eBPF based always-on profiler auto-discovering targets in Kubernetes and systemd, zero code changes or restarts needed!
-
Updated
May 17, 2024 - Go
eBPF is a technology that can run sandboxed programs in a privileged context such as the operating system kernel.
It is used to safely and efficiently extend the capabilities of the kernel at runtime without requiring to change kernel source code or load kernel modules.
eBPF based always-on profiler auto-discovering targets in Kubernetes and systemd, zero code changes or restarts needed!
eBPF distributed networking observability tool for Kubernetes
Continuous profiling for analysis of CPU and memory usage, down to the line number and throughout time. Saving infrastructure cost, improving performance, and increasing reliability.
eBPF-based Networking, Security, and Observability
Didactic project for K8s Networking analysis
Cloud Native Runtime Security
The eBPF tool and systems inspection framework for Kubernetes, containers and Linux hosts.
Lightweight service mesh for Kubernetes East-West and North-South traffic management, uses ebpf for layer4 and pipy proxy for layer7 traffic management, support multi cluster network.
Linux Runtime Security and Forensics using eBPF
🧑💻🔭 Digma is a Continuous Feedback platform that makes observability relevant in dev. Digma empowers developers to own their code all the way to production, improves code quality and prevents critical issues before they escalate. Sign up today! https://digma.ai 💫
An eBPF Manager for Linux and Kubernetes
eBPF-based Security Observability and Runtime Enforcement
libsinsp, libscap, the kernel module driver, and the eBPF driver sources
Aya is an eBPF library for the Rust programming language, built with a focus on developer experience and operability.