Important: This documentation is about an older version. It's relevant only to the release noted, many of the features and functions have been updated or replaced. Please view the current version.
Setup eBPF Profiling on Kubernetes
To set up eBPF profiling with Grafana Alloy on Kubernetes, you need to:
- Verify that your cluster meets the prerequisites.
- Add the Grafana helm repository.
- Create an Alloy configuration file. For more information, refer to Configuration reference.
- Install Alloy, refer to the installation instructions
- Verify that profiles are received.
Before you begin
Before you begin, you need:
- Helm and kubectl installed with access to your Kubernetes cluster.
- A Pyroscope server where Alloy can send profiling data.
- Access to Grafana with the Grafana Pyroscope data source provisioned.
Note
If you don’t have a Grafana or a Pyroscope server, you can use the [Grafana Cloud][gcloud] free plan to get started.
Verify that your cluster meets the requirements
The eBPF profiler requires a Linux kernel version >= 4.9 (due to BPF_PROG_TYPE_PERF_EVENT).
BPF_PROG_TYPE_PERF_EVENT
is a type of eBPF program that can be attached to hardware or software events, such as performance monitoring counters or tracepoints, in the Linux kernel.
To print the kernel version of each node in your cluster, run:
kubectl get nodes -o jsonpath='{range .items[*]}{.metadata.name}{"\t"}{.status.nodeInfo.kernelVersion}{"\n"}{end}'
Make sure all nodes have a kernel version >= 4.9.
Add the Grafana Helm repository
Use Helm to install Alloy. To add the Grafana Helm repository, run:
helm repo add grafana https://grafana.github.io/helm-charts
helm repo update
Verify that the repository was added successfully by running:
helm search repo grafana/alloy
The command returns a list of available versions of Alloy.
Create an Alloy configuration file
Create a file named values.yaml
with the content from the sample configuration file.
alloy:
configMap:
create: true
content: |
discovery.kubernetes "local_pods" {
selectors {
field = "spec.nodeName=" + env("HOSTNAME")
role = "pod"
}
role = "pod"
}
pyroscope.ebpf "instance" {
forward_to = [pyroscope.write.endpoint.receiver]
targets = discovery.kubernetes.local_pods.targets
}
pyroscope.write "endpoint" {
endpoint {
basic_auth {
password = "<PASSWORD>"
username = "<USERNAME>"
}
url = "<URL>"
}
}
securityContext:
privileged: true
runAsGroup: 0
runAsUser: 0
controller:
hostPID: true
For information about configuring Alloy, refer to Grafana Alloy on Kubernetes.
For information about the specific blocks used, refer to the Grafana Alloy Reference.
Replace the <URL>
placeholder with the appropriate server URL.
This could be the Grafana Cloud URL or your own custom Pyroscope server URL.
If you need to send data to Grafana Cloud, you’ll have to configure HTTP Basic authentication.
Replace <User>
with your Grafana Cloud stack user and <Password>
with your Grafana Cloud API key.
For more information, refer to the Configure the Grafana Pyroscope data source documentation.
Note
If you’re using your own Pyroscope server, you can remove thebasic_auth
section altogether.
Install Alloy
To install Alloy, run:
helm install pyroscope-ebpf grafana/alloy -f values.yaml
Once configured, Alloy starts collecting eBPF profiles and sends them to the Pyroscope server.
Verify profiles are received
To verify that the profiles are received by the Pyroscope server:
- Go to the Pyroscope UI or Grafana Pyroscope data source.
- Select a profile type and a service from the drop-down menu.
Considerations for profiling applications in containers
When profiling Python applications running in containers using the pyroscope.ebpf
component in Alloy, consider the following:
Kernel version: Ensure that the host system’s kernel version is >= 4.9, as required by eBPF. This is crucial for the profiler to function correctly
Container privileges: The eBPF profiler requires certain privileges to access kernel features. Ensure that the container running the profiler has the necessary permissions. This typically involves setting the container to run in privileged mode or adjusting security contexts
Host PID namespace: The profiler may need access to the host’s PID namespace to correctly attach to processes. Ensure that the
hostPID
is set totrue
in your Kubernetes configurationNetwork access: Ensure that the container has network access to send profiling data to the Pyroscope server. This may involve configuring network policies or service accounts