Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
eBPF for Security Observability
Search
Sponsored
·
Your Podcast. Everywhere. Effortlessly.
Share. Educate. Inspire. Entertain. You do you. We'll handle the rest.
→
Liz Rice
June 24, 2022
Technology
0
1.5k
eBPF for Security Observability
As seen at DevOpsDays Amsterdam and KCD Berlin
Liz Rice
June 24, 2022
Tweet
Share
More Decks by Liz Rice
See All by Liz Rice
Building a cloud native business on open source
lizrice
0
240
KCD Lima: eBee in Peru!
lizrice
0
190
Unleashing the kernel with eBPF
lizrice
0
330
eBPF's Abilities and Limitations: The Truth
lizrice
0
480
Simplifying multi-cloud and multi-cluster Kubernetes deployments with Cilium
lizrice
0
260
When is a Secure Connection not encrypted? And other stories
lizrice
1
120
Keeping it simple: Cilium Mesh - networking for multi-cloud Kubernetes and beyond
lizrice
1
760
How Many Proxies Do You Need
lizrice
1
180
Beginner's Guide to eBPF Programming for Networking
lizrice
1
2.6k
Other Decks in Technology
See All in Technology
[JAWS DAYS 2026]私の AWS DevOps Agent 推しポイント
furuton
0
130
楽しく学ぼう!コミュニティ入門 AWSと人が つむいできたストーリー
hiroramos4
PRO
1
180
JAWS DAYS 2026 ExaWizards_20260307
exawizards
0
400
OpenClawで回す組織運営
jacopen
3
670
Shifting from MCP to Skills / ベストプラクティスの変遷を辿る
yamanoku
4
770
作りっぱなしで終わらせない! 価値を出し続ける AI エージェントのための「信頼性」設計 / Designing Reliability for AI Agents that Deliver Continuous Value
aoto
PRO
2
270
DevOpsエージェントで実現する!! AWS Well-Architected(W-A) を実現するシステム設計 / 20260307 Masaki Okuda
shift_evolve
PRO
3
480
Exadata Database Service on Dedicated Infrastructure(ExaDB-D) UI スクリーン・キャプチャ集
oracle4engineer
PRO
8
7.2k
組織全体で実現する標準監視設計
yuobayashi
2
470
Claude Codeが爆速進化してプラグイン追従がつらいので半自動化した話 ver.2
rfdnxbro
0
490
自動テストが巻き起こした開発プロセス・チームの変化 / Impact of Automated Testing on Development Cycles and Team Dynamics
codmoninc
3
1.3k
Claude Code Skills 勉強会 (DevelersIO向けに調整済み) / claude code skills for devio
masahirokawahara
1
13k
Featured
See All Featured
Faster Mobile Websites
deanohume
310
31k
Skip the Path - Find Your Career Trail
mkilby
1
75
Learning to Love Humans: Emotional Interface Design
aarron
275
41k
Connecting the Dots Between Site Speed, User Experience & Your Business [WebExpo 2025]
tammyeverts
11
850
Everyday Curiosity
cassininazir
0
160
What’s in a name? Adding method to the madness
productmarketing
PRO
24
4k
Principles of Awesome APIs and How to Build Them.
keavy
128
17k
Game over? The fight for quality and originality in the time of robots
wayneb77
1
130
Documentation Writing (for coders)
carmenintech
77
5.3k
Rebuilding a faster, lazier Slack
samanthasiow
85
9.4k
Build your cross-platform service in a week with App Engine
jlugia
234
18k
The Art of Programming - Codeland 2020
erikaheidi
57
14k
Transcript
eBPF for Security Observability Liz Rice | @lizrice Chief Open
Source Officer, Isovalent
@lizrice
@lizrice What is ? extended Berkeley Packet Filter
@lizrice What is ? Makes the kernel programmable
@lizrice userspace kernel app event system calls eBPF program Run
custom code in the kernel
@lizrice SEC("kprobe/sys_execve") int hello(void *ctx) { bpf_trace_printk("Hello World!"); return 0;
} $ sudo ./hello bash-20241 [004] d... 84210.752785: 0: Hello World! bash-20242 [004] d... 84216.321993: 0: Hello World! bash-20243 [004] d... 84225.858880: 0: Hello World! Info about process that called execve syscall + userspace code to load eBPF program eBPF Hello World
Dynamic changes to kernel behaviour
Dynamic tracing tools
@lizrice userspace kernel Tracing tool event eBPF program Use eBPF
to collect event metrics eBPF Map metrics load Gather & show metrics
@lizrice eBPF tracing tools from iovisor/bcc
@lizrice eBPF tracing - opensnoop ~/bcc/libbpf-tools$ sudo ./opensnoop PID COMM
FD ERR PATH 5040 node 21 0 /proc/5132/cmdline 5040 node 21 0 /proc/6460/cmdline 5040 node 21 0 /proc/6460/cmdline 6461 opensnoop 18 0 /etc/localtime 5040 node 21 0 /proc/5132/cmdline 5040 node 21 0 /proc/6460/cmdline 5060 node 23 0 /home/liz/.vscode-server/data/User/workspaceStorage/48b53 5040 node 21 0 /proc/5132/cmdline 5040 node 21 0 /proc/6460/cmdline 5040 node 21 0 /proc/5132/cmdline 5040 node 21 0 /proc/6460/cmdline …
