From 15533a6af7212b41eec9162bd494dd392a04d005 Mon Sep 17 00:00:00 2001 From: yunwei37 <1067852565@qq.com> Date: Mon, 27 Nov 2023 11:08:36 +0800 Subject: [PATCH] fix title for tutorials --- src/18-further-reading/ebpf-security.md | 4 ++-- src/23-http/README_en.md | 2 +- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/src/18-further-reading/ebpf-security.md b/src/18-further-reading/ebpf-security.md index 20c50922..14a53fa6 100644 --- a/src/18-further-reading/ebpf-security.md +++ b/src/18-further-reading/ebpf-security.md @@ -1,4 +1,4 @@ -# The Secure Path Forward for eBPF: Challenges and Innovations +# The Secure Path Forward for eBPF runtime: Challenges and Innovations Yusheng Zheng @@ -9,7 +9,7 @@ However, as with any system that interfaces closely with the kernel, the securit ## Table of Contents -- [The Secure Path Forward for eBPF: Challenges and Innovations](#the-secure-path-forward-for-ebpf-challenges-and-innovations) +- [The Secure Path Forward for eBPF runtime: Challenges and Innovations](#the-secure-path-forward-for-ebpf-runtime-challenges-and-innovations) - [Table of Contents](#table-of-contents) - [How eBPF Ensures Security with Verifier](#how-ebpf-ensures-security-with-verifier) - [What the eBPF Verifier Is and What It Does](#what-the-ebpf-verifier-is-and-what-it-does) diff --git a/src/23-http/README_en.md b/src/23-http/README_en.md index d2b6ca1f..8ca5883f 100644 --- a/src/23-http/README_en.md +++ b/src/23-http/README_en.md @@ -1,4 +1,4 @@ -# Exploring Seven-Layer Protocol Tracing with eBPF: HTTP and Beyond via Socket Filters and Syscall Tracing +# L7 Tracing with eBPF: HTTP and Beyond via Socket Filters and Syscall Tracepoints In today's technology landscape, with the rise of microservices, cloud-native applications, and complex distributed systems, observability of systems has become a crucial factor in ensuring their health, performance, and security. Especially in a microservices architecture, application components may be distributed across multiple containers and servers, making traditional monitoring methods often insufficient to provide the depth and breadth needed to fully understand the behavior of the system. This is where observing seven-layer protocols such as HTTP, gRPC, MQTT, and more becomes particularly important.