Blog page

When Not to Use eBPF for Observability and Security
Dive into eBPF's capabilities for system observability and security on Linux systems, while noting its limitations, like the lack of Windows support and the complexity of eBPF programming, which requires deep Linux kernel knowledge
Read more
What is Kube-Proxy and Why Move From iptables to eBPF?
This article explores replacing iptables with eBPF in Kubernetes networking to address iptables scalability and performance issues
Read more
Can eBPF Keep Your Kubernetes Cluster from Getting Hacked?
Explore how eBPF can help make Kubernetes clusters more secure and less likely to be hacked
Read more
eBPF Offers a New Way to Secure Cloud Native Systems
Dive into the advantages of eBPF in enhancing security for cloud-native systems by offering better visibility and control over system and network behaviors
Read more
Userspace eBPF Runtimes: Overview and Applications
Dive into the role of userspace eBPF runtimes, such as ubpf, rbpf, and bpftime, and why they are intriguing due to enhanced performance, flexibility, and security
Read more
Unlocking Speed: eBPF-Based Auto-Instrumentation Over 20x Faster Than Traditional Instrumentation
The article discusses the Odigos project, which utilizes eBPF for automated tracing in applications, addressing challenges like code modification and performance dips associated with traditional tracing. It showcases that eBPF-based auto-instrumentation is over 20x faster than manual instrumentation, significantly reducing performance overhead
Read more
XDP: Your eBPF Packet Processing Introduction!
Learn about how XDP enables network applications to function safely within the Kernel, even before processing by the host's networking stack
Read more
The Evolution and Impact of eBPF: A list of Key Research Papers from Recent Years
A comprehensive list of research papers related to eBPF and highlighting eBPF's capabilities in accelerating network processing, enhancing observability, and enabling programmable packet processing
Read more
eBPF vs Traditional Packet Filtering Technologies: A Deep Dive
Dive into the technical foundations of both eBPF and traditional packet filtering, their architectures, performance metrics, advanced features, and security aspects
Read more
Learning eBPF Review
Leigh Finch provides a review of the book 'Learning eBPF' by Liz Rice, emphasizing its unique approach towards eBPF from a security and kernel modification perspective, beyond the common observability and performance lens
Read more