TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Show HN: Alaz: Open-Source, Self-Hosted, eBPF-Based K8s Monitoring

101 pointsby fatihbaltaciover 1 year ago
Hello Everyone,<p>I&#x27;m excited to introduce a new open-source observability platform and would love to hear your feedback.<p>We are aware that there are lots of open-source&#x2F;commercial tools out there. However, we believe that monitoring the clusters and extracting actionable insights requires deep know-how about the tools&#x2F;domain. We mainly focused on this problem.<p>- Alaz is an eBPF agent installed on your K8s cluster as DaemonSet. Thanks to eBPF, Alaz collects traces directly from Linux kernels. This means there&#x27;s no need for sidecars, instrumentations, or service restarts.<p>- The UI not only visualizes data but also provides actionable insights. Using the Service Map, you can:<p><pre><code> - View latencies and RPS between services. - Detect zombie services and underperforming SQL queries. - Monitor golden signals, such as 5xx status codes. </code></pre> In addition, Alaz can capture system resources like CPU, Memory, Disk, and Network through the Prometheus Node Exporter, which is embedded in the agent.<p>Setting up is straightforward: just install Alaz as a DaemonSet, and the platform will handle the rest.<p>Finally, the combination of Alaz and Ddosify Performance Testing makes it possible to do load testing and simultaneously monitor the system to find bottlenecks instantly.<p>For those interested, check out Alaz on GitHub: <a href="https:&#x2F;&#x2F;github.com&#x2F;ddosify&#x2F;alaz">https:&#x2F;&#x2F;github.com&#x2F;ddosify&#x2F;alaz</a><p>Your feedback would be greatly appreciated!

10 comments

bisilarover 1 year ago
First and foremost, congratulations on launching such an innovative project! Your unique approach seems to significantly simplify the process of observing and gaining insights into Kubernetes clusters.<p>The fact that Alaz can collect traces directly from Linux kernels without the need for sidecars, instrumentation, or service restarts is truly impressive. Additionally, having a UI that not only visualizes data but also provides actionable insights is a great advantage.<p>I&#x27;m eager to follow your product closely and can&#x27;t wait to try it out when the opportunity arises. I&#x27;ve starred the project on GitHub and am excited about its progress. Best wishes for your continued success!
评论 #37412322 未加载
efatnarover 1 year ago
I will be honest with y&#x27;all, whenever someone coming with add-on sw launched into kernel I get anxiety attack as a platform engineer. This is very fragile matters both for performance as well as security. I see ddosify-alaz leverages prometheus node exporter for metrics collection which is awesome, using ebpf for service mash-map is promising but as I said I would prefer this part to be configurable to be not deployed if sre&#x2F;platform teams do not want ebpf but only metric exporter capabilities to feed in to DDosify observability platform. Overall: Great Open source sw launch, please make it flexible for configuration. Cheers!
评论 #37412259 未加载
rounakdattaover 1 year ago
The one similar product I had come across is Kubeshark (<a href="https:&#x2F;&#x2F;github.com&#x2F;kubeshark&#x2F;kubeshark">https:&#x2F;&#x2F;github.com&#x2F;kubeshark&#x2F;kubeshark</a>). But admittedly the eBPF way seems more performant theoretically (given you can afford to have a modern-enough kernel). I&#x27;m really excited to see how this project develops out.<p>The eBPF-mode of innovation is pretty exciting, truly a fresh lens to building software. I&#x27;m also following Akita Software - the company building an eBPF paradigm of monitoring.
评论 #37418757 未加载
prabhatsharmaover 1 year ago
How is it different than pixie?
评论 #37421095 未加载
traceroute66over 1 year ago
&gt; Detect zombie services and underperforming SQL queries<p>I know eBPF is the latest coolest thing on the block, but sometimes I just don&#x27;t get it.<p>There have been database and system tools to detect zombie services and underperforming queries since time immemorial.<p>If people do not have the technical competence (or are frankly, just too lazy) to make use of the tools available to them already, why is some random eBPF tool suddenly going to fix it ?
评论 #37416540 未加载
gregwebsover 1 year ago
Netdata also has an eBPF collector. <a href="https:&#x2F;&#x2F;learn.netdata.cloud&#x2F;docs&#x2F;data-collection&#x2F;linux-systems&#x2F;ebpf-for-systems-monitoring" rel="nofollow noreferrer">https:&#x2F;&#x2F;learn.netdata.cloud&#x2F;docs&#x2F;data-collection&#x2F;linux-syste...</a>
lfmunoz4over 1 year ago
Would be good if you offer support &#x2F; document to not use k8s just run on linux.
评论 #37417021 未加载
mdanielover 1 year ago
AGPLv3 if that interests you: <a href="https:&#x2F;&#x2F;github.com&#x2F;ddosify&#x2F;alaz&#x2F;blob&#x2F;v0.1.3&#x2F;LICENSE">https:&#x2F;&#x2F;github.com&#x2F;ddosify&#x2F;alaz&#x2F;blob&#x2F;v0.1.3&#x2F;LICENSE</a>
评论 #37412705 未加载
VectorLockover 1 year ago
Does it generate the Service Map from eBPF traces too? Can you use the Service Map without k8s?
评论 #37417126 未加载
prabhatsharmaover 1 year ago
Does it collect traces from compiled as well as scripted languages?
评论 #37417062 未加载