yagikota / study

0 stars 0 forks source link

詳解 システム・パフォーマンス 1章 #33

Open yagikota opened 2 months ago

yagikota commented 2 months ago

What do you do?

詳解 システム・パフォーマンス 1章 読む

TODO

1章 イントロダクション

Tweet

yagikota commented 2 months ago

1.3

image

ref. https://sreake.com/blog/release-engineer/

https://sreake.com/blog/release-engineer/

これらを導入すると、パフォーマンステストを初期段階でする必要がない。本番環境でテストしてしまえばいい。


1.3

キャパシティプランニングとはレトロスペクティブとか、SREになってから知った単語だ出てくる。

ref. https://martinfowler.com/articles/retrospective-antipatterns.html

1.5.4

パフォーマンス問題を見つけること自体は大したことではない。 重要なのは、問題を定量化(レイテンシが役に立つ)し、解決すればどれほどのビジネスインパクトがあるかを示すこと。 確かに、むやみにパフォーマンスのメトリクスとって満足している状況は往々にしてあると思う。


1.6

eBPFとはなんぞ?

whta is eBPF? eBPF (extended Berkeley Packet Filter) is a powerful technology that allows running programs in a privileged context within the Linux kernel. Here are the key points about eBPF: ### What is eBPF? eBPF is a Linux kernel technology that enables running sandboxed programs in kernel space without modifying kernel source code or loading kernel modules [1]. It provides a secure and efficient way to extend kernel capabilities at runtime [1]. ### Key features and benefits - Allows programs to run safely within the kernel without modifying source code or loading modules [1][2] - Provides deep access to low-level system events while maintaining system safety [2] - Enables high-performance networking, observability, and security functionality [1][2] - Uses a Just-In-Time (JIT) compiler and verification engine for efficiency [1] ### Use cases eBPF is used for various applications including: - Next-generation networking and load balancing [1] - Fine-grained security observability [1] - Application tracing and performance troubleshooting [1] - Preventive application and container runtime security enforcement [1] ### Safety and verification Safety is ensured through several layers: - Static code analysis performed by an in-kernel verifier [5] - Rejection of programs that could crash, hang, or interfere negatively with the kernel [5] - Verification of strong exit guarantees and safety checks [5] ### History and evolution - Originally based on Berkeley Packet Filter (BPF) introduced in 1993 [2] - Extended to solve new problems beyond packet filtering [2] - Now considered a standalone technology, not just an extension of BPF [1] ### Community and governance - Has its own foundation (eBPF Foundation) established in 2021 [5] - Supported by major tech companies like Meta, Google, Microsoft, Netflix [5] - Growing ecosystem with increasing adoption beyond Linux [5] In summary, eBPF represents a significant advancement in kernel-level programmability, enabling powerful functionality while maintaining system safety and efficiency. Its versatility has made it a crucial technology for modern operating systems and infrastructure. Citations: [1] https://ebpf.io/what-is-ebpf/ [2] https://www.datadoghq.com/knowledge-center/ebpf/ [3] https://ebpf.io/ [4] https://www.tigera.io/learn/guides/ebpf/ [5] https://en.wikipedia.org/wiki/EBPF [6] https://www.kentik.com/blog/ebpf-explained-why-its-important-for-observability/ [7] https://www.ibm.com/topics/ebpf [8] https://www.groundcover.com/ebpf [9] https://www.splunk.com/en_us/blog/learn/what-is-ebpf.html