Show HN: Subtrace – Wireshark for Docker Containers

(github.com)

Comments

gerwim 20 February 2025
Looks great! Reading through the docs it seems the subtrace process sends all data to your server. I'm reluctant to do that on a production environment, where API keys and personal data are being handled.

Is there any way to run it completely self hosted? If not, are there plans? And how will you monitize self hosted options (if it's possible)?

qwertox 19 February 2025
Wireshark seems a bit misleading. More like a "network inspector" if one leans towards the browser's network tab in the inspector?

But it really looks useful and I'll definitely play with it to see if I put it into my toolbox.

jgauth 19 February 2025
Looks like it is for http requests only? If so, wireshark is not an apt comparison.
smw 19 February 2025
Can it decrypt tls? Perhaps by hooking the calls to common libraries?
johannes1234321 19 February 2025
From the video it seems the dashboard is hosted on sibtrace.dev. Is my data being sent there? That's an absolute no-go for me.
IggleSniggle 20 February 2025
My most painful debugging scenarios with Docker networking (for me) has always been dealing with non-TCP traffic. But still, this seems useful. One thing I don't understand is why this requires an account token? Does this require a network connection to subtrace? It seems like this should all be running locally, and these kinds of connection details are _exactly_ the kind I would not want to leave the host, let alone go to a third party.
mhils 20 February 2025
Congrats on the seccomp-based interception, that's a really neat way to solve this problem! We did some BPF_PROG_TYPE_CGROUP_SOCK eBPF shenanigans in mitmproxy for redirection, but that doesn't work with containers at all. Cool to see that intercepting all relevant syscalls works that well.
ksdme9 19 February 2025
Have not played around with it, but, curious, how does debugging on production work for a specific request/session? Can I filter by some sort if request trace id or something?
choilive 19 February 2025
Always wanted a tool like this. Will try it out next time I need to inspect traffic of a docker container.
parliament32 18 hours ago
So "tcpdump as a service"? Why wouldn't I just generate my own pcap and stick it into wireshark or whatever I like for looking at packet captures? I'm having trouble seeing the value prop here.
arguflow 19 February 2025
Very happy subtrace user here. Especially useful to possess the Server-Timing headers.
29athrowaway 19 February 2025
You can use mitmproxy and mitmweb to achieve the same. It is in Docker hub and you can pass environment variables to your other containers to make it work.

The TLS certificate setup is more tricky but that is always going to be a pain.

Burp Proxy is another great tool that is even more powerful but harder to set up.

Vordimous 20 February 2025
This will help those developers who don't want to navigate Wireshark's setup and just want the familiar Chrom DevTools. Very cool project!
kylegalbraith 20 February 2025
Do you envision going beyond just network calls from bpf?
Onkar-Hanchate 19 February 2025
Interesting! How does this handle latency? Does it introduce any noticeable delay?
thebabayaga29 20 February 2025
Cool product, I can imagine my engineers using it. Out of curiosity, how would you monitize that?
kristopolous 19 February 2025
stratoshark, the docker container part of wireshark, may be a better match for that description.

I'd probably use a postman related pitch instead. This is much closer to that and looks like a nice complement to that workflow

withinboredom 20 February 2025
We use https://treblle.com/ at work for this in production. Very handy to see what requests are being made and by whom.
sirjaz 20 February 2025
Any Windows Server support coming?
polithrow22 19 February 2025
anything similar for k8s?
rob_c 19 February 2025
or, there's you know... wireshark...
codegeek 19 February 2025
Side question. Why not do a Launch HN instead of Show HN since you are backed by YC ? I thought YC companies can do a launch HN?
vednig 19 February 2025
please add YC to the title