eBPF Summit 2024

Blog page

How-ToExternal

Hello eBPF: Global Variables (10)

The tenth installment of the Hello eBPF series. In this part, you'll learn how to use global variables to configure our eBPF and communicate between user-land and kernel-land

Read more
CommunityExternal

Demystifying eBPF with Liz Rice: A Deep Dive into Kernel Programming and Security

In this podcast, Liz sheds light on the evolution of eBPF from a packet filtering tool to a powerful kernel programming technology

Read more
TechnologyExternal

Leveraging eBPF for DevSecOps

Learn how eBPF's raw data can be combined with Cloud APIs can allow users to understand application-layer identity, provide real-time security, pinpoint problem origins and stop threats with surgical, active response

Read more
TechnologyExternal

Detecting Advanced Persistent Threats (APTs) in Financial Systems with eBPF

Explore how eBPF enhances security in Kubernetes for financial systems by detecting Advanced Persistent Threats (APTs)

Read more
TechnologyExternal

Tetragon Process Lifecycle Observation: eBPF Part

Learn how Tetragon detects process creation and termination using eBPF

Read more
TechnologyExternal

Using Tc-Bpf Program To Redirect Dns Traffic In Docker Containers

A practical guide for implementing DNS redirection amd using TC-BPF to enhance network control within containerized environments

Read more
TechnologyExternal

Optimizing Local Socket Communication: SOCKMAP and eBPF

A detailed overview of how SOCKMAP works in conjunction with eBPF to splice sockets, allowing for streamlined communication between different network namespaces or within a single namespace

Read more
TechnologyExternal

Getting started with Aya and eBPF Part 1

The first part in a series of posts exploring eBPF and the Rust Aya crate

Read more
TechnologyExternal

Seccomp, eBPF, and the Importance of Kernel System Call Filtering

Learn about attacks that affect user space security products and how popular technologies such as Seccomp and eBPF can be used in such a way that avoids these issues

Read more
CommunityExternal

How is Kubernetes Network Security Evolving?

In this podcast, Liz Rice spoke on Cilium, Tetragon and eBPF's impact in network security

Read more