The eBPF tool and systems inspection framework for Kubernetes, containers and Linux hosts.
-
Updated
May 29, 2024 - C
eBPF is a technology that can run sandboxed programs in a privileged context such as the operating system kernel.
It is used to safely and efficiently extend the capabilities of the kernel at runtime without requiring to change kernel source code or load kernel modules.
The eBPF tool and systems inspection framework for Kubernetes, containers and Linux hosts.
eBPF-based autoinstrumentation of web applications and network metrics
🧑💻🔭 Digma is a Continuous Feedback platform that makes observability relevant in dev. Digma empowers developers to own their code all the way to production, improves code quality and prevents critical issues before they escalate. Sign up today! https://digma.ai 💫
Web-based Traffic and Security Network Traffic Monitoring
eBPF-based Networking, Security, and Observability
eBPF-based Security Observability and Runtime Enforcement
libsinsp, libscap, the kernel module driver, and the eBPF driver sources
High Performance ServiceMesh Data Plane Based on Programmable Kernel
Continuous profiling for analysis of CPU and memory usage, down to the line number and throughout time. Saving infrastructure cost, improving performance, and increasing reliability.
Fast and Lightweight Observability Data Collector
eBPF based always-on profiler auto-discovering targets in Kubernetes and systemd, zero code changes or restarts needed!
Runtime Security Enforcement System. Workload hardening/sandboxing and implementing least-permissive policies made easy leveraging LSMs (BPF-LSM, AppArmor).
Profiling/tracing/visualization tool based on eBPF
Kepler (Kubernetes-based Efficient Power Level Exporter) uses eBPF to probe performance counters and other system stats, use ML models to estimate workload energy consumption based on these stats, and exports them as Prometheus metrics
eBPF verifier based on abstract interpretation