bmc-cache
loxilb-ebpf
bmc-cache | loxilb-ebpf | |
---|---|---|
2 | 1 | |
421 | 16 | |
0.0% | - | |
0.0 | 9.0 | |
over 2 years ago | 7 days ago | |
C | C | |
GNU Lesser General Public License v3.0 only | BSD 2-clause "Simplified" License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
bmc-cache
loxilb-ebpf
-
Is there a way to debug running eBPF programs?
Have some per-cpu maps for debugging and update values of whatever you want to debug/check in these maps. Finally monitor these maps using bpftool while your custom load-balancer processes packets. Send only a few packets at a time to have a better grasp of what is happening. Meanwhile if you want to explore a more complicated ebpf load-balancer visit this repo.
What are some alternatives?
bpftool - Automated upstream mirror for bpftool stand-alone build.
lb-from-scratch - A very basic eBPF Load Balancer in a few lines of C
tubular - BSD socket API on steroids
tetragon - eBPF-based Security Observability and Runtime Enforcement
bpftune - bpftune uses BPF to auto-tune Linux systems
ebpfkit - ebpfkit is a rootkit powered by eBPF
traffico - Shape your traffic the BPF way
bpfmon-example - proof-of-concept example of using eBPF to Monitor for eBPF Map tampering
p4c-xdp - Backend for the P4 compiler targeting XDP
TripleCross - A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.
bpfcov - Source-code based coverage for eBPF programs actually running in the Linux kernel
pwru - Packet, where are you? -- eBPF-based Linux kernel networking debugger