What Is eBPF?

An Introduction to a New Generation of Networking, Security, and Observability Tools


What Is eBPF?
What Is eBPF?
Compliments of Isovalent

Book Details

Author Liz Rice
Publisher O'Reilly Media
Published 2022
Edition 1st
Paperback 54 pages
Language English
ISBN-13 9781492097266, 9781492097259
ISBN-10 1492097268, 149209725X
License Compliments of Isovalent

Book Description

In just the past few years, the extended Berkeley Packet Filter (eBPF) has gone from relative obscurity to one of the hottest technology areas in modern infrastructure computing. With this report, Liz Rice dives into eBPF and explains how this framework enables networking, security, and observability tooling for modern compute environments. SREs, ops engineers, and engineering team leads will learn what eBPF is and why it's so powerful.

Rice, chief open source officer at Isovalent, shows you how to load and run custom eBPF programs within the kernel of your operating system, modifying the way the kernel behaves. You'll learn what's required to build eBPF-enabled tools, and why eBPF has become so prevalent in such a short period of time.

With this book, you will:
- Learn why the ability to dynamically change the kernel behavior is so useful, and how eBPF is a game-changer when it comes to making kernel changes
- See what's involved in writing eBPF code with a programming example to understand how the process works
- Explore an overview of eBPF-enabled tools that you can use to instrument your cloud native applications


This book is published as open-access, which means it is freely available to read, download, and share without restrictions.

If you enjoyed the book and would like to support the author, you can purchase a printed copy (hardcover or paperback) from official retailers.

Download and Read Links

Share this Book

[localhost]# find . -name "*Similar_Books*"


Building Modern Web Applications With Spring Boot and Vaadin

Java Spring

This guide is a practical introduction to web application development with Spring Boot and Vaadin. It covers the entire development process, from setup to deployment, following a step-by-step approach. You can replicate each section at your own pace as you follow along. The content is suitable for anyone familiar with Java who wants to build a web

The SysAdmin Handbook

Server

Over the past two years, Simple-Talk has published articles on a variety of SysAdmin topics, from Exchange to Virtualization, and including everything from Powershell to Unified Messaging. We have brought the best of these articles together to form The SysAdmin Handbook. With over fifty articles packed into this book, it will be an essential refere

Platform Embedded Security Technology Revealed

Security

Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applicati

An Introduction to C & GUI Programming, 2nd Edition

C / C++

Freshly updated for GTK3, the 2nd edition of An Introduction to C & GUI Programming will teach you all you need to know to write simple programs in C and start creating GUIs, even if you're an absolute beginner. The first half of the book is an introduction to C, and covers the basics of writing simple command-line programs. The second half shows h

Introduction to Autonomous Robots

Robotics

Textbooks that provide a broad algorithmic perspective on the mechanics and dynamics of robots almost unfailingly serve students at the graduate level. Introduction to Autonomous Robots offers a much-needed resource for teaching third- and fourth-year undergraduates the computational fundamentals behind the design and control of autonomous robots.

Kubernetes Security and Observability

Kubernetes

Securing, observing, and troubleshooting containerized workloads on Kubernetes can be daunting. It requires a range of considerations, from infrastructure choices and cluster configuration to deployment controls and runtime and network security. With this practical book, you'll learn how to adopt a holistic security and observability strategy for b