lizrice, to random
@lizrice@hachyderm.io avatar

Don’t miss eCHO tomorrow when I’ll be learning from Alan Maguire about how bpftune is using reinforcement learning to tune kernel parameters. Join us and bring your questions and ideas! It’s the last eCHO of 2023 too 🙋‍♀️#eBPF

https://www.youtube.com/live/3ylmGE6sW8w?si=4ioh8Ym5o6kZO88M

dnsmichi, to random

👋 New Ops in Dev newsletter, December 2023

Ollama.ai, tldraw make real, AWS Q, Google Gemini, Duo Chat, CI/CD , recordings

https://opsindev.news/archive/2023-12-08/

And much more 👇

dnsmichi,

🐝 The Inner Dev learning eBPF

Detect and defend attacks
Snoopy to trace TLS
#eBPF and signals
Kubescape 3.0
Isovalent Labs

https://opsindev.news/archive/2023-12-08/#the-inner-dev-learning-ebpf

kernellogger, to linux
@kernellogger@fosstodon.org avatar

"'"In this blog, we'll demonstrate how #eBPF can be practically used for function #tracing. […]

We'll begin by covering the basics of eBPF and #uprobes. Following that, we'll apply these concepts in a real-world example. […]

Our example involves a user-space program calling a function with randomized parameters. Our eBPF program will track how many times each parameter is called. […]"'"

https://ddosify.com/blog/exploring-function-tracing-with-ebpf-and-uprobes/

#Linux #Kernel #LinuxKernel

chris, to random German

Amazing talk by @lizrice. So much great info about tooling and the benefits of using #eBPF in #kuberntes. Lovely presentation.

#ConLife23

pchaigno, to random

Daniel Borkmann presents the new netkit Linux devices, a pair of virtual devices programmed by #eBPF.
This will replace veth devices in Cilium and bring container performance on par with the host. #LinuxPlumbers

Slides: https://lpc.events/event/17/contributions/1581/attachments/1292/2602/lpc_netkit_devs.pdf
Stream: https://www.youtube.com/watch?v=zDNZY0HQOMw&t=10755s

pchaigno, to random

In his talk, Masami Hiramatsu provides a nice overview of the various tracing #eBPF probes, what tracing mechanism they use, and what context they have.
He proposes to use ftrace_regs across the board, to reduce overhead. #LinuxPlumbers

Slides: https://lpc.events/event/17/contributions/1588/attachments/1169/2481/LPC23_%20Use%20ftrace_regs%20for%20tracers_1.pdf
Stream: https://www.youtube.com/watch?v=zDNZY0HQOMw&t=3700s

pchaigno, to random
mttaggart, to random

Here's a concrete example of why I think #eBPF is the wave of the future.

This little script, written in the training wheels bpftrace language, monitors for shell executions on the system. It reports shell invocations and full command lines, and also alerts when service users (uid < 1000) invoke a shell. It also can be invoked in KILL MODE, which will murdalize those unauthorized shells.

This effectively stops most webshells in their tracks. It's not perfect, but as a demo of what's possible, I think pretty neat!

https://github.com/mttaggart/bluebpf/blob/main/bt/shellguardian.bt

mttaggart, to rust

After a couple weeks of living in #eBPF code after the sun went down, here's kind of where I'm at:

  1. I still think this technology is amazing.
  2. Hoo boy is the #Rust implementation not ready to come out of the oven.
  3. It's a shame it's at the mercy of the Linux kernel.
  4. Better tooling could make this explode
  5. It's also a shame that the main pusher of this tech is so tied to Kubernetes, because I feel like the association does eBPF a disservice.
  6. What Sysmon for Linux does with it is just scratching the surface.
kernellogger, to linux
@kernellogger@fosstodon.org avatar

Now out: #eBPF: Unlocking the #Kernel [OFFICIAL DOCUMENTARY]

https://www.youtube.com/watch?v=Wb_vD3XZYOA

#BPF #Linux #LinuxKernel

lizrice, to random
@lizrice@hachyderm.io avatar

Who’s at and wants to chat about and today?

  • This morning after keynotes I’ll be at the AWS booth - come ask me anything!

  • My talk on secure connections is at 3:25pm in W.185 today

  • I’ll be doing a Learning eBPF book signing at the Isovalent Cilium Experience booth at 5pm

See you there!

kernellogger, to linux
@kernellogger@fosstodon.org avatar

#BPF aka #eBPF highlights from the main net merge for #Linux #kernel 6.7 (https://git.kernel.org/torvalds/c/89ed67ef126c4160349c1b96fdb775ea6170ac90):

  • Support exceptions (https://lwn.net/Articles/938435/ )

  • Add support for local per-cpu kptr, allow allocating and storing per-cpu objects in maps.

  • Extend cgroup BPF sockaddr hooks for UNIX sockets. The use case is for systemd to […]

  • Add new veth-like netdevice where BPF program defines the logic of the xmit routine

  • Add BPF v4 CPU instruction support for arm32 and s390x.

