Currently, we don't collect traces from codes. However, we plan to make this feature available soon. Stay tuned for the updates! Currently, Alaz uses eBPF to collect network information from the kernel and correlate it with K8s services to generate a Service Map. In addition, Alaz utilizes Prometheus Node exporter to collect system resources such as CPU, memory, disk, and network from K8s nodes. This data is then sent to the Ddosify Platform for visualization. Our next plan is to collect code traces using eBPF. We understand that collecting code traces for scripted languages can be more challenging than for compiled languages, so we will utilize a hybrid approach using both eBPF and OTEL (Open Telemetry).
Pixie is great, but Alaz stands out due to its effortless integration with the Ddosify Observability Platform (Cloud and Self-Hosted), allowing native integration of K8s Observability and Performance Testing.