Profile avatar
breakawaybilly.bsky.social
Cloud Native networking, observability, and security with Cilium, eBPF, and Isovalent Newsletter cilium.io/newsletter
1,885 posts 952 followers 388 following
Prolific Poster
Conversation Starter
comment in response to post
4. Monitor Your Programs for Performance Anomalies 5. Do as Much as Possible in the Kernel 6. Manage High Bandwidth Events Efficiently 7. Consider Event Wakup Strategy
comment in response to post
The end goal is the same, better control over service-to-service communication, just without the operational baggage. It had a good run for a decade, but maybe it is time to call it: RIP Service Mesh 2015-2025 🪦
comment in response to post
Security and policy enforcement work best when they’re part of the foundation, not something you have to manage separately. Taking network observability data directly from the wire also flows naturally.
comment in response to post
She highlights a broader shift that I'm also seeing. Instead of bolting on additional layers, we’re seeing platforms absorb these service mesh "features" directly. For example, pushing L4 zero trust network security into the infrastructure makes sense.
comment in response to post
At the same time, it’s a reminder of how essential eBPF is to this journey. The more invisible it becomes, the more powerful it proves to be.
comment in response to post
eBPF is now so deeply embedded in our work that it requires no introduction. It’s a testament to the hard work and dedication of everyone involved in bringing eBPF to the forefront of kernel innovation and cloud native networking and security.
comment in response to post
not just because of what’s under the hood, but because of what it enables like seamless multi-cluster networking and scalable network policy. The things that solve their problems today. This shift highlights a significant achievement for both the Cilium and eBPF communities.
comment in response to post
For years, explaining eBPF as the foundation of Cilium was essential. It was new, cutting edge, and a big part of why early adopters took the leap. But now, eBPF has crossed the chasm. We’re not just talking to innovators, early adopters are here and they’re picking Cilium
comment in response to post
Have you seen tetragon.io?
comment in response to post
That's why I think you need to sell value around the open source project rather than the open source project itself. Collect value based on making people more productive with the software
comment in response to post
Just as cgroups and namespaces standardized resource control, eBPF is creating new standards for interacting with the kernel, further cementing the kernel's role as the engine of innovation. Do you see eBPF as important as cgroups and namespaces?
comment in response to post
These capabilities are transforming infrastructure through programmable, code-driven designs. For the next generation of technology, rather than standardizing through committees, we are standardizing through code with eBPF on the leading edge of that
comment in response to post
For example, it's making container networking as efficient as host networking with netkit, boosting application performance by enabling custom process schedulers, and allowing for dynamic security policies at runtime without the need for agents.
comment in response to post
I'm seeing eBPF as the next pivotal kernel technology that is driving a paradigm shift in infrastructure software and redefining the cloud native ecosystem. eBPF is modernizing the kernel by allowing us to rewrite and/or remove abstracts and create fundamentally better building blocks.
comment in response to post
Maybe these are interesting for you www.linuxfoundation.org/press/threat...
comment in response to post
"someone" 😂😂😂
comment in response to post
What security considerations are you talking about?
comment in response to post
video is private 😅