Session
eBPF - The Superpower You Didn't Know Your Linux Kernel Had
Extended Berkeley Packet Filter (eBPF) is revolutionizing how we observe and secure Linux systems. This lightning talk cuts through the complexity to show how eBPF can give you superpowers for debugging, performance analysis, and security monitoring - all without changing your application code or kernel.
This talk is perfect for Security Ops engineers, SREs, Cloud Security Engineers and System Administrators who want to level up their observability game. Basic familiarity with Linux systems is ideally preferred but not required.
Outline:
1. eBPF Fundamentals
1.1 What is eBPF and why should you care?
1.2 How it works: The 30-second technical explanation
1.3 Key capabilities and limitations
2. Practical Applications
2.1 System performance analysis
2.2 Security monitoring and enforcement
2.3 Network observability
2.4 Custom metrics collection
3. Tools & Implementation
3.1 Popular eBPF-based tools (bcc, bpftrace)
3.2 Integration with existing observability stacks
3.3 Getting started with minimal overhead
4. Live Demo
4.1 Quick demonstration of system introspection
4.2 Real-time performance analysis
4.3 Security monitoring example
Chaitanya Rahalkar
Software Security Engineer at Block Inc. (f.k.a. Square Inc.)
Austin, Texas, United States
Links
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top