Skip to content

Commit c7b20d6

Browse files
gwynnemonahanMichael Burke
authored andcommitted
[enterprise-4.15] OSDOCS-15287 [NETOBSERV] Line breaks for observing-network-traffic.adoc assembly and its includes
1 parent 3e12d20 commit c7b20d6

24 files changed

+45
-13
lines changed

modules/network-observability-RTT-overview.adoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,7 @@
55
:_mod-docs-content-type: CONCEPT
66
[id="network-observability-RTT-overview_{context}"]
77
= Round-Trip Time
8+
89
You can use TCP smoothed Round-Trip Time (sRTT) to analyze network flow latencies. You can use RTT captured from the `fentry/tcp_rcv_established` eBPF hookpoint to read sRTT from the TCP socket to help with the following:
910

1011

modules/network-observability-RTT.adoc

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,7 @@
55
:_mod-docs-content-type: PROCEDURE
66
[id="network-observability-RTT_{context}"]
77
= Working with RTT tracing
8+
89
You can track RTT by editing the `FlowCollector` to the specifications in the following YAML example.
910

1011
.Procedure
@@ -30,7 +31,7 @@ spec:
3031
- FlowRTT <1>
3132
----
3233
<1> You can start tracing RTT network flows by listing the `FlowRTT` parameter in the `spec.agent.ebpf.features` specification list.
33-
34+
3435
.Verification
3536
When you refresh the *Network Traffic* page, the *Overview*, *Traffic Flow*, and *Topology* views display new information about RTT:
3637

@@ -39,9 +40,9 @@ When you refresh the *Network Traffic* page, the *Overview*, *Traffic Flow*, and
3940
.. In the *Traffic Flows* view, you can also expand the side panel to view more information about RTT.
4041
+
4142
.Example filtering
42-
... Click the *Common* filters -> *Protocol*.
43+
... Click the *Common* filters -> *Protocol*.
4344
... Filter the network flow data based on *TCP*, *Ingress* direction, and look for *FlowRTT* values greater than 10,000,000 nanoseconds (10ms).
44-
... Remove the *Protocol* filter.
45+
... Remove the *Protocol* filter.
4546
... Filter for *Flow RTT* values greater than 0 in the *Common* filters.
4647

4748
.. In the *Topology* view, click the Display option dropdown. Then click *RTT* in the *edge labels* drop-down list.

modules/network-observability-configuring-options-overview.adoc

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,7 @@
55
:_mod-docs-content-type: REFERENCE
66
[id="network-observability-configuring-options-overview_{context}"]
77
= Configuring advanced options for the Overview view
8+
89
You can customize the graphical view by using advanced options. To access the advanced options, click *Show advanced options*. You can configure the details in the graph by using the *Display options* drop-down menu. The options available are as follows:
910

1011
* *Scope*: Select to view the components that network traffic flows between. You can set the scope to *Node*, *Namespace*, *Owner*, *Zones*, *Cluster* or *Resource*. *Owner* is an aggregation of resources. *Resource* can be a pod, service, node, in case of host-network traffic, or an unknown IP address. The default value is *Namespace*.
@@ -14,7 +15,7 @@ You can customize the graphical view by using advanced options. To access the ad
1415
== Managing panels and display
1516
You can select the required panels to be displayed, reorder them, and focus on a specific panel. To add or remove panels, click *Manage panels*.
1617

17-
The following panels are shown by default:
18+
The following panels are shown by default:
1819

1920
* *Top X average bytes rates*
2021
* *Top X bytes rates stacked with total*

modules/network-observability-configuring-options-topology.adoc

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,12 +5,13 @@
55
:_mod-docs-content-type: REFERENCE
66
[id="network-observability-configuring-options-topology_{context}"]
77
= Configuring the advanced options for the Topology view
8+
89
You can customize and export the view by using *Show advanced options*. The advanced options view has the following features:
910

1011
* *Find in view*: To search the required components in the view.
1112
* *Display options*: To configure the following options:
1213
+
13-
** *Edge labels*: To show the specified measurements as edge labels. The default is to show the *Average rate* in *Bytes*.
14+
** *Edge labels*: To show the specified measurements as edge labels. The default is to show the *Average rate* in *Bytes*.
1415
** *Scope*: To select the scope of components between which the network traffic flows. The default value is *Namespace*.
1516
** *Groups*: To enhance the understanding of ownership by grouping the components. The default value is *None*.
1617

modules/network-observability-configuring-options-trafficflow.adoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,7 @@
55
:_mod-docs-content-type: PROCEDURE
66
[id="network-observability-configuring-options-trafficflow_{context}"]
77
= Configuring advanced options for the Traffic flows view
8+
89
You can customize and export the view by using *Show advanced options*.
910
You can set the row size by using the *Display options* drop-down menu. The default value is *Normal*.
1011

modules/network-observability-dns-overview.adoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,7 @@
55
:_mod-docs-content-type: CONCEPT
66
[id="network-observability-dns-overview_{context}"]
77
= DNS tracking
8+
89
You can configure graphical representation of Domain Name System (DNS) tracking of network flows in the *Overview* view. Using DNS tracking with extended Berkeley Packet Filter (eBPF) tracepoint hooks can serve various purposes:
910

