Linux tracing with LTTng
Formal Metadata
Title |
Linux tracing with LTTng
|
Subtitle |
The love of development without printf()
|
Title of Series | |
Author |
|
License |
CC Attribution 2.0 Belgium:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor. |
Identifiers |
|
Publisher |
|
Release Date |
2014
|
Language |
English
|
Content Metadata
Subject Area | |
Abstract |
In the past, a lot of effort has been invested in high performance kernel tracing tools, but now the focus of the tracing community seems to be shifting over to efficient user space application tracing. By providing joint kernel and user space tracing, developers now have deeper insights into their applications. Furthermore, system administrators can now put in place a new way to monitor and debug systems using a low intrusiveness tracing system, LTTng. This presentation explains how LTTng can be used as a powerful development and debugging tool for user space applications taking advantage of this year's exciting new features such as network streaming and snapshots. It demonstrates how open source developers and hackers can use LTTng kernel and user space tracers to create powerful logging systems and easier debugging, thus greatly improving development and maintainability of their project(s). Finally, this talk concludes with the future work we will be doing on LTTng, and how the community can help with improving the project from feedback to very valuable contributions
|

00:00
Trail
Computer animation
Projective plane
Right angle
Event horizon
Resultant
00:50
Presentation of a group
Server (computing)
Run time (program lifecycle phase)
Instance (computer science)
Mereology
Mathematics
Component-based software engineering
Befehlsprozessor
Computer animation
Different (Kate Ryan album)
Term (mathematics)
Network topology
Procedural programming
Spacetime
02:33
Distribution (mathematics)
Shift operator
Word
Kernel (computing)
Computer animation
File format
MiniDisc
Binary file
Spacetime
03:15
Module (mathematics)
Run time (program lifecycle phase)
Model theory
Contingency table
Mereology
Cartesian coordinate system
Event horizon
Tracing (software)
Kernel (computing)
Process (computing)
Computer animation
Different (Kate Ryan album)
Network topology
Compiler
Video game
Spacetime
Library (computing)
04:30
Module (mathematics)
Windows Registry
Demon
Predictability
Slide rule
Game controller
Streaming media
Line (geometry)
Instance (computer science)
Kernel (computing)
Computer animation
Software
Network topology
Utility software
Freezing
Library (computing)
Spacetime
05:26
Component-based software engineering
Computer animation
Software
Computer file
output
Tracing (software)
06:07
Slide rule
Kernel (computing)
Computer animation
Information
Different (Kate Ryan album)
Video game
Instance (computer science)
Cartesian coordinate system
Tracing (software)
Physical system
Library (computing)
07:18
Addition
Kernel (computing)
Computer animation
Orientation (vector space)
Virtual machine
Numbering scheme
Public domain
Cartesian coordinate system
Event horizon
Spacetime
08:08
Addition
Open source
Euler angles
Workstation <Musikinstrument>
Shared memory
Insertion loss
Incidence algebra
Crash (computing)
Arithmetic mean
Computer animation
Different (Kate Ryan album)
Network topology
Buffer solution
Video game
Spacetime
09:12
Mechanism design
Scaling (geometry)
Computer animation
Synchronization
Speech synthesis
Data structure
Quicksort
System call
Tracing (software)
Library (computing)
09:51
Point (geometry)
Functional (mathematics)
Run time (program lifecycle phase)
Multiplication sign
Execution unit
Letterpress printing
Public domain
Streaming media
Event horizon
Code
Field (computer science)
Number
Element (mathematics)
Frequency
Software testing
Data structure
Series (mathematics)
Macro (computer science)
Physical system
Area
Digitizing
Instance (computer science)
Cartesian coordinate system
Benchmark
Flow separation
Proof theory
Spring (hydrology)
Computer animation
Network topology
Internet service provider
Right angle
13:30
Point (geometry)
Building
State of matter
Multiplication sign
Function (mathematics)
Parameter (computer programming)
Event horizon
Term (mathematics)
String (computer science)
Flag
Data structure
Information security
Weight
Instance (computer science)
Affine space
Message passing
Pointer (computer programming)
Kernel (computing)
Process (computing)
Computer animation
Internet service provider
Network topology
Summierbarkeit
Quicksort
Escape character
15:28
Point (geometry)
Addition
Clique-width
Computer animation
Link (knot theory)
Network topology
Multiplication sign
Buffer solution
Cartesian coordinate system
Twitter
Asynchronous Transfer Mode
16:28
Point (geometry)
Computer file
Data storage device
Virtual machine
Public domain
Mereology
Cartesian coordinate system
Timestamp
Product (business)
Kernel (computing)
Computer animation
Software
Local ring
Spacetime
17:13
Implementation
Real number
Set (mathematics)
Instance (computer science)
Statute
Cartesian coordinate system
Event horizon
Kernel (computing)
Computer animation
Personal digital assistant
Network topology
Core dump
Buffer solution
Cycle (graph theory)
Object (grammar)
Row (database)
18:15
Scripting language
Group action
Multiplication sign
Virtual machine
Real-time operating system
Instance (computer science)
Cartesian coordinate system
Login
Component-based software engineering
Process (computing)
Computer animation
Different (Kate Ryan album)
Term (mathematics)
Hypermedia
Profil (magazine)
Pattern language
Reverse engineering
19:48
Windows Registry
Boss Corporation
Computer file
Forcing (mathematics)
Staff (military)
Drop (liquid)
Instance (computer science)
Event horizon