eBPF and Kubernetes
@lizrice userspace kernel pod container pod container container One kernel
per host
@lizrice userspace kernel networking access files create containers One kernel
per host pod container pod container container
@lizrice userspace kernel app app pods networking access files create
containers Kernel aware of everything on the host
@lizrice userspace app kernel app pods networking access files create
containers eBPF programs can be aware of everything
@lizrice $ kubectl gadget trace open NODE NAMESPACE POD CONTAINER
PID COMM FD ERR PATH kind-2-control-plane default xwing spaceship 361876 vi 3 0 /etc/passwd eBPF tracing on Kubernetes - Inspektor Gadget Kubernetes info
@lizrice eBPF observability tools -
@lizrice eBPF observability tools - Cilium Hubble
eBPF observability
eBPF security observability
@lizrice Security observability
@lizrice Security observability
@lizrice What activity do we care about for security? eBPF
programs
@lizrice Syscall checks within the kernel
@lizrice TOCTTOU vulnerabilities with syscalls For more details • Leo
Di Donato & KP Singh at CN eBPF Day 2021 • Rex Guo & Junyuan Zeng at DEFCON 29 on Phantom attacks Attacker changes params after inspection
@lizrice Need to make the check at the right place
@lizrice Linux Security Modules • Stable interface • Safe places
to make checks
@lizrice BPF LSM • Stable interface • Safe places to
make checks + eBPF benefits • Dynamic • Protect pre-existing processes
@lizrice $ sudo ./chmoddemo & [1] 7631 $ sudo cat
/sys/kernel/debug/tracing/trace_pipe chmod-7776 [001] d... 38197.342160: bpf_trace_printk: lsm path_chmod liz BPF LSM hook has kernel info populated SEC("lsm/path_chmod") int BPF_PROG(path_chmod, const struct path *path, umode_t mode) { bpf_printk("lsm path_chmod %s\n", path->dentry->d_iname); return 0; } Filename known to kernel
@lizrice BPF LSM • Stable interface • Safe places to
make checks + eBPF benefits • Dynamic • Protect pre-existing processes But needs kernel 5.7+ & Kubernetes context?
How stable is the Linux kernel?
@lizrice Cilium Tetragon • Safe places to make checks +
eBPF benefits • Dynamic • Protect pre-existing processes Uses kernel knowledge to hook into sufficiently stable functions Adds Kubernetes context
@lizrice Photo credit: Bibafu A Tetragonisca angustula bee guarding the
nest-entrance
@lizrice apiVersion: cilium.io/v1alpha1 kind: TracingPolicy metadata: name: "etc-files" spec: kprobes:
- call: "fd_install" … matchArgs: - index: 1 operator: "Prefix" values: - "/etc/" … Cilium Tetragon tracing policy + Policy “follows” file descriptor through read, write & close events
@lizrice $ kubectl logs ds/tetragon -c export-stdout -f | tetragon
observe 🚀 process default/xwing /usr/bin/vi /etc/passwd 📬 open default/xwing /usr/bin/vi /etc/passwd 📪 close default/xwing /usr/bin/vi 📬 open default/xwing /usr/bin/vi /etc/passwd 📝 write default/xwing /usr/bin/vi /etc/passwd 1275 bytes 📪 close default/xwing /usr/bin/vi 💥 exit default/xwing /usr/bin/vi /etc/passwd 0 Cilium Tetragon observe Policy events Kubernetes info
@lizrice Combined network and runtime visibility
eBPF preventative runtime security
@lizrice Network policy → eBPF programs drop packets
@lizrice Preventative actions from user space
@lizrice Preventative actions from kernel
@lizrice $ kubectl logs ds/tetragon -c export-stdout -f | tetragon
observe 🚀 process default/xwing /usr/bin/vi /etc/passwd 📬 open default/xwing /usr/bin/vi /etc/passwd 📪 close default/xwing /usr/bin/vi 📬 open default/xwing /usr/bin/vi /etc/passwd 📝 write default/xwing /usr/bin/vi /etc/passwd 1269 bytes 💥 exit default/xwing /usr/bin/vi /etc/passwd SIGKILL Cilium Tetragon observe Killed before write
eBPF security observability • Dynamic instrumentation - zero app modifications
• Contextual information, Kubernetes identity-aware • Option for runtime enforcement from the kernel
Thank you! cilium/tetragon @ciliumproject cilium.io | ebpf.io @lizrice