Skip to content

Commit 7e87daa

Browse files
committed
minor updates
1 parent 4ee726a commit 7e87daa

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

content/en/containers/guide/ad_identifiers.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -111,12 +111,12 @@ If you want to apply different configuration templates to containers running the
111111

112112
## Advanced container identifiers
113113

114-
For use cases which require further granularity on Agent v7.74.0+, you can use the `cel_selector` check configuration option to target specific containers based on additional container attributes. These rules are based on the [Common Expression Language][3] syntax.
114+
For use cases which require further granularity on Agent v7.73.0+, you can use the `cel_selector` check configuration option to target specific containers based on additional container attributes. These rules are based on the [Common Expression Language][3] syntax.
115115

116116
Note: To be a valid Autodiscovery configuration, the check configuration must either include an `ad_identifier` or `cel_selector` container rule with the `container.image.reference` parameter.
117117

118118
**Example**:
119-
The following Nginx Autodiscovery configuration template designates a container image with the name `nginx` on two selected namespaces. Separately listed conditions are joined together through an **OR** operation.
119+
The following NGINX Autodiscovery configuration template designates a container image with the name `nginx` on two selected namespaces. Separately listed conditions are joined together through an **OR** operation.
120120

121121
```yaml
122122
ad_identifiers:
@@ -130,10 +130,10 @@ cel_selector:
130130
| Attribute | Description |
131131
|------------------------------|------------------------------------------------------------|
132132
| `container.name` | The name of the container. |
133-
| `container.image.reference` | The full reference of the container image (repo, tag/digest). |
133+
| `container.image.reference` | The full reference of the container image (registry, repo, tag/digest). |
134134
| `container.pod.name` | The name of the pod running the container. |
135135
| `container.pod.namespace` | The Kubernetes namespace of the pod. |
136-
| `container.pod.annotations` | The annotations applied to the pod (keyvalue map). |
136+
| `container.pod.annotations` | The annotations applied to the pod (key-value map). |
137137

138138
These attributes can be used with the [CEL syntax][4] to define rules to select specific containers for check scheduling. Below is a list of example rules that could be defined:
139139

@@ -149,7 +149,7 @@ cel_selector:
149149
- container.pod.annotations["monitoring"] == "true"
150150
```
151151

152-
To select the container running the image `nginx` in namespaces not containing the substring `-dev`:
152+
To select the container running the image `nginx` in namespaces without the substring `-dev`:
153153

154154
```yaml
155155
ad_identifiers:
@@ -169,7 +169,7 @@ cel_selector:
169169
- container.name == "nginx-server" && container.pod.namespace == "prod"
170170
```
171171

172-
To select the container running an image containing the substring `nginx`:
172+
To select the container running an image with the substring `nginx`:
173173

174174
```yaml
175175
cel_selector:
@@ -189,11 +189,11 @@ cel_selector:
189189

190190
<div class="alert alert-danger">
191191

192-
Broad conditions can unintentionally target containers on your host. For example, using a containers `cel_selector` like `container.image.reference != "nginx"` selects **every** container on the host except nginx, including system components and likely unrelated applications. This can lead to additional telemetry collection which can impact billing.
192+
Broad conditions can unintentionally target containers on your host. For example, using a containers `cel_selector` like `!container.image.reference.matches("nginx")` selects **every** container on the host except nginx, including system components and likely unrelated applications. This can lead to additional telemetry collection which can impact billing.
193193

194194
</div>
195195

196-
To globally exclude particular workloads from being collected regardless of the check integration, refer to the [Container Discovery Management][5] documentation.
196+
To globally exclude particular workloads from being collected regardless of the check integration, see the [Container Discovery Management][5] documentation.
197197

198198
## Further Reading
199199

0 commit comments

Comments
 (0)