NETOBSERV-2545: Add quick filters for external traffic#2271
NETOBSERV-2545: Add quick filters for external traffic#2271jotak merged 3 commits intonetobserv:mainfrom
Conversation
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## main #2271 +/- ##
==========================================
- Coverage 73.55% 73.47% -0.09%
==========================================
Files 88 88
Lines 9780 9780
==========================================
- Hits 7194 7186 -8
- Misses 2146 2149 +3
- Partials 440 445 +5
Flags with carried forward coverage won't be shown. Click here to find out more.
🚀 New features to boost your workflow:
|
|
New changes are detected. LGTM label has been removed. |
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
|
@jotak: This pull request references NETOBSERV-2545 which is a valid jira issue. Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.22.0" version, but no target version was set. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
@jotak: This pull request references NETOBSERV-2545 which is a valid jira issue. Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.22.0" version, but no target version was set. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
@jotak: This pull request references NETOBSERV-2545 which is a valid jira issue. Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.22.0" version, but no target version was set. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
/ok-to-test |
|
New images:
They will expire after two weeks. To deploy this build: # Direct deployment, from operator repo
IMAGE=quay.io/netobserv/network-observability-operator:c34a0f6 make deploy
# Or using operator-sdk
operator-sdk run bundle quay.io/netobserv/network-observability-operator-bundle:v0.0.0-sha-c34a0f6Or as a Catalog Source: apiVersion: operators.coreos.com/v1alpha1
kind: CatalogSource
metadata:
name: netobserv-dev
namespace: openshift-marketplace
spec:
sourceType: grpc
image: quay.io/netobserv/network-observability-operator-catalog:v0.0.0-sha-c34a0f6
displayName: NetObserv development catalog
publisher: Me
updateStrategy:
registryPoll:
interval: 1m |
|
I'm trying to understand how this works and what flows I will see. Let's just take the "External ingress" case. The filter is:
|
Right, good point. Also I haven't thought much about the non-openshift case, maybe I should make it openshift-only.
I'd recommend to take this PR in the light of my blog here: netobserv/netobserv.github.io#29 You're right about the doc, I should add that in the subnet labels doc
yes, only the first |
|
Let's document the expectations and requirements, and provide clarity on what "External ingress" is (e.g. only the flow part of a conversation where the source is external). Perhaps, add a tooltip to point to an online documentation. One way to remove the requirement that external CIDRs must begin with "EXT:" for this to work is to have a separate field for object type instead of overloading subnet label. It will need one for source and destination. The object type will have a fixed set of enum values like "pod", "service", "external", etc., similar to what |
21bfa43 to
1ffefa6
Compare
done
I'm not convinced extra doc is needed here, I don't feel there's anything unexpected in how it's done. Traffic between openshift-ingress and internal workloads IS cluster traffic, I don't think it's ambiguous.
yeah, we can improve that in a follow-up; but let's try to not create any breaking change, if users start to leverage the EXT prefix already. We could just make it so that when the object type is "external", the prefix is automatically added, but the end result is the same with the label |
1ffefa6 to
5a730c7
Compare
|
/label qe-approved |
|
@jotak: This pull request references NETOBSERV-2545 which is a valid jira issue. Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.22.0" version, but no target version was set. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |

Description
Now that external traffic detection starts getting quite accurate, adding a quick filter looks like a quick win:
Dependencies
n/a
Checklist
If you are not familiar with our processes or don't know what to answer in the list below, let us know in a comment: the maintainers will take care of that.