Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking and Finance Review

Global Banking & Finance Review

Company

    GBAF Logo
    • About Us
    • Profile
    • Privacy & Cookie Policy
    • Terms of Use
    • Contact Us
    • Advertising
    • Submit Post
    • Latest News
    • Research Reports
    • Press Release
    • Awards▾
      • About the Awards
      • Awards TimeTable
      • Submit Nominations
      • Testimonials
      • Media Room
      • Award Winners
      • FAQ
    • Magazines▾
      • Global Banking & Finance Review Magazine Issue 79
      • Global Banking & Finance Review Magazine Issue 78
      • Global Banking & Finance Review Magazine Issue 77
      • Global Banking & Finance Review Magazine Issue 76
      • Global Banking & Finance Review Magazine Issue 75
      • Global Banking & Finance Review Magazine Issue 73
      • Global Banking & Finance Review Magazine Issue 71
      • Global Banking & Finance Review Magazine Issue 70
      • Global Banking & Finance Review Magazine Issue 69
      • Global Banking & Finance Review Magazine Issue 66
    Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

    Global Banking & Finance Review® is a leading financial portal and online magazine offering News, Analysis, Opinion, Reviews, Interviews & Videos from the world of Banking, Finance, Business, Trading, Technology, Investing, Brokerage, Foreign Exchange, Tax & Legal, Islamic Finance, Asset & Wealth Management.
    Copyright © 2010-2025 GBAF Publications Ltd - All Rights Reserved.

    ;
    Editorial & Advertiser disclosure

    Global Banking and Finance Review is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    Home > Technology > Improving observability in cloud native environments
    Technology

    Improving observability in cloud native environments

    Improving observability in cloud native environments

    Published by Jessica Weisman-Pitts

    Posted on December 15, 2021

    Featured image for article about Technology

    By Rory McCune, Cloud Native Security Advocate at Aqua Security

    The speed of organisations’ digital transformation initiatives has dramatically increased over the course of the pandemic. The rate of this process can come at a cost, resulting in frequent infrastructure disruptions, troublesome applications, and major gaps in cybersecurity defences. However, with the help of observability tools, DevSecOps teams can identify threats and suspicious behaviours in the early phases of a cyberattack. These solutions provide rapid feedback reports to administrators enabling them to react appropriately to the attack within their network environment.

    Observability does not look the same across all cloud native and non-cloud native environments. So maintaining performance whilst capturing the information that security organisations need can be a significant challenge. This is where Extended Berkeley Packet Filter (eBPF) technology comes in – it achieves fast and powerful observability in cloud native environments.

    The eBPF solution

    BPF, eBPFs predecessor, was designed to capture useful network packets directly from the kernel, eliminating the need to copy them to the user space and then funnel them out through a network tap. BPF runs code in the kernel in order to decide which packets to filter in or out. This results in unnecessary traffic being filtered out without a lengthy manual process.

    Building on this, eBPF enables the user to run arbitrary code in the kernel and can be triggered by many different types of events, not just the arrival of network packets. For example, by attaching the program to a “kprobe” event, eBPF code can be triggered to run when a kernel function starts.

    eBPF based applications are typically made up of two parts. The first is the kernel space code, which is responsible for capturing relevant events and making them available to the user space application. The second part is the user space program, which reviews the events shared by the eBPF code running in the kernel and can refine and augment this low-level information with additional context. These two parts together enable the identification of unexpected workloads as they appear.

    eBPF provides a major advantage of other approaches to the problem which would traditionally have used kernel module code to achieve the same results. Using kernel modules often presents risks to the stability of the overall system, as a bug in the module can crash the whole kernel. eBPF on the other hand uses a verifier to ensure that code is safe and then runs it in a sandbox, giving the performance advantages of kernel level software, without the risks.

    As well as eBPF’s incredible speed, it also has exceptional workload monitoring capabilities. eBPF code can run in response to file events to check if they are expected for that workload. This means that it will pick up on any unexpected behaviour in the application and highlight it for review.

    Pushing the limits

    A container is fundamentally a Linux process, therefore eBPF can interact easily with them. Open source projects can push the limits of using eBPF technology, especially in the case of runtime Linux forensics. It is possible to make open source interoperable for different versions of the Linux kernel so others can create eBPF programs that are easier to use for a mainstream DevOps audience. With this capability eBPF holds the key to powerful observability in cloud native environments.

    Projects run by eBPF technology can be used to better appreciate a program’s runtime behaviour and can take on challenges that may prove difficult for other security software solutions. eBPF technology is important to obtain the relevant observability, monitoring, and forensics capabilities for cloud native environments. Improving these components is an absolute must to uphold effective cybersecurity standards.

