Skip to content

Commit a1f2b27

Browse files
authored
Merge pull request #97036 from openshift-cherrypick-robot/cherry-pick-96966-to-enterprise-4.19
[enterprise-4.19] OSDOCS-14543 [NETOBSERV] Change Network Observability to network observability when not referencing the Operator
2 parents 3854db8 + 22693bb commit a1f2b27

22 files changed

+39
-39
lines changed

modules/network-observability-cli-capturing-metrics.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
:_mod-docs-content-type: PROCEDURE
66
[id="network-observability-cli-capturing-metrics_{context}"]
77
= Capturing metrics
8-
You can generate on-demand dashboards in Prometheus by using a service monitor for Network Observability.
8+
You can generate on-demand dashboards in Prometheus by using a service monitor for network observability.
99

1010
.Prerequisites
1111
* Install the {oc-first}.
@@ -20,7 +20,7 @@ You can generate on-demand dashboards in Prometheus by using a service monitor f
2020
$ oc netobserv metrics --enable_filter=true --cidr=0.0.0.0/0 --protocol=TCP --port=49051
2121
----
2222
. Open the link provided in the terminal to view the *NetObserv / On-Demand* dashboard:
23-
+
23+
+
2424
.Example URL
2525
[source,terminal]
2626
----

modules/network-observability-con_filter-network-flows-at-ingestion.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
[id="network-observability-filter-network-flows-at-ingestion_{context}"]
77
= Filter network flows at ingestion
88

9-
You can create filters to reduce the number of generated network flows. Filtering network flows can reduce the resource usage of the Network Observability components.
9+
You can create filters to reduce the number of generated network flows. Filtering network flows can reduce the resource usage of the network observability components.
1010

1111
You can configure two kinds of filters:
1212

modules/network-observability-create-network-policy.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55

66
:_mod-docs-content-type: PROCEDURE
77
[id="network-observability-network-policy_{context}"]
8-
= Creating a network policy for Network Observability
8+
= Creating a network policy for network observability
99

1010
If you want to further customize the network policies for the `netobserv` and `netobserv-privileged` namespaces, you must disable the managed installation of the policy from the `FlowCollector` CR, and create your own. You can use the network policy resources that are enabled from the `FlowCollector` CR as a starting point for the procedure that follows:
1111

modules/network-observability-deploy-network-policy.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
[id="network-observability-deploy-network-policy_{context}"]
88
= Configuring an ingress network policy by using the FlowCollector custom resource
99

10-
You can configure the `FlowCollector` custom resource (CR) to deploy an ingress network policy for Network Observability by setting the `spec.NetworkPolicy.enable` specification to `true`. By default, the specification is `false`.
10+
You can configure the `FlowCollector` custom resource (CR) to deploy an ingress network policy for network observability by setting the `spec.NetworkPolicy.enable` specification to `true`. By default, the specification is `false`.
1111

1212
If you have installed Loki, Kafka or any exporter in a different namespace that also has a network policy, you must ensure that the Network Observability components can communicate with them. Consider the following about your setup:
1313

modules/network-observability-ebpf-agent-alert.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,11 +5,11 @@
55
[id="network-observability-netobserv-dashboard-ebpf-agent-alerts_{context}"]
66
= Using the eBPF agent alert
77

8-
An alert, `NetObservAgentFlowsDropped`, is triggered when the Network Observability eBPF agent hashmap table is full or when the capacity limiter is triggered. If you see this alert, consider increasing the `cacheMaxFlows` in the `FlowCollector`, as shown in the following example.
8+
An alert, `NetObservAgentFlowsDropped`, is triggered when the network observability eBPF agent hashmap table is full or when the capacity limiter is triggered. If you see this alert, consider increasing the `cacheMaxFlows` in the `FlowCollector`, as shown in the following example.
99

1010
[NOTE]
1111
====
12-
Increasing the `cacheMaxFlows` might increase the memory usage of the eBPF agent.
12+
Increasing the `cacheMaxFlows` might increase the memory usage of the eBPF agent.
1313
====
1414

