Skip to content

Commit 582303b

Browse files
committed
OSDOCS-14366 Additional context concept about the multi-flow filtering capability
1 parent 4f2240a commit 582303b

File tree

1 file changed

+5
-3
lines changed

1 file changed

+5
-3
lines changed

modules/network-observability-ebpf-rule-flow-filter.adoc

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,13 +5,15 @@
55
:_mod-docs-content-type: CONCEPT
66
[id="network-observability-ebpf-flow-rule-filter_{context}"]
77
= eBPF flow rule filter
8-
You can use rule-based filtering to control the volume of packets cached in the eBPF flow table. For example, a filter can specify that only packets coming from port 100 should be recorded. Then only the packets that match the filter are cached and the rest are not cached.
8+
You can use rule-based filtering to control the volume of packets cached in the eBPF flow table. For example, a filter can specify that only packets coming from port 100 should be recorded. Then only the packets that match the filter are cached and the rest are not cached.
9+
10+
You can apply multiple filter rules to control the volume of packets cached in the eBPF flow table, and add a webhook check to prevent CIDR duplication.
911

1012
[id="ingress-and-egress-traffic-filtering_{context}"]
1113
== Ingress and egress traffic filtering
12-
CIDR notation efficiently represents IP address ranges by combining the base IP address with a prefix length. For both ingress and egress traffic, the source IP address is first used to match filter rules configured with CIDR notation. If there is a match, then the filtering proceeds. If there is no match, then the destination IP is used to match filter rules configured with CIDR notation.
14+
CIDR notation efficiently represents IP address ranges by combining the base IP address with a prefix length. For both ingress and egress traffic, the source IP address is first used to match filter rules configured with CIDR notation. If there is a match, then the filtering proceeds. If there is no match, then the destination IP is used to match filter rules configured with CIDR notation.
1315

14-
After matching either the source IP or the destination IP CIDR, you can pinpoint specific endpoints using the `peerIP` to differentiate the destination IP address of the packet. Based on the provisioned action, the flow data is either cached in the eBPF flow table or not cached.
16+
After matching either the source IP or the destination IP CIDR, you can pinpoint specific endpoints using the `peerIP` to differentiate the destination IP address of the packet. Based on the provisioned action, the flow data is either cached in the eBPF flow table or not cached.
1517

1618
[id="dashboard-and-metrics-integrations_{context}"]
1719
== Dashboard and metrics integrations

0 commit comments

Comments
 (0)