Blog page
File Monitoring with eBPF and Tetragon (Part 1)
Learn how to implement secure and scalable file monitoring(FIM) with eBPF and Tetragon
Read moreCorrelating Tracing with Profiling using eBPF
Learn how to use ebpf-based Parca-Agent to read the trace ID from a target program with Go
Read moreHello eBPF: Tail calls and your first eBPF application (4)
In the 4th part of the series, you'll finish the chapter 2 of the Learning eBPF book, learn how to use tail calls and the hello-ebpf project as a library and implement one of the book’s exercises
Read moreAdventures in eBPF
An exploration of eBPF highlighting how build a program that leverages eBPF to intercept SSL traffic in user-space
Read moreeBPF program creation in practice – PID concealment (Part 1)
Learn how to create an eBPF program using a tracepoint
Read moreeBPF Up and Running: Part 1
A simple introduction to writing your first eBPF program using C and Golang
Read morePerfecting Protocol Parsing (Probably) with eBPF
Learn how to parse BGP messages with eBPF
Read moreXDP and eBPF for Network Observability with Python
Explore observability with eBPF and Python by extending a packet counter example from Liz's Learning eBPF book
Read moreHello eBPF: Recording data in basic eBPF maps (2)
In the second post in the series, hello-ebpf gained support for basic eBPF hash maps and the ability to store structures in these maps
Read moreBuilding portable eBPF Programs - CO-RE
Learn how to create portable eBPF programs using Compile Once - Run Everywhere (CO-RE)
Read more