    Nowadays, there are toolkits like BCC (BPF Compiler Collection) that can be used to write eBPF programs in modern day languages like Go and Python, rather than having to manually write an eBPF program in bytecode. With this process simplified, users can better appreciate the ease of use and benefits that come along with eBPF technologies, and the programs run by it within their cloud native environments.

    Running applications usually interact with the operating system via system calls (syscalls). One of the key benefits of eBPF is that it allows the running of sandboxed programs in the Linux kernel without changing the kernel source code or loading kernel modules. Therefore, by attaching such programs to Linux Security Module (LSM) hooks using kprobes, it is easy to collect the argument values that were used by the kernel. This dramatically simplifies the process of analysing the behaviour of the running application via syscalls, which in turn make issue resolution much easier.

    eBPF programs are a high performance and effective tool for monitoring system software within a cloud native environment. Its advanced observability can alert an administrator around sudden and unusual behaviour. As powerful as it is, only several lines of code are needed to arm your system with maximum observability.

    By Rory McCune, Cloud Native Security Advocate at Aqua Security

    The speed of organisations’ digital transformation initiatives has dramatically increased over the course of the pandemic. The rate of this process can come at a cost, resulting in frequent infrastructure disruptions, troublesome applications, and major gaps in cybersecurity defences. However, with the help of observability tools, DevSecOps teams can identify threats and suspicious behaviours in the early phases of a cyberattack. These solutions provide rapid feedback reports to administrators enabling them to react appropriately to the attack within their network environment.

    Observability does not look the same across all cloud native and non-cloud native environments. So maintaining performance whilst capturing the information that security organisations need can be a significant challenge. This is where Extended Berkeley Packet Filter (eBPF) technology comes in – it achieves fast and powerful observability in cloud native environments.

    The eBPF solution

    BPF, eBPFs predecessor, was designed to capture useful network packets directly from the kernel, eliminating the need to copy them to the user space and then funnel them out through a network tap. BPF runs code in the kernel in order to decide which packets to filter in or out. This results in unnecessary traffic being filtered out without a lengthy manual process.

    Building on this, eBPF enables the user to run arbitrary code in the kernel and can be triggered by many different types of events, not just the arrival of network packets. For example, by attaching the program to a “kprobe” event, eBPF code can be triggered to run when a kernel function starts.

    eBPF based applications are typically made up of two parts. The first is the kernel space code, which is responsible for capturing relevant events and making them available to the user space application. The second part is the user space program, which reviews the events shared by the eBPF code running in the kernel and can refine and augment this low-level information with additional context. These two parts together enable the identification of unexpected workloads as they appear.

    eBPF provides a major advantage of other approaches to the problem which would traditionally have used kernel module code to achieve the same results. Using kernel modules often presents risks to the stability of the overall system, as a bug in the module can crash the whole kernel. eBPF on the other hand uses a verifier to ensure that code is safe and then runs it in a sandbox, giving the performance advantages of kernel level software, without the risks.

    As well as eBPF’s incredible speed, it also has exceptional workload monitoring capabilities. eBPF code can run in response to file events to check if they are expected for that workload. This means that it will pick up on any unexpected behaviour in the application and highlight it for review.

    Pushing the limits

    A container is fundamentally a Linux process, therefore eBPF can interact easily with them. Open source projects can push the limits of using eBPF technology, especially in the case of runtime Linux forensics. It is possible to make open source interoperable for different versions of the Linux kernel so others can create eBPF programs that are easier to use for a mainstream DevOps audience. With this capability eBPF holds the key to powerful observability in cloud native environments.

    Projects run by eBPF technology can be used to better appreciate a program’s runtime behaviour and can take on challenges that may prove difficult for other security software solutions. eBPF technology is important to obtain the relevant observability, monitoring, and forensics capabilities for cloud native environments. Improving these components is an absolute must to uphold effective cybersecurity standards.

    Nowadays, there are toolkits like BCC (BPF Compiler Collection) that can be used to write eBPF programs in modern day languages like Go and Python, rather than having to manually write an eBPF program in bytecode. With this process simplified, users can better appreciate the ease of use and benefits that come along with eBPF technologies, and the programs run by it within their cloud native environments.

