Skip to content

Commit ff45d9b

Browse files
committed
OSDOCS-8104: Adding OVS drops type to Packet drops
1 parent b9e4d17 commit ff45d9b

File tree

3 files changed

+12
-3
lines changed

3 files changed

+12
-3
lines changed

modules/network-observability-packet-drops.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ spec:
3434
ebpf:
3535
features:
3636
- PacketDrop <1>
37-
privileged: true <2>
37+
privileged: true <2>
3838
----
3939
<1> You can start reporting the packet drops of each network flow by listing the `PacketDrop` parameter in the `spec.agent.ebpf.features` specification list.
4040
<2> The `spec.agent.ebpf.privileged` specification value must be `true` for packet drop tracking.
@@ -43,5 +43,5 @@ spec:
4343
* When you refresh the *Network Traffic* page, the *Overview*, *Traffic Flow*, and *Topology* views display new information about packet drops:
4444
.. Select new choices in *Manage panels* to choose which graphical visualizations of packet drops to display in the *Overview*.
4545
.. Select new choices in *Manage columns* to choose which packet drop information to display in the *Traffic flows* table.
46-
... In the *Traffic Flows* view, you can also expand the side panel to view more information about packet drops.
46+
... In the *Traffic Flows* view, you can also expand the side panel to view more information about packet drops. Host drops are prefixed with `SKB_DROP` and OVS drops are prefixed with `OVS_DROP`.
4747
.. In the *Topology* view, red lines are displayed where drops are present.

modules/network-observability-pktdrop-overview.adoc

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,5 +21,14 @@ When packet drop tracking is enabled, you can see the following metrics represen
2121
* Top X dropped cause
2222
* Top X flow dropped rates stacked with total
2323
24+
Two kinds of packet drops are detected by Network Observability: host drops and OVS drops. Host drops are prefixed with `SKB_DROP` and OVS drops are prefixed with `OVS_DROP`. Dropped flows are shown in the side panel of the *Traffic flows* table along with a link to a description of each drop type. Examples of host drop reasons are as follows:
25+
26+
* `SKB_DROP_REASON_NO_SOCKET`: the packet dropped due to a missing socket.
27+
* `SKB_DROP_REASON_TCP_CSUM`: the packet dropped due to a TCP checksum error.
28+
29+
Examples of OVS drops reasons are as follows:
30+
31+
* `OVS_DROP_LAST_ACTION`: OVS packets dropped due to an implicit drop action, for example due to a configured network policy.
32+
* `OVS_DROP_IP_TTL`: OVS packets dropped due to an expired IP TTL.
2433
2534
See the _Additional Resources_ of this section for more information about enabling and working with packet drop tracking.

network_observability/network-observability-operator-release-notes.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ You can now export eBPF-enriched network flows to the IPFIX collector. For more
9696

9797
[id="network-observability-packet-drop-1.4"]
9898
==== Packet drops
99-
In the 1.4 release of the Network Observability Operator, eBPF tracepoint hooks are used to enable packet drop tracking. You can now detect and analyze the cause for packet drops and make decisions to optimize network performance. This feature is only supported in {product-title} versions 4.13+. For more information, see xref:../network_observability/observing-network-traffic#network-observability-pktdrop-overview_nw-observe-network-traffic[Configuring packet drop tracking] and xref:../network_observability/observing-network-traffic#network-observability-packet-drops_nw-observe-network-traffic[Working with packet drops].
99+
In the 1.4 release of the Network Observability Operator, eBPF tracepoint hooks are used to enable packet drop tracking. You can now detect and analyze the cause for packet drops and make decisions to optimize network performance. In {product-title} 4.14 and later, both host drops and OVS drops are detected. In {product-title} 4.13, only host drops are detected. For more information, see xref:../network_observability/observing-network-traffic#network-observability-pktdrop-overview_nw-observe-network-traffic[Configuring packet drop tracking] and xref:../network_observability/observing-network-traffic#network-observability-packet-drops_nw-observe-network-traffic[Working with packet drops].
100100

101101
==== s390x architecture support
102102
Network Observability Operator can now run on `s390x` architecture. Previously it ran on `amd64`, `ppc64le`, or `arm64`.

0 commit comments

Comments
 (0)