Blog page
CoreTechnologys - How to drop 1 Tbps of DDoS traffic
Discover how CoreTechnologys tackled a DDoS attack using eBPF/XDP-powered hardware to efficiently filter out malicious traffic at their network's edge
Read moreKubeCon points to the future of enterprise IT
Explore the strategic shifts in enterprise IT at KubeCon, highlighting the significance of open-source projects like eBPF/Cilium and Tetragon in shaping cloud infrastructure and enhancing security in distributed computing
Read moreHow to Use eBPF Capabilities to Navigate Kubernetes Monitoring
Learn how eBPF can be used to elevate your Kubernetes monitoring strategy by setting up an eBPF environment to monitor Kubernetes
Read moreThe Big Interview: Thomas Graf, CTO, Isovalent, on eBPF, cloud-native networking and why Cilium is so hot right now
The Stack features Thomas Graf, CTO of Isovalent, discussing Cilium, an ebpf-based project for cloud native networking. Thomas highlighted Cilium's impact on cloud native networking, noting its rapid ascent as an eBPF-based standard for secure Kubernetes networking
Read moreWhy eBPF Isn’t Enough for Container Monitoring
This article discusses how eBPF falls short for container monitoring because it doesn't capture application-level activity or the broader context necessary for a complete network observability strategy
Read moreWhen Not to Use eBPF for Observability and Security
Dive into eBPF's capabilities for system observability and security on Linux systems, while noting its limitations, like the lack of Windows support and the complexity of eBPF programming, which requires deep Linux kernel knowledge
Read moreWhat is Kube-Proxy and Why Move From iptables to eBPF?
This article explores replacing iptables with eBPF in Kubernetes networking to address iptables scalability and performance issues
Read moreCan eBPF Keep Your Kubernetes Cluster from Getting Hacked?
Explore how eBPF can help make Kubernetes clusters more secure and less likely to be hacked
Read moreeBPF Offers a New Way to Secure Cloud Native Systems
Dive into the advantages of eBPF in enhancing security for cloud-native systems by offering better visibility and control over system and network behaviors
Read moreUserspace eBPF Runtimes: Overview and Applications
Dive into the role of userspace eBPF runtimes, such as ubpf, rbpf, and bpftime, and why they are intriguing due to enhanced performance, flexibility, and security
Read more