Skip to content

Details

eBPF programs often behave differently than developers expect, not because of incorrect logic, but because of subtle behaviours of the hookpoints themselves.

Join Donia Chaiehloudj to run through commonly misunderstood attachment types like kprobes/fentry, tracepoints and uprobes, and real-world gotchas that routinely affect production tools. Learn why they occur and how to work around them.

Show notes: [https://hackmd.io/@echo-live](https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbXJleHlQcnVEVmo0Q1NCN0JvS05acmR0Y3Bxd3xBQ3Jtc0trbHRoV184d2tCOFlGeWxDMzZxNG11ZG1aQkw2U3JWNktoTG5sSmNQYnQtSXNucXhaOHU0X2RBOEg1RFA5YjNOWDFORDVyN0lTckphOU03QS1KX29iQ0M3LVBpaVJqZ1NiMGFrVkw3em4yT0hWT2I0OA&q=https%3A%2F%2Fhackmd.io%2F%40echo-live&v=JMnG5Hfr0pk)

Join us live at 3pm CET: LINK

*eBPF & Cilium Office Hours - a weekly livestream. Join us live, we would love to hear your questions and comments! Find out more at: https://github.com/isovalent/eCHO*

Related topics

Network Security
Cloud Computing
Cloud Native
Open Source
Kubernetes

You may also like