Cilium v1.8 DocumentationKernel Testing JIT Debugging Introspection Tracing pipe Miscellaneous Program Types XDP tc (traffic control) Further Reading Kernel Developer FAQ Projects using BPF XDP Newbies BPF Newsletter Podcasts Blog kernel technology called BPF, which enables the dynamic insertion of powerful security visibility and control logic within Linux itself. Because BPF runs inside the Linux kernel, Cilium security policies can have resolved a particular DNS name? Why Cilium & Hubble? BPF is enabling visibility into and control over systems and applications at a granularity and efficiency that was not possible before. It does0 码力 | 1124 页 | 21.33 MB | 1 年前3
Cilium v1.10 DocumentationKernel Testing JIT Debugging Introspection Tracing pipe Miscellaneous Program Types XDP tc (traffic control) Further Reading Kernel Developer FAQ Projects using BPF XDP Newbies BPF Newsletter Podcasts Blog technology called eBPF, which enables the dynamic insertion of powerful security visibility and control logic within Linux itself. Because eBPF runs inside the Linux kernel, Cilium security policies can have resolved a particular DNS name? Why Cilium & Hubble? eBPF is enabling visibility into and control over systems and applications at a granularity and efficiency that was not possible before. It does0 码力 | 1307 页 | 19.26 MB | 1 年前3
Cilium v1.11 DocumentationKernel Testing JIT Debugging Introspection Tracing pipe Miscellaneous Program Types XDP tc (traffic control) Further Reading Kernel Developer FAQ Projects using BPF XDP Newbies BPF Newsletter Podcasts Blog technology called eBPF, which enables the dynamic insertion of powerful security visibility and control logic within Linux itself. Because eBPF runs inside the Linux kernel, Cilium security policies can have resolved a particular DNS name? Why Cilium & Hubble? eBPF is enabling visibility into and control over systems and applications at a granularity and efficiency that was not possible before. It does0 码力 | 1373 页 | 19.37 MB | 1 年前3
Cilium v1.9 DocumentationKernel Testing JIT Debugging Introspection Tracing pipe Miscellaneous Program Types XDP tc (traffic control) Further Reading Kernel Developer FAQ Projects using BPF XDP Newbies BPF Newsletter Podcasts Blog technology called eBPF, which enables the dynamic insertion of powerful security visibility and control logic within Linux itself. Because eBPF runs inside the Linux kernel, Cilium security policies can have resolved a particular DNS name? Why Cilium & Hubble? eBPF is enabling visibility into and control over systems and applications at a granularity and efficiency that was not possible before. It does0 码力 | 1263 页 | 18.62 MB | 1 年前3
Cilium v1.7 DocumentationKernel Testing JIT Debugging Introspection Tracing pipe Miscellaneous Program Types XDP tc (traffic control) Further Reading Kernel Developer FAQ Projects using BPF XDP Newbies BPF Newsletter Podcasts Blog kernel technology called BPF, which enables the dynamic insertion of powerful security visibility and control logic within Linux itself. Because BPF runs inside the Linux kernel, Cilium security policies can approaches to struggle to scale side by side with the application as load balancing tables and access control lists carrying hundreds of thousands of rules that need to be updated with a continuously growing0 码力 | 885 页 | 12.41 MB | 1 年前3
Cilium v1.6 Documentationkernel technology called BPF, which enables the dynamic insertion of powerful security visibility and control logic within Linux itself. Because BPF runs inside the Linux kernel, Cilium security policies can approaches to struggle to scale side by side with the application as load balancing tables and access control lists carrying hundreds of thousands of rules that need to be updated with a continuously growing and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services, traditional CIDR based security policies0 码力 | 734 页 | 11.45 MB | 1 年前3
Cilium v1.5 Documentationkernel technology called BPF, which enables the dynamic inser�on of powerful security visibility and control logic within Linux itself. Because BPF runs inside the Linux kernel, Cilium security policies can approaches to struggle to scale side by side with the applica�on as load balancing tables and access control lists carrying hundreds of thousands of rules that need to be updated with a con�nuously growing and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services, tradi�onal CIDR based security policies0 码力 | 740 页 | 12.52 MB | 1 年前3
How and When You
Should Measure CPU
Overhead of eBPF
ProgramsAdded in kernel v4.12 – Only for specific program types – Specify how many times to repeat – Control input data and/or context. Examine output data/context. – Use cases: – Unit testing – Debugging BPF_PROG_TYPE_LWT_XMIT ✔ ✔ ✔ ✔ ✔ BPF_PROG_TYPE_LWT_SEG6LOCAL ✔ ✔ ✔ ✔ ✔ BPF_PROG_TYPE_XDP ✔ ? ✔ ? ✔ BPF_PROG_TYPE_FLOW_DISSECTOR ✔ ✔ ✔ ✔ ✔ Feature Support ebpfbench - Go library for eBPF benchmarking https://github0 码力 | 20 页 | 2.04 MB | 1 年前3
Building a Secure and Maintainable PaaShelp with troubleshooting ❏ Features to expose network traffic flows to teams ❏ Hubble UI ❏ Network flow logs exported to logging stack ❏ Tracking network traffic to specific binaries 16 Durable Audit0 码力 | 20 页 | 2.26 MB | 1 年前3
eBPF at LINE's Private CloudRouters Advertise VIP with eBGP Configure with RPC Health check daemon etc… Service Discovery Per-flow ECMP k8s CCM Frontend (dash board) To Backends User For More Information • Our motivation, detailed0 码力 | 12 页 | 1.05 MB | 1 年前3
共 15 条
- 1
- 2













