Changelog Master Feed

eBPF and Go (Go Time #201)

Oct 14, 2021
Ask episode
Chapters
Transcript
Episode notes
1
Introduction
00:00 • 4min
2
How to Change the Rules of a Sandbox Without Changing the Kernel
03:34 • 2min
3
How to Use eBPF to Create a Linux Kernel That Responds to Certain Hooks
05:14 • 2min
4
The Limitations of eBPF
07:10 • 2min
5
Microsoft's Porting BPF to Windows
09:16 • 2min
6
How to Write Programs That Run in Kernel Space
11:01 • 2min
7
The Advantages of eBPF for Tracing
12:46 • 4min
8
How to Write an eBPF Program in C
17:00 • 3min
9
How to Use Slack to Manage Incidents
19:48 • 2min
10
EVBF: A Targeted Tool for Security
21:58 • 2min
11
How to Monitor Memory Allocation
23:43 • 2min
12
How to Debug a Production Issue in Prod
25:16 • 2min
13
The Benefits of Writing eBPF Code
27:12 • 2min
14
What's It Like to Work With a Rockstar?
29:03 • 2min
15
How to Implement eBPF-based Load Balancing
30:39 • 2min
16
How to Write and Use eBPF Programs and Go Against Go
32:10 • 3min
17
How to Use a Ring Buffer in an eBPF Program
35:11 • 2min
18
The Different Features of eBPF Go
36:58 • 2min
19
How to Use Lib BPF Go to Build a File Watcher
38:35 • 2min
20
The Future of eBPF
40:49 • 2min
21
The Future of LiveBPF
42:48 • 2min
22
The Importance of a Security Engineer on Every Team
45:11 • 2min
23
The Future of Software Development
46:52 • 2min
24
Snake Cases Better Than Camel Case
48:37 • 2min
25
Snake Case Versus Camel Case
50:15 • 2min
26
The Unpopular Opinion
51:52 • 2min
27
The Unpopularity of Grant Grant on Twitter
53:31 • 2min
28
How to Be a Go Developer
55:18 • 2min
29
How the Sausage Gets Made
57:14 • 2min