What is eBPF?
eBPF (extended Berkeley Packet Filter) is a revolutionary Linux kernel technology that allows running custom programs inside the kernel without changing kernel source code or loading kernel modules.How kguardian Uses eBPF
kguardian attaches eBPF programs to kernel hooks to observe pod behavior:Network Traffic Monitoring
Hook points:tcp_connect- Outbound TCP connectionstcp_sendmsg/tcp_recvmsg- Data transmissionudp_sendmsg/udp_recvmsg- UDP traffic
- Source and destination IP addresses
- Source and destination ports
- Protocol (TCP/UDP)
- Network namespace (to map to containers)
Syscall Monitoring
Hook points:sys_enter_*- Entry to any syscallsys_exit_*- Exit from syscall
- Syscall name (e.g.,
open,read,socket) - Process ID and container namespace
- Architecture (x86_64, arm64, etc.)
Why eBPF?
Performance
~1-2% CPU overhead vs 10-20% for proxy-based solutions
Safety
Verifier ensures programs can’t crash the kernel
No Changes Required
No code changes, sidecars, or pod restarts needed
Kernel-Level Visibility
See everything, including encrypted connections
Learn more: