Tutorial: Getting Familiar with Security Observability Using eBPF &Cilium Tetragon - Holmes & Cooley
eCHO Episode 46: Security Observability with eBPF and Tetragon
Caretta: Mapping Services With eBPF
Think eBPF for Kernel Security Monitoring – Eric Sage & Melissa Kilby, Apple
Buzzing across the eBPF Landscape and into the Hive - Marga Manterola
eBPF and Kubernetes — Better Together! Observability and Security with Tetragon | Anna & James
Use Falco and eBPF to protect your applications | Thomas Labarussias | Conf42 Observability 2023
Prometheus as exposition format for eBPF programs by Leonardo Di Donato
Zero instrumentation monitoring with your first steps in eBPF (Beatriz Martínez)
Tetragon a k8s observability and security tool - John Fastabend
Quickstart into Tetragon
eBPF 201: Supercharging Your eBPF Dev Process for Cloud Native Apps - Sanjeev Rampal & Donald Hunter
Zero Instrumentation Monitoring with Your First Steps in eBPF - Beatriz Martínez, Isovalent - Full
Hunting kernel rootkits with eBPF by Asaf Eitani & Itamar Maouda Kochavi
Securing systems with eBPF Linux Security Module - Frederick Lawler
What are Cilium & Hubble - With Thomas Graf
Sidecarless Mesh Monitoring with eBPF and Grafana - Adam Sayah, Solo.io
Enabling eBPF Super Powers on ARM64 with Cilium - Jianlin Lv, ARM - Full Lightning
What is eBPF Direct Service Return (DSR)
What is Tetragon?