Uploaded image for project: 'Network Observability'
  1. Network Observability
  2. NETOBSERV-628

Categorization of unknown IPs

    • Icon: Epic Epic
    • Resolution: Unresolved
    • Icon: Undefined Undefined
    • None
    • None
    • Console Plugin
    • None
    • netobserv-ip-categorization
    • False
    • None
    • False
    • Not Selected
    • To Do
    • 40
    • 40% 40%

      It happens frequently that some captured source or destination IPs cannot be matched with any known kube object. These IPs can be internal to the cluster, or external.

      To help users troubleshooting and understand what these IPs could be (or could not be), we can categorize them accordingly to the cluster network configuration. It will save time for the users trying to understand what they could be.

       

      Here's an example of what we could show with this feature, identifying traffic here to Amazon S3: (this is from a PoC)

       

       

      Also, in OpenShift, cluster networking is configured with "clusterNetwork", "machineNetwork" and "serviceNetwork" CIDR. IPs that we can't match with any kube object can then, as a fallback, be matched against these CIDRs, or other CIDRs configured by users. IPs not matching any of them should be assumed "external".

      In the console plugin UI, this categorisation should be made visible (table, topology, ...)

            jtakvori Joel Takvorian
            jtakvori Joel Takvorian
            Votes:
            0 Vote for this issue
            Watchers:
            2 Start watching this issue

              Created:
              Updated: