Unit Testing eBPF Programs: A Comprehensive Guide with XDP Examples
2025-10-25
Learn how to effectively unit test eBPF programs using BPF_PROG_RUN and libbpf. Complete guide with XDP examples, best practices, and troubleshooting tips.
2076 words
|
10 minutes
A Minimal Scheduler with eBPF, sched_ext and C
2025-10-25
A comprehensive tutorial for creating a minimal Linux scheduler using eBPF and sched_ext, implementing a round-robin scheduling algorithm with practical examples and visualization.
1271 words
|
6 minutes
How to Run Code in Kernel Space? eBPF! Complete Guide with XDP Packet Capture
2025-10-22
Comprehensive guide to running code in kernel space using eBPF, featuring a complete XDP packet capture implementation with Go integration and practical examples.
3297 words
|
16 minutes
Netflix eBPF Infrastructure Observability: Detecting Noisy Neighbors at Scale
2025-09-18
Learn how Netflix leverages eBPF to detect noisy neighbors in multi-tenant systems through continuous Linux scheduler instrumentation with minimal performance overhead.
3113 words
|
16 minutes
Introducing The eBPF Agent: A No-Code Approach for Cloud-Native Observability
2025-09-16
Discover how Broadcom's eBPF agent revolutionizes cloud-native monitoring with dynamic instrumentation, near-zero overhead, and language-agnostic support for modern microservices architectures.
3397 words
|
17 minutes
Writing eBPF Kprobe Programs with Rust Aya: Complete Developer Guide
2025-09-14
Comprehensive tutorial on writing eBPF Kprobe programs using Rust Aya framework, including kernel function tracing, argument handling, and production deployment strategies.
5197 words
|
26 minutes
My Journey in Cybersecurity: From Code to Defense
2025-08-03
A comprehensive look at my evolution as a cybersecurity professional, from early coding days to leading XDR platform development.
751 words
|
4 minutes
Linux Kernel Exploitation and Defense: Understanding Attack Techniques and Building Robust Defenses
2025-08-02
Deep dive into Linux kernel exploitation techniques, from classic attacks to modern methods. Learn defensive strategies, detection mechanisms, and how to build resilient kernel modules against sophisticated threats.
3363 words
|
17 minutes