You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -206,15 +206,14 @@ Otherwise it is matched as a case-sensitive string.
206
206
| List of additional features to enable. They are all disabled by default. Enabling additional features might have performance impacts. Possible values are: +
207
207
208
208
- `PacketDrop`: Enable the packets drop flows logging feature. This feature requires mounting
209
-
the kernel debug filesystem, so the eBPF agent pods must run as privileged.
210
-
If the `spec.agent.ebpf.privileged` parameter is not set, an error is reported. +
209
+
the kernel debug filesystem, so the eBPF agent pods must run as privileged via `spec.agent.ebpf.privileged`. +
211
210
212
211
- `DNSTracking`: Enable the DNS tracking feature. +
213
212
214
213
- `FlowRTT`: Enable flow latency (sRTT) extraction in the eBPF agent from TCP traffic. +
215
214
216
215
- `NetworkEvents`: Enable the network events monitoring feature, such as correlating flows and network policies.
217
-
This feature requires mounting the kernel debug filesystem, so the eBPF agent pods must run as privileged.
216
+
This feature requires mounting the kernel debug filesystem, so the eBPF agent pods must run as privileged via `spec.agent.ebpf.privileged`.
218
217
It requires using the OVN-Kubernetes network plugin with the Observability feature.
219
218
IMPORTANT: This feature is available as a Technology Preview. +
220
219
@@ -224,7 +223,7 @@ IMPORTANT: This feature is available as a Technology Preview. +
224
223
225
224
- `UDNMapping`: Enable interfaces mapping to User Defined Networks (UDN). +
226
225
227
-
This feature requires mounting the kernel debug filesystem, so the eBPF agent pods must run as privileged.
226
+
This feature requires mounting the kernel debug filesystem, so the eBPF agent pods must run as privileged via `spec.agent.ebpf.privileged`.
228
227
It requires using the OVN-Kubernetes network plugin with the Observability feature. +
229
228
230
229
- `IPSec`, to track flows between nodes with IPsec encryption. +
@@ -259,10 +258,8 @@ Otherwise it is matched as a case-sensitive string.
259
258
260
259
| `privileged`
261
260
| `boolean`
262
-
| Privileged mode for the eBPF Agent container. When ignored or set to `false`, the operator sets
263
-
granular capabilities (BPF, PERFMON, NET_ADMIN) to the container.
264
-
If for some reason these capabilities cannot be set, such as if an old kernel version not knowing CAP_BPF
265
-
is in use, then you can turn on this mode for more global privileges.
261
+
| Privileged mode for the eBPF Agent container. When set to `true`, the agent is able to capture more traffic, including from secondary interfaces.
262
+
When ignored or set to `false`, the operator sets granular capabilities (BPF, PERFMON, NET_ADMIN) to the container.
266
263
Some agent features require the privileged mode, such as packet drops tracking (see `features`) and SR-IOV support.
267
264
268
265
| `resources`
@@ -272,7 +269,7 @@ For more information, see https://kubernetes.io/docs/concepts/configuration/mana
272
269
273
270
| `sampling`
274
271
| `integer`
275
-
| Sampling ratio of the eBPF probe. 100 means one packet on 100 is sent. 0 or 1 means all packets are sampled.
272
+
| Sampling interval of the eBPF probe. 100 means one packet on 100 is sent. 0 or 1 means all packets are sampled.
276
273
277
274
|===
278
275
== .spec.agent.ebpf.advanced
@@ -457,7 +454,7 @@ To change the default, you can define a rule that accepts everything: `{ action:
457
454
458
455
| `sampling`
459
456
| `integer`
460
-
| `sampling` is the sampling ratio for the matched packets, overriding the global sampling defined at `spec.agent.ebpf.sampling`.
457
+
| `sampling` is the sampling interval for the matched packets, overriding the global sampling defined at `spec.agent.ebpf.sampling`.
461
458
462
459
| `sourcePorts`
463
460
| `integer-or-string`
@@ -559,7 +556,7 @@ To filter two ports, use a "port1,port2" in string format. For example, `ports:
559
556
560
557
| `sampling`
561
558
| `integer`
562
-
| `sampling` is the sampling ratio for the matched packets, overriding the global sampling defined at `spec.agent.ebpf.sampling`.
559
+
| `sampling` is the sampling interval for the matched packets, overriding the global sampling defined at `spec.agent.ebpf.sampling`.
563
560
564
561
| `sourcePorts`
565
562
| `integer-or-string`
@@ -2015,6 +2012,10 @@ Type::
2015
2012
|===
2016
2013
| Property | Type | Description
2017
2014
2015
+
| `excludeLabels`
2016
+
| `array (string)`
2017
+
| `excludeLabels` is a list of fields to be excluded from the list of Loki labels. [Unsupported (*)].
2018
+
2018
2019
| `staticLabels`
2019
2020
| `object (string)`
2020
2021
| `staticLabels` is a map of common labels to set on each flow in Loki storage.