    Running applications usually interact with the operating system via system calls (syscalls). One of the key benefits of eBPF is that it allows the running of sandboxed programs in the Linux kernel without changing the kernel source code or loading kernel modules. Therefore, by attaching such programs to Linux Security Module (LSM) hooks using kprobes, it is easy to collect the argument values that were used by the kernel. This dramatically simplifies the process of analysing the behaviour of the running application via syscalls, which in turn make issue resolution much easier.

    eBPF programs are a high performance and effective tool for monitoring system software within a cloud native environment. Its advanced observability can alert an administrator around sudden and unusual behaviour. As powerful as it is, only several lines of code are needed to arm your system with maximum observability.

    Related Posts
    Treasury transformation must be built on accountability and trust
    Treasury transformation must be built on accountability and trust
    Financial services: a human-centric approach to managing risk
    Financial services: a human-centric approach to managing risk
    LakeFusion Secures Seed Funding to Advance AI-Native Master Data Management
    LakeFusion Secures Seed Funding to Advance AI-Native Master Data Management
    Clarity, Context, Confidence: Explainable AI and the New Era of Investor Trust
    Clarity, Context, Confidence: Explainable AI and the New Era of Investor Trust
    Data Intelligence Transforms the Future of Credit Risk Strategy
    Data Intelligence Transforms the Future of Credit Risk Strategy
    Architect of Integration Ushers in a New Era for AI in Regulated Industries
    Architect of Integration Ushers in a New Era for AI in Regulated Industries
    How One Technologist is Building Self-Healing AI Systems that Could Transform Financial Regulation
    How One Technologist is Building Self-Healing AI Systems that Could Transform Financial Regulation
    SBS is Doubling Down on SaaS to Power the Next Wave of Bank Modernization
    SBS is Doubling Down on SaaS to Power the Next Wave of Bank Modernization
    Trust Embedding: Integrating Governance into Next-Generation Data Platforms
    Trust Embedding: Integrating Governance into Next-Generation Data Platforms
    The Guardian of Connectivity: How Rohith Kumar Punithavel Is Redefining Trust in Private Networks
    The Guardian of Connectivity: How Rohith Kumar Punithavel Is Redefining Trust in Private Networks
    BNY Partners With HID and SwiftConnect to Provide Mobile Access to its Offices Around the Globe With Employee Badge in Apple Wallet
    BNY Partners With HID and SwiftConnect to Provide Mobile Access to its Offices Around the Globe With Employee Badge in Apple Wallet
    How Integral’s CTO Chidambaram Bhat is helping to solve  transfer pricing problems through cutting edge AI.
    How Integral’s CTO Chidambaram Bhat is helping to solve transfer pricing problems through cutting edge AI.

    Why waste money on news and opinions when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    Previous Technology PostDigital ID – the keystone technology for the future of financial services
    Next Technology PostGlobal Banking and Payments Technology – Predictions for 2022

    More from Technology

    Explore more articles in the Technology category

    Why Physical Infrastructure Still Matters in a Digital Economy

    Why Physical Infrastructure Still Matters in a Digital Economy

    Why Compliance Has Become an Engineering Problem

    Why Compliance Has Become an Engineering Problem

    Can AI-Powered Security Prevent $4.2 Billion in Banking Fraud?

    Can AI-Powered Security Prevent $4.2 Billion in Banking Fraud?

    Reimagining Human-Technology Interaction: Sagar Kesarpu’s Mission to Humanize Automation

    Reimagining Human-Technology Interaction: Sagar Kesarpu’s Mission to Humanize Automation

    LeapXpert: How financial institutions can turn shadow messaging from a risk into an opportunity

    LeapXpert: How financial institutions can turn shadow messaging from a risk into an opportunity

    Intelligence in Motion: Building Predictive Systems for Global Operations

    Intelligence in Motion: Building Predictive Systems for Global Operations

    Predictive Analytics and Strategic Operations: Strengthening Supply Chain Resilience

    Predictive Analytics and Strategic Operations: Strengthening Supply Chain Resilience

    How Nclude.ai   turned broken portals into completed applications

    How Nclude.ai turned broken portals into completed applications

    The Silent Shift: Rethinking Services for a Digital World?

    The Silent Shift: Rethinking Services for a Digital World?

    Culture as Capital: How Woxa Corporation Is Redefining Fintech Sustainability

    Culture as Capital: How Woxa Corporation Is Redefining Fintech Sustainability

    Securing the Future: We're Fixing Cyber Resilience by Finally Making Compliance Cool

    Securing the Future: We're Fixing Cyber Resilience by Finally Making Compliance Cool

    Supply chain security risks now innumerable and unmanageable for majority of cybersecurity leaders, IO research reveals

    Supply chain security risks now innumerable and unmanageable for majority of cybersecurity leaders, IO research reveals

    View All Technology Posts