Show HN: Trayce – Network tab for Docker containers
138 points| ev_dev3 | 1 year ago |trayce.dev
As a backend developer I wanted something which was similar to Wireshark or the Chrome network tab, but which intercepted requests & responses to my containers for debugging in a local dev environment. Wireshark is a great tool but it seems more geared towards lower level networking tasks. When I'm developing APIs or microservices I dont care about packets, I'm only concerned with HTTP requests and their responses. I also didn't want to have to configure a pre-shared master key to intercept TLS, I wanted it to work out-of-the-box.
Trayce is in beta phase so feedback is very welcome, bug reports too. The frontend GUI is written in Python with the QT framework. The TrayceAgent which is what does the intercepting of traffic is written in Go and EBPF.
gyre007|1 year ago
notpushkin|1 year ago
inyorgroove|1 year ago
Just one problem I noticed imminently that prevents me from using this, the docker agent container[1] isn't multi-architecture, this will be an issue on Apple Silicon devices. This is something I have some experience setting up if you are looking for help, though will take some research to figure out how to get going in github actions etc.
1: https://github.com/evanrolfe/trayce_agent/
EDIT: quick search found this post, tested on a side project repo it works great: https://depot.dev/blog/multi-platform-docker-images-in-githu...
ev_dev3|1 year ago
unknown|1 year ago
[deleted]
thomasfromcdnjs|1 year ago
ev_dev3|1 year ago
This is a common problem however when trying to run ebpf programs in docker, see "CONFIG_BPF_SYSCALL and RLIMIT_MEMLOCK issues" here: http://andreybleme.com/2022-05-22/running-ebpf-programs-on-d...
Also see "Configuring limits in the container" here too: https://blog.bitsofnetworks.org/debug-bpf-docker-l2tpns/
unknown|1 year ago
[deleted]
quibono|1 year ago
upon_drumhead|1 year ago
One thing that we've been craving for our infrastructure is something like Little Snitch for containers. We make extensive use of third party containers and have been very concerned about any sort of data exfiltration attempts via supply chain attacks. We have a pile of iptable rules right now, but they're error prone and difficult to rationalize about. If we had something like Little Snitch where we would get the feed of connections and allow us to approve/reject them, it would make us all sleep a lot better.
Best of luck with your endeavors!
unknown|1 year ago
[deleted]
iamcreasy|1 year ago
> It uses EBPF to achieve zero-configuration sniffing of TLS-encrypted traffic.
Can someone ELI5 this?
ev_dev3|1 year ago
unknown|1 year ago
[deleted]
ThaDood|1 year ago
thebuilderjr|1 year ago
sesm|1 year ago
zokier|1 year ago
piyushtechsavy|1 year ago
unknown|1 year ago
[deleted]
ancras|1 year ago
esafak|1 year ago
viralpraxis|1 year ago
skeptrune|1 year ago
globular-toast|1 year ago
ev_dev3|1 year ago
alexliu518|1 year ago