1011
* Network Monitoring: Gain insights into DNS queries and responses, helping network administrators identify unusual patterns, potential bottlenecks, or performance issues.

modules/network-observability-dns-tracking.adoc

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,7 @@
55
:_mod-docs-content-type: PROCEDURE
66
[id="network-observability-dns-tracking_{context}"]
77
= Working with DNS tracking
8+
89
Using DNS tracking, you can monitor your network, conduct security analysis, and troubleshoot DNS issues. You can track DNS by editing the `FlowCollector` to the specifications in the following YAML example.
910

1011
[IMPORTANT]
@@ -44,5 +45,5 @@ spec:
4445

4546
[NOTE]
4647
====
47-
TCP handshake packets do not have DNS headers. TCP protocol flows without DNS headers are shown in the traffic flow data with *DNS Latency*, *ID*, and *Response code* values of "n/a". You can filter out flow data to view only flows that have DNS headers using the *Common* filter "DNSError" equal to "0".
48+
TCP handshake packets do not have DNS headers. TCP protocol flows without DNS headers are shown in the traffic flow data with *DNS Latency*, *ID*, and *Response code* values of "n/a". You can filter out flow data to view only flows that have DNS headers using the *Common* filter "DNSError" equal to "0".
4849
====

modules/network-observability-ebpf-rule-flow-filter.adoc

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,11 @@
55
:_mod-docs-content-type: CONCEPT
66
[id="network-observability-ebpf-flow-rule-filter_{context}"]
77
= eBPF flow rule filter
8+
89
You can use rule-based filtering to control the volume of packets cached in the eBPF flow table. For example, a filter can specify that only packets coming from port 100 should be recorded. Then only the packets that match the filter are cached and the rest are not cached.
910

11+
You can apply multiple filter rules.
12+
1013
[id="ingress-and-egress-traffic-filtering_{context}"]
1114
== Ingress and egress traffic filtering
1215
CIDR notation efficiently represents IP address ranges by combining the base IP address with a prefix length. For both ingress and egress traffic, the source IP address is first used to match filter rules configured with CIDR notation. If there is a match, then the filtering proceeds. If there is no match, then the destination IP is used to match filter rules configured with CIDR notation.
@@ -15,4 +18,4 @@ After matching either the source IP or the destination IP CIDR, you can pinpoint
1518

1619
[id="dashboard-and-metrics-integrations_{context}"]
1720
== Dashboard and metrics integrations
18-
When this option is enabled, the *Netobserv/Health* dashboard for *eBPF agent statistics* now has the *Filtered flows rate* view. Additionally, in *Observe* -> *Metrics* you can query `netobserv_agent_filtered_flows_total` to observe metrics with the reason in *FlowFilterAcceptCounter*, *FlowFilterNoMatchCounter* or *FlowFilterRecjectCounter*.
21+
When this option is enabled, the *Netobserv/Health* dashboard for *eBPF agent statistics* now has the *Filtered flows rate* view. Additionally, in *Observe* -> *Metrics* you can query `netobserv_agent_filtered_flows_total` to observe metrics with the reason in *FlowFilterAcceptCounter*, *FlowFilterNoMatchCounter* or *FlowFilterRecjectCounter*.

modules/network-observability-filtering-ebpf-rule.adoc

Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,14 @@
55
:_mod-docs-content-type: PROCEDURE
66
[id="network-observability-filtering-ebpf-rule_{context}"]
77
= Filtering eBPF flow data using a global rule
8-
You can configure the `FlowCollector` to filter eBPF flows using a global rule to control the flow of packets cached in the eBPF flow table.
8+
9+
You can configure the `FlowCollector` custom resource to filter eBPF flows using multiple rules to control the flow of packets cached in the eBPF flow table.
10+
11+
[IMPORTANT]
12+
====
13+
* You cannot use duplicate Classless Inter-Domain Routing (CIDRs) in filter rules.
14+
* When an IP address matches multiple filter rules, the rule with the most specific CIDR prefix (longest prefix) takes precedence.
15+
====
916

1017
.Procedure
1118
. In the web console, navigate to *Operators* -> *Installed Operators*.
@@ -71,4 +78,4 @@ spec:
7178
<2> The `cidr` value of `0.0.0.0/0` matches against any IP address.
7279
<3> See flows after `peerIP` is configured with `192.168.127.12`.
7380
<4> You must set `spec.agent.ebpf.flowFilter.enable` to `true` to enable the feature.
74-
====
81+
====

modules/network-observability-flow-filter-parameters.adoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,7 @@
55

66
[id="network-observability-flowcollector-flowfilter-parameters_{context}"]
77
= Flow filter configuration parameters
8+
89
The flow filter rules consist of required and optional parameters.
910

1011
.Required configuration parameters

0 commit comments

Comments
 (0)