Dieser Inhalt ist in der von Ihnen ausgewählten Sprache nicht verfügbar.

Chapter 8. Network Policy


As an administrator, you can create a network policy for the

netobserv
namespace. This policy secures inbound and outbound access to the Network Observability Operator.

You can set up ingress and egress network policies to control pod traffic. This enhances security and collects only the network flow data you need. This reduces noise, supports compliance, and improves visibility into network communication.

You can configure the

FlowCollector
custom resource (CR) to deploy an egress and ingress network policy for network observability. By default, the
spec.NetworkPolicy.enable
specification is set to
true
.

If you have installed Loki, Kafka or any exporter in a different namespace that also has a network policy, you must ensure that the network observability components can communicate with them. Consider the following about your setup:

  • Connection to Loki (as defined in the
    FlowCollector
    CR
    spec.loki
    parameter)
  • Connection to Kafka (as defined in the
    FlowCollector
    CR
    spec.kafka
    parameter)
  • Connection to any exporter (as defined in FlowCollector CR
    spec.exporters
    parameter)
  • If you are using Loki and including it in the policy target, connection to an external object storage (as defined in your
    LokiStack
    related secret)

Procedure

  1. In the web console, go to Operators Installed Operators page.
  2. Under the Provided APIs heading for Network Observability, select Flow Collector.
  3. Select cluster then select the YAML tab.
  4. Configure the

    FlowCollector
    CR. A sample configuration is as follows:

    Example FlowCollector CR for network policy

    apiVersion: flows.netobserv.io/v1beta2
    kind: FlowCollector
    metadata:
      name: cluster
    spec:
      namespace: netobserv
      networkPolicy:
        enable: true 
    1
    
        additionalNamespaces: ["openshift-console", "openshift-monitoring"] 
    2
    
    # ...

    1
    By default, the enable value is true.
    2
    Default values are ["openshift-console", "openshift-monitoring"].
Red Hat logoGithubredditYoutubeTwitter

Lernen

Testen, kaufen und verkaufen

Communitys

Über Red Hat Dokumentation

Wir helfen Red Hat Benutzern, mit unseren Produkten und Diensten innovativ zu sein und ihre Ziele zu erreichen – mit Inhalten, denen sie vertrauen können. Entdecken Sie unsere neuesten Updates.

Mehr Inklusion in Open Source

Red Hat hat sich verpflichtet, problematische Sprache in unserem Code, unserer Dokumentation und unseren Web-Eigenschaften zu ersetzen. Weitere Einzelheiten finden Sie in Red Hat Blog.

Über Red Hat

Wir liefern gehärtete Lösungen, die es Unternehmen leichter machen, plattform- und umgebungsübergreifend zu arbeiten, vom zentralen Rechenzentrum bis zum Netzwerkrand.

Theme

© 2026 Red Hat
Nach oben