Skip to content

Commit 8b8f5b0

Browse files
committed
even more netutrality
1 parent dd8ba7f commit 8b8f5b0

File tree

2 files changed

+5
-9
lines changed

2 files changed

+5
-9
lines changed

README.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,9 @@ Flow data is then available in multiple ways, each optional:
2020
You can install the NetObserv Operator using [Helm](https://helm.sh/), or directly from sources.
2121

2222
> [!TIP]
23-
> If you are running on OpenShift, please refer to the [product documentation](https://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/network_observability/installing-network-observability-operators) instead. NetObserv is referred to as the Network Observability operator there.
23+
NetObserv can be used in downstream products, which may provide their own documentation. If you are using such a product, please refer to that documentation instead:
24+
>
25+
> - On OpenShift: [see Network Observability operator](https://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/network_observability/installing-network-observability-operators).
2426
2527
### Pre-requisite
2628

@@ -56,8 +58,6 @@ helm install my-netobserv -n netobserv --create-namespace --set install.loki=tru
5658

5759
# OR minimal install (Prometheus/Loki must be installed separately)
5860
helm install my-netobserv -n netobserv --create-namespace netobserv/netobserv-operator
59-
60-
# If you're in OpenShift, you can use "--set standaloneConsole.enable=false" to use the Console plugin instead.
6161
```
6262

6363
You can now create a `FlowCollector` resource. Refer to the [Configuration section](#configuration) of this document. A short `FlowCollector` should work, using most default values, plus with the standalone console enabled:
@@ -93,7 +93,6 @@ EOF
9393
```
9494

9595
A few remarks:
96-
- `spec.consolePlugin.standalone` can be set to true to deploy the [web console](https://github.com/netobserv/network-observability-console-plugin) as a standalone.
9796
- You can change the Prometheus and Loki URLs depending on your installation. This example works if you use the "standalone" installation described above, with `install.loki=true` and `install.prom-stack=true`. Check more configuration options for [Prometheus](https://github.com/netobserv/network-observability-operator/blob/main/docs/FlowCollector.md#flowcollectorspecprometheus-1) and [Loki](https://github.com/netobserv/network-observability-operator/blob/main/docs/FlowCollector.md#flowcollectorspecloki-1).
9897
- You can enable networkPolicy, which makes the operator lock down the namespaces that it manages; however, this is highly dependent on your cluster topology, and may cause malfunctions, such as preventing NetObserv pods from communicating with the Kube API server.
9998
- The processor env `SERVER_NOTLS` means that the communication between eBPF agents and Flowlogs-pipeline won't be encrypted. To enable TLS, you need to supply the TLS certificates to Flowlogs-pipeline (a Secret named `flowlogs-pipeline-cert`), and the CA to the eBPF agents (a ConfigMap named `flowlogs-pipeline-ca` in the privileged namespace). [Check this issue](https://github.com/netobserv/network-observability-operator/issues/2360) if you want to help making it simpler.
@@ -141,7 +140,7 @@ Historically, Grafana Loki was a strict dependency but it isn't anymore. If you
141140

142141
### Web Console
143142

144-
When `FlowCollector` is installed, a standalone web console is deployed or, if running in OpenShift, an OpenShift Console plugin. It provides the following views:
143+
When `FlowCollector` is installed, a standalone web console is deployed or, when available, a console plugin. It provides the following views:
145144

146145
#### Overview metrics
147146

@@ -257,7 +256,7 @@ More information about multi-tenancy can be found on [this page](https://github.
257256

258257
For a production deployment, it is highly recommended to lock down the `netobserv` namespace (or wherever NetObserv is installed) using network policies.
259258

260-
You can set `spec.networkPolicy.enable` to `true` to make NetObserv install automatically a network policy. The policy may need to be fined-tuned for your environment (e.g. for access to kube apiserver, or Prometheus). It has been mostly tested on OpenShift with OVN-Kubernetes.
259+
You can set `spec.networkPolicy.enable` to `true` to make NetObserv install automatically a network policy. The policy may need to be fined-tuned for your environment (e.g. for access to kube apiserver, or Prometheus), by adding authorized namespaces.
261260

262261
A simple example of network policy is [provided here](https://github.com/netobserv/documents/blob/main/examples/lockdown-netobserv.yaml).
263262

helm/README.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -52,8 +52,6 @@ helm install my-netobserv -n netobserv --create-namespace --set install.loki=tru
5252

5353
# OR minimal install (Prometheus/Loki must be installed separately)
5454
helm install my-netobserv -n netobserv --create-namespace netobserv/netobserv-operator
55-
56-
# If you're in OpenShift, you can use "--set standaloneConsole.enable=false" to use the Console plugin instead.
5755
```
5856

5957
You can now create a `FlowCollector` resource ([full API reference](https://github.com/netobserv/network-observability-operator/blob/main/docs/FlowCollector.md#flowsnetobserviov1beta2)). A short `FlowCollector` should work, using most default values, plus with the standalone console enabled:
@@ -89,7 +87,6 @@ EOF
8987
```
9088

9189
A few remarks:
92-
- `spec.consolePlugin.standalone` can be set to true to deploy the [web console](https://github.com/netobserv/network-observability-console-plugin) as a standalone.
9390
- You can change the Prometheus and Loki URLs depending on your installation. This example works if you use the "standalone" installation described above, with `install.loki=true` and `install.prom-stack=true`. Check more configuration options for [Prometheus](https://github.com/netobserv/network-observability-operator/blob/main/docs/FlowCollector.md#flowcollectorspecprometheus-1) and [Loki](https://github.com/netobserv/network-observability-operator/blob/main/docs/FlowCollector.md#flowcollectorspecloki-1).
9491
- You can enable networkPolicy, which makes the operator lock down the namespaces that it manages; however, this is highly dependent on your cluster topology, and may cause malfunctions, such as preventing NetObserv pods from communicating with the Kube API server.
9592
- The processor env `SERVER_NOTLS` means that the communication between eBPF agents and Flowlogs-pipeline won't be encrypted. To enable TLS, you need to supply the TLS certificates to Flowlogs-pipeline (a Secret named `flowlogs-pipeline-cert`), and the CA to the eBPF agents (a ConfigMap named `flowlogs-pipeline-ca` in the privileged namespace).

0 commit comments

Comments
 (0)