Tracing (software)
Mathematics
Word
Computer animation
Synchronization
Hypermedia
Different (Kate Ryan album)
Series (mathematics)
Quicksort
Physical system
21:26
Demon
Block (periodic table)
System administrator
Workstation <Musikinstrument>
Virtual machine
Instance (computer science)
Tracing (software)
Medical imaging
Array data structure
Kernel (computing)
Computer animation
Software
Internet forum
Video game
Spacetime
22:49
Scaling (geometry)
Computer animation
Virtual machine
Mass
23:27
Module (mathematics)
Musical ensemble
Randomization
Prisoner's dilemma
Decision theory
Electronic program guide
Image registration
Cartesian coordinate system
Arithmetic mean
Kernel (computing)
Computer animation
Root
Network topology
Freezing
24:16
Musical ensemble
Kernel (computing)
Computer animation
Personal digital assistant
Network topology
Public domain
Online help
Event horizon
24:57
Ocean current
Standard deviation
Kernel (computing)
Computer animation
Different (Kate Ryan album)
Factory (trading post)
Insertion loss
Right angle
Event horizon
25:43
Point (geometry)
Mathematics
Computer animation
Software
Computer file
Different (Kate Ryan album)
Synchronization
Data storage device
File viewer
Event horizon
Neuroinformatik
26:51
Kernel (computing)
Computer animation
Network topology
Bit
Parameter (computer programming)
27:35
Latent heat
Mathematics
Computer animation
Network topology
Right angle
Cartesian coordinate system
Event horizon
Resultant
28:17
Point (geometry)
Musical ensemble
Virtual machine
Event horizon
Twitter
Wave packet
Latent heat
Mathematics
Different (Kate Ryan album)
Ideal (ethics)
Office suite
Content (media)
Bit
Line (geometry)
Cartesian coordinate system
Degree (graph theory)
Type theory
Curvature
Befehlsprozessor
Computer animation
Software
Network topology
Buffer solution
MiniDisc
output
Operating system
Freezing
Row (database)
31:12
Point (geometry)
Revision control
Medical imaging
Computer animation
Alphabet (computer science)
Mereology
Resultant
Freezing
32:23
Process (computing)
Computer animation
Network topology
Interpreter (computing)
Design by contract
Quicksort
Line (geometry)
Library (computing)
Social class
33:29
Dynamical system
Open source
Military base
Multiplication sign
Projective plane
Combinational logic
Tracing (software)
Process (computing)
Kernel (computing)
Computer animation
Software
Internet forum
Network topology
Right angle
34:39
Computer program
Context awareness
Dynamical system
Code
Multiplication sign
Public domain
Real-time operating system
Client (computing)
Mereology
Disk read-and-write head
Food energy
Tracing (software)
Neuroinformatik
Medical imaging
Inference
Sign (mathematics)
Mathematics
Different (Kate Ryan album)
Semiconductor memory
Core dump
Information security
Physical system
Oracle
Area
Electric generator
Concentric
Digitizing
Moment (mathematics)
Keyboard shortcut
Feedback
Maxima and minima
Bit
Instance (computer science)
Arithmetic mean
Binary tree
Process (computing)
MiniDisc
Right angle
Pattern language
Quicksort
Resultant
Spacetime
Filter <Stochastik>
Point (geometry)
Functional (mathematics)
Service (economics)
Open source
Virtual machine
Electronic program guide
Canonical ensemble
Event horizon
Rule of inference
Theory
Power (physics)
Revision control
Latent heat
Term (mathematics)
Profil (magazine)
Integer
Condition number
Module (mathematics)
Addition
Standard deviation
Dialect
Information
Interface (computing)
Projective plane
Mathematical analysis
Planning
Line (geometry)
Contingency table
Cartesian coordinate system
Symbol table
Word
Kernel (computing)
Computer animation
Visualization (computer graphics)
Integrated development environment
Network topology
Table (information)
00:00
or to find it parsimony is there there you worked on a deal to the new
00:06
projects are also on our data shows which is a company that basically we make features in the development of thingy sold today on the news so usually tracing thoughts or can cover of the boring but I try to do my best to find the so just show around here who ever heard about delta g g our experience at least 2 people with and so tracing and in general our individual events uses raising a would Castries her 50 and as results of our right to so I'm in good track uh so I
00:50
maintain the altitude you tools about part component of the of the G to change and this presentation is about like tracing builds GNG that they're showing you what we did in our in the last 3 years in terms of excellent feature in great work and how you can use it in user space also and so there's really a quick overview of the change trees in general I had a problem people here are middle know what procedures on just going to be an overview of all trees and all of them are going to talk about originals and some future work and so the difference is interesting
01:30
and avoiding or and what log it's a slow and so on that is that you can enable or disable advance during runtime and tracing is low intrusiveness very high performance so we delta g in g of we created this user server and some federal Teresa and introduce entity tools component that makes them together so we can merge Carol endless pastries with and what within 1 trees and analyze that after all so tracing is basically a high throughput by performance debugging have like that for you print out and then sold 3 uses that print of but I performance written it's killed CPU's also so this is this what's in it so for instance has 3 so anyone knows histories you agree to the users traits uh and just to and understand how to pronounce the DSS skulls but this is also interesting is more
02:34
is different from from the bottom it's very
02:37
