Skip to content

Commit

Permalink
removes the suggested link
Browse files Browse the repository at this point in the history
Signed-off-by: ashutoshreddy <[email protected]>
  • Loading branch information
ashutoshcloud committed Sep 20, 2023
1 parent 05eb9a5 commit 18ce5f8
Showing 1 changed file with 1 addition and 1 deletion.
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ tags: ["eBPF", "Falco", "Syscalls", "Probes"]

In [Tracing System Calls Using eBPF Part 1](https://falco.org/blog/tracing-syscalls-using-ebpf-part-1/), we lay the groundwork, introducing you to the fundamentals of `eBPF` and its predecessor, `BPF (Berkeley Packet Filter)`. We delve into the evolution of this technology, its safety, performance, and observability advantages over traditional kernel modules, and its pivotal role in securing modern cloud-native environments. We guide you through the intricate process of working with eBPF programs, from compilation to execution, highlighting its power in tracing system calls.

In the second installment, `Tracing System Calls Using eBPF Part 2`, we elevate our understanding of eBPF's capabilities. We unravel the world of `Uprobes` and `Uretprobes`, demonstrating how these features empower developers to instrument and monitor user-space applications seamlessly. We then venture into `Kprobes` and `Kretprobes`, unlocking the potential to dynamically trace and debug kernel functions, offering insights into system behavior and performance analysis. While developing runtime threat detection softwares for workloads we engineers at [CloudDefense.AI](https://www.clouddefense.ai/) developed several kernel probes which are helping in enhancing detection of runtime security threats.
In the second installment, `Tracing System Calls Using eBPF Part 2`, we elevate our understanding of eBPF's capabilities. We unravel the world of `Uprobes` and `Uretprobes`, demonstrating how these features empower developers to instrument and monitor user-space applications seamlessly. We then venture into `Kprobes` and `Kretprobes`, unlocking the potential to dynamically trace and debug kernel functions, offering insights into system behavior and performance analysis.

## Uprobes

Expand Down

0 comments on commit 18ce5f8

Please sign in to comment.