Analyzer kernel-dropwatch
Name
kernel-dropwatch - Packet Drop Flame Graph
This analyzer monitors and profiles packet drops at the kernel level across the entire system. It captures stack traces when packets are dropped by the kernel network stack, tracking drop locations and reasons. The analyzer generates flame graphs visualizing the kernel code paths leading to packet drops, and produces PCAP files of dropped packets for detailed inspection. This is essential for diagnosing network performance issues, identifying bottlenecks in packet processing, and troubleshooting packet loss problems at the system level.
Resource Category
Network I/O.
Application Type & Technical Stack
- All
Command Line Syntax
The analyzer can be invoked directly on the command-line via the orxray
utility from the openresty-xray-cli software package.
Alternatively, the analyzer can also be invoked manually or automatically on the web console UI of OpenResty XRay (like on the Advanced web page).
# PID is the target process PID.
orxray analyzer run kernel-dropwatch -p PID
# trace a shell command directly
orxray analyzer run kernel-dropwatch -c SHELL_CMD
# PGID is the process group ID or any process's PID within the target process
# group.
orxray analyzer run kernel-dropwatch -p -PGID
# trace any processes started from the specified executable path.
orxray analyzer run kernel-dropwatch --exe /path/to/exe/file
Tracing Multiple Processes
Supported.
Output Formats
- Flame Graphs
Author
The OpenResty Inc. Team.
Copyright
Copyright (C) by OpenResty Inc. All rights reserved.