Hacker News new | past | comments | ask | show | jobs | submit login

Currently, we don't collect traces from codes. However, we plan to make this feature available soon. Stay tuned for the updates! Currently, Alaz uses eBPF to collect network information from the kernel and correlate it with K8s services to generate a Service Map. In addition, Alaz utilizes Prometheus Node exporter to collect system resources such as CPU, memory, disk, and network from K8s nodes. This data is then sent to the Ddosify Platform for visualization. Our next plan is to collect code traces using eBPF. We understand that collecting code traces for scripted languages can be more challenging than for compiled languages, so we will utilize a hybrid approach using both eBPF and OTEL (Open Telemetry).



I am really curious, why build another project that has similar features as another open source software pixie - https://px.dev/.


Pixie is great, but Alaz stands out due to its effortless integration with the Ddosify Observability Platform (Cloud and Self-Hosted), allowing native integration of K8s Observability and Performance Testing.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: