eBPF Summit 2024

Blog page

TechnologyExternal

CoreTechnologys - How to drop 1 Tbps of DDoS traffic

Discover how CoreTechnologys tackled a DDoS attack using eBPF/XDP-powered hardware to efficiently filter out malicious traffic at their network's edge

Read more
TechnologyExternal

KubeCon points to the future of enterprise IT

Explore the strategic shifts in enterprise IT at KubeCon, highlighting the significance of open-source projects like eBPF/Cilium and Tetragon in shaping cloud infrastructure and enhancing security in distributed computing

Read more
TechnologyExternal

How to Use eBPF Capabilities to Navigate Kubernetes Monitoring

Learn how eBPF can be used to elevate your Kubernetes monitoring strategy by setting up an eBPF environment to monitor Kubernetes

Read more
TechnologyExternal

The Big Interview: Thomas Graf, CTO, Isovalent, on eBPF, cloud-native networking and why Cilium is so hot right now

The Stack features Thomas Graf, CTO of Isovalent, discussing Cilium, an ebpf-based project for cloud native networking. Thomas highlighted Cilium's impact on cloud native networking, noting its rapid ascent as an eBPF-based standard for secure Kubernetes networking

Read more
TechnologyExternal

Why eBPF Isn’t Enough for Container Monitoring

This article discusses how eBPF falls short for container monitoring because it doesn't capture application-level activity or the broader context necessary for a complete network observability strategy

Read more
TechnologyExternal

When Not to Use eBPF for Observability and Security

Dive into eBPF's capabilities for system observability and security on Linux systems, while noting its limitations, like the lack of Windows support and the complexity of eBPF programming, which requires deep Linux kernel knowledge

Read more
TechnologyExternal

What is Kube-Proxy and Why Move From iptables to eBPF?

This article explores replacing iptables with eBPF in Kubernetes networking to address iptables scalability and performance issues

Read more
TechnologyExternal

Can eBPF Keep Your Kubernetes Cluster from Getting Hacked?

Explore how eBPF can help make Kubernetes clusters more secure and less likely to be hacked

Read more
TechnologyExternal

eBPF Offers a New Way to Secure Cloud Native Systems

Dive into the advantages of eBPF in enhancing security for cloud-native systems by offering better visibility and control over system and network behaviors

Read more
TechnologyExternal

Userspace eBPF Runtimes: Overview and Applications

Dive into the role of userspace eBPF runtimes, such as ubpf, rbpf, and bpftime, and why they are intriguing due to enhanced performance, flexibility, and security

Read more