important to understand this this is the basic truths about the spoken about to make use of 3 senior the tool of that Institute of X so we have to look for it and bring along some of is the unified tracing so if I continue to use the space and kernels but as I said were lower here we use a commentary for medical here which is the tracing formats in binary format on disk and then we analyze them with a few words what whatever you if you were to use and we're now all shift in the wind into the readout in other distributions so as I said so there's 2
03:18
traces where you entered into modules which are in the kernel trick so you as a and the repeated that like a lot you don't need to recompile external until the DAG use modules was now so the difference between a contingent that between person CNG our is that person's internal they do a lot of the stuff they also on the profiling where else did you doesn't do that but with the kernel model with the kernel 3 so you can trace lot of events in the kernel skulls and a bunch of of of whatever happens in a kernel in the different subsystems and then we created this you receive the year this is 1 most eminent part about today's these user this research so the love development will print so the news tracing user space and so
04:11
this reasoning process libraries so you gotta you instrument application recompile and you have the trees but the good thing is that enable these able and during runtime any events begin life traces against snapshot there's a lot of interest in for but yes so you can use the
04:32
kernel as into 2 . 68 before at least to digest the kernel but after that no on the modules are the utilities
04:42
of of the TNG so at the end user of our created a out of demon scholar session even the the session the first 1 is the freezing registry daemon this thing will combine everything you do so when you create a trace for instance so you have and injured create would come line so you can use the kernel in the spaces so it's pretty pretty great where you can integrate our whole slide into a tree of so yes so there would predict control library can use as else C so it's a C library interlibrary rather really which this really makes but you can stream the trace of a network so we can extract traces from
05:27
machines and put it on the network and then analyzed later on so this is the really needed in streaming data and the consumer he is the 1 we extract so there's a bunch of even is you don't really need to care about that when you trace will hinges so uh but if you want to do that contribute to or make development entertaining those kind the component but you were as
05:53
well I with choose which basically takes an input phrase and put dietary of traces and file traces and just print out on the on the council of human readable but there's GNG thought and this is
06:08
pretty pretty often so everyone years no stop the each stuff and this LP-CNG top is exactly the same but it uses kernel traces to print out the information from the top so the difference between something he does that we don't truly trough every 2nd for instance we just use life traces and we you can and you out what going on this pretty pretty often it is usually performance or of 1 to 3 per cent of 5 per cent it on your system worked out it takes a lot of use
06:48
on art so this is altitude user-space I you answered your application and I have some ideas about slides where you chose what's the what's instrumentation what's means that would call that tracepoints so just to betray he application and then extract at high your your data in Brussels library and a session you run your collected traces and then analyzed that's it that's all and so on so this is a lot
07:21
quick excuses scheme of what's going on so you're in machine any of your session even position even as I said is trees and register it just helps you create sessions and enable events that so on a command line you at the end you create enabling than that she remains that uses space for dash K dash kernel and we have a lot of people that domains rapid other domains that I'm gonna show you later on and actually also you able all around orientation so we don't change a great deal about that this issue of instruments addition of you list what's what which application you can trace so
08:00
if you start her application on your machine and didn't register for that session Newman and solution even with by consumers
08:08
safeguard Camden consume your trace an extractor trees and that's it's pretty easy an incident the attitude and the answer to that station will have so far consumer we create our profits and we share in the application so that it is you just pop enables profit to trees in the data and this is the great thing about treating you space with use that when the differences when you application crash as well the the buffers loss of life so we i'm offers we have everything to consume them we notification is that so we just extract you know and then you get all your trees uh even though addition
08:51
that and this this is done with a shared memory so we use is we are using every uses the source you so on and 1 of the 3rd or Syria assurance or see you yeah sources of computing but it's so users resources that progeny means really
09:13
company update its and synchronization mechanism to have very very high efficiency and performance than the right performance of that structure what is the the structuring in as sewing users there's there's a library of course you library call uses course you can check it out and we
09:32
use that a lot just to synchronize traces how form speeches as I said if you have 80 use 1 to 1 28 to be used on a scale of over and so that's what sort of so yes this is basically all we do stuff
