileged:
15581558
description: |-
1559-
Privileged mode for the eBPF Agent container. When ignored or set to `false`, the operator sets
1560-
granular capabilities (BPF, PERFMON, NET_ADMIN) to the container.
1561-
If for some reason these capabilities cannot be set, such as if an old kernel version not knowing CAP_BPF
1562-
is in use, then you can turn on this mode for more global privileges.
1559+
Privileged mode for the eBPF Agent container. When set to `true`, the agent is able to capture more traffic, including from secondary interfaces.
1560+
When ignored or set to `false`, the operator sets granular capabilities (BPF, PERFMON, NET_ADMIN) to the container.
15631561
Some agent features require the privileged mode, such as packet drops tracking (see `features`) and SR-IOV support.
15641562
type: boolean
15651563
resources:

config/crd/bases/flows.netobserv.io_flowcollectors.yaml

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1434,10 +1434,8 @@ spec:
14341434
type: object
14351435
privileged:
14361436
description: |-
1437-
Privileged mode for the eBPF Agent container. When ignored or set to `false`, the operator sets
1438-
granular capabilities (BPF, PERFMON, NET_ADMIN) to the container.
1439-
If for some reason these capabilities cannot be set, such as if an old kernel version not knowing CAP_BPF
1440-
is in use, then you can turn on this mode for more global privileges.
1437+
Privileged mode for the eBPF Agent container. When set to `true`, the agent is able to capture more traffic, including from secondary interfaces.
1438+
When ignored or set to `false`, the operator sets granular capabilities (BPF, PERFMON, NET_ADMIN) to the container.
14411439
Some agent features require the privileged mode, such as packet drops tracking (see `features`) and SR-IOV support.
14421440
type: boolean
14431441
resources:

docs/FlowCollector.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -363,10 +363,8 @@ Otherwise it is matched as a case-sensitive string.<br/>
363363
<td><b>privileged</b></td>
364364
<td>boolean</td>
365365
<td>
366-
Privileged mode for the eBPF Agent container. When ignored or set to `false`, the operator sets
367-
granular capabilities (BPF, PERFMON, NET_ADMIN) to the container.
368-
If for some reason these capabilities cannot be set, such as if an old kernel version not knowing CAP_BPF
369-
is in use, then you can turn on this mode for more global privileges.
366+
Privileged mode for the eBPF Agent container. When set to `true`, the agent is able to capture more traffic, including from secondary interfaces.
367+
When ignored or set to `false`, the operator sets granular capabilities (BPF, PERFMON, NET_ADMIN) to the container.
370368
Some agent features require the privileged mode, such as packet drops tracking (see `features`) and SR-IOV support.<br/>
371369
</td>
372370
<td>false</td>

docs/flowcollector-flows-netobserv-io-v1beta2.adoc

Lines changed: 161 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -118,7 +118,7 @@ Kafka can provide better scalability, resiliency, and high availability (for mor
118118
119119
| `networkPolicy`
120120
| `object`
121-
| `networkPolicy` defines ingress network policy settings for Network Observability components isolation.
121+
| `networkPolicy` defines network policy settings for Network Observability components isolation.
122122
123123
| `processor`
124124
| `object`
@@ -206,15 +206,14 @@ Otherwise it is matched as a case-sensitive string.
206206
| List of additional features to enable. They are all disabled by default. Enabling additional features might have performance impacts. Possible values are: +
207207

