Blog page

Can eBPF Keep Your Kubernetes Cluster from Getting Hacked?
Explore how eBPF can help make Kubernetes clusters more secure and less likely to be hacked
Read more
eBPF Offers a New Way to Secure Cloud Native Systems
Dive into the advantages of eBPF in enhancing security for cloud-native systems by offering better visibility and control over system and network behaviors
Read more
Userspace eBPF Runtimes: Overview and Applications
Dive into the role of userspace eBPF runtimes, such as ubpf, rbpf, and bpftime, and why they are intriguing due to enhanced performance, flexibility, and security
Read more
Unlocking Speed: eBPF-Based Auto-Instrumentation Over 20x Faster Than Traditional Instrumentation
The article discusses the Odigos project, which utilizes eBPF for automated tracing in applications, addressing challenges like code modification and performance dips associated with traditional tracing. It showcases that eBPF-based auto-instrumentation is over 20x faster than manual instrumentation, significantly reducing performance overhead
Read more
XDP: Your eBPF Packet Processing Introduction!
Learn about how XDP enables network applications to function safely within the Kernel, even before processing by the host's networking stack
Read more
The Evolution and Impact of eBPF: A list of Key Research Papers from Recent Years
A comprehensive list of research papers related to eBPF and highlighting eBPF's capabilities in accelerating network processing, enhancing observability, and enabling programmable packet processing
Read more
eBPF vs Traditional Packet Filtering Technologies: A Deep Dive
Dive into the technical foundations of both eBPF and traditional packet filtering, their architectures, performance metrics, advanced features, and security aspects
Read more
Learning eBPF Review
Leigh Finch provides a review of the book 'Learning eBPF' by Liz Rice, emphasizing its unique approach towards eBPF from a security and kernel modification perspective, beyond the common observability and performance lens
Read more
Pitfalls of relying on eBPF for security monitoring (and some solutions)
This blog post discusses the use of eBPF for security monitoring, highlighting significant pitfalls like uninvoked probes and data truncation. It offers insight into these challenges and emphasizes the importance of handling eBPF's limitations for robust security tool development
Read more
Not Your Grandpa’s Packet Filter: eBPF in Cloud-Native Networking
This article explores how eBPF has evolved from a simple packet filter into a general-purpose compute engine within the kernel, and how it adds functionality, flexibility and performance to a decades-old technology
Read more