Excluding generic Network devices from Service Discovery

We are using Check_mk to monitor our Kubernetes nodes. Unfortunately whenever a new pod is created, a generic nework-device, eg [cali0611d97dacb] (up) MAC: EE:EE:EE:EE:EE:EE, 10 Gbit/s is created.

How can I filter them from Service Discovery or create a rule that disables them by default?

Thnx in advance.

After trying around for a while I found the following solution:

I created the following rules under Monitoring Configuration/Disabled Services

  1. Negative Match, with a list of all Interfaces I want to monitor and a label matching the kubernets nodes
  2. Positive Match with a regex Interface.* and a label matching the kubernetes nodes

Imporant to note that the order is important. Now I’m not diturbed about pods starting / terminating anymore. :+1:

1 Like

More easy solution. Use the interface description as name and ignore all interfaces starting with “cali”.