-
Feature Request
-
Resolution: Unresolved
-
Normal
-
None
-
None
-
None
-
None
-
Product / Portfolio Work
-
None
-
False
-
-
None
-
None
-
None
-
-
None
-
None
-
None
-
None
-
None
- Proposed title of this feature request
Graphical visualization of traffic flow between pods in a namespace - What is the nature and description of the request?
The request is to enhance the OpenShift Web Console by adding a visual network traffic flow view that allows users to select one or more namespaces and observe pod-to-pod and namespace-to-namespace traffic flow when NetworkPolicies are applied. - Why does the customer need this? (List the business requirements here)
- Clear visibility into NetworkPolicy impact
Helps customers immediately understand whether an applied NetworkPolicy is blocking traffic between specific pods or namespaces. - Reduced operational risk
Prevents accidental service outages caused by overly restrictive NetworkPolicies by allowing users to visually validate policies before and after deployment. - Improved user experience for non-network experts
Makes Kubernetes networking more approachable for developers and platform engineers who are not deeply familiar with NetworkPolicy semantics. - Better multi-namespace and multi-tenant visibility
Especially valuable in multi-tenant clusters where traffic between namespaces must be tightly controlled and clearly understood.
- Reduced dependency on CLI tools and logs
Minimizes the need to inspect OVN flows, iptables, or CNI logs, which are complex and time-consuming.
- List any affected packages or components.
- is blocked by
-
OCPSTRAT-1635 OVN Observability with Sampling (GA)
-
- In Progress
-
- relates to
-
NETOBSERV-2092 Network events / drops UX
-
- To Do
-
-
OCPSTRAT-488 OVN Observability with Sampling (tech preview)
-
- Closed
-