GBrayUT, to webassembly

TIL there are now userspace runtimes for #eBPF. Good overview and comparison to #Wasm use cases at https://eunomia.dev/blogs/userspace-ebpf/

lizrice, to random
@lizrice@hachyderm.io avatar
lizrice, to random
@lizrice@hachyderm.io avatar

Off to Vienna 🇦🇹 for the first time tomorrow - I'll be speaking on Wednesday morning about #eBPF superpowers for cloud native at KCD Austria. Who will I see there?

https://community.cncf.io/events/details/cncf-kcd-austria-presents-kcd-austria-2023-1/

rml, to random

Kernelless kernel programming with #eBPF

considering its #computerphile I anticipate they will say a thing or two about what eBPF is, and then go tangent off into something entirely related for 20 minutes and call it a day, but lets see
https://www.youtube.com/watch?v=J_EehoXLbIU

lizrice, to random
@lizrice@hachyderm.io avatar

🎬 Going live in under half an hour, on eCHO this week Kev Sheldrake is joining me to show some networking enhancements to Tetragon. Come join us, #eBPF friends!

https://www.youtube.com/live/CiNnro9o-LM?feature=share

lizrice, to random
@lizrice@hachyderm.io avatar

🐝 Kev Sheldrake will join me on eCHO this Friday to show us some great networking improvements in Tetragon

#eBPF & Cilium Office Hours
Friday, 18th August 2023 - 9 am ET / 3 pm CEST

Livestream👇
https://youtube.com/live/CiNnro9o-LM

fuzzychef, to Kubernetes
@fuzzychef@m6n.io avatar

On Tuesday Aug 29: KBE Insider will export the future of eBPF and Kubernetes with a guest panel of eBPF experts.

https://youtube.com/live/YrieqDfcQqo

#kubernetes #eBPF #performance #linux

kfekete, to random

It was really nice to see all the exciting and creative submissions for this year's Summit as a member of the Program Committee!

Cannot wait for the conference!

kernellogger, to linux
@kernellogger@fosstodon.org avatar

LOL:


- it is not in #BPF, we cannot talk about it at netdev conf. […]```

/me wonders what this kind of argument should be called; "appeal to cool technology" maybe?

Source: "[RFC bpf-next 0/8] BPF 'force to MPTCP'"  
<https://lore.kernel.org/mptcp/cover.1688616142.git.geliang.tang@suse.com/> #Linux #kernel #eBPF #LinuxKernel #MPTCP
kernellogger, to linux
@kernellogger@fosstodon.org avatar

Introducing bpftune for lightweight, always-on auto-tuning of system behaviour – https://blogs.oracle.com/linux/post/introducing-bpftune

Alan Maguire writes:

Introducing bpftune, an automatic configurator that monitors your workloads and sets the correct [#Linux] #kernel parameter values! […] using #BPF […] pluggable infrastructure that is open to contributions. […] #eBPF #LinuxKernel

dnsmichi, to random

I 💜 @CloudLandFestival Fantastic community, insightful chats, engaging activities, and new #cloudnative friends 🤗

Learning about Ansible Ops with #GitLab OIDC security hands-on, and how folks are building developer experience cloud platforms (spontaneous talk today at 3pm that includes GitLab).

image/png
image/jpeg

dnsmichi,

Practiced a lot for my #eBPF workshop @CloudLandFestival yesterday, while learning about Power BI and Azure monitoring. The eBPF workshop Linux VM froze in the middle, but we continued practicing in theory, and had a great time overall. Everyone can learn async, slides at https://go.gitlab.com/2rrbrh 🤗 (Kudos to @lizrice for the inspiration)

Kensan, to linux
@Kensan@mastodon.social avatar

Prompted by the recent thread/inquiry by @Patricia with @HalvarFlake’s reply I went to see if somebody was now working on applying formal methods to the eBPF verifier. Turns out there are some folks at the University of Texas at Austin that released a paper titled “Formal Verification of the Linux Kernel eBPF Verifier Range Analysis”

Paper:
https://sanjit-bhat.github.io/assets/pdf/ebpf-verifier-range-analysis22.pdf

#formalmethods #linux #ebpf

horovits, to opensource
@horovits@fosstodon.org avatar

carries a GPL copyleft license baggage from Linux, and this makes trouble to Apache2 , whether ones centered around eBPF like or an experimental side feature like in . The community and are crunching it https://github.com/cncf/toc/pull/1000#issuecomment-1564662488

  • All
  • Subscribed
  • Moderated
  • Favorites
  • anitta
  • InstantRegret
  • mdbf
  • ngwrru68w68
  • magazineikmin
  • thenastyranch
  • rosin
  • khanakhh
  • osvaldo12
  • Youngstown
  • slotface
  • Durango
  • kavyap
  • DreamBathrooms
  • JUstTest
  • tacticalgear
  • ethstaker
  • modclub
  • cisconetworking
  • tester
  • GTA5RPClips
  • cubers
  • everett
  • megavids
  • provamag3
  • normalnudes
  • Leos
  • lostlight
  • All magazines