diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-07-24 09:54:23 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-07-24 09:54:44 +0000 |
commit | 836b47cb7e99a977c5a23b059ca1d0b5065d310e (patch) | |
tree | 1604da8f482d02effa033c94a84be42bc0c848c3 /collectors/ebpf.plugin/integrations/ebpf_cachestat.md | |
parent | Releasing debian version 1.44.3-2. (diff) | |
download | netdata-836b47cb7e99a977c5a23b059ca1d0b5065d310e.tar.xz netdata-836b47cb7e99a977c5a23b059ca1d0b5065d310e.zip |
Merging upstream version 1.46.3.
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'collectors/ebpf.plugin/integrations/ebpf_cachestat.md')
-rw-r--r-- | collectors/ebpf.plugin/integrations/ebpf_cachestat.md | 179 |
1 files changed, 0 insertions, 179 deletions
diff --git a/collectors/ebpf.plugin/integrations/ebpf_cachestat.md b/collectors/ebpf.plugin/integrations/ebpf_cachestat.md deleted file mode 100644 index 5bf0a377..00000000 --- a/collectors/ebpf.plugin/integrations/ebpf_cachestat.md +++ /dev/null @@ -1,179 +0,0 @@ -<!--startmeta -custom_edit_url: "https://github.com/netdata/netdata/edit/master/collectors/ebpf.plugin/integrations/ebpf_cachestat.md" -meta_yaml: "https://github.com/netdata/netdata/edit/master/collectors/ebpf.plugin/metadata.yaml" -sidebar_label: "eBPF Cachestat" -learn_status: "Published" -learn_rel_path: "Data Collection/eBPF" -most_popular: False -message: "DO NOT EDIT THIS FILE DIRECTLY, IT IS GENERATED BY THE COLLECTOR'S metadata.yaml FILE" -endmeta--> - -# eBPF Cachestat - - -<img src="https://netdata.cloud/img/ebpf.jpg" width="150"/> - - -Plugin: ebpf.plugin -Module: cachestat - -<img src="https://img.shields.io/badge/maintained%20by-Netdata-%2300ab44" /> - -## Overview - -Monitor Linux page cache events giving for users a general vision about how his kernel is manipulating files. - -Attach tracing (kprobe, trampoline) to internal kernel functions according options used to compile kernel. - -This collector is only supported on the following platforms: - -- Linux - -This collector supports collecting metrics from multiple instances of this integration, including remote instances. - -The plugin needs setuid because it loads data inside kernel. Netada sets necessary permission during installation time. - -### Default Behavior - -#### Auto-Detection - -The plugin checks kernel compilation flags (CONFIG_KPROBES, CONFIG_BPF, CONFIG_BPF_SYSCALL, CONFIG_BPF_JIT) and presence of BTF files to decide which eBPF program will be attached. - -#### Limits - -The default configuration for this integration does not impose any limits on data collection. - -#### Performance Impact - -This thread will add overhead every time that an internal kernel function monitored by this thread is called. The estimated additional period of time is between 90-200ms per call on kernels that do not have BTF technology. - - -## Metrics - -Metrics grouped by *scope*. - -The scope defines the instance that the metric belongs to. An instance is uniquely identified by a set of labels. - - - -### Per eBPF Cachestat instance - -These metrics show total number of calls to functions inside kernel. - -This scope has no labels. - -Metrics: - -| Metric | Dimensions | Unit | -|:------|:----------|:----| -| mem.cachestat_ratio | ratio | % | -| mem.cachestat_dirties | dirty | page/s | -| mem.cachestat_hits | hit | hits/s | -| mem.cachestat_misses | miss | misses/s | - -### Per apps - -These Metrics show grouped information per apps group. - -Labels: - -| Label | Description | -|:-----------|:----------------| -| app_group | The name of the group defined in the configuration. | - -Metrics: - -| Metric | Dimensions | Unit | -|:------|:----------|:----| -| app.ebpf_cachestat_hit_ratio | ratio | % | -| app.ebpf_cachestat_dirty_pages | pages | page/s | -| app.ebpf_cachestat_access | hits | hits/s | -| app.ebpf_cachestat_misses | misses | misses/s | - -### Per cgroup - - - -This scope has no labels. - -Metrics: - -| Metric | Dimensions | Unit | -|:------|:----------|:----| -| cgroup.cachestat_ratio | ratio | % | -| cgroup.cachestat_dirties | dirty | page/s | -| cgroup.cachestat_hits | hit | hits/s | -| cgroup.cachestat_misses | miss | misses/s | -| services.cachestat_ratio | a dimension per systemd service | % | -| services.cachestat_dirties | a dimension per systemd service | page/s | -| services.cachestat_hits | a dimension per systemd service | hits/s | -| services.cachestat_misses | a dimension per systemd service | misses/s | - - - -## Alerts - -There are no alerts configured by default for this integration. - - -## Setup - -### Prerequisites - -#### Compile kernel - -Check if your kernel was compiled with necessary options (CONFIG_KPROBES, CONFIG_BPF, CONFIG_BPF_SYSCALL, CONFIG_BPF_JIT) in `/proc/config.gz` or inside /boot/config file. Some cited names can be different accoring preferences of Linux distributions. -When you do not have options set, it is necessary to get the kernel source code from https://kernel.org or a kernel package from your distribution, this last is preferred. The kernel compilation has a well definedd pattern, but distributions can deliver their configuration files -with different names. - -Now follow steps: -1. Copy the configuration file to /usr/src/linux/.config. -2. Select the necessary options: make oldconfig -3. Compile your kernel image: make bzImage -4. Compile your modules: make modules -5. Copy your new kernel image for boot loader directory -6. Install the new modules: make modules_install -7. Generate an initial ramdisk image (`initrd`) if it is necessary. -8. Update your boot loader - - - -### Configuration - -#### File - -The configuration file name for this integration is `ebpf.d/cachestat.conf`. - - -You can edit the configuration file using the `edit-config` script from the -Netdata [config directory](https://github.com/netdata/netdata/blob/master/docs/configure/nodes.md#the-netdata-config-directory). - -```bash -cd /etc/netdata 2>/dev/null || cd /opt/netdata/etc/netdata -sudo ./edit-config ebpf.d/cachestat.conf -``` -#### Options - -All options are defined inside section `[global]`. - - -<details><summary>Config options</summary> - -| Name | Description | Default | Required | -|:----|:-----------|:-------|:--------:| -| update every | Data collection frequency. | 5 | no | -| ebpf load mode | Define whether plugin will monitor the call (`entry`) for the functions or it will also monitor the return (`return`). | entry | no | -| apps | Enable or disable integration with apps.plugin | no | no | -| cgroups | Enable or disable integration with cgroup.plugin | no | no | -| pid table size | Number of elements stored inside hash tables used to monitor calls per PID. | 32768 | no | -| ebpf type format | Define the file type to load an eBPF program. Three options are available: `legacy` (Attach only `kprobe`), `co-re` (Plugin tries to use `trampoline` when available), and `auto` (plugin check OS configuration before to load). | auto | no | -| ebpf co-re tracing | Select the attach method used by plugin when `co-re` is defined in previous option. Two options are available: `trampoline` (Option with lowest overhead), and `probe` (the same of legacy code). | trampoline | no | -| maps per core | Define how plugin will load their hash maps. When enabled (`yes`) plugin will load one hash table per core, instead to have centralized information. | yes | no | -| lifetime | Set default lifetime for thread when enabled by cloud. | 300 | no | - -</details> - -#### Examples -There are no configuration examples. - - |