1515
.Procedure
@@ -31,7 +31,7 @@ spec:
3131
namespace: netobserv
3232
deploymentModel: Direct
3333
agent:
34-
type: eBPF
34+
type: eBPF
3535
ebpf:
3636
cacheMaxFlows: 200000 <1>
3737
----

modules/network-observability-flowcollector-view.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,9 @@ You can view and edit YAML directly in the {product-title} web console.
1111
.Procedure
1212
. In the web console, navigate to *Operators* -> *Installed Operators*.
1313
. Under the *Provided APIs* heading for the *NetObserv Operator*, select *Flow Collector*.
14-
. Select *cluster* then select the *YAML* tab. There, you can modify the `FlowCollector` resource to configure the Network Observability operator.
14+
. Select *cluster* then select the *YAML* tab. There, you can modify the `FlowCollector` resource to configure the Network Observability Operator.
1515

16-
The following example shows a sample `FlowCollector` resource for {product-title} Network Observability operator:
16+
The following example shows a sample `FlowCollector` resource for {product-title} Network Observability Operator:
1717
[id="network-observability-flowcollector-configuring-about-sample_{context}"]
1818
.Sample `FlowCollector` resource
1919
[source, yaml]

modules/network-observability-metrics-names.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
:_mod-docs-content-type: REFERENCE
66
[id="network-observability-metrics_{context}"]
7-
= Network Observability metrics
7+
= Network observability metrics
88

99
You can also create alerts by using the `includeList` metrics in Prometheus rules, as shown in the example "Creating alerts".
1010

modules/network-observability-multitenancy.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
:_mod-docs-content-type: PROCEDURE
66
[id="network-observability-multi-tenancy_{context}"]
7-
= Enabling multi-tenancy in Network Observability
7+
= Enabling multi-tenancy in network observability
88

99
Multi-tenancy in the Network Observability Operator allows and restricts individual user access, or group access, to the flows stored in Loki and or Prometheus. Access is enabled for project administrators. Project administrators who have limited access to some namespaces can access flows for only those namespaces.
1010

modules/network-observability-networking-events-overview.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,9 +8,9 @@
88
:FeatureName: OVN-Kubernetes networking events tracking
99
include::snippets/technology-preview.adoc[]
1010

11-
You use network event tracking in Network Observability to gain insight into OVN-Kubernetes events, including network policies, admin network policies, and egress firewalls. You can use the insights from tracking network events to help with the following tasks:
11+
You use network event tracking in network observability to gain insight into OVN-Kubernetes events, including network policies, admin network policies, and egress firewalls. You can use the insights from tracking network events to help with the following tasks:
1212

13-
* Network monitoring: Monitor allowed and blocked traffic, detecting whether packets are allowed or blocked based on network policies and admin network policies.
13+
* Network monitoring: Monitor allowed and blocked traffic, detecting whether packets are allowed or blocked based on network policies and admin network policies.
1414
1515
* Network security: You can track outbound traffic and see whether it adheres to egress firewall rules. Detect unauthorized outbound connections and flag outbound traffic that violates egress rules.
1616

modules/network-observability-nodes-taints-tolerations.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,9 @@
44

55
:_mod-docs-content-type: CONCEPT
66
[id="network-observability-multi-tenancy{context}"]
7-
= Network Observability deployment in specific nodes
7+
= Network observability deployment in specific nodes
88

9-
You can configure the `FlowCollector` to control the deployment of Network Observability components in specific nodes. The `spec.agent.ebpf.advanced.scheduling`, `spec.processor.advanced.scheduling`, and `spec.consolePlugin.advanced.scheduling` specifications have the following configurable settings:
9+
You can configure the `FlowCollector` to control the deployment of network observability components in specific nodes. The `spec.agent.ebpf.advanced.scheduling`, `spec.processor.advanced.scheduling`, and `spec.consolePlugin.advanced.scheduling` specifications have the following configurable settings:
1010

1111
* `NodeSelector`
1212
* `Tolerations`

0 commit comments

Comments
 (0)