208208
- `PacketDrop`: Enable the packets drop flows logging feature. This feature requires mounting
209-
the kernel debug filesystem, so the eBPF agent pods must run as privileged.
210-
If the `spec.agent.ebpf.privileged` parameter is not set, an error is reported. +
209+
the kernel debug filesystem, so the eBPF agent pods must run as privileged via `spec.agent.ebpf.privileged`. +
211210
212211
- `DNSTracking`: Enable the DNS tracking feature. +
213212
214213
- `FlowRTT`: Enable flow latency (sRTT) extraction in the eBPF agent from TCP traffic. +
215214
216215
- `NetworkEvents`: Enable the network events monitoring feature, such as correlating flows and network policies.
217-
This feature requires mounting the kernel debug filesystem, so the eBPF agent pods must run as privileged.
216+
This feature requires mounting the kernel debug filesystem, so the eBPF agent pods must run as privileged via `spec.agent.ebpf.privileged`.
218217
It requires using the OVN-Kubernetes network plugin with the Observability feature.
219218
IMPORTANT: This feature is available as a Technology Preview. +
220219
@@ -224,7 +223,7 @@ IMPORTANT: This feature is available as a Technology Preview. +
224223
225224
- `UDNMapping`: Enable interfaces mapping to User Defined Networks (UDN). +
226225
227-
This feature requires mounting the kernel debug filesystem, so the eBPF agent pods must run as privileged.
226+
This feature requires mounting the kernel debug filesystem, so the eBPF agent pods must run as privileged via `spec.agent.ebpf.privileged`.
228227
It requires using the OVN-Kubernetes network plugin with the Observability feature. +
229228
230229
- `IPSec`, to track flows between nodes with IPsec encryption. +
@@ -259,10 +258,8 @@ Otherwise it is matched as a case-sensitive string.
259258
260259
| `privileged`
261260
| `boolean`
262-
| Privileged mode for the eBPF Agent container. When ignored or set to `false`, the operator sets
263-
granular capabilities (BPF, PERFMON, NET_ADMIN) to the container.
264-
If for some reason these capabilities cannot be set, such as if an old kernel version not knowing CAP_BPF
265-
is in use, then you can turn on this mode for more global privileges.
261+
| Privileged mode for the eBPF Agent container. When set to `true`, the agent is able to capture more traffic, including from secondary interfaces.
262+
When ignored or set to `false`, the operator sets granular capabilities (BPF, PERFMON, NET_ADMIN) to the container.
266263
Some agent features require the privileged mode, such as packet drops tracking (see `features`) and SR-IOV support.
267264
268265
| `resources`
@@ -272,7 +269,7 @@ For more information, see https://kubernetes.io/docs/concepts/configuration/mana
272269
273270
| `sampling`
274271
| `integer`
275-
| Sampling ratio of the eBPF probe. 100 means one packet on 100 is sent. 0 or 1 means all packets are sampled.
272+
| Sampling interval of the eBPF probe. 100 means one packet on 100 is sent. 0 or 1 means all packets are sampled.
276273
277274
|===
278275
== .spec.agent.ebpf.advanced
@@ -457,7 +454,7 @@ To change the default, you can define a rule that accepts everything: `{ action:
457454
458455
| `sampling`
459456
| `integer`
460-
| `sampling` is the sampling ratio for the matched packets, overriding the global sampling defined at `spec.agent.ebpf.sampling`.
457+
| `sampling` is the sampling interval for the matched packets, overriding the global sampling defined at `spec.agent.ebpf.sampling`.
461458
462459
| `sourcePorts`
463460
| `integer-or-string`
@@ -559,7 +556,7 @@ To filter two ports, use a "port1,port2" in string format. For example, `ports:
559556
560557
| `sampling`
561558
| `integer`
562-
| `sampling` is the sampling ratio for the matched packets, overriding the global sampling defined at `spec.agent.ebpf.sampling`.
559+
| `sampling` is the sampling interval for the matched packets, overriding the global sampling defined at `spec.agent.ebpf.sampling`.
563560
564561
| `sourcePorts`
565562
| `integer-or-string`
@@ -2015,6 +2012,10 @@ Type::
20152012
|===
20162013
| Property | Type | Description
20172014

2015+
| `excludeLabels`
2016+
| `array (string)`
2017+
| `excludeLabels` is a list of fields to be excluded from the list of Loki labels. [Unsupported (*)].
2018+
20182019
| `staticLabels`
20192020
| `object (string)`
20202021
| `staticLabels` is a map of common labels to set on each flow in Loki storage.
@@ -2650,7 +2651,7 @@ If the namespace is different, the config map or the secret is copied so that it
26502651
Description::
26512652
+
26522653
--
2653-
`networkPolicy` defines ingress network policy settings for Network Observability components isolation.
2654+
`networkPolicy` defines network policy settings for Network Observability components isolation.
26542655
--
26552656

