Blog page
eBPF Network Vershitifier
Learn about eBPF Network Vershitifier, a simple ebpf-go application that randomly drops outgoing packets for targeted processes using the eBPF TC filters
Read moreMemory Management on Kubernetes with Golang and eBPF: Deep Dive
An exploration on workload memory use, the memory control group, the OOM killer, and their relation with applications running on Kubernetes using Go and eBPF
Read moreThe coming eBPF revolution and why Kubernetes monitoring will never be the same
Learn how eBPF revolutionizes Kubernetes monitoring by making the Linux kernel programmable, enhancing performance, visibility, and innovation. It also outlines the history of eBPF, its core use cases, and examples of major companies benefiting from its implementation
Read moreHello eBPF: BPF Type Format and 13 Thousand Generated Java Classes (11)
The eleventh installment of the Hello eBPF series. In this part, you’ll learn about the BPF Type Format (BTF) and how and why we generate Java code from it
Read moreApp-Level eBPF Applications - User vs. Kernel Probes
Learn about the two most popular methods for implementing eBPF instrumentation to gain application context in the runtime, by using user-space and kernel probes - and understand how each impacts the application performance and compute cost
Read moreFooling Port Scanners: Simulating Open Ports with eBPF and Rust
Learn how to use Rust and eBPF to thwart curious individuals attempting to scan a machine using the three-way handshake behavior and a related port scanning technique
Read moreMonitoring PostgreSQL Database on Kubernetes using eBPF
Learn how to use eBPF for monitoring PostgreSQL databases on Kubernetes
Read moreReverse engineering eBPF programs
Dive into the internals of how eBPF works by reverse engineering some eBPF-based programs
Read moreHow eBPF is shaping the future of Linux and platform engineering
Explore eBPF's origins, its impact on modernizing the kernel for cloud native use cases, and how it is becoming mainstream through projects like Cilium, Tetragon, and Pixie
Read moreUnveiling Hidden Threats: Detecting Unauthorized Access in Kubernetes with eBPF
Dive deep into using eBPF for security, specifically detecting unauthorized access attempts
Read more