09:52
in userspace shared-memory we exchange offers minutes our right to start and
10:01
who so this is this value in certain applications and the
10:07
status of this see it's macros it's kind of complicated to be honest in our area of how various elements proof that helps to period of a year and a half years Brussels the but it again you will be the the usefulness person is that you instrument application you do once you don't the print as everywhere who just instrument put on trees points and then you can trace it over time so your your petition is running then at some point is in problem well you can just be able call events on the tank is the subsystem is my eyes guys were in this value working and you need to make such a data so this that is so this is a test adhering to the entity and Europe history we have a and B have 2 examples and this 1 is a moral example so you provide an interest point main those are 2 different used to separate trees points so you can have a look at a bunch of tricks point unification interests that spring and to providers or domain or whatever so instance of you in the company name and then the department in and the application a subsystem and that's it you have to provide a name and you can just raise the fields that they don't want so you recorded in stream structure whatever so soul whether the basic function here I'm and then that industries point that the unit of created here so you with the test all and then we using it right so when you're using only on when you're coding application or maintaining at whatever the gain of 1st point to the cold and this series on put trees point and then the fields and is very record so this interesting is not enabled and there is absolutely no a performance is so the twist of the digits of zeroed out and that's if you enable it during runtime and then you get but I did area in benchmark the performance of child's but as of now we are around 250 nanoseconds it takes 3 application to the trees point and 2nd the lowest annual right now there's no sense going there in the back it's all of us you will copy stuff so this is very very i performances pretty pretty pretty good stuff and then just going person session so the command line you create a session so that the 1 enable the subsystem number 1 subsystem the number 42 and can use wildcards like that's in just subsystem 42 underscore in every event and that's a system would enable so that you use a space and and the sub system name and you can start and the other thing you start means just spike this the the tree is going to get recorded and then you can see the way in whatever you want coffee and then stop at some point and you can do it so that this URIs so this
13:32
is an example of of the trees can extract so the other times than the the top of the but that and then we have the delta between those 2 events that are all ranged in is the delta between 2 events so once again between this little since then they also in their true interest point name provider interest within name and then build a security saying this event was done on that the use of you want you to speak to and then the bill and others so for the building can put whatever you want to know anything strings in its that this structure pointers again extracted as a which is a human readable output that means the from babble trees for trees and so this is this is another example of
14:23
the kernel so for instance this is goal region this is golden and the escapes which states which is when to begin pj sort them to private processes that gets which must get during the kernel so so yes for instance we have the bill really the bottom point an account opened the affine flags sums of our itself up around the same outputs and in terms of of culture and that is pretty similar interests also because of histories can understand you the layout of this skull for instance if you do not receive messages send message and appeal to the uh you know the type of of the pills which means the structure of the of the arguments and so on so this is why offers appointed we don't know if what weight points or what's the structure and this just point but again human readable
15:29
so again spots that link and you
15:31
but this is not very useful India and because he just started trees the trees and then you start
15:38
so dreaded snapshots was not just means you're running your addition flight recorder it it's so we buffers you get sold you trace data you get a data but in the offers at some point in time uh depending on the size of the buffer is going to get rid of the so it's going to get up and you raised by new new data so right we modified recorded the point of that is that let's say you monitors your your answering application we don't you receive Twitter is the the width of interest points and then you start he just be able everything started just forget about it is goes into flight frequent mode going bottom-up and you have some tactile you an idea was a lot and the true
16:29
snapshot so what this does is that it requires snapshot did everything and from that point on the destruction is then extracted you wouldn't this or part of a network as you choose can predominant working ascended to a redhead now injury ladies in storage and file on another machine or on local commission and you can then analyze the traits that getting rid of digital why users in is that you can do that with a kernel and user space so you can snapshot boat domain both races so any because a timestamp or a synchronized so you have the trace they are from application and from your kernel so this is pretty great produced in you that from 1 to monitor
17:10
