Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
KCD Lima: eBee in Peru!
Search
Liz Rice
July 23, 2025
Technology
0
170
KCD Lima: eBee in Peru!
Drawing parallels between eBPF/Cloud Native and Inca technologies
Liz Rice
July 23, 2025
Tweet
Share
More Decks by Liz Rice
See All by Liz Rice
Building a cloud native business on open source
lizrice
0
210
Unleashing the kernel with eBPF
lizrice
0
280
eBPF's Abilities and Limitations: The Truth
lizrice
0
440
Simplifying multi-cloud and multi-cluster Kubernetes deployments with Cilium
lizrice
0
240
When is a Secure Connection not encrypted? And other stories
lizrice
1
97
Keeping it simple: Cilium Mesh - networking for multi-cloud Kubernetes and beyond
lizrice
1
710
How Many Proxies Do You Need
lizrice
1
160
eBPF for Security Observability
lizrice
0
1.5k
Beginner's Guide to eBPF Programming for Networking
lizrice
1
2.5k
Other Decks in Technology
See All in Technology
【M3】攻めのセキュリティの実践!プロアクティブなセキュリティ対策の実践事例
axelmizu
0
160
LINEヤフー バックエンド組織・体制の紹介
lycorptech_jp
PRO
0
760
それでは聞いてください「Impeller導入に失敗しました」 #FlutterKaigi #skia
tacck
PRO
0
130
Devoxx Morocco 2025 - Like Spring but faster: The new Java Jedi
edeandrea
PRO
0
100
CloudFormationコンソールから、実際に作られたリソースを辿れるようになろう!
amixedcolor
1
190
ググるより、AIに聞こう - Don’t Google it, ask AI
oikon48
0
930
技術広報のOKRで生み出す 開発組織への価値 〜 カンファレンス協賛を通して育む学びの文化 〜 / Creating Value for Development Organisations Through Technical Communications OKRs — Nurturing a Culture of Learning Through Conference Sponsorship —
pauli
5
350
米軍Platform One / Black Pearlに学ぶ極限環境DevSecOps
jyoshise
2
420
Error.prototype.stack の今と未来
progfay
1
160
なぜThrottleではなくDebounceだったのか? 700並列リクエストと戦うサーバーサイド実装のすべて
yoshiori
13
4.6k
機密情報の漏洩を防げ! Webフロントエンド開発で意識すべき漏洩パターンとその対策
mizdra
PRO
9
3.5k
[mercari GEARS 2025] Building Foundation for Mercari’s Global Expansion
mercari
PRO
1
130
Featured
See All Featured
[RailsConf 2023] Rails as a piece of cake
palkan
57
6.1k
The Power of CSS Pseudo Elements
geoffreycrofte
80
6.1k
Fashionably flexible responsive web design (full day workshop)
malarkey
407
66k
For a Future-Friendly Web
brad_frost
180
10k
Building a Modern Day E-commerce SEO Strategy
aleyda
45
8.1k
Mobile First: as difficult as doing things right
swwweet
225
10k
GraphQLとの向き合い方2022年版
quramy
49
14k
[RailsConf 2023 Opening Keynote] The Magic of Rails
eileencodes
31
9.7k
A Tale of Four Properties
chriscoyier
162
23k
Testing 201, or: Great Expectations
jmmastey
46
7.8k
Leading Effective Engineering Teams in the AI Era
addyosmani
9
1.1k
"I'm Feeling Lucky" - Building Great Search Experiences for Today's Users (#IAC19)
danielanewman
231
22k
Transcript
Liz Rice eBee in Peru! Chief Open Source Officer, Isovalent
at Cisco
¡Hola! Me llamo Liz 👋 • Open source and community
at Isovalent, now part of Cisco • Author Learning eBPF & Container Security • Formerly CNCF Governing Board, chair of Technical Oversight Committee • Early career writing network protocol code
This is eBee
What is ? Makes the kernel programmable
userspace kernel app event eBPF program system calls - run
custom code in the kernel
userspace kernel app eBPF program eBPF Verifier system calls -
safely run custom code in the kernel 🔍
Photo: Smishra1 CC BYSA 4.0 One day in July 2024
✅ Open Source, many contributors ✅ Field-hardened The verifier is
software too Much reduced chance of a kernel crash
Like Inca walls, eBPF is Robust Good for security Takes
skill to build
Incas built incredible things together Ayni - reciprocal work Mita
- required work on state projects Minka - work for the benefit of the community
Sometimes Incas had to make bug fixes
Incas upgraded to avoid vulnerabilities Rebuilding rope bridges every year
Photo by Marcos Venteo:
eBPF is the foundation for powerful Cloud Native tools for
networking, observability and security
Chasquis - messenger runners Fit and trained to run long
distances Relay system - up to 300km / day Incas had networking
Controls on people and goods as they passed through checkpoints
Incas had network policies
Incas had encrypted data traffic Quipus - knotted strings
Incas had observability hubble Observation points high up
Incas had security Walls Narrow staircases Gates with doors Armed
guards
Did the Incas have Tetragon?
apiVersion: cilium.io/v1alpha1 kind: TracingPolicy metadata: name: "inca" spec: kprobes: -
call: "security_file_permission" ... selectors: - matchArgs: - index: 0 operator: "Equal" values: - "/lost_city_of_inca.txt" matchActions: - action: Sigkill 🚀 process 021c177557f5 /usr/bin/cat /lost_city_of_inca.txt 📚 read 021c177557f5 /usr/bin/cat /lost_city_of_inca.txt 💥 exit 021c177557f5 /usr/bin/cat /lost_city_of_inca.txt SIGKILL Did the Incas have Tetragon?
Muchas gracias! ebpf.io cilium.io tetragon.io isovalent.com/labs
None