Blog page

Get Started with eBPF Network Log Analytics in your Kubernetes Cluster
Learn how to audit external connections from a Kubernetes cluster and get valuable insights to protect your cluster with Parseable, eBPF and Tetragon
Read more
How eBPF has changed the way I feel about observability
In this interview, Bill Mulligan from the eBPF Foundation dives into the State of eBPF Report which details eBPF adoption within Linux that is fundamentally changing the way IT is managed
Read more
How eBPF Benefits IT Operations Teams Seeking to Improve Observability
A guide on why ITOps teams should consider taking advantage of eBPF, and how they can do so
Read more
Hello eBPF: Tail calls and your first eBPF application (4)
In the 4th part of the series, you'll finish the chapter 2 of the Learning eBPF book, learn how to use tail calls and the hello-ebpf project as a library and implement one of the book’s exercises
Read more
Java and eBPF--airhacks.fm podcast
The #281 airhacks.fm episode with Johannes Bechberger about developing eBPF programs with Java and migrating Python tooling to Java with Project Panama
Read more
Cisco's eBPF Gambit: A Game Changer in Cloud Native Security?
A short report on Cisco's acquisition of Isovalent highligting the benefits Cisco can get out of the deal and how they can leverage eBPF
Read more
Adventures in eBPF
An exploration of eBPF highlighting how build a program that leverages eBPF to intercept SSL traffic in user-space
Read more
eBPF: Meaner Hooks, More WebAssembly and Observability Due
This blog post discusses the growing accessibility of eBPF-based tools for enhanced observability and functionality, indicating a trend towards broader adoption due to emerging, user-friendly solutions
Read more
eBPF program creation in practice – PID concealment (Part 1)
The NewStack reports on Cisco's acquisition of Isovalent, highlighting the strategic importance of eBPF technology and its application in Cilium for advancing network and security observability in cloud-native environments
Read more
eBPF program creation in practice – PID concealment (Part 1)
Learn how to create an eBPF program using a tracepoint
Read more