Skip to content

Commit cd16c31

Browse files
authored
Merge pull request #64448 from skrthomas/OCPBUGS-17785
OCPBUGS-17785: Document SR-IOV/FlowCollector config
2 parents b38a5ca + f6525a2 commit cd16c31

File tree

4 files changed

+45
-4
lines changed

4 files changed

+45
-4
lines changed
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
// Module included in the following assemblies:
2+
//
3+
// * network_observability/configuring-operator.adoc
4+
5+
:_content-type: PROCEDURE
6+
[id="network-observability-SR-IOV-config_{context}"]
7+
= Configuring monitoring for SR-IOV interface traffic
8+
In order to collect traffic from a cluster with a Single Root I/O Virtualization (SR-IOV) device, you must set the `FlowCollector` `spec.agent.ebpf.privileged` field to `true`. Then, the eBPF agent monitors other network namespaces in addition to the host network namespaces, which are monitored by default. When a pod with a virtual functions (VF) interface is created, a new network namespace is created. With `SRIOVNetwork` policy `IPAM` configurations specified, the VF interface is migrated from the host network namespace to the pod network namespace.
9+
10+
.Prerequisites
11+
* Access to an {product-title} cluster with a SR-IOV device.
12+
* The `SRIOVNetwork` custom resource (CR) `spec.ipam` configuration must be set with an IP address from the range that the interface lists or from other plugins.
13+
14+
.Procedure
15+
. In the web console, navigate to *Operators* -> *Installed Operators*.
16+
. Under the *Provided APIs* heading for the *NetObserv Operator*, select *Flow Collector*.
17+
. Select *cluster* and then select the *YAML* tab.
18+
. Configure the `FlowCollector` custom resource. A sample configuration is as follows:
19+
+
20+
[id="network-observability-flowcollector-configuring-SRIOV-monitoring{context}"]
21+
.Configure `FlowCollector` for SR-IOV monitoring
22+
[source,yaml]
23+
----
24+
apiVersion: flows.netobserv.io/v1alpha1
25+
kind: FlowCollector
26+
metadata:
27+
name: cluster
28+
spec:
29+
namespace: netobserv
30+
deploymentModel: DIRECT
31+
agent:
32+
type: EBPF
33+
ebpf:
34+
privileged: true <1>
35+
----
36+
<1> The `spec.agent.ebpf.privileged` field value must be set to `true` to enable SR-IOV monitoring.

modules/network-observability-loki-secret.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
The Loki Operator supports a few log storage options, such as AWS S3, Google Cloud Storage, Azure, Swift, Minio, OpenShift Data Foundation. The following example shows how to create a secret for AWS S3 storage. The secret created in this example, `loki-s3`, is referenced in "Creating a LokiStack resource". You can create this secret in the web console or CLI.
99

1010
. Using the web console, navigate to the *Project* -> *All Projects* dropdown and select *Create Project*. Name the project `netobserv` and click *Create*.
11-
. Navigate to the Import icon, *+*, in the top right corner. Paste your YAML file into the editor. It is important to create this YAML file in the `netobserv` namespace that uses the `access_key_id` and `access_key_secret` to specify your credentials.
11+
. Navigate to the Import icon, *+*, in the top right corner. Paste your YAML file into the editor.
1212
+
1313
The following shows an example secret YAML file for S3 storage:
1414
+

modules/network-observability-lokistack-create.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
:_content-type: PROCEDURE
66
[id="network-observability-lokistack-create_{context}"]
77
= Creating a LokiStack custom resource
8-
It is recommended to deploy the LokiStack in the same namespace referenced by the `FlowCollector` specification, `spec.namespace`. You can use the web console or CLI to create a namespace, or new project.
8+
You can deploy a LokiStack using the web console or CLI to create a namespace, or new project.
99

1010
.Procedure
1111

@@ -20,7 +20,7 @@ It is recommended to deploy the LokiStack in the same namespace referenced by th
2020
kind: LokiStack
2121
metadata:
2222
name: loki
23-
namespace: netobserv <1>
23+
namespace: netobserv <1>
2424
spec:
2525
size: 1x.small
2626
storage:
@@ -39,7 +39,7 @@ It is recommended to deploy the LokiStack in the same namespace referenced by th
3939
+
4040
[IMPORTANT]
4141
====
42-
You must not reuse the same LokiStack that is used for cluster logging.
42+
You must not reuse the same `LokiStack` that is used for cluster logging.
4343
====
4444
. Click *Create*.
4545

networking/network_observability/configuring-operator.adoc

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,5 +24,10 @@ For more information about specifying flow format, see xref:../../networking/net
2424

2525
include::modules/network-observability-configuring-FLP-sampling.adoc[leveloffset=+1]
2626
include::modules/network-observability-configuring-quickfilters-flowcollector.adoc[leveloffset=+1]
27+
include::modules/network-observability-SRIOV-configuration.adoc[leveloffset=+1]
28+
[role="_additional-resources"]
29+
.Additional resources
30+
For more information about creating the `SriovNetwork` custom resource, see xref:../../networking/hardware_networks/configuring-sriov-device.adoc#cnf-creating-an-additional-sriov-network-with-vrf-plug-in_configuring-sriov-device[Creating an additional SR-IOV network attachment with the CNI VRF plugin].
31+
2732
include::modules/network-observability-resource-recommendations.adoc[leveloffset=+1]
2833
include::modules/network-observability-resources-table.adoc[leveloffset=+2]

0 commit comments

Comments
 (0)