Blog page
Reflecting on the eBPF Summit 2024: A Recap of Innovation and Community
A Recap of the recently concluded eBPF Summit 2024
Read moreFirst eBPF program
Learn how to write a Python program that compiles and loads the eBPF program into the kernel and attaches it to the execve system call
Read moreHow Cloudflare auto-mitigated world record 3.8 Tbps DDoS attack
Learn how Cloudflare were able to deal with a DDoS attack and protect their systems with XDP and eBPF
Read moreeBPF Challenge 1: XDP Return Codes
An eBPF challenge that showcases the consequence of returning a 0 value from an XDP program
Read moreeBPF- One Size Does Not Fit All
Explore how eBPF is not a "one size fits all" solution despite how it is becoming widely adopted for various use cases
Read moreIntroduction to eBPF
Discover how eBPF allows developers to safely extend Linux kernel capabilities for observability, tracing, and security
Read moreCrowdStrike's Blue Screen blunder: Could eBPF have saved the day?
Grafana Labs CTO, Tom Wilkie, discusses eBPF and its role in preventing incidents such as the CrowdStrike Windows kernel crash, while also addressing cloud economics and open-source development
Read moreTetragon eBPF for Kubernetes: The Verdict Is Out
Dive into Tetragon's effectiveness in improving security and observability for cloud-native applications running on Kubernetes
Read moreLoops and Iterators in eBPF
Learn how to use loops and iterators in eBPF and how to implement them effectively in eBPF applications
Read moreWhat Insights Can eBPF Provide into Real-Time SSL/TLS Encrypted Traffic and How?
Learn how eBPF user space probes (uprobes) can help bypass encryption limitations to monitor and interpret secure network traffic that traditional packet sniffers cannot
Read more