Blog page

Leveraging eBPF for DevSecOps
Learn how eBPF's raw data can be combined with Cloud APIs can allow users to understand application-layer identity, provide real-time security, pinpoint problem origins and stop threats with surgical, active response
Read more
Tetragon Process Lifecycle Observation: eBPF Part
Learn how Tetragon detects process creation and termination using eBPF
Read more
Using Tc-Bpf Program To Redirect Dns Traffic In Docker Containers
A practical guide for implementing DNS redirection amd using TC-BPF to enhance network control within containerized environments
Read more
Optimizing Local Socket Communication: SOCKMAP and eBPF
A detailed overview of how SOCKMAP works in conjunction with eBPF to splice sockets, allowing for streamlined communication between different network namespaces or within a single namespace
Read more
Getting started with Aya and eBPF Part 1
The first part in a series of posts exploring eBPF and the Rust Aya crate
Read more
Seccomp, eBPF, and the Importance of Kernel System Call Filtering
Learn about attacks that affect user space security products and how popular technologies such as Seccomp and eBPF can be used in such a way that avoids these issues
Read more
How is Kubernetes Network Security Evolving?
In this podcast, Liz Rice spoke on Cilium, Tetragon and eBPF's impact in network security
Read more
eBPF’s User Ring Buffer: Introducing BPF_MAP_TYPE_USER_RINGBUF
Learn about BPF map types and the User Ring Buffer map type
Read more
How to Manage XDP/eBPF Effectively for Better DDoS Protection
Learn all about the techniques Gcore uses in their DDoS Protection product to effectively use xDP/eBPF
Read more
eBPF: Reliable Policy Setting and Enforcement
An exploration on the capabilities of eBPF in setting and enforcing reliable policies across various layers of the software stack. This piece discusses how eBPF enhances security, monitoring, and also argues that eBPF's utility extends beyond just Linux environments, highlighting its adaptability and impact on a broader range of operating systems
Read more