You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/en/containers/guide/ad_identifiers.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -111,12 +111,12 @@ If you want to apply different configuration templates to containers running the
111
111
112
112
## Advanced container identifiers
113
113
114
-
For use cases which require further granularity on Agent v7.74.0+, you can use the `cel_selector` check configuration option to target specific containers based on additional container attributes. These rules are based on the [Common Expression Language][3] syntax.
114
+
For use cases which require further granularity on Agent v7.73.0+, you can use the `cel_selector` check configuration option to target specific containers based on additional container attributes. These rules are based on the [Common Expression Language][3] syntax.
115
115
116
116
Note: To be a valid Autodiscovery configuration, the check configuration must either include an `ad_identifier` or `cel_selector` container rule with the `container.image.reference` parameter.
117
117
118
118
**Example**:
119
-
The following Nginx Autodiscovery configuration template designates a container image with the name `nginx` on two selected namespaces. Separately listed conditions are joined together through an **OR** operation.
119
+
The following NGINX Autodiscovery configuration template designates a container image with the name `nginx` on two selected namespaces. Separately listed conditions are joined together through an **OR** operation.
| `container.image.reference` | The full reference of the container image (repo, tag/digest). |
133
+
| `container.image.reference` | The full reference of the container image (registry, repo, tag/digest). |
134
134
| `container.pod.name` | The name of the pod running the container. |
135
135
| `container.pod.namespace` | The Kubernetes namespace of the pod. |
136
-
| `container.pod.annotations` | The annotations applied to the pod (key–value map). |
136
+
| `container.pod.annotations` | The annotations applied to the pod (key-value map). |
137
137
138
138
These attributes can be used with the [CEL syntax][4] to define rules to select specific containers for check scheduling. Below is a list of example rules that could be defined:
To select the container running an image containing the substring `nginx`:
172
+
To select the container running an image with the substring `nginx`:
173
173
174
174
```yaml
175
175
cel_selector:
@@ -189,11 +189,11 @@ cel_selector:
189
189
190
190
<div class="alert alert-danger">
191
191
192
-
Broad conditions can unintentionally target containers on your host. For example, using a containers `cel_selector` like `container.image.reference != "nginx"` selects **every** container on the host except nginx, including system components and likely unrelated applications. This can lead to additional telemetry collection which can impact billing.
192
+
Broad conditions can unintentionally target containers on your host. For example, using a containers `cel_selector` like `!container.image.reference.matches("nginx")` selects **every** container on the host except nginx, including system components and likely unrelated applications. This can lead to additional telemetry collection which can impact billing.
193
193
194
194
</div>
195
195
196
-
To globally exclude particular workloads from being collected regardless of the check integration, refer to the [Container Discovery Management][5] documentation.
196
+
To globally exclude particular workloads from being collected regardless of the check integration, see the [Container Discovery Management][5] documentation.
0 commit comments