tubular
pwru
Our great sponsors
tubular | pwru | |
---|---|---|
1 | 7 | |
244 | 2,464 | |
0.0% | 6.9% | |
0.0 | 9.1 | |
about 1 year ago | 3 days ago | |
C | C | |
BSD 3-clause "New" or "Revised" License | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
tubular
-
Decoupling IP from services and sockets for addressing agility
About a month after this blog post was published, Cloudflare open sourced a tool called Tubular for binding sockets with eBPF. Nobody really noticed. But itβs extremely cool and it works.
Blog: https://blog.cloudflare.com/tubular-fixing-the-socket-api-wi...
GitHub: https://github.com/cloudflare/tubular
pwru
- GitHub - cilium/pwru: Packet, where are you? -- eBPF-based Linux kernel networking debugger
- cilium/pwru: Packet, where are you? -- eBPF-based Linux kernel networking debugger
-
Packet, where are you? β eBPF-based Linux kernel networking debugger
if you have a recent enough kernel, this change https://github.com/cilium/pwru/pull/148 means that it will print the reason the packet was dropped in the output - see https://lwn.net/Articles/885729/
There's a whole heap of reasons a packet can be dropped:
-
A list of new(ish) command line tools β Julia Evans
[pwru](https://github.com/cilium/pwru) is a fun new tool from the Cilium folks for tracing network packets in the kernel. Like tcpdump but it shows you the full path including kernel syscalls. Lets you debug much deeper than "when the packet gets to this port it gets dropped".
-
Better visibility into Linux packet-dropping decisions
I recently came across another useful utility for debugging unexpected packet drops - PWRU[0] (Packet, Where Are You) by Cilium.
It uses eBPF to try to trace the path of the packet through the kernel. Haven't needed to use it yet, but it could have saved me a lot of trouble in the past.
[0]: https://github.com/cilium/pwru
What are some alternatives?
TripleCross - A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.
parca-agent - eBPF based always-on profiler auto-discovering targets in Kubernetes and systemd, zero code changes or restarts needed!
bmc-cache - In-kernel cache based on eBPF.
fsmon - monitor filesystem on iOS / OS X / Android / FirefoxOS / Linux
ebpfkit - ebpfkit is a rootkit powered by eBPF
libbpf - Automated upstream mirror for libbpf stand-alone build.
pomod - pomodoro daemon
bpfcov - Source-code based coverage for eBPF programs actually running in the Linux kernel
opentelemetry-go-instrumentation - OpenTelemetry auto-instrumentation for Go applications
glow - Render markdown on the CLI, with pizzazz! π π»
up - Ultimate Plumber is a tool for writing Linux pipes with instant live preview
lnav - Log file navigator