Skip to content

Commit e1ce6ae

Browse files
Merge pull request #94524 from ovalenti/ovalenti/external-IPs-GA
[RHACS] Documentation updates for ROX#29130: External IPs GA
2 parents e5dcec2 + 6f7b264 commit e1ce6ae

4 files changed

+22
-47
lines changed

modules/enabling-external-ip-collection-central.adoc

Lines changed: 0 additions & 36 deletions
This file was deleted.

modules/visualizing-external-entities-known-limitations.adoc

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,10 @@
88
[role="_abstract"]
99
The following are some known limitations of the Visualizing external entities feature:
1010

11-
* When you enable external IP collection for a cluster, Collector in those clusters report more information to Sensor and to Central. This might create scalability issues if the workload in the cluster communicates with a large number of distinct external peers. It is recommended that you do not enable this feature on clusters with communication patterns involving more than 10,000 distinct external entities.
1211
* You cannot see external IP addresses if they are part of CIDR blocks.
13-
* When you enable external IP collection, external IP addresses might appear in a deployment's network baseline.
12+
* When you enable external IP collection for a cluster, the Collector in those clusters reports more information to Sensor and Central. Enabling external IP collection might create scalability issues if the workload in the cluster communicates with a large number of distinct external peers. Red{nbsp}Hat recommends that you turn off this feature on clusters with communication patterns involving more than 10,000 distinct external entities. However, if the pattern is mostly ingress or egress, you can overcome the scaling issue by enabling external IPs only in the opposite direction. For more information, see "Using Collector runtime configuration" in the Additional resources section.
13+
+
14+
[NOTE]
15+
====
16+
During a test, Red{nbsp}Hat generated 20 flows per second with external entities, leading to a daily increase of 450 MB in Central memory usage. This memory persisted even after deleting the deployments. Turning off external IPs at the Collector level stops further memory growth in Central caused by external IPs. To clear most of the memory used by external IPs, turn off external IPs at the Central level by setting the `ROX_EXTERNAL_IPS` environment variable to `false` and the `ROX_EXTERNAL_IPS_PRUNING` environment variable to `true`.
17+
====

operating/using-collector-runtime-configuration.adoc

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,21 +4,22 @@
44
include::modules/common-attributes.adoc[]
55

66
:FeatureName: Using Collector runtime configuration
7-
include::snippets/technology-preview.adoc[]
87
:!FeatureName:
98

109
toc::[]
1110

1211
[role="_abstract"]
13-
Collector runtime configuration enables you to modify some collector behaviors without restarting Collector. Collector runtime configuration is set using a `ConfigMap` object called `collector-config`. When you create or update the `ConfigMap` object, Collector refreshes the runtime configuration. When you delete the `ConfigMap` object, the settings revert to the default runtime configuration values.
12+
You can use the Collector runtime configuration to modify some collector behaviors without restarting Collector. Set the Collector runtime configuration by using a `ConfigMap` object called `collector-config`. When you create or update the `ConfigMap` object, Collector refreshes the runtime configuration. When you delete the `ConfigMap` object, the settings revert to the default runtime configuration values.
1413

15-
Currently, only two settings are controlled by using Collector runtime configuration:
14+
You can control the following settings using the Collector runtime configuration:
1615

1716
* `networking.externalIps.enabled` controls if the visualizing external entities feature is enabled or disabled. The default is `DISABLED`. In release 4.6, this setting was `networking.externalIps.enable` and was a boolean. For more information, see xref:../operating/visualizing-external-entities.adoc#visualizing-external-entities[Visualizing external entities].
1817
18+
* `networking.externalIps.direction` specifies the direction for collecting external IPs. The values are `INGRESS`, `EGRESS`, or `BOTH` (default). For example, when you select `EGRESS` it provides details for all outgoing connections while aggregating the incoming ones.
19+
1920
* `networking.maxConnectionsPerMinute` is the maximum number of open networking connections reported by Collector per container per minute. The default value is 2048.
2021
21-
The following example enables the visualizing external entities feature and sets `maxConnectionsPerMinute` to 2048.
22+
The following example enables the visualizing external entities for outgoing connections only and sets `maxConnectionsPerMinute` to 2048.
2223

2324
[source,yaml]
2425
----
@@ -32,6 +33,8 @@ data:
3233
networking:
3334
externalIps:
3435
enabled: ENABLED
36+
direction: EGRESS <2>
3537
maxConnectionsPerMinute: 2048
3638
----
3739
<1> {product-title-short} mounts this file at `/etc/stackrox/runtime_config.yaml`.
40+
<2> The `direction` setting is optional. If you do not specify it, the default value is `BOTH`, which collects both ingress and egress connections.

operating/visualizing-external-entities.adoc

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,25 +7,29 @@ include::modules/common-attributes.adoc[]
77
toc::[]
88

99
:FeatureName: Visualizing external entities
10-
include::snippets/technology-preview.adoc[]
1110
:!FeatureName:
1211

1312
[role="_abstract"]
1413

1514
Understanding the interactions between your cluster and external entities is essential for incident response and network policy management. With the Visualizing external entities feature, you can view the external IP addresses that interact with your cluster.
1615

17-
You can view external entities in the Network Graph by selecting the External Entities graph node or query external entities by using the API.
16+
You can view external entities in the Network Graph by selecting the External Entities graph node or by checking the deployment flows tab.
17+
18+
You can also query external entities using the API.
1819

1920
[NOTE]
2021
====
21-
Visualizing external entities is an opt-in feature that is disabled by default. To enable this feature, you must enable external IP collection in Central and secured clusters, as described in the following sections.
22+
Visualizing external entities is an opt-in feature that is disabled by default. To enable this feature, you must enable external IP collection in secured clusters, as described in the following section.
2223
====
2324

24-
include::modules/enabling-external-ip-collection-central.adoc[leveloffset=+1]
25-
2625
include::modules/enabling-external-ip-collection-secured-clusters.adoc[leveloffset=+1]
2726

2827
include::modules/querying-external-entities-using-api.adoc[leveloffset=+1]
2928

3029
include::modules/visualizing-external-entities-known-limitations.adoc[leveloffset=+1]
3130

31+
[role="_additional-resources"]
32+
[id="additional-resources_{context}"]
33+
== Additional resources
34+
35+
* xref:../operating/using-collector-runtime-configuration.adoc#using-collector-runtime-configuration[Using collector runtime configuration]

0 commit comments

Comments
 (0)