Blog page
Can eBPF Keep Your Kubernetes Cluster from Getting Hacked?
Explore how eBPF can help make Kubernetes clusters more secure and less likely to be hacked
Read moreeBPF Offers a New Way to Secure Cloud Native Systems
Dive into the advantages of eBPF in enhancing security for cloud-native systems by offering better visibility and control over system and network behaviors
Read moreUserspace eBPF Runtimes: Overview and Applications
Dive into the role of userspace eBPF runtimes, such as ubpf, rbpf, and bpftime, and why they are intriguing due to enhanced performance, flexibility, and security
Read moreUnlocking Speed: eBPF-Based Auto-Instrumentation Over 20x Faster Than Traditional Instrumentation
The article discusses the Odigos project, which utilizes eBPF for automated tracing in applications, addressing challenges like code modification and performance dips associated with traditional tracing. It showcases that eBPF-based auto-instrumentation is over 20x faster than manual instrumentation, significantly reducing performance overhead
Read moreXDP: Your eBPF Packet Processing Introduction!
Learn about how XDP enables network applications to function safely within the Kernel, even before processing by the host's networking stack
Read moreThe Evolution and Impact of eBPF: A list of Key Research Papers from Recent Years
A comprehensive list of research papers related to eBPF and highlighting eBPF's capabilities in accelerating network processing, enhancing observability, and enabling programmable packet processing
Read moreeBPF vs Traditional Packet Filtering Technologies: A Deep Dive
Dive into the technical foundations of both eBPF and traditional packet filtering, their architectures, performance metrics, advanced features, and security aspects
Read moreLearning eBPF Review
Leigh Finch provides a review of the book 'Learning eBPF' by Liz Rice, emphasizing its unique approach towards eBPF from a security and kernel modification perspective, beyond the common observability and performance lens
Read morePitfalls of relying on eBPF for security monitoring (and some solutions)
This blog post discusses the use of eBPF for security monitoring, highlighting significant pitfalls like uninvoked probes and data truncation. It offers insight into these challenges and emphasizes the importance of handling eBPF's limitations for robust security tool development
Read moreNot Your Grandpa’s Packet Filter: eBPF in Cloud-Native Networking
This article explores how eBPF has evolved from a simple packet filter into a general-purpose compute engine within the kernel, and how it adds functionality, flexibility and performance to a decades-old technology
Read more