From 8931dddb246c94de9e136376b0c2a7f6af4deb29 Mon Sep 17 00:00:00 2001 From: Christopher Tauchen Date: Wed, 23 Jul 2025 10:16:21 +0100 Subject: [PATCH] Add flow logs limitation for ALP --- calico-cloud/network-policy/application-layer-policies/alp.mdx | 2 ++ .../network-policy/application-layer-policies/alp.mdx | 2 ++ .../network-policy/application-layer-policies/alp.mdx | 2 ++ .../network-policy/application-layer-policies/alp.mdx | 2 ++ .../network-policy/application-layer-policies/alp.mdx | 2 ++ .../network-policy/application-layer-policies/alp.mdx | 2 ++ 6 files changed, 12 insertions(+) diff --git a/calico-cloud/network-policy/application-layer-policies/alp.mdx b/calico-cloud/network-policy/application-layer-policies/alp.mdx index 44d1a27229..6009b8e23b 100644 --- a/calico-cloud/network-policy/application-layer-policies/alp.mdx +++ b/calico-cloud/network-policy/application-layer-policies/alp.mdx @@ -17,6 +17,8 @@ Application layer policies let you configure access controls based on L7 attribu * Supported protocols are limited to TCP-based protocols (for example, HTTP, HTTPS, or gRPC). * Application layer policies apply to the entire cluster. They can not be namespaced. +* Logs for application layer polices are not included with other L7 logs in Service Graph. + To view logs for application layer policies, you must [view them in Kibana](../../observability/elastic/l7/configure.mdx#kibana). * Application layer policy is supported only on Kubernetes 1.29 and later. :::important diff --git a/calico-cloud_versioned_docs/version-21-2/network-policy/application-layer-policies/alp.mdx b/calico-cloud_versioned_docs/version-21-2/network-policy/application-layer-policies/alp.mdx index bb522897b7..815e663ca6 100644 --- a/calico-cloud_versioned_docs/version-21-2/network-policy/application-layer-policies/alp.mdx +++ b/calico-cloud_versioned_docs/version-21-2/network-policy/application-layer-policies/alp.mdx @@ -17,6 +17,8 @@ Application layer policies let you configure access controls based on L7 attribu * Supported protocols are limited to TCP-based protocols (for example, HTTP, HTTPS, or gRPC). * Application layer policies apply to the entire cluster. They can not be namespaced. +* Logs for application layer polices are not included with other L7 logs in Service Graph. + To view logs for application layer policies, you must [view them in Kibana](../../observability/elastic/l7/configure.mdx#kibana). * Application layer policy is supported only on Kubernetes 1.29 and later. :::important diff --git a/calico-enterprise/network-policy/application-layer-policies/alp.mdx b/calico-enterprise/network-policy/application-layer-policies/alp.mdx index c3d333aa22..2ea19c96fc 100644 --- a/calico-enterprise/network-policy/application-layer-policies/alp.mdx +++ b/calico-enterprise/network-policy/application-layer-policies/alp.mdx @@ -17,6 +17,8 @@ Application layer policies let you configure access controls based on L7 attribu * Supported protocols are limited to TCP-based protocols (for example, HTTP, HTTPS, or gRPC). * Application layer policies apply to the entire cluster. They can not be namespaced. +* Logs for application layer polices are not included with other L7 logs in Service Graph. + To view logs for application layer policies, you must [view them in Kibana](../../observability/elastic/l7/configure.mdx#kibana). * Application layer policy is supported only on Kubernetes 1.29 and later. :::important diff --git a/calico-enterprise_versioned_docs/version-3.20-2/network-policy/application-layer-policies/alp.mdx b/calico-enterprise_versioned_docs/version-3.20-2/network-policy/application-layer-policies/alp.mdx index be1b5ca73d..8193b921f5 100644 --- a/calico-enterprise_versioned_docs/version-3.20-2/network-policy/application-layer-policies/alp.mdx +++ b/calico-enterprise_versioned_docs/version-3.20-2/network-policy/application-layer-policies/alp.mdx @@ -17,6 +17,8 @@ Application layer policies let you configure access controls based on L7 attribu * Supported protocols are limited to TCP-based protocols (for example, HTTP, HTTPS, or gRPC). * Application layer policies apply to the entire cluster. They can not be namespaced. +* Logs for application layer polices are not included with other L7 logs in Service Graph. + To view logs for application layer policies, you must [view them in Kibana](../../observability/elastic/l7/configure.mdx#kibana). * Application layer policy is supported only on Kubernetes 1.29 and later. :::important diff --git a/calico-enterprise_versioned_docs/version-3.21-2/network-policy/application-layer-policies/alp.mdx b/calico-enterprise_versioned_docs/version-3.21-2/network-policy/application-layer-policies/alp.mdx index c558e7b0c6..518300e2ea 100644 --- a/calico-enterprise_versioned_docs/version-3.21-2/network-policy/application-layer-policies/alp.mdx +++ b/calico-enterprise_versioned_docs/version-3.21-2/network-policy/application-layer-policies/alp.mdx @@ -17,6 +17,8 @@ Application layer policies let you configure access controls based on L7 attribu * Supported protocols are limited to TCP-based protocols (for example, HTTP, HTTPS, or gRPC). * Application layer policies apply to the entire cluster. They can not be namespaced. +* Logs for application layer polices are not included with other L7 logs in Service Graph. + To view logs for application layer policies, you must [view them in Kibana](../../observability/elastic/l7/configure.mdx#kibana). * Application layer policy is supported only on Kubernetes 1.29 and later. :::important diff --git a/calico-enterprise_versioned_docs/version-3.22-1/network-policy/application-layer-policies/alp.mdx b/calico-enterprise_versioned_docs/version-3.22-1/network-policy/application-layer-policies/alp.mdx index c3d333aa22..2ea19c96fc 100644 --- a/calico-enterprise_versioned_docs/version-3.22-1/network-policy/application-layer-policies/alp.mdx +++ b/calico-enterprise_versioned_docs/version-3.22-1/network-policy/application-layer-policies/alp.mdx @@ -17,6 +17,8 @@ Application layer policies let you configure access controls based on L7 attribu * Supported protocols are limited to TCP-based protocols (for example, HTTP, HTTPS, or gRPC). * Application layer policies apply to the entire cluster. They can not be namespaced. +* Logs for application layer polices are not included with other L7 logs in Service Graph. + To view logs for application layer policies, you must [view them in Kibana](../../observability/elastic/l7/configure.mdx#kibana). * Application layer policy is supported only on Kubernetes 1.29 and later. :::important