eBPFChirp FM

Teodor J. Podobnik

eBPFChirp FM is a quick‑hit podcast spotlighting the innovators behind projects like Cilium, Coroot, and other eBPF breakthroughs. Tune in for punchy chats on how they’re rewriting the rules of cloud‑native networking and observability. ebpfchirp.substack.com

Episodes

  1. Interview with Henrik Rexed, CNCF Ambassador, Cloud Native Advocate at Dynatrace

    02/12/2025

    Interview with Henrik Rexed, CNCF Ambassador, Cloud Native Advocate at Dynatrace

    This time I sat down with Henrik Rexed, CNCF Ambassador and Staff Engineer at Dynatrace. Henrik is also the voice behind the popular blog Is It Observable and brings deep expertise from a career spent largely in performance engineering. Here’s what we covered: * What does a CNCF Ambassador actually do? It turns out the role is less about status and more about survival for open-source projects. The goal is simple: help the community navigate a landscape flooded with new tools and ensure worthy projects actually get adopted. * When “CPU Usage” tells you nothing From European League live streams to GPS trackers on police cars in the desert, simulating massive loads used to be the only way to understand system limits. But simply knowing a CPU is “waiting” isn’t enough. Is it waiting on disk? On the network? We discussed why traditional observability fail in modern architectures and how eBPF provides the missing context. * Is eBPF always the answer? It’s tempting to rewrite everything in eBPF, but is it always necessary? Dynatrace takes a “tactical” approach. Forcing eBPF onto legacy bare-metal systems with old kernels creates a maintenance nightmare. The argument here is for a hybrid model: use eBPF only where the environment (like Kubernetes) is controlled enough to support it safely. * The “Cross Your Fingers” Deployment We deploy network policies in Kubernetes or Istio, but do we actually know what they are doing? There is a frustrating gap in observability: when a connection fails, was it the policy or the network? Right now, most of us are just guessing. * Security: To block or to listen? If a process acts up, should you kill it immediately? Aggressive blocking often causes more problems than it solves, especially if dependencies break. We discuss the alternative: using “honeypots” and fake tokens to let attackers reveal themselves before you take action—learning the behavior rather than just stopping the process. I’ll leave it at that. Hope you enjoy it 🐝 Get full access to eBPFChirp at ebpfchirp.substack.com/subscribe

    26 min
  2. Interview with Rafael David Tinoco, Senior Software Engineer at Garnet

    11/11/2025

    Interview with Rafael David Tinoco, Senior Software Engineer at Garnet

    This time I sat down with Rafael David Tinoco, Engineer at Garnet, where he’s developing Jibril — a runtime security engine. Rafael’s story spans from mainframes and operating system internals to maintaining Tracee at Aqua Security, and now, pushing eBPF to its architectural limits at Garnet. Here’s what we covered: * From CI/CD runtime security to Kubernetes Jibril started as a project focused on GitHub Actions runtime security, but as users began deploying it in Kubernetes clusters, the transition was natural. After all, GitHub runners are just virtual machines — Kubernetes simply scales that model across nodes. * The context-first vision From day one, Garnet’s founders had a clear thesis: whoever holds the best context wins. Jibril’s engine was built around this — capturing what’s happening at the system level without caring whether it’s running on GitHub, Kubernetes, or even a toaster. * A new/unique way to process kernel events Unlike traditional runtime security tools like Falco, Tetragon, or Datadog Agent, Jibril doesn’t stream events from kernel to user space. Instead, it uses an in-kernel data query model — treating eBPF maps like a database.Rather than flooding user space with raw events, Jibril stores, indexes, and exposes them on-demand through queries. The result: an order of magnitude reduction in CPU and memory usage while maintaining full observability. * Virtual maps and caching To make this model scale, Rafael built what he calls virtual maps — “maps made of maps” — enabling nested lookups and richer data structures entirely in-kernel.A userland caching layer further optimizes queries, ensuring repeated lookups don’t re-hit the kernel unless necessary. The outcome is a smooth balance between cadence and performance, with tunable refresh intervals depending on workload. * Beyond just detection Jibril already supports in-kernel enforcement, blocking domains or CIDRs at egress using eBPF — no proxy, no user-space hop.For broader cluster-wide blocking, it can also hand off to Cilium to enforce network policies, rather than competing with it. At the end, there’s a short demo of Jibril — aimed at a more technical audience — showcasing the concepts we discussed throughout our conversation. I’ll leave it at that — this was one of the most technical and insightful discussions I’ve had about eBPF architecture in a while. Jibril is shaping up to be a fascinating rethink of how we do runtime security — not by streaming data faster, but by rethinking where and how data lives. 🐝 Get full access to eBPFChirp at ebpfchirp.substack.com/subscribe

