TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Show HN: Pixie, open source observability for Kubernetes using eBPF

6 点作者 nserrino将近 3 年前

1 comment

westurner将近 3 年前
&quot;Sysdig and Falco now powered by eBPF&quot; too; <a href="https:&#x2F;&#x2F;sysdig.com&#x2F;blog&#x2F;sysdig-and-falco-now-powered-by-ebpf&#x2F;" rel="nofollow">https:&#x2F;&#x2F;sysdig.com&#x2F;blog&#x2F;sysdig-and-falco-now-powered-by-ebpf...</a><p>- &quot;Linux Extended BPF (eBPF) Tracing Tools&quot; <a href="https:&#x2F;&#x2F;www.brendangregg.com&#x2F;ebpf.html" rel="nofollow">https:&#x2F;&#x2F;www.brendangregg.com&#x2F;ebpf.html</a> lists eBPF commands, [CLI] frontends, relevant kernel components<p>- awesome-ebpf#manual-pages <a href="https:&#x2F;&#x2F;github.com&#x2F;zoidbergwill&#x2F;awesome-ebpf" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;zoidbergwill&#x2F;awesome-ebpf</a> links to the kernel eBPF docs<p>- eBPF -&gt; BPF Berkeley Packet Filter: <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Berkeley_Packet_Filter" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Berkeley_Packet_Filter</a> :<p>&gt; Extensions &amp; optimizations: <i>Since version 3.18, the Linux kernel includes an extended BPF virtual machine with ten 64-bit registers, termed extended BPF (eBPF). It can be used for non-networking purposes, such as for attaching eBPF programs to various tracepoints.[5][6][7] Since kernel version 3.19, eBPF filters can be attached to sockets,[8][9] and, since kernel version 4.1, to traffic control classifiers for the ingress and egress networking data path.[10][11] The original and obsolete version has been retroactively renamed to classic BPF (cBPF). Nowadays, the Linux kernel runs eBPF only and loaded cBPF bytecode is transparently translated into an eBPF representation in the kernel before program execution.[12] All bytecode is verified before running to prevent denial-of-service attacks. Until Linux 5.3, the verifier prohibited the use of loops.</i><p>- ... EVM&#x2F;eWASM opcodes have a cost in gas&#x2F;particles; <a href="https:&#x2F;&#x2F;github.com&#x2F;crytic&#x2F;evm-opcodes" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;crytic&#x2F;evm-opcodes</a> ... (dlt) Dataset indexing curation signals &amp; incentives<p>&quot;Tracing in Kubernetes: kubectl capture plugin.&quot; <a href="https:&#x2F;&#x2F;sysdig.com&#x2F;blog&#x2F;tracing-in-kubernetes-kubectl-capture-plugin&#x2F;" rel="nofollow">https:&#x2F;&#x2F;sysdig.com&#x2F;blog&#x2F;tracing-in-kubernetes-kubectl-captur...</a><p>kubectl-capture: <a href="https:&#x2F;&#x2F;github.com&#x2F;sysdiglabs&#x2F;kubectl-capture.git" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;sysdiglabs&#x2F;kubectl-capture.git</a><p>Is it possible to do this sort of low level distributed tracing with Pixie e.g. conditionally when a pattern expression matches?
评论 #31699622 未加载