application that runs in production France
17:14
so yeah I created enable spot anyway you something and you statute records and that's so real world use cases where we we use that and it's it's it's then it's the main news flat where we go on to launch a large set of the news with that is for instance we are the core inlet accord up the way of course dominant implementation cycles whatever anything your application called dumps well you can tell it to you when it caught snapshot and is really really useful with especially kernel begins again knows exactly what happens which applications and the kernel when
18:03
this obligation caught up in as I said the buffers are shared with the consumer it means that when he scored on object you have the assurance that you get a get every event of the triggered by the application so we have that tree Ronald initiatives to
18:17
entity genes that have I did not tell the lord of the ripples through there and you have this we have this fancy you bash script that allows you to just a snapshot when accordance the idea also so let's say you are tracing regularly on your you just raising your your application you kernels you on different machines for notes and there's an there's right now research down and University in Montreal where it uses the data on data that is uploaded from L to the G to treat AIDS to analyze that on the spot real-time and just triggers trigger action made some some pattern emerged and sold at the being used to correlate data
19:11
logs in to merge with syslog also we have that we would try to work deployments that about allows you to that use tracing the and put it with the for instance plunk for or like on in terms of time duration uh you can use it for the performance profiling and so on and so forth so the hassles last year the since september about media we are assuming the recently a process for the 2 . 4 reversion but we had the light components slow-light component means you
19:49
can trace your data you can trace prone and you can read the event as they've been caught that sounds that seems like easy to you but it's not very difficult so the interval synchronization performance to achieve better performance on this but I have to a lot of work in the media we added this feature upstream so as not only in for instance uses that you traitors to trace the recession you trace your Kronecker education and you can lie read the traits so 1 of the things we're trying to do is to have a the and like in a drop in replacement for as for as for instance where we can use of CNG to do the same thing as history the in the different answers now the is that a trace changes reputation it uses betrays its changes staff and
20:44
did you hear a petition wooden x-rays and without a series of different ah because the truth is very intrusive intuitions registry in new doing some uh John trampoline offers an to to uh to extract is the sole imagine you can use a girl with the 3 forces to persons that its performance on your system and the exact same thing with this sort this word trying to this is why we come here to files and just like I explained in this and that's a feature not sell it to you but also trying to make you contribute and help boss to do development of contributors and changing so this is a kind of work so the
21:28
light using the thing is that you can countries analyzes clusterable analyzes you can do a lot of things which life imagine where you can like the life and 1 of the thing we just change in the last years that we tried to bring tracing to not kernel the block hours right so to use a space of opposite system administrator just to use tracing in nothing development fashion between just monitoring useful way so as a quick fix about image
22:02
of of the infrastructure that is usually of of the station the 1 year olds so this means else session use the demon that how traces of the trace of being collected on the other thing is socially and thought arrays the of the those running traits and you can extract on the to really be an adaptive you were connected to that region over TCP cities are so for instance River I we work with the companies uh large companies like Ericsson in Sweden that you use kind of infrastructure where they have you demand of the extracted data to a couple of moderation true network and indeed you which would or a machine to analyze it through another through that network uh it
22:51
scales on a massive amount of of of machines and it's being used so it is not just like you know
23:03
just 1 that's of someone of some developers having a dream it's been used so yes I only I want to add the more you have to digital but
23:14
a I got a problem with my out this morning so I can't of unfortunately but what I can do is use just to
23:27
the just to show you some some basic evidence that so what we have is health thing here so LC-NMR gene and this is something that will be for this so 1 thing is that if you have a session even running as roots i is it you know that Natalie kernel module kernel trees if your application is your guide the user is in the prison
23:58
possibly registration group and you can you can change any means is comparable with a the freezing group allows you to talk to decision even in the session is running as a random trees kernel so normal user trace a kernel soul mind that recent groups some of the things you
24:17
create this session in your soul there is no such agreement so
24:23
strong and going around the trees their time so healthy and you in this last case that means use the event to the kernel domain yes signed the GUI and that's an interesting part of
24:37
me put you on with groups
24:43
sorry but my like is a mess I the the Robert put on the back of the room
