What is eBPF and why is it called a superpower in Linux?

What is eBPF and why is it called a superpower in Linux?


BPF also known as Berkeley Packet Filters was introduced first in 1992 by Steven McCanne and Van Jacobson in their paper The BSD packet filter: A New architecture for user-level packet capture. In this paper, they presented about BPF architecture and how it interfaced with the rest of the system and a new mechanism for

How Kubernetes works on a reconciler pattern

How Kubernetes works on reconciler pattern.


Kubernetes is very hot right now in the industry and everyone wants to learn and use it. In this article, we will read about how Kubernetes works on a reconciler pattern. We have previously talked about the reconciler pattern and how you can use it. You can have a look at the writeup in the

How traceroute works

How traceroute works using ICMP error messages.


In this article, we will talk about how traceroute works using ICMP. ICMP stands for Internet Control Message Protocol. This is used in the network layer just above the IP because ICMP messages are also encapsulated in IP packets. Now let’s have a look at how traceroute works using ICMP. When you type traceroute destination

sidecar pattern and ambassador pattern

Sidecar pattern vs ambassador pattern


Sidecar is one of the important patterns in today’s world of containerization and Kubernetes. Sidecar is a single node pattern and when we talk about a single node pattern we have another major pattern which is called ambassador pattern. In this article, we will talk about the difference between the sidecar pattern vs ambassador pattern.

monitoring infrastructure system design

Monitoring Infrastructure System Design


In this article about monitoring infrastructure system design, we will talk about how you can get metrics from any running application and software and then ship it and show it in a more understandable way. We will try to use the open-source software as much as possible. When we talk about this, we are talking

Logging infrastructure System Design

Logging Infrastructure System Design.


Logging infrastructure system design is very important for each and every infrastructure as you need to look into logs. When you have a huge number of applications talking to each other there is an enormous amount of logs that they produce. Handling this amount of logs can be very costly and a headache. Let’s look

Inorder traversal Python of a Tree

Inorder traversal Python of a Binary Tree


Inorder traversal using python of a tree is as pretty easy if you know the concepts of dictionaries and classes. In this article, we will talk about the Inorder traversal Python of a Tree. Here we will be talking about binary trees. Tree and its inorder traversal using python. Binary tree is the tree where

Breadth-first search in a graph with python

Breadth-first search in a graph with python


In Implementing graph with python and how to traverse we learn how we can implement graph with python. In this article, we are going to talk about the breadth-first search and how we can achieve it using python. If you haven’t read about implementing a graph with python read it here. If you have read

Implementing graph with python

Implementing graph with python and how to traverse.


When we talk about algorithms, graphs are one of the most important parts to know about. In this session, we will talk about graphs and implementing graph in python. What is a graph? A graph is a data structure consists of nodes and edges. It is nonlinear and can form very complex structures. If you