<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Ebpf on Pi Stack</title><link>https://www.pistack.xyz/tags/ebpf/</link><description>Recent content in Ebpf on Pi Stack</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Fri, 17 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://www.pistack.xyz/tags/ebpf/index.xml" rel="self" type="application/rss+xml"/><item><title>Complete Guide to Self-Hosted eBPF Networking and Observability: Cilium, Pixie, Tetragon 2026</title><link>https://www.pistack.xyz/posts/ebpf-networking-observability-cilium-pixie-tetragon-guide-2026/</link><pubDate>Fri, 17 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/ebpf-networking-observability-cilium-pixie-tetragon-guide-2026/</guid><description>&lt;p>The eBPF (extended Berkeley Packet Filter) revolution has fundamentally changed how we observe, secure, and manage network infrastructure. Born from the Linux kernel, eBPF allows sandboxed programs to run inside the kernel without modifying kernel source code or loading modules. This means you can intercept network packets, trace system calls, monitor application performance, and enforce security policies — all with near-zero overhead and no instrumentation changes to your applications.&lt;/p></description></item></channel></rss>