Blog page
![](/static/22bd20470f086550b7a93ce7e8829843/789ff/ogimage.png)
How eBPF has changed the way I feel about observability
In this interview, Bill Mulligan from the eBPF Foundation dives into the State of eBPF Report which details eBPF adoption within Linux that is fundamentally changing the way IT is managed
Read more![](/static/4c30c90f756482f9c58f8d269cba3b71/8a706/ogimage.jpg)
How eBPF Benefits IT Operations Teams Seeking to Improve Observability
A guide on why ITOps teams should consider taking advantage of eBPF, and how they can do so
Read more![](/static/7b04f5e00d9ac9bfa4c966b9e5537a15/73a03/ogimage.png)
Hello eBPF: Tail calls and your first eBPF application (4)
In the 4th part of the series, you'll finish the chapter 2 of the Learning eBPF book, learn how to use tail calls and the hello-ebpf project as a library and implement one of the book’s exercises
Read more![](/static/0d2a3f2530f7e37d6e27c095d60addec/c9bad/ogimage.jpg)
Java and eBPF--airhacks.fm podcast
The #281 airhacks.fm episode with Johannes Bechberger about developing eBPF programs with Java and migrating Python tooling to Java with Project Panama
Read more![](/static/b7b3c250ed9a32a685d76dcc1290466b/9aa5f/ogimage.jpg)
Cisco's eBPF Gambit: A Game Changer in Cloud Native Security?
A short report on Cisco's acquisition of Isovalent highligting the benefits Cisco can get out of the deal and how they can leverage eBPF
Read more![](/static/5f2a4da11bbbbeace9f48891c0137e5d/d4850/ogimage.png)
Adventures in eBPF
An exploration of eBPF highlighting how build a program that leverages eBPF to intercept SSL traffic in user-space
Read more![](/static/e3355a94da0abe5cfd00613b38b3fc71/9aa5f/ogimage.jpg)
eBPF: Meaner Hooks, More WebAssembly and Observability Due
This blog post discusses the growing accessibility of eBPF-based tools for enhanced observability and functionality, indicating a trend towards broader adoption due to emerging, user-friendly solutions
Read more![](/static/cc2e240b6331b4f9acda1ce286f05f68/58230/ogimage.jpg)
eBPF program creation in practice – PID concealment (Part 1)
Learn how to create an eBPF program using a tracepoint
Read more![](/static/eeaf567fd733d28923071a0bd1a2a08f/0eae2/ogimage.jpg)
eBPF program creation in practice – PID concealment (Part 1)
The NewStack reports on Cisco's acquisition of Isovalent, highlighting the strategic importance of eBPF technology and its application in Cilium for advancing network and security observability in cloud-native environments
Read more![](/static/509e38313af72b6961ae52c991e42080/8d684/ogimage.webp)
eBPF Up and Running: Part 1
A simple introduction to writing your first eBPF program using C and Golang
Read more