This is documentation for the next version of Grafana Beyla documentation. For the latest stable release, go to the latest version.
Configure Beyla instrumentation options
This configuration section describes various options for controlling the instrumentation capabilities of Beyla related to distributed traces, context propagation and various protocol instrumentation options.
Distributed traces and context propagation
YAML section: ebpf
You can configure the component under the ebpf section of your YAML configuration or via environment variables.
Enable context propagation
Deprecated. Use context_propagation instead.
Context propagation
Beyla injects the Traceparent header value for outgoing HTTP requests, so it can propagate any incoming context to downstream services. This context propagation works for any programming language.
For TLS encrypted HTTP requests (HTTPS), Beyla encodes the Traceparent header value at the TCP/IP packet level. Beyla must be present on both sides of the communication.
The TCP/IP packet level encoding uses Linux Traffic Control (TC). eBPF programs that also use TC must chain correctly with Beyla. For more information about chaining programs, see the Cilium compatibility documentation.
You can disable the TCP/IP level encoding and TC programs by setting context_propagation="headers". This context propagation is fully compatible with any OpenTelemetry distributed tracing library.
Context propagation values:
all: Enable both HTTP and IP options context propagationheaders: Enable context propagation via the HTTP headers onlyip: Enable context propagation via the IP options field onlydisabled: Disable trace context propagation
To use this option in containerized environments (Kubernetes and Docker), you must:
- Deploy Beyla as a
DaemonSetwith host network accesshostNetwork: true - Volume mount the
/sys/fs/cgrouppath from the host as local/sys/fs/cgrouppath - Grant the
CAP_NET_ADMINcapability to the Beyla container
gRPC and HTTP2 are not supported.
For an example of how to configure distributed traces in Kubernetes, see our Distributed traces with Beyla guide.
Track request headers
This option lets Beyla process any incoming Traceparent header values. If enabled, when Beyla sees an incoming server request with a Traceparent header value, it uses the provided ’trace id’ to create its own trace spans.
This option does not affect Go applications, where the Traceparent field is always processed.
Enabling this option may increase performance overhead in high request volume scenarios. This option is only useful when generating Beyla traces; it does not affect metrics.
Payload extraction
Various cloud and database protocols are implemented on top of HTTP. For example, all AWS S3 (Amazon Web Services) requests are in fact HTTP requests. To create better traces and metrics, Beyla has custom protocol detectors which run on top of HTTP, by performing HTTP payload extraction. You can configure which payload extractors are enabled by default with the following options:
YAML section:
ebpf:
http:
graphql:YAML section:
ebpf:
http:
elasticsearch:Opensearch is a fork of Elasticsearch and therefore also supported.
YAML section:
ebpf:
http:
aws:List of supported AWS services protocol detectors:
Configure data processing buffer sizes
To minimize the performance impact of eBPF data collection, Beyla uses limited payload buffer size capture for various protocols, which gives us the best quality to performance ratio. However, for certain kinds of protocols, especially for some that are mentioned in Payload extraction, it might be beneficial to use larger buffer sizes. The following section describes the configuration options for controlling the auxiliary buffers captured for higher quality trace generation.
YAML section:
ebpf:
buffer_sizes:Other attributes
YAML section: ebpf
The heuristic sql detect option lets Beyla detect SQL client requests by inspecting query statements, even if the protocol is not directly supported. By default, Beyla detects SQL client requests by their binary protocol format. If you use a database technology not directly supported by Beyla, you can enable this option to get database client telemetry. This option is not enabled by default, because it can create false positives, for example, if an application sends SQL text for logging through a TCP connection. Currently, Beyla natively supports the Postgres and MySQL binary protocols.
The max_transaction_time option configures the distributed tracing transaction correlation maximum allowed time. It specifies the maximum time allowed for two requests to be correlated as parent -> child.
This is implemented as a safety measure for limiting the maximum possible trace size, because some programs (for example load generators) keep on generating requests from the same thread in perpetuity, which can generate very large traces.
If a child request has started later than the time specified by max_transaction_time, then we consider the two requests not correlated to prevent infinite traces.



