Blog page
The Big Interview: Thomas Graf, CTO, Isovalent, on eBPF, cloud-native networking and why Cilium is so hot right now
The Stack features Thomas Graf, CTO of Isovalent, discussing Cilium, an ebpf-based project for cloud native networking. Thomas highlighted Cilium's impact on cloud native networking, noting its rapid ascent as an eBPF-based standard for secure Kubernetes networking
Read moreWhy eBPF Isn’t Enough for Container Monitoring
This article discusses how eBPF falls short for container monitoring because it doesn't capture application-level activity or the broader context necessary for a complete network observability strategy
Read moreWhen Not to Use eBPF for Observability and Security
Dive into eBPF's capabilities for system observability and security on Linux systems, while noting its limitations, like the lack of Windows support and the complexity of eBPF programming, which requires deep Linux kernel knowledge
Read moreWhat is Kube-Proxy and Why Move From iptables to eBPF?
This article explores replacing iptables with eBPF in Kubernetes networking to address iptables scalability and performance issues
Read moreCan eBPF Keep Your Kubernetes Cluster from Getting Hacked?
Explore how eBPF can help make Kubernetes clusters more secure and less likely to be hacked
Read moreeBPF Offers a New Way to Secure Cloud Native Systems
Dive into the advantages of eBPF in enhancing security for cloud-native systems by offering better visibility and control over system and network behaviors
Read moreKubernetes Community Days UK: Keynote Cilium and eBPF
This post discusses a keynote by Liz Rice at Kubernetes Community Days UK, introducing Cilium's Mutual Authentication feature powered by eBPF and notes Cilium's recent CNCF graduation, indicating its stability for production use
Read moreUserspace eBPF Runtimes: Overview and Applications
Dive into the role of userspace eBPF runtimes, such as ubpf, rbpf, and bpftime, and why they are intriguing due to enhanced performance, flexibility, and security
Read moreeBPF: A practical intro with examples on Observability, Security & Networking
This practical guide to eBPF demonstrates its use in writing and loading code into the Linux kernel at runtime without changes. Through examples, the author showcases eBPF's potential in system security by blocking file access attempts and in networking by counting ICMP packets per destination IPv4, highlighting its versatility in observability, networking, and security
Read moreeBPF application development: Beyond the basics
An advanced guide to eBPF application development, moving beyond basic concepts to explore best practices for teams aiming to deploy production eBPF applications
Read more