You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: pipeline/inputs/ebpf.md
+41-35Lines changed: 41 additions & 35 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,23 +1,25 @@
1
-
# `in_ebpf`Input Plugin for Fluent Bit (Experimental)
1
+
# `in_ebpf`input plugin for Fluent Bit (experimental)
2
2
3
-
> **Note:** This plugin is experimental and may be unstable. Use it in development or testing environments only, as its features and behavior are subject to change.
3
+
{% hint style="info" %}
4
+
This plugin is experimental and might be unstable. Use it in development or testing environments only. Its features and behavior are subject to change.
5
+
{% endhint %}
4
6
5
-
The `in_ebpf` input plugin is an **experimental** plugin for Fluent Bit that uses eBPF (extended Berkeley Packet Filter) to capture low-level system events. This plugin allows Fluent Bit to monitor kernel-level activities such as process executions, file accesses, memory allocations, network connections, and signal handling. It provides valuable insights into system behavior for debugging, monitoring, and security analysis.
7
+
The `in_ebpf` input plugin uses eBPF (extended Berkeley Packet Filter) to capture low-level system events. This plugin lets Fluent Bit monitor kernel-level activities such as process executions, file accesses, memory allocations, network connections, and signal handling. It provides valuable insights into system behavior for debugging, monitoring, and security analysis.
6
8
7
-
## Overview
9
+
The `in_ebpf` plugin leverages eBPF to trace kernel events in real-time. By specifying trace points, users can collect targeted system-level metrics and events, giving visibility into operating system interactions and performance characteristics.
8
10
9
-
The `in_ebpf` plugin leverages eBPF to trace kernel events in real-time. By specifying trace points, users can collect targeted system-level metrics and events, which can be particularly useful for gaining visibility into operating system interactions and performance characteristics.
10
-
11
-
## System Dependencies
11
+
## System dependencies
12
12
13
13
To enable `in_ebpf`, ensure the following dependencies are installed on your system:
14
-
-**Kernel Version**: 4.18 or higher with eBPF support enabled.
15
-
-**Required Packages**:
14
+
15
+
-**Kernel version**: 4.18 or greater, with eBPF support enabled.
16
+
-**Required packages**:
16
17
-`bpftool`: Used to manage and debug eBPF programs.
17
18
-`libbpf-dev`: Provides the `libbpf` library for loading and interacting with eBPF programs.
18
19
-**CMake** 3.13 or higher: Required for building the plugin.
0 commit comments