Unit Testing eBPF Programs: A Comprehensive Guide with XDP Examples
Learn how to effectively unit test eBPF programs using BPF_PROG_RUN and libbpf. Complete guide with XDP examples, best practices, and troubleshooting tips.
2076 words
|
10 minutes
A Minimal Scheduler with eBPF, sched_ext and C
A comprehensive tutorial for creating a minimal Linux scheduler using eBPF and sched_ext, implementing a round-robin scheduling algorithm with practical examples and visualization.
1271 words
|
6 minutes
How to Run Code in Kernel Space? eBPF! Complete Guide with XDP Packet Capture
Comprehensive guide to running code in kernel space using eBPF, featuring a complete XDP packet capture implementation with Go integration and practical examples.
3297 words
|
16 minutes
Netflix eBPF Infrastructure Observability: Detecting Noisy Neighbors at Scale
Learn how Netflix leverages eBPF to detect noisy neighbors in multi-tenant systems through continuous Linux scheduler instrumentation with minimal performance overhead.
3113 words
|
16 minutes
Introducing The eBPF Agent: A No-Code Approach for Cloud-Native Observability
Discover how Broadcom's eBPF agent revolutionizes cloud-native monitoring with dynamic instrumentation, near-zero overhead, and language-agnostic support for modern microservices architectures.
3397 words
|
17 minutes
Writing eBPF Kprobe Programs with Rust Aya: Complete Developer Guide
Comprehensive tutorial on writing eBPF Kprobe programs using Rust Aya framework, including kernel function tracing, argument handling, and production deployment strategies.
5197 words
|
26 minutes
My Journey in Cybersecurity: From Code to Defense
A comprehensive look at my evolution as a cybersecurity professional, from early coding days to leading XDR platform development.
751 words
|
4 minutes
Linux Kernel Exploitation and Defense: Understanding Attack Techniques and Building Robust Defenses
Deep dive into Linux kernel exploitation techniques, from classic attacks to modern methods. Learn defensive strategies, detection mechanisms, and how to build resilient kernel modules against sophisticated threats.
3363 words
|
17 minutes