    26 min
  3. Interview with Avi Lumelsky, AI Security Researcher at Oligo Security

    21/10/2025

    Interview with Avi Lumelsky, AI Security Researcher at Oligo Security

    This time I sat down with Avi Lumelsky, AI Security Researcher at Oligo Security, where he works at the intersection of AI and runtime protection. Avi’s story is a perfect example of how curiosity leads to innovation. Here are some of the topics we covered: * From inference to insightBefore Oligo, Avi worked at Deci AI, optimizing model inference speed. There, he realized something crucial — performance isn’t just about models; it’s also about how well you understand and leverage the system it runs on. * The confinement challengeImagine a Python model that should only do math, but could also spawn a subprocess or access the network. How do you confine it safely? * Discovering eBPFHis early experiments with DTrace were too slow and invasive for production, so when eBPF matured, he rebuilt his secimport prototype — and found a scalable way to trace and enforce what code can (and can’t) do in real time. * Beyond observabilityAvi’s big insight: eBPF isn’t just for monitoring. Combined with Linux Security Modules (LSM) and KRSI, it can actively stop malicious behavior before it completes — for example, blocking a rogue pickle.load() before it spawns a shell. * Language-aware securityAt Oligo, Avi’s team extended this concept across languages — Python, Java, Node, .NET, PHP — extracting application-level context straight from production without user-space overhead. * From CVEs to contextInstead of flagging every potential vulnerability, Oligo maps which functions actually run in production, reducing noise and focusing developer effort where it matters most. * The AI connectionWe also discussed how AI agents could soon operate eBPF — dynamically tuning kernel parameters or deploying probes on demand, creating adaptive, self-healing systems. * Looking aheadAvi sees a future where security tooling merges with intelligence — where production data directly informs code fixes, and AI uses eBPF to keep systems resilient in real time. 🐝 I’ll leave it there — hope you enjoy the conversation. Get full access to eBPFChirp at ebpfchirp.substack.com/subscribe

    37 min
  4. Interview with Karim Traiaia, Co-Founder of Kerno

    16/09/2025

    Interview with Karim Traiaia, Co-Founder of Kerno

    This time I sat down with Karim Traiaia, the Co-founder of Kerno, a company that helps troubleshoot cloud applications. Here are some of the topics we discussed: * The sparkEvery startup starts with a pain point—how did Karim come up with Kerno, and what problem was he trying to solve at the beginning? * First customersLanding those early paying users is always tough. Did Kerno rely on free trials, community outreach, or partnerships to get started? * The eBPF foundationWas eBPF part of the plan from day one, or did the idea for Kerno evolve into it over time? And why eBPF specifically over other tooling? * What only eBPF can doWhere has eBPF been able to collect critical data that simply wasn’t available from user space or other observability tools? * Taming the telemetry floodObservability tools generate a LOT of events—from syscalls to protocol traces. How does Kerno decide what data to keep vs. what’s just noise, and how much is actually useful in practice? * The observer effectWhat about CPU and memory overhead—how does Kerno make sure the eBPF agent itself doesn’t impact the workloads? * Scaling upWhat’s the largest production environment Kerno has been tested in? What bottlenecks emerged at scale, and how were they solved? * Measuring impactKerno promises a “64% reduction in customer-facing production incidents” and a “3x increase in successful deployment attempts.” How are those numbers measured and validated? * Looking aheadWhat would Karim consider a home-run feature or capability for Kerno three years from now? * From visibility to autonomyWill we see a future where observability shifts from passive runtime visibility to autonomous systems that detect and act on issues—powered by eBPF-fed AI models? * Startup mindsetIf Karim were a fresh graduate looking at the industry, how would he approach finding and validating an idea that could grow into a startup? 🐝 I’ll leave it there—hope you enjoy the conversation. Get full access to eBPFChirp at ebpfchirp.substack.com/subscribe