@@ -2650,7 +2651,7 @@ If the namespace is different, the config map or the secret is copied so that it
`networkPolicy` defines network policy settings for Network Observability components isolation.
2654
2655
--
2655
2656
2656
2657
Type::
@@ -2673,7 +2674,7 @@ configuration, you can disable it and install your own instead.
2673
2674
| `boolean`
2674
2675
| Set `enable` to `true` to deploy network policies on the namespaces used by Network Observability (main and privileged). It is disabled by default.
2675
2676
These network policies better isolate the Network Observability components to prevent undesired connections to them.
2676
-
To increase the security of connections, enable this option or create your own network policy.
2677
+
This option is enabled by default, disable it to manually manage network policies
2677
2678
2678
2679
|===
2679
2680
== .spec.processor
@@ -2989,7 +2990,7 @@ Type::
2989
2990
2990
2991
| `sampling`
2991
2992
| `integer`
2992
-
| `sampling` is the sampling ratio when deduper `mode` is `Sample`. For example, a value of `50` means that 1 flow in 50 is sampled.
2993
+
| `sampling` is the sampling interval when deduper `mode` is `Sample`. For example, a value of `50` means that 1 flow in 50 is sampled.
2993
2994
2994
2995
|===
2995
2996
== .spec.processor.filters
@@ -3034,7 +3035,7 @@ Type::
3034
3035
3035
3036
| `sampling`
3036
3037
| `integer`
3037
-
| `sampling` is an optional sampling ratio to apply to this filter. For example, a value of `50` means that 1 matching flow in 50 is sampled.
3038
+
| `sampling` is an optional sampling interval to apply to this filter. For example, a value of `50` means that 1 matching flow in 50 is sampled.
3038
3039
3039
3040
|===
3040
3041
== .spec.processor.kafkaConsumerAutoscaler
@@ -3068,15 +3069,18 @@ Type::
3068
3069
|===
3069
3070
| Property | Type | Description
3070
3071
3072
+
| `alerts`
3073
+
| `array`
3074
+
| `alerts` is a list of alerts to be created for Prometheus AlertManager, organized by templates and variants [Unsupported (*)].
3075
+
This is currently an experimental feature behind a feature gate. To enable, edit `spec.processor.advanced.env` by adding `EXPERIMENTAL_ALERTS_HEALTH` set to `true`.
3076
+
More information on alerts: https://github.com/netobserv/network-observability-operator/blob/main/docs/Alerts.md
3077
+
3071
3078
| `disableAlerts`
3072
3079
| `array (string)`
3073
-
| `disableAlerts` is a list of alerts that should be disabled.
3074
-
Possible values are: +
3075
-
3076
-
`NetObservNoFlows`, which is triggered when no flows are being observed for a certain period. +
3077
-
3078
-
`NetObservLokiError`, which is triggered when flows are being dropped due to Loki errors. +
3079
-
3080
+
| `disableAlerts` is a list of alert groups that should be disabled from the default set of alerts.
3081
+
Possible values are: `NetObservNoFlows`, `NetObservLokiError`, `PacketDropsByKernel`, `PacketDropsByDevice`, `IPsecErrors`, `NetpolDenied`,
More information on alerts: https://github.com/netobserv/network-observability-operator/blob/main/docs/Alerts.md
3080
3084
3081
3085
| `includeList`
3082
3086
| `array (string)`
@@ -3095,6 +3099,140 @@ More information, with full list of available metrics: https://github.com/netobs
3095
3099
| `object`
3096
3100
| Metrics server endpoint configuration for Prometheus scraper
3097
3101
3102
+
|===
3103
+
== .spec.processor.metrics.alerts
3104
+
Description::
3105
+
+
3106
+
--
3107
+
`alerts` is a list of alerts to be created for Prometheus AlertManager, organized by templates and variants [Unsupported (*)].
3108
+
This is currently an experimental feature behind a feature gate. To enable, edit `spec.processor.advanced.env` by adding `EXPERIMENTAL_ALERTS_HEALTH` set to `true`.
3109
+
More information on alerts: https://github.com/netobserv/network-observability-operator/blob/main/docs/Alerts.md
3110
+
--
3111
+
3112
+
Type::
3113
+
`array`
3114
+
3115
+
3116
+
3117
+
3118
+
== .spec.processor.metrics.alerts[]
3119
+
Description::
3120
+
+
3121
+
--
3122
+
3123
+
--
3124
+
3125
+
Type::
3126
+
`object`
3127
+
3128
+
Required::
3129
+
- `template`
3130
+
- `variants`
3131
+
3132
+
3133
+
3134
+
[cols="1,1,1",options="header"]
3135
+
|===
3136
+
| Property | Type | Description
3137
+
3138
+
| `template`
3139
+
| `string`
3140
+
| Alert template name.
3141
+
Possible values are: `PacketDropsByKernel`, `PacketDropsByDevice`, `IPsecErrors`, `NetpolDenied`,
0 commit comments