24:52
stuff of help you is that is so
24:58
this is all the kernel invented interest see if your 1st 60 Trudy are accused the of loss standard advanced of our of our internal right now it's tracepoint article traced back to the principle of how the same events factories also at the differences in a single vessels and then you
25:19
can trace whatever you want so let's say we have going to let's 3 the
25:27
mole and see are much events in create some just enable all them to my session for the current look into session as I could and should stay and it is so all
25:44
the enzymes and there's a lot right so when I do something he starts so I that at this point
25:51
my mind a computer is atrazine Detroit just to show you how much they're going to create and changes in this search so let me just trying to
26:08
center so we can see 11 11
26:13
megabytes and then 12 megabytes or a
26:15
nice so those are the the Lord the
26:20
your deal on the file after that have been filed so channel 0 mean just shows the was of the 4 channels synchronous channel the I did put on events and involves China so you can have different events in different channels and different session you can move that around in the network and so on so as the nice tracing an itemized viewers about doing nothing but i'm extracting every every event the and so a lot of the and there's nothing this store and also that
26:53
so let's stop there and the show you how it looks like yes only if the don't so
27:12
is a bit of its nonstop I
27:15
have learned a lesson to you all for what's months by so there's not being recorded and this is true this is kernels that every 10 Ramallah illocutionary oligomer attention every skills which everything in the argument is being trees so all that's 1st that and and just to show you the the
27:37
amount of data you can extract without any performance and this is a really great and you can as I said you can couple that without any you use user specification of sold if I have any application yielded change this that's you and you can see the application and what you can trace when application starts only application just sufficient even and and this is the event so you can just list that you see what efficient interests and trees a good that's all it's
28:08
still that to the the right so it
28:11
is something just performance results just to show you the the awesomeness of so we're on that for 15
28:20
minutes of our own and we took a snapshot of and every I don't evidence that you and created a snapshot of 7 megabytes of data on and you'll as to raise of so we compared to restore resources would create what about 5 out of 5 . 4 gigabytes of data in a matter of 15 minutes with 61 million about so remember phrase is this calls for a specific application entity you will trace every Cisco happens in your you in your machine for every application and the only spouses goals look at all the other events you so may create 6 . 8 to 256 storing to millions events of the same type syllables or and and we have a 1 cent didn't lost that so we themselves basically at this way too much the I speed and so we have to of news events unfortunately need to be able to have this kind of performance and record
29:28
so this is the the degree this for so mean it means that we have this and the trees in the input on that it's a dedicated to share this with your operating system and you can see all in their supply lines when he sees you right now sold the red 1 is this race with efforts my spilled my so-called and the rest is the same with changes so there's no performance so is the same as no freezing and we are comparing that with flight recorder as I said the we just recording recording point office and the rest of the yellow 1 ancestry so we expected the history on the network so you extract inter-machine and there's absolutely no performance it but you trace 250 million events yeah so when a shared this our it goes a bit more than he gives them the very i contention on the disk and ideals or off the roof on solo tracing of course high-performance and then you get your restaurants which is the yellow 1 and L 2 the use scalable so this is why you can see the the flat line of history says that when you go to 3 trends on a city on a 32 CPU machine invented but doesn't it doesn't got some point stop scaling and it just doesn't go into the where L 2 fugitives and the difference is that we have such a person you buffers and we tried very origin just of haunt cashline bouncing in a of performance problem you have when you have the training a petition so all of the 39th much of
31:14
the recent work in a futures so
31:17
some parts of this image is about 2 . x has been created in 2 thousand and 10 genes and each version is the name of the year of our in Quebec and Montreal correct and Canada so we have microbreweries and greater that we got very good results every we following the the alphabet so it's like 80 whatever we on and so too does the woods and they all 2 . 1 is Boston have stood up to is a of could of which is a very nice IQ from Obama we Montreal and everything sold 2 . 4 is like a package the 1 which is a remarkable now called please don't collect and 2 point 5 I don't remember what's the names in the outskirts biclique F so in excellent of a 2 . 4 we added the light freezing LSS we have also this snapshot of the 2 . 3 but as you can you can use them and 2 . 4 1 2 printer whatever and we had also you just or you still support so I only if there
32:24