    32 min
  5. Interview with Nikolay Sivko, Founder & CEO at Coroot

    21/08/2025

    Interview with Nikolay Sivko, Founder & CEO at Coroot

    This time I sat down with Nikolay Sivko, the Founder and CEO at Coroot, and here are some of the topics we discussed: * The sparkEvery product begins with a pain point—what was the “aha moment” that made Coroot necessary? * The landscapeWhen looking at the broad observability market, what’s the biggest advantage Coroot brings compared to existing solutions? * The profiling edgeMetrics, logs, traces, and continuous profiling all ship out of the box. Where has profiling made the biggest difference in practice? * Zero-code instrumentationCoroot promises instrumentation without code changes for every language on Kubernetes. Which runtime—Java, Go, Rust, etc.—caused the trickiest edge cases, and how were they solved? * Taming the firehoseCollecting “everything” is easy—handling it without blowing up the system is the real challenge. How do you decide which telemetry data is important and which not? * The eBPF observer effectWhat about CPU and memory overhead—how do you guard against the tooling itself impacting the workload? * 80/20 troubleshootingHow did you arrive at the idea that 80% of issues follow common patterns, and the remaining 20% can be uncovered by linking logs with other system data? * AI insightsCoroot uses AI to surface actionable insights. How do you avoid false positives and measure the success rate of those explanations? * From telemetry to root causeHow do you actually map raw telemetry to a possible root cause—is this a huge state machine, pattern matching, or something else under the hood? * The future of observabilityWill we see a shift from passive runtime visibility to autonomous systems that not only detect but also act on issues, powered by eBPF-fed AI models? The fear, of course, is false positives—how do you see that playing out? * Community energyYour GitHub repo has passed 6,000 stars in a short time. What have you learned about building—and sustaining—an engaged open-source community? 🐝 I’ll leave it there—hope you enjoy the conversation. Get full access to eBPFChirp at ebpfchirp.substack.com/subscribe

    28 min
  6. Interview with Bill Mulligan, Cilium and eBPF Community Pollinator

    24/07/2025

    Interview with Bill Mulligan, Cilium and eBPF Community Pollinator

    It’s been a while since I first had this idea, but I’ve been thinking hard about how to extend eBPFChirp newsletter and inject more real eBPF energy into the community. Alongside developing eBPF online coding exercises (still in progress), I want to add interviews that deliver a personal touch and real industry insight—what’s happening inside the minds of exceptional people at companies like Cisco, Cloudflare, and beyond. Bill Mulligan is definitely one of them and we discussed several interesting topics: * A day in the lifeWhat does a typical workday look like for you? * First encounterHow did you first “bump into” eBPF? * The children’s book twistWhat sparked the idea to write a children’s book about eBPF? * Common misconceptionsWhat’s the single biggest myth you still hear from newcomers kicking the tires on eBPF? * Security concernsMany security engineers shy away from eBPF because it traditionally requires root access. Are those risks still real today, and how do you frame the conversation? * Enterprise signalsYou talk to enterprises every week—what concrete signal tells you eBPF is a fit for them, and how can engineers spot that same signal inside their own orgs? * Emerging workloadsLooking at the eBPF ecosystem right now—edge AI, 5G cores, serverless—which workload is about to unlock a “must‑have” eBPF pattern that nobody’s talking about yet? * Scaling Cilium adoptionYou helped Cilium leap from “cool project” to the de‑facto Kubernetes networking standard. What marketing tactic actually moved the needle? * Inspiring the next generationMany computer‑science students still see networking as “boring” and eBPF as niche. What concrete steps should faculty and staff take to make these topics engaging and mainstream? * eBPF Documentary Part 2 😉 I’ll leave it at that — hope you enjoy the conversation. 🐝 Get full access to eBPFChirp at ebpfchirp.substack.com/subscribe

    24 min

About

eBPFChirp FM is a quick‑hit podcast spotlighting the innovators behind projects like Cilium, Coroot, and other eBPF breakthroughs. Tune in for punchy chats on how they’re rewriting the rules of cloud‑native networking and observability. ebpfchirp.substack.com