You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
To observe what the CLI deploys on your cluster, you can run the `oc events -n netobserv-cli -w` command to watch all the events happening in the `netobserv-cli` namespace.
19
19
20
-
The result will look like:
20
+
The result look like:
21
21
```sh
22
22
LAST SEEN TYPE REASON OBJECT MESSAGE
23
23
0s Normal SuccessfulCreate DaemonSet/netobserv-cli Created pod: netobserv-cli-t2vlr
@@ -41,9 +41,9 @@ LAST SEEN TYPE REASON OBJECT MESSAGE
41
41
```
42
42
43
43
## North / South and East / West traffic
44
-
The CLI is able to read configurations from `cluster-config-v1` and `network` to identify **Machine**, **Pods**, and **Services** subnets using the `--get-subnets` option. This will automatically add `SrcSubnetLabel` and `DstSubnetLabel` to your flows.
44
+
The CLI is able to read configurations from `cluster-config-v1` and `network` to identify **Machine**, **Pods**, and **Services** subnets using the `--get-subnets` option. This automatically add `SrcSubnetLabel` and `DstSubnetLabel` to your flows.
45
45
46
-
You will see subnets being configured during the creation of the agents:
46
+
You can see subnets being configured during the creation of the agents:
**WARNING: Running regexes filters means that all the flows are captured and enriched before applying this filter stage in the pipeline. To avoid performance impact on your cluster, use eBPF filters such as IPs, Ports and Protocol as most as possible.**
69
69
70
-
The output will now only show**Pods** to **Services** flows:
70
+
The output is now only showing**Pods** to **Services** flows:
@@ -88,7 +88,7 @@ Since we don't know what we are looking for yet, we should enable all the featur
88
88
--enable_all
89
89
```
90
90
91
-
By clicking on the pod name, we can see that our current pod IP is `10.129.0.48`. To capture all the traffic going in and out of this pod, we will use the filter:
91
+
By clicking on the pod name, we can see that our current pod IP is `10.129.0.48`. To capture all the traffic going in and out of this pod, we use the filter:
92
92
```sh
93
93
--peer_ip=10.129.0.48
94
94
```
@@ -105,12 +105,12 @@ Finally, you can add a node selector label on top:
105
105
106
106
**WARNING: Running the capture without filtering is also an option, but it is not recommended as it collects all the flows of the cluster. Depending of the size of your cluster, this could be a lot and make the collector pod crash.**
107
107
108
-
All together, the command to run flow capture with all the features on our pod IP will be:
108
+
All together, the command to run flow capture with all the features on our pod IP is:
@@ -163,7 +163,7 @@ INFO[0000] flows table created
163
163
164
164
At this stage, the collector wait for incoming data. If nothing shows yet, it means that no traffic is captured. Try to open the route of your application or update the filters of the capture.
165
165
166
-
Once some traffic is captured, the output will look like:
166
+
Once some traffic is captured, the output look like:
Cycle to the **network events** view. In this capture, we see that the traffic is blocked by a network policy since it reports the `NetpolNamespace` event.
@@ -188,7 +188,7 @@ spec:
188
188
Once you updated your policies, you can give another try to your route until you fix the issue:
Once you are done, simply press `CTRL + C` to exit. Your capture will be copied to your local machine for post mortem analysis.
210
+
Once you are done, simply press `CTRL + C` to exit. Your capture is copied to your local machine for post mortem analysis.
211
211
212
212
That's the end of the first scenario about connectivity checks !
213
213
214
214
## User Defined Network (Tech Preview)
215
215
216
-
As tech preview, you can enrich flows to get User Defined Network (UDNs) information. To do so, you will need to use the `--enable_udn_mapping` option.
216
+
As tech preview, you can enrich flows to get User Defined Network (UDNs) information. To do so, you can use the `--enable_udn_mapping` option.
217
217
218
218
To configure your UDNs, [refer to the official documentation](https://docs.openshift.com/container-platform/4.17/networking/multiple_networks/primary_networks/about-user-defined-networks.html).
219
219
@@ -265,14 +265,14 @@ metadata:
265
265
```
266
266
267
267
Note that `eth0` is the default pod network and `ovn-udn1`is the User Defined Network. We are going to filter on its IP: `10.0.0.4`.
268
-
As this IP is not unique across the cluster, we can add a filter on the port `8080` which will be used in this example and the node annotation `kubernetes.io/hostname=ci-ln-cfqkhfb-72292-6l8l5-worker-c-lrr4q` matching the node running this pod.
268
+
As this IP is not unique across the cluster, we can add a filter on the port `8080` which is used in this example and the node annotation `kubernetes.io/hostname=ci-ln-cfqkhfb-72292-6l8l5-worker-c-lrr4q` matching the node running this pod.
Similarly to the previous scenario, the script connects to your cluster and starts deploying the eBPF agents and collector pod but capturing full packet content this time.
294
294
295
-
Once first packet is captured, you will see a table with the amount of packets and bytes:
295
+
Once first packet is captured, you see a table with the amount of packets and bytes:
0 commit comments