Learning eBPF | PDF下载|ePub下载
出版社: 人民邮电出版社
原作名: Cracking the coding interview:150 programming questions and solutions,fifth edition
译者:李琳骁/漆犇
出版年: 2013-11
页数: 372
定价: 59.00元
装帧: 平装
ISBN: 9787115332912
内容简介 · · · · · ·
What is eBPF? With this revolutionary technology, you can write custom code that dynamically changes the way the kernel behaves. It’s an extraordinary platform for building a whole new generation of security, observability, and networking tools.
This practical book is ideal for developers, system administrators, operators, and students who are curious about eBPF and want to know how it works. Author Liz Rice, chief open source officer with cloud native networking and security specialists Isovalent, also provides a foundation for those who want to explore writing eBPF programs themselves.
With this book, you will:
1. Learn why eBPF has become so important in the past couple of years
2. Write basic eBPF code, and manipulate eBPF programs and attach them to events
3. Explore how eBPF components interact with Linux to dynamically change the operating system’s behavior
4. Learn how tools based on eBPF can instrument applications without changes to the apps or their configuration
5. Discover how this technology enables new tools for observability, security, and networking
作者简介 · · · · · ·
Liz Rice is Chief Open Source Officer with eBPF specialists Isovalent, creators of the Cilium cloud native networking, security, and observability project. She was Chair of CNCF’s Technical Oversight Committee in 2019-2022, and Cochair of KubeCon + CloudNativeCon in 2018. She is also the author of Container Security, published by O’Reilly.
She has a wealth of software development, team, and product management experience from working on network protocols and distributed systems, and in digital technology sectors such as VOD, music, and VoIP. When not writing code, or talking about it, Liz loves riding bikes in places with better weather than her native London, competing in virtual races on Zwift, and making music under the pseudonym Insider Nine.
目录 · · · · · ·
2. eBPF’s “Hello World”
3. Anatomy of an eBPF program
4. The bpf System Call
5. CO-RE, BTF and libbpf
6. The eBPF Verifier
7.eBPF Program and Attachment Types
8.eBPF for Networking
9.eBPF for Security
10.eBPF Programming
11.The Future Evolution of eBPF
· · · · · ·
发表回复
要发表评论,您必须先登录。