What Is eBPF?
An Introduction to a New Generation of Networking, Security, and Observability Tools
Book Details
| Author | Liz Rice |
| Publisher | O'Reilly Media |
| Published | 2022 |
| Edition | 1st |
| Paperback | 54 pages |
| Language | English |
| ISBN-13 | 9781492097266, 9781492097259 |
| ISBN-10 | 1492097268, 149209725X |
| License | Compliments of Isovalent |
Book Description
In just the past few years, the extended Berkeley Packet Filter (eBPF) has gone from relative obscurity to one of the hottest technology areas in modern infrastructure computing. With this report, Liz Rice dives into eBPF and explains how this framework enables networking, security, and observability tooling for modern compute environments. SREs, ops engineers, and engineering team leads will learn what eBPF is and why it's so powerful.
Rice, chief open source officer at Isovalent, shows you how to load and run custom eBPF programs within the kernel of your operating system, modifying the way the kernel behaves. You'll learn what's required to build eBPF-enabled tools, and why eBPF has become so prevalent in such a short period of time.
With this book, you will:
- Learn why the ability to dynamically change the kernel behavior is so useful, and how eBPF is a game-changer when it comes to making kernel changes
- See what's involved in writing eBPF code with a programming example to understand how the process works
- Explore an overview of eBPF-enabled tools that you can use to instrument your cloud native applications
This book is published as open-access, which means it is freely available to read, download, and share without restrictions.
If you enjoyed the book and would like to support the author, you can purchase a printed copy (hardcover or paperback) from official retailers.
Download and Read Links
Share this Book
[localhost]# find . -name "*Similar_Books*"
Building Modern Web Applications With Spring Boot and Vaadin
This guide is a practical introduction to web application development with Spring Boot and Vaadin. It covers the entire development process, from setup to deployment, following a step-by-step approach. You can replicate each section at your own pace as you follow along. The content is suitable for anyone familiar with Java who wants to build a web
The SysAdmin Handbook
Over the past two years, Simple-Talk has published articles on a variety of SysAdmin topics, from Exchange to Virtualization, and including everything from Powershell to Unified Messaging. We have brought the best of these articles together to form The SysAdmin Handbook. With over fifty articles packed into this book, it will be an essential refere
Platform Embedded Security Technology Revealed
Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applicati
An Introduction to C & GUI Programming, 2nd Edition
Freshly updated for GTK3, the 2nd edition of An Introduction to C & GUI Programming will teach you all you need to know to write simple programs in C and start creating GUIs, even if you're an absolute beginner. The first half of the book is an introduction to C, and covers the basics of writing simple command-line programs. The second half shows h
Introduction to Autonomous Robots
Textbooks that provide a broad algorithmic perspective on the mechanics and dynamics of robots almost unfailingly serve students at the graduate level. Introduction to Autonomous Robots offers a much-needed resource for teaching third- and fourth-year undergraduates the computational fundamentals behind the design and control of autonomous robots.
Kubernetes Security and Observability
Securing, observing, and troubleshooting containerized workloads on Kubernetes can be daunting. It requires a range of considerations, from infrastructure choices and cluster configuration to deployment controls and runtime and network security. With this practical book, you'll learn how to adopt a holistic security and observability strategy for b