As discussed on the call, here's who I think are the three audiences for
bcc/BPF tracing:

A) Kernel hackers (~100): who would like the language to be easier, better
errors, docs, etc.
B) Sysadmins/operators/senior devs (~5k): who will use the existing bcc
tools (and edit some).
C) Everyone else (>50k): via dashboards/GUIs.

I'm pretty happy with where the toolset is for audience B. There's a few
more tools I'd like to add (TCP internals and buffering, disk I/O
internals), but a lot can be done now.

Audience A might be served by something like ply, or partially served by
Sasha's multi-tools.

But we haven't spoken much about audience C, which will end up the biggest.
And that will include most of the developers at Netflix (I think only a few
of us are going to ssh onto instances and run the bcc tools, even though we
install them by default now).

I did file this for Intel snap:
https://github.com/intelsdi-x/snap/issues/800 . Sounds like they may need
our help. We should also file something similar for collectd... What else?

Brendan
_______________________________________________
iovisor-dev mailing list
[email protected]
https://lists.iovisor.org/mailman/listinfo/iovisor-dev

Reply via email to