is a lot shot developer here I'm not inferior jealous lover of me like Jell-O of there's a lot of people using Joan so how we have this sort of contract to a supportive and not supported added feature of the of using job-related utilizing so you eligible user along his library where you can you log repetition go so we booked we're really understand you agent in general and
32:51
this is books itself on on the job will you to library and extracted data from that and put on the trees so it's pretty nice because should arrange our can do not interpretation of 1 line like just chat with CG does to create your class so don't remember exactly but just to create a class and then you start the job of the of thing and you can use it to change of ideas with the Council and trace your job so ah yes so this is a performance gets but against the use
33:29
of our future work and almost and so there's a lot of fun question a of future work is that we have this year and we are already where tracing would be no talking along with the harm people in their people and we gonna try to put on the Ottawa traces interested so
33:46
once we can do that it means that you can combine traces kernel traces and use bases in the same in the same room arteries and Korea times them and analyze that which is this to be honest pretty awesome and it's you can do that right now on this use of pride SELF proprietary software from market of for is trying to full source the trees uh but by it's coming up and interested triggers and draw the courts of Portland and an automatic analyzes dynamic also instrumentation with d-trees doesn't and we don't should but we're trying so if you're looking for for Trajan's Forum open-source project to contribute or you know even a job or dynamic guidance mutations are important because they're trying do
34:40
1 yes so you project and that's nowhere Europe so in this question that's right yes I think there's a
34:51
microphone around our just there's 1 person with yeah further work but more so for that and just 1 thing for the question answered please sign clearly if you have questions so we can come around to your place to give him microphone and if you want to leave please leave cry of the others have a chance to get asked that question about so you mention that there standards of tracing lines and then install so that I don't have to recompile and his father couldn't stand you log in you can alter the same that machine for example on the disk by that you can look at this the I can trace what's in the so what I enables the everything in the car and then I want to log on this data and on the local disk that heats hands like in parallel so they're do I get rules of log of the entries in my trace data only so so you're saying that you we extracting do we get our goals events in the data the all of the dual working so yes there is a kind of feedback to wind in their own where you use yielded GNG events so you were extracted data we using of course the skulls and you see that in the trees so the more you train the more you created by far you can fill that our we have filters and USC and then is that come with kernel just removal to the duty was question and I and our question about time we don't the uh tracepoints dynamically interval running kernel and we want to do the this fact so apart so the question is raised by dynamically add to it points to occur and so our the trace events in the kernel or status so it means the code of the upstream right now and you using so what's existing is the kernel is called the profile for concentration mistresses so you can talk to any symbol in the world that and LGG supports so we didn't do it for every event again just have let's say I 1 trees that that function the kernel so you can do out with the you would have enabled and that's just function that educated so those or of we can assume that exist the current and trees and the simple you know where usually addressed coordinate by the beginning of hi I have some questions phone and you space place that some of these in the condition anywhere to like 4 people wanted from nearest canon programming to to use space probing somewhere because when I was looking for something when teaching Judean find much information the assailant what's interesting points followed by some interpreter and use it anywhere reckon so our our documentation is always a problem with the source of projects and and that he is also lacking in the documentation and also for instance if you want to add the instrumentation your application are what I would say so you can have the mandate of the USC is the best place to look for Councilman Joe everything US the US is used is that you get used to it and that and also you look at the examples in the core the this you wanna create a developer of the condition that the develop guide cry again it's just a matter of time and resources just do that can teII extract like consists of a decision of but when you use space in and extract would stack at some point is easy to do in in the in the congenial that I just thought it was a really extra that the road to strike at some given point all well now look at the at the time I the result of this OK of I have high can you describe lives how does and at the end see yeah and here I they describe how it in the analyzes they why they're being creative and what the interfaces are available for the that asked questions that is there is an interface to do the analyses of everything you I'm sorry I couldn't use is the question is and a lot more about the changes to extracted data 1 it's it's getting out by what is their interfaces to do otherwise and so the question so you have parts so how we understand that there's some analyzes there's this team at the phrase monitoring foreign word contingency plans so this tool that is presented as you wish graphical to to and analyze the of the