Blog page
![](/static/360d22d79c5d3ad1cd867eac8805d7c3/e8666/ogimage.png)
The Secure Path Forward for eBPF runtime: Challenges and Innovations
Delve into eBPF security, learn about the role of the eBPF verifier and explore how the mechanisms intended to safeguard eBPF can themselves be fortified
Read more![](/static/2fb1f2651015e2fbf65e4049b6a6ab4d/e0731/ogimage.webp)
EBPF-Based Security Solutions: Exploring Weaknesses And Mitigation Techniques
Learn about eBPF key vulnerabilities and mitigations to keep your systems secure
Read more![](/static/458eef17d8e228a0897a10aa0c1d51ff/77ff9/ogimage.png)
Grafana Beyla 1.0 release: zero-code instrumentation for application telemetry using eBPF
Grafana announce the release of Beyla 1.0, an open source eBPF auto-instrumentation tool. Learn about the basics and major features of Grafana Beyla
Read more![](/static/2cb3b64c9b85c7412547ceeaafc1fa99/f26dd/ogimage.png)
CoreTechnologys - How to drop 1 Tbps of DDoS traffic
Discover how CoreTechnologys tackled a DDoS attack using eBPF/XDP-powered hardware to efficiently filter out malicious traffic at their network's edge
Read more![](/static/dd728c5b16766a7310a1aa06010167d5/ed0f2/ogimage.webp)
KubeCon points to the future of enterprise IT
Explore the strategic shifts in enterprise IT at KubeCon, highlighting the significance of open-source projects like eBPF/Cilium and Tetragon in shaping cloud infrastructure and enhancing security in distributed computing
Read more![](/static/8758cfe803e6eea2c69d2d94abc8c0b7/5e9ec/ogimage.png)
How to Use eBPF Capabilities to Navigate Kubernetes Monitoring
Learn how eBPF can be used to elevate your Kubernetes monitoring strategy by setting up an eBPF environment to monitor Kubernetes
Read more![](/static/f18a1f345c91d491e3c0d9faf3085092/05d0c/ogimage.jpg)
The Big Interview: Thomas Graf, CTO, Isovalent, on eBPF, cloud-native networking and why Cilium is so hot right now
The Stack features Thomas Graf, CTO of Isovalent, discussing Cilium, an ebpf-based project for cloud native networking. Thomas highlighted Cilium's impact on cloud native networking, noting its rapid ascent as an eBPF-based standard for secure Kubernetes networking
Read more![](/static/d77aefe2f20a0b3ef41cbbd2aab640a1/948fd/ogimage.webp)
Why eBPF Isn’t Enough for Container Monitoring
This article discusses how eBPF falls short for container monitoring because it doesn't capture application-level activity or the broader context necessary for a complete network observability strategy
Read more![](/static/2daac50c232b18f65fd43f495c3ee5f6/8a706/ogimage.jpg)
When Not to Use eBPF for Observability and Security
Dive into eBPF's capabilities for system observability and security on Linux systems, while noting its limitations, like the lack of Windows support and the complexity of eBPF programming, which requires deep Linux kernel knowledge
Read more![](/static/ab5d590fd7949f4a12c3964a7cf8b3c0/5bf4b/ogimage.webp)
What is Kube-Proxy and Why Move From iptables to eBPF?
This article explores replacing iptables with eBPF in Kubernetes networking to address iptables scalability and performance issues
Read more