26562657
Type::
@@ -2673,7 +2674,7 @@ configuration, you can disable it and install your own instead.
26732674
| `boolean`
26742675
| Set `enable` to `true` to deploy network policies on the namespaces used by Network Observability (main and privileged). It is disabled by default.
26752676
These network policies better isolate the Network Observability components to prevent undesired connections to them.
2676-
To increase the security of connections, enable this option or create your own network policy.
2677+
This option is enabled by default, disable it to manually manage network policies
26772678

26782679
|===
26792680
== .spec.processor
@@ -2989,7 +2990,7 @@ Type::
29892990

29902991
| `sampling`
29912992
| `integer`
2992-
| `sampling` is the sampling ratio when deduper `mode` is `Sample`. For example, a value of `50` means that 1 flow in 50 is sampled.
2993+
| `sampling` is the sampling interval when deduper `mode` is `Sample`. For example, a value of `50` means that 1 flow in 50 is sampled.
29932994

29942995
|===
29952996
== .spec.processor.filters
@@ -3034,7 +3035,7 @@ Type::
30343035

30353036
| `sampling`
30363037
| `integer`
3037-
| `sampling` is an optional sampling ratio to apply to this filter. For example, a value of `50` means that 1 matching flow in 50 is sampled.
3038+
| `sampling` is an optional sampling interval to apply to this filter. For example, a value of `50` means that 1 matching flow in 50 is sampled.
30383039

30393040
|===
30403041
== .spec.processor.kafkaConsumerAutoscaler
@@ -3068,15 +3069,18 @@ Type::
30683069
|===
30693070
| Property | Type | Description
30703071

3072+
| `alerts`
3073+
| `array`
3074+
| `alerts` is a list of alerts to be created for Prometheus AlertManager, organized by templates and variants [Unsupported (*)].
3075+
This is currently an experimental feature behind a feature gate. To enable, edit `spec.processor.advanced.env` by adding `EXPERIMENTAL_ALERTS_HEALTH` set to `true`.
3076+
More information on alerts: https://github.com/netobserv/network-observability-operator/blob/main/docs/Alerts.md
3077+
30713078
| `disableAlerts`
30723079
| `array (string)`
3073-
| `disableAlerts` is a list of alerts that should be disabled.
3074-
Possible values are: +
3075-
3076-
`NetObservNoFlows`, which is triggered when no flows are being observed for a certain period. +
3077-
3078-
`NetObservLokiError`, which is triggered when flows are being dropped due to Loki errors. +
3079-
3080+
| `disableAlerts` is a list of alert groups that should be disabled from the default set of alerts.
3081+
Possible values are: `NetObservNoFlows`, `NetObservLokiError`, `PacketDropsByKernel`, `PacketDropsByDevice`, `IPsecErrors`, `NetpolDenied`,
3082+
`LatencyHighTrend`, `DNSErrors`, `ExternalEgressHighTrend`, `ExternalIngressHighTrend`, `CrossAZ`.
3083+
More information on alerts: https://github.com/netobserv/network-observability-operator/blob/main/docs/Alerts.md
30803084

30813085
| `includeList`
30823086
| `array (string)`
@@ -3095,6 +3099,140 @@ More information, with full list of available metrics: https://github.com/netobs
30953099
| `object`
30963100
| Metrics server endpoint configuration for Prometheus scraper
30973101

