From 11d401cfa52aa8d00c027d6d278e5eb048f22713 Mon Sep 17 00:00:00 2001 From: Clayton Cornell Date: Fri, 6 Sep 2024 10:35:54 -0700 Subject: [PATCH 1/2] Rework and reorganise Beyla component doc --- .../reference/components/beyla/beyla.ebpf.md | 231 +++++++++--------- 1 file changed, 122 insertions(+), 109 deletions(-) diff --git a/docs/sources/reference/components/beyla/beyla.ebpf.md b/docs/sources/reference/components/beyla/beyla.ebpf.md index 2e19242f02..5eeb3f6671 100644 --- a/docs/sources/reference/components/beyla/beyla.ebpf.md +++ b/docs/sources/reference/components/beyla/beyla.ebpf.md @@ -14,19 +14,20 @@ title: beyla.ebpf The `beyla.ebpf` component is used as a wrapper for [Grafana Beyla][] which uses [eBPF][] to automatically inspect application executables and the OS networking layer, and capture trace spans related to web transactions and Rate Errors Duration (RED) metrics for Linux HTTP/S and gRPC services. You can configure the component to collect telemetry data from a specific port or executable path, and other criteria from Kubernetes metadata. -The component exposes metrics that can be collected by a Prometheus scrape component, and traces that can be forwarded to an OTEL exporter component. +The component exposes metrics that can be collected by a Prometheus scrape component, and traces that can be forwarded to an OTel exporter component. {{< admonition type="note" >}} -To run this component, {{< param "PRODUCT_NAME" >}} requires administrative (`sudo`) privileges, or at least it needs to be granted the `CAP_SYS_ADMIN` and `CAP_SYS_PTRACE` capability. +To run this component, {{< param "PRODUCT_NAME" >}} requires administrator privileges, or at least it must be granted the `CAP_SYS_ADMIN` and `CAP_SYS_PTRACE` capability. In Kubernetes environments, the [AppArmor profile must be `Unconfined`](https://kubernetes.io/docs/tutorials/security/apparmor/#securing-a-pod) for the Deployment or DaemonSet running {{< param "PRODUCT_NAME" >}}. {{< /admonition >}} - ## Usage ```alloy beyla.ebpf "