eBPF Summit 2024

Blog page

TechnologyExternal

eBPF Network Vershitifier

Learn about eBPF Network Vershitifier, a simple ebpf-go application that randomly drops outgoing packets for targeted processes using the eBPF TC filters

Read more
TechnologyExternal

Memory Management on Kubernetes with Golang and eBPF: Deep Dive

An exploration on workload memory use, the memory control group, the OOM killer, and their relation with applications running on Kubernetes using Go and eBPF

Read more
TechnologyExternal

The coming eBPF revolution and why Kubernetes monitoring will never be the same

Learn how eBPF revolutionizes Kubernetes monitoring by making the Linux kernel programmable, enhancing performance, visibility, and innovation. It also outlines the history of eBPF, its core use cases, and examples of major companies benefiting from its implementation

Read more
How-ToExternal

Hello eBPF: BPF Type Format and 13 Thousand Generated Java Classes (11)

The eleventh installment of the Hello eBPF series. In this part, you’ll learn about the BPF Type Format (BTF) and how and why we generate Java code from it

Read more
TechnologyExternal

App-Level eBPF Applications - User vs. Kernel Probes

Learn about the two most popular methods for implementing eBPF instrumentation to gain application context in the runtime, by using user-space and kernel probes - and understand how each impacts the application performance and compute cost

Read more
How-ToExternal

Fooling Port Scanners: Simulating Open Ports with eBPF and Rust

Learn how to use Rust and eBPF to thwart curious individuals attempting to scan a machine using the three-way handshake behavior and a related port scanning technique

Read more
How-ToExternal

Monitoring PostgreSQL Database on Kubernetes using eBPF

Learn how to use eBPF for monitoring PostgreSQL databases on Kubernetes

Read more
How-ToExternal

Reverse engineering eBPF programs

Dive into the internals of how eBPF works by reverse engineering some eBPF-based programs

Read more
TechnologyExternal

How eBPF is shaping the future of Linux and platform engineering

Explore eBPF's origins, its impact on modernizing the kernel for cloud native use cases, and how it is becoming mainstream through projects like Cilium, Tetragon, and Pixie

Read more
How-ToExternal

Unveiling Hidden Threats: Detecting Unauthorized Access in Kubernetes with eBPF

Dive deep into using eBPF for security, specifically detecting unauthorized access attempts

Read more