Blog page
eBPF Challenge 1: XDP Return Codes
An eBPF challenge that showcases the consequence of returning a 0 value from an XDP program
Read moreeBPF- One Size Does Not Fit All
Explore how eBPF is not a "one size fits all" solution despite how it is becoming widely adopted for various use cases
Read moreIntroduction to eBPF
Discover how eBPF allows developers to safely extend Linux kernel capabilities for observability, tracing, and security
Read moreCrowdStrike's Blue Screen blunder: Could eBPF have saved the day?
Grafana Labs CTO, Tom Wilkie, discusses eBPF and its role in preventing incidents such as the CrowdStrike Windows kernel crash, while also addressing cloud economics and open-source development
Read moreTetragon eBPF for Kubernetes: The Verdict Is Out
Dive into Tetragon's effectiveness in improving security and observability for cloud-native applications running on Kubernetes
Read moreLoops and Iterators in eBPF
Learn how to use loops and iterators in eBPF and how to implement them effectively in eBPF applications
Read moreWhat Insights Can eBPF Provide into Real-Time SSL/TLS Encrypted Traffic and How?
Learn how eBPF user space probes (uprobes) can help bypass encryption limitations to monitor and interpret secure network traffic that traditional packet sniffers cannot
Read moreObservability With eBPF
Dive into eBPF, a technology that allows you to run sandboxed programs within the Linux kernel
Read moreLeveraging eBPF for Improved Infrastructure Observability
A summary of Netflix's publication on using eBPF for detecting noisy neighbor
Read moreCan eBPF Detect Redis Message Patterns Before They Become Problems?
Learn how eBPF can efficiently monitor Redis deployments to identify and troubleshoot performance issues
Read more