3102+
|===
3103+
== .spec.processor.metrics.alerts
3104+
Description::
3105+
+
3106+
--
3107+
`alerts` is a list of alerts to be created for Prometheus AlertManager, organized by templates and variants [Unsupported (*)].
3108+
This is currently an experimental feature behind a feature gate. To enable, edit `spec.processor.advanced.env` by adding `EXPERIMENTAL_ALERTS_HEALTH` set to `true`.
3109+
More information on alerts: https://github.com/netobserv/network-observability-operator/blob/main/docs/Alerts.md
3110+
--
3111+
3112+
Type::
3113+
`array`
3114+
3115+
3116+
3117+
3118+
== .spec.processor.metrics.alerts[]
3119+
Description::
3120+
+
3121+
--
3122+
3123+
--
3124+
3125+
Type::
3126+
`object`
3127+
3128+
Required::
3129+
- `template`
3130+
- `variants`
3131+
3132+
3133+
3134+
[cols="1,1,1",options="header"]
3135+
|===
3136+
| Property | Type | Description
3137+
3138+
| `template`
3139+
| `string`
3140+
| Alert template name.
3141+
Possible values are: `PacketDropsByKernel`, `PacketDropsByDevice`, `IPsecErrors`, `NetpolDenied`,
3142+
`LatencyHighTrend`, `DNSErrors`, `ExternalEgressHighTrend`, `ExternalIngressHighTrend`, `CrossAZ`.
3143+
More information on alerts: https://github.com/netobserv/network-observability-operator/blob/main/docs/Alerts.md
3144+
3145+
| `variants`
3146+
| `array`
3147+
| A list of variants for this template
3148+
3149+
|===
3150+
== .spec.processor.metrics.alerts[].variants
3151+
Description::
3152+
+
3153+
--
3154+
A list of variants for this template
3155+
--
3156+
3157+
Type::
3158+
`array`
3159+
3160+
3161+
3162+
3163+
== .spec.processor.metrics.alerts[].variants[]
3164+
Description::
3165+
+
3166+
--
3167+
3168+
--
3169+
3170+
Type::
3171+
`object`
3172+
3173+
Required::
3174+
- `thresholds`
3175+
3176+
3177+
3178+
[cols="1,1,1",options="header"]
3179+
|===
3180+
| Property | Type | Description
3181+
3182+
| `groupBy`
3183+
| `string`
3184+
| Optional grouping criteria, possible values are: `Node`, `Namespace`, `Workload`.
3185+
3186+
| `lowVolumeThreshold`
3187+
| `string`
3188+
| The low volume threshold allows to ignore metrics with a too low volume of traffic, in order to improve signal-to-noise.
3189+
It is provided as an absolute rate (bytes per second or packets per second, depending on the context).
3190+
When provided, it must be parsable as a float.
3191+
3192+
| `thresholds`
3193+
| `object`
3194+
| Thresholds of the alert per severity.
3195+
They are expressed as a percentage of errors above which the alert is triggered. They must be parsable as floats.
3196+
3197+
| `trendDuration`
3198+
| `string`
3199+
| For trending alerts, the duration interval for baseline comparison. For example, "2h" means comparing against a 2-hours average. Defaults to 2h.
3200+
3201+
| `trendOffset`
3202+
| `string`
3203+
| For trending alerts, the time offset for baseline comparison. For example, "1d" means comparing against yesterday. Defaults to 1d.
3204+
3205+
|===
3206+
== .spec.processor.metrics.alerts[].variants[].thresholds
3207+
Description::
3208+
+
3209+
--
3210+
Thresholds of the alert per severity.
3211+
They are expressed as a percentage of errors above which the alert is triggered. They must be parsable as floats.
3212+
--
3213+
3214+
Type::
3215+
`object`
3216+
3217+
3218+
3219+
3220+
[cols="1,1,1",options="header"]
3221+
|===
3222+
| Property | Type | Description
3223+
3224+
| `critical`
3225+
| `string`
3226+
| Threshold for severity `critical`. Leave empty to not generate a Critical alert.
3227+
3228+
| `info`
3229+
| `string`
3230+
| Threshold for severity `info`. Leave empty to not generate an Info alert.
3231+
3232+
| `warning`
3233+
| `string`
3234+
| Threshold for severity `warning`. Leave empty to not generate a Warning alert.
3235+
30983236
|===
30993237
== .spec.processor.metrics.server
31003238
Description::

0 commit comments

Comments
 (0)