Open danipozo opened 6 days ago
Hi @danipozo,
Thank you for raising this regarding symbolization support. You're absolutely right about the current gaps in our symbolization capabilities.
We're actively working on improving symbolization support in Pyroscope. We recognize this is a critical feature for production use, especially when working with stripped executables. We're aiming to have the manual upload support hopefully by the end of this year.
We'll also consider integrating with system's addr2line
utility for reliable symbol resolution (great point about potential issues with custom implementations).
In the meantime, I've updated our documentation to make the current limitations clearer for users.
Let us know if you have any other suggestions!
Is your feature request related to a problem? Please describe.
Experimental support for receiving profiles from OpenTelemetry sources has landed (documented in #3713). This enables using Pyroscope with the OTel ebpf-profiler as shown in this example.
The ebpf-profiler README specifies that symbolization of stack traces should be done in the backend and that there should be a way to upload private executables to the backend:
Describe the solution you'd like
Ideally, the profiler itself would discover the backend and upload executables for which no public debuginfo is found. This is the approach taken by parca-agent.
At least there should be a way to manually upload executables to Pyroscope for symbolization.
Describe alternatives you've considered
As far as I can tell there is no infrastructure in Pyroscope for symbolization of native stack traces right now.
Additional context
Any implementation of symbolization should IMHO offer the possibility of using the system's
addr2line
utility, as custom implementations can be error-prone (see https://github.com/parca-dev/parca/issues/5291).