Skip to main content

Get Started with eBPF Network Log Analytics in your Kubernetes Cluster

· 6 min read
Neependra Khare
Guest Author

In the dynamic landscape of Kubernetes network security, it is necessary to be cautious. Tetragon is an eBPF-based Security Observability and Runtime Enforcement tool that integrates with Parseable, a lightweight, high-performance log analytics tool. This post walks you through how to extract and analyse network connections effectively in Parseable using Tetragon. We'll explore how to trigger an alert in the event of outbound connections occurring from the running pod.

Wrangle log data in cli with pb

· 5 min read

We released pb, a modern, fast and intuitive CLI for log management couple of months ago. pb is built for developers who like the comfort of their terminal. Log data is primarily textual, and hence it was important that pb is pluggable via the linux pipe | to other text manipulation tools like grep, awk, sed etc.

In this post, we will see how pb can be used to wrangle log data in the terminal. We'll also explore the new pb tail command to see how it can be used to tail logs in the terminal.

Fiberplane: Parseable as a Data Source for Fiberplane

· 5 min read
Aldrin Jenson
Guest Author

Engineers often run into the issue of reproducibility of an issue. Something that happens at one location is hard to reproduce at another location. More often so, for SREs and DevOps folks whose jobs revolve around several moving parts.

Folks at Fiberplane saw this problem and decided to solve it. Fiberplane provides collaborative notebooks for incident debugging, post-mortem, runbooks and general DevOps debugging.

Visualize eBPF logs with Parseable and Grafana

· 6 min read
Pratiksha Patel
Guest Author

In our previous post Get started with eBPF log analytics in your Kubernetes cluster, we saw how to ingest Tetragon logs in Parsable and generate alerts when a sensitive file like /etc/passwd is accessed by an unauthorized pod. However, it is time-consuming and generally difficult to work with large volume of raw logs. Visualizing logs in a dashboard helps better identify patterns.

This post is a continuation of the previous post. In this post, we will see how to visualize the eBPF logs in Grafana.

Get started with eBPF log analytics in your Kubernetes cluster

· 8 min read
Pratiksha Patel
Guest Author
Aldrin Jenson
Guest Author

Traditionally Linux kernel has been one of the best places to implement security and observability features, but also very difficult in practice, because you can't add new features to the kernel. eBPF changes this by securely enhancing the Kernel functionality at runtime. eBPF allows sandboxed programs to be executed in the Linux kernel without changing the kernel source code or requiring a reboot. It extends the Linux kernel at runtime.

Kubernetes Audit Logs & Kubernetes auditing with Parseable

· 8 min read
Oshi Gupta
Guest Author

Audit logs are core components of security and observability in Kubernetes. This post explains how to ingest and store Kubernetes audit logs in Parseable. Additionally, we'll see how to setup alerts on these logs to get notified when a specific event occurs. In this example, we'll setup an alert to get notified when a user (service-account) accesses a secret.

Introducing pb - modern cli for log analytics

· 3 min read

pb is a command line tool designed to fit developer's toolkit and help debug issues faster. You can point pb to a Parseable for instance, query and analyze logs, directly from the comfort of command line. The focus is to meet the users where they are, and not force them to switch contexts into different dashboards. pb is written in Go and available as a single static binary for all the major platforms.

Get Updates from Parseable

Subscribe to keep up with latest news, updates and new features on Parseable