diff --git a/docs/sources/reference/components/beyla/beyla.ebpf.md b/docs/sources/reference/components/beyla/beyla.ebpf.md index 2e19242f02..c64088ab0d 100644 --- a/docs/sources/reference/components/beyla/beyla.ebpf.md +++ b/docs/sources/reference/components/beyla/beyla.ebpf.md @@ -2,6 +2,10 @@ canonical: https://grafana.com/docs/alloy/latest/reference/components/beyla/beyla.ebpf/ aliases: - ../beyla.ebpf/ # /docs/alloy/latest/reference/components/beyla.ebpf/ +keywords: + - Grafana Beyla + - eBPF + - Beyla description: Learn about beyla.ebpf title: beyla.ebpf --- @@ -12,21 +16,22 @@ title: beyla.ebpf {{< docs/shared lookup="stability/public_preview.md" source="alloy" version="" >}} -The `beyla.ebpf` component is used as a wrapper for [Grafana Beyla][] which uses [eBPF][] to automatically inspect application executables and the OS networking layer, and capture trace spans related to web transactions and Rate Errors Duration (RED) metrics for Linux HTTP/S and gRPC services. +The `beyla.ebpf` component is a wrapper for [Grafana Beyla][], which uses [eBPF][] to automatically inspect application executables and the OS networking layer and capture trace spans related to web transactions and Rate Errors Duration (RED) metrics for Linux HTTP/S and gRPC services. You can configure the component to collect telemetry data from a specific port or executable path, and other criteria from Kubernetes metadata. -The component exposes metrics that can be collected by a Prometheus scrape component, and traces that can be forwarded to an OTEL exporter component. +The component exposes metrics that a Prometheus scrape component can collect and traces that can be forwarded to an OTel exporter component. {{< admonition type="note" >}} -To run this component, {{< param "PRODUCT_NAME" >}} requires administrative (`sudo`) privileges, or at least it needs to be granted the `CAP_SYS_ADMIN` and `CAP_SYS_PTRACE` capability. +To run this component, {{< param "PRODUCT_NAME" >}} requires administrator privileges, or at least it must be granted the `CAP_SYS_ADMIN` and `CAP_SYS_PTRACE` capability. In Kubernetes environments, the [AppArmor profile must be `Unconfined`](https://kubernetes.io/docs/tutorials/security/apparmor/#securing-a-pod) for the Deployment or DaemonSet running {{< param "PRODUCT_NAME" >}}. {{< /admonition >}} - ## Usage ```alloy beyla.ebpf "