and all the trees are it's our it's an eclipse there's there's a rich client what's called our city thing which you can use also the clips that allows you to analyze data and think about it but if you see our automatic analyzes for instance no there's nothing right now and this is something we looking for computers to help us do the thematic analyzes in terms of what we can think of security of performance at after I was wondering if there is a need to the use of the energy in known as the tools that yes without choking studio phi interface right so we have a job bindings and we're working on part of findings also have got desert now without the job works fine without using even now he used to go to or you just we don't have anything else but there's this you're working apart combined this so this would be possible to get yet at the the yes I haven't both in a real-time image project which works with RT and stand my as well as on so the last 1 is out of question because that's after it's like I I don't expect any problems using that with our Dupree and your question from these analyzes are done in the data points using that and for trees using a DAG uses for real time with the cinema use all inferences are and also the old and the new Kodak patterns for different about the 2 x doesn't support article on the contrary question differently argue it in the head in the generation of a trace event is the analysis of course or is this just memory to tomorrow the year there is no system calls stuff when the trace of the court is not so we just so there's a right context but this kind of copy thing where regions and maximum region of the data and then we extract that so there is a tracepoint instances of the things comes and theory that so all the stuff that LTTE indeed compared to other systems have already traces of is that it always traces everything and you analyze it later or what's the main differences are at so the major difference is that the trace insisting that when you try to go through kernel every time out we don't do that user space we don't want to kernel so it means we don't have to solve why do traces system that you have to use the kernel module oracles to a kernel to trace the tree structured data the trace our it's it's great but the big issue is that I'm sorry there's oracle people in room but ah it's it's been Bob Oracle right is there was a song about like Oracle and an oracle right now it's just not saying it right but is trying to put it on the central source so to more of doing stuff for integers closest everything and so there's a Linux support for but it's not that you are using traces for Solaris and and I was using and also and system that is a great thing they just a bit complicated the use of different kinds of from offering and extract data but again the use of kernel we don't and this is a very very a different approaches performing and the performance of the thingies performance as century in terms of the future is worse than that in the trees the and just want to mention that that the use of dynamic tension of trees is we don't know that I'm interested means you can just see application running you can just decide to trace 2 of 2 trees that have specific function for instance I'm to promote that's different and that and defined I don't try to use classification we used see I and I want to get the full trees from the moment my program starts running so we had to begin I cannot be somehow pre enable the tracepoints before the application is registered with session you will have so you can enable you can enable any advance you want and when the application starts to get a table at the Four domain of applications part so this means that the way to get the main part of reputation power features what I already enable isolated can enable like before OK 2 and 1 of the question and if I have a long-running running occasional tragedy and a halfway to the trace of the sort of want to enable more advanced can I do that without stopping and restarting the trace the features can enable event and it hasn't yet so that's the the which reason is that you can enable disable events so everyone has sold any point in time you can disable events like meaning stop stop for a single event or you can enable them so you got to enable them prior right so it a when a 1 1 event and then you start addition traces and what it is they to build our designated it's on mortgages enable them when we want the entire at the we find that the more you guys looking at tracing guests in which less environment through the hypervisor so so are we looking at at tracing of the visualization just as I mean you know concession been running on the host and then you have comical yes guests and because of the the trees so few United some intense internal power so you can trace those events from the events but some getting to trace out the whole of the energy and how within the with the old for instance I know we don't do it at all that we support to trace different about me and also in the trees so for instance if you galaxies for this services that also the revision in the trace initial which holds the EU's going through this event again of say all this coming from that which digitization is a much more between yields and the gas is more difficult to just straight along the the plans supporting him and not all of the analysis kind difficult not wanting to be greatest in of desynchronizing thanks to the north there's no plan have planned for that and I would like also to thank the I so thank you all area of foreign next week and I have talked models so please come to this What's your talk tomorrow and thank you for the support and the next begins some
