Reasoned Software Infrastructure Engineer. Performance Engineer. Site Reliability Engineer. System Programmer. Dealing with Observability, Reliability, and Performance. π€ Slow thinker. Open Source Enthusiast. Mentor (CNCF LFX, Google Summer of Code, CommunityBridge, GoBridge). Blogger and speaker. Introverted Human (not Cylon, I guess). π Pronouns: He/Him or They/Them.
π Iβm currently working on an eBPF-based profiler. Also, I help to build large-scale, distributed systems, observability infrastructure, and real-time data storage systems. π± Iβm currently learning the internals of time-series and columnar databases, distributed systems, and building highly available systems.
Sucker for @ziglang, @rust-lang, and @golang!
For more, visit kakkoyun.me/about
From: 08 November 2024 - To: 15 November 2024
Markdown 1 hr 16 mins βββββββββββββββββββββββββ 82.07 %
Zig 16 mins βββββββββββββββββββββββββ 17.93 %
Further details wakatime.com/@kemal
A new chapter in my professional journey As the flowers bloom and the world awakens to the vibrant colors of spring, a season of renewal and growth, I find myself embarking on a significant transition in my professional journey. (Too cheesy? I know, but bear with me.) This year, I find myself absent from the vibrant buzz of KubeCon, a place of learning and connection that I hold dear. Instead, I’m on a different kind of duty β one that involves diapers and the joys of parenthood.
- Profiling Python and Ruby using eBPF
October 4, 2023
Originally published on polarsignals.com/blog on 04.10.2023 https://www.polarsignals.com/blog/posts/2023/10/04/profiling-python-and-ruby-with-ebpf/
- Ice and Fire: How to read icicle and flame graphs
March 28, 2023
I am too lazy now a days to re-post the blog post with all its assets and animations here. So until I get to it, I have put a link to it here. Enjoy :) Originally published on polarsignals.com/blog on 28.03.2023 https://www.polarsignals.com/blog/posts/2023/03/28/how-to-read-icicle-and-flame-graphs
- Fantastic Symbols and Where to Find Them - Part 2
January 27, 2022
This is a blog post series. If you havenβt read Part 1 we recommend you to do so first! Originally published on polarsignals.com/blog on 27.01.2022 In the first blog post, we learned about the fantastic symbols (debug symbols), how the symbolization process works and lastly, how to find the symbolic names of addresses in a compiled binary. The actual location of the symbolic information depends on the programming language implementation the program is written in.
- Fantastic Symbols and Where to Find Them - Part 1
January 13, 2022
Originally published on polarsignals.com/blog on 13.01.2022 Symbolization is a technique that allows you to translate machine memory addresses to human-readable symbol information (symbols). Why do we need to read what programs do anyways? We usually do not need to translate everything to a human-readable format when things run smoothly. But when things go south, we need to understand what is going on under the hood. Symbolization is needed by introspection tools like debuggers, profilers and core dumps or any other program that needs to trace the execution of another program.
For more visit kakkoyun.me/posts