Getting Started
Qtap is Qpoint's lightweight eBPF agent that captures network traffic at the Linux kernel level. It can run standalone (configured via YAML) or connected to Qplane for centralized management.
Choose Your Quick Start Path
We have several getting started guides tailored to different needs:
For First-Time Users
5-Minute Quickstart - Fast preview with console output
Time: 5 minutes
Best for: Testing if Qtap works on your system, quick demo
You'll get: Real-time console output of HTTP/HTTPS traffic
For Production Deployment
Complete Guide: Hello World to Production - Progressive 4-level tutorial
Time: 50 minutes (pauseable between levels)
Best for: Learning Qtap systematically, production deployment planning
You'll learn: Basic setup → Filtering → Rules → S3 storage
For Urgent Debugging
Production Debugging with HTTPS Visibility - Emergency troubleshooting
Time: 30 seconds to 5 minutes
Best for: Active production issues requiring immediate visibility
You'll get: HTTPS traffic inspection without certificates
For Specific Use Cases
Interactive debugging: DevTools UI - Browser-Based Traffic Inspection
Web servers (NGINX, Caddy, etc.): NGINX Traffic Capture
Ingress traffic: Ingress Traffic Capture
All guides: Qtap Guides Overview
System Requirements
Before getting started, check the system requirements for details on Qtap compatibility.
Quick compatibility check:
Minimum Requirements
Linux kernel 5.10+ (check with
uname -r)Docker installed (for Docker-based deployment)
root/sudo permissions
eBPF support enabled
Quick Demo
Want to see Qtap in action right now? Run this one-liner:
This starts Qtap with a basic configuration that outputs captured traffic to your console. Generate some traffic with curl to see it in action.
Docker Demo
Step 1: Create a Simple Qpoint Configuration File
Step 2: Run the Qpoint Tap Agent
Now, deploy the Qtap agent:
Step 3: Generate Some Test Traffic
Let's create some test traffic to see Qpoint in action:
Step 4: View the Captured Traffic
Check the Qtap logs to see the traffic being captured:
You should see log entries showing:
Connection details (source, destination, protocol)
HTTP request and response metadata
Full request and response payloads in the console
Error information for the 404 and 500 responses
Example output snippet:
Step 5: Test Specific Use Cases
Now that Qpoint is running, you can try various use cases to see more capabilities:
Capture API Authentication Issues
Monitor Third-Party API Health
Track Slow Responses
Last updated