Dieser Inhalt ist in der von Ihnen ausgewählten Sprache nicht verfügbar.

Chapter 21. Using the Skupper console


You can use the Skupper console to monitor and troubleshoot your application network. The console provides a visual overview of the sites, links, services, and communication metrics.

Prerequisites

  • Access to an Kubernetes cluster with Network Observer installed.
  • A site is created in a namespace

Procedure

  1. Change context to the site namespace.
  2. If you are using the OpenShift console:

    1. Navigate to Operators Installed Operators.
    2. Choose Red Hat Service Interconnect Network Observer Operator from the list of available Operators, and then click Create Instance.
  3. If you are not using the OpenShift console:

    1. Create a file named network-observer.yaml with the following CR:

      apiVersion: observability.skupper.io/v2alpha1
      kind: NetworkObserver
      metadata:
        name: networkobserver-sample
        namespace: west
      spec: {}
      Copy to Clipboard Toggle word wrap

      Change the namespace value to match the site namespace.

  4. Apply the CR YAML:

    $ kubectl apply -f network-observer.yaml
    Copy to Clipboard Toggle word wrap
  5. Determine the console URL:

    kubectl get --namespace west -o jsonpath="{.spec.host}" route networkobserver-sample-network-observer
    Copy to Clipboard Toggle word wrap
  6. Navigate to the console.

21.1. Configuring the Network observer

Currently the primary purpose of the Network Observer is to provide a console for monitoring your application network. This section describes advanced configuration.

  1. Change context to a site namespace.
  2. Apply a CR to create the Network Observer instance

    The following CR shows the supported parameters that you can use to configure the Network observer instance:

    apiVersion: observability.skupper.io/v2alpha1
    kind: NetworkObserver
    metadata:
      name: networkobserver-sample
      namespace: west
    spec:
      # Resource requests and limits
      resources:
        requests:
          cpu: "250m"
          memory: "4Gi"
        limits:
          cpu: "1"
          memory: "8Gi"
    
      # Authentication strategies
      auth:
        # strategy is one of none, basic, or openshift
        strategy: "openshift"
        openshift:
          # createCookieSecret -
          # for the openshift oauth2 proxy.
          createCookieSecret: true
          # cookieSecretName name of the session cookie secret.
          cookieSecretName: ""
          # Service account for openshift auth
          serviceAccount:
            create: true
            nameOverride: ""
    Copy to Clipboard Toggle word wrap
  3. Verify the configuration, enter:

    oc describe networkobserver networkobserver-sample -n west
    Copy to Clipboard Toggle word wrap

    Note that the parameters listed in output, not related to the CR above, are not configurable.

Troubleshooting

If you are concerned about Network Observer resources, consider using standard techniques to monitor those resources. The following example demonstrates how to configure a Prometheus alert that triggers when memory usage exceeds 90% of the defined limit.

apiVersion: monitoring.coreos.com/v1
kind: PrometheusRule
metadata:
  name: network-observer-memory-alert
  namespace: west
spec:
  groups:
  - name: network-observer.rules
    rules:
    - alert: NetworkObserverHighMemory
      expr: |
        (container_memory_working_set_bytes{namespace="west", container="network-observer"}
        /
        kube_pod_container_resource_limits{namespace="west", container="network-observer", resource="memory"}) > 0.9
      for: 5m
      labels:
        severity: warning
      annotations:
        summary: "Network Observer pod in namespace {{ $labels.namespace }} is using > 90% of its memory limit."
        description: "Pod {{ $labels.pod }} is currently using {{ $value | humanizePercentage }} of its memory limit."
Copy to Clipboard Toggle word wrap
Red Hat logoGithubredditYoutubeTwitter

Lernen

Testen, kaufen und verkaufen

Communitys

Über Red Hat Dokumentation

Wir helfen Red Hat Benutzern, mit unseren Produkten und Diensten innovativ zu sein und ihre Ziele zu erreichen – mit Inhalten, denen sie vertrauen können. Entdecken Sie unsere neuesten Updates.

Mehr Inklusion in Open Source

Red Hat hat sich verpflichtet, problematische Sprache in unserem Code, unserer Dokumentation und unseren Web-Eigenschaften zu ersetzen. Weitere Einzelheiten finden Sie in Red Hat Blog.

Über Red Hat

Wir liefern gehärtete Lösungen, die es Unternehmen leichter machen, plattform- und umgebungsübergreifend zu arbeiten, vom zentralen Rechenzentrum bis zum Netzwerkrand.

Theme

© 2026 Red Hat
Nach oben