├── Contributing.md
├── Getting Started with eBPF.go
├── README.md
└── Security Glossary.md
/Contributing.md:
--------------------------------------------------------------------------------
1 | # Contributing Guidelines
2 |
3 | **Make sure your pull request follows these guidelines:**
4 |
5 | - [x] Search through the previous pull requests before making a new one!
6 | - [x] Adding new categories, or improving existing categories is welcome!
7 | - [x] Make sure you've personally used or benefited from the suggested resource.
8 | - [x] Make an individual pull request for each suggestion.
9 | - [x] Use the following format: `[Resource Title](url link) — description.`
10 | - [x] Expand on why the resource is useful in your pull request if needed.
11 | - [x] Keep descriptions short and simple, but descriptive.
12 | - [x] Please double check your spelling and grammar.
13 |
14 | **Thanks for contributing to this Project!**
15 |
--------------------------------------------------------------------------------
/Getting Started with eBPF.go:
--------------------------------------------------------------------------------
1 | Code samples & snippets coming soon!
2 |
3 | //Setting up eBPF on Linux
4 |
5 |
6 | //Setting up eBPF on Windows
7 |
8 |
9 | //Setting up eBPF on macOS
10 |
--------------------------------------------------------------------------------
/README.md:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | eBPF Guide
5 |
6 |
7 |
8 |
9 |
10 | 
11 | 
12 |
13 | #### A guide covering eBPF including the applications, libraries and tools that will make you a better and more efficient eBPF development.
14 |
15 | **Note: You can easily convert this markdown file to a PDF in [VSCode](https://code.visualstudio.com/) using this handy extension [Markdown PDF](https://marketplace.visualstudio.com/items?itemName=yzane.markdown-pdf).**
16 |
17 |
18 |
19 |
20 |
21 |
22 | # Table of Contents
23 |
24 | 1. [Getting Started with eBPF](https://github.com/mikeroyal/eBPF-Guide#getting-started-with-eBPF)
25 |
26 | - [eBPF Tools & Libraries](https://github.com/mikeroyal/eBPF-Guide#ebpf-tools--libraries)
27 | - [Books & Tutorials](https://github.com/mikeroyal/eBPF-Guide#books--tutorials)
28 |
29 | 2. [LLVM Development](https://github.com/mikeroyal/eBPF-Guide#llvm-development)
30 |
31 | 3. [GO Development](https://github.com/mikeroyal/eBPF-Guide#go-development)
32 |
33 | 4. [C++ Development](https://github.com/mikeroyal/eBPF-Guide#cc-development)
34 |
35 | 5. [Rust Development](https://github.com/mikeroyal/eBPF-Guide#rust-development)
36 |
37 | 6. [Networking](https://github.com/mikeroyal/eBPF-Guide#networking)
38 |
39 | 7. [Kubernetes](https://github.com/mikeroyal/eBPF-Guide#kubernetes)
40 |
41 | 8. [Databases](https://github.com/mikeroyal/eBPF-Guide#databases)
42 |
43 |
44 | # Getting Started with eBPF
45 | [Back to the Top](https://github.com/mikeroyal/eBPF-Guide#table-of-contents)
46 |
47 | **eBPF Companies**
48 |
49 | * [Isovalent](https://isovalent.com/) is a company founded by the creators of [Cilium](https://cilium.io/) and [eBPF](https://ebpf.io/). They build open source software and enterprise solutions solving networking, security, and observability needs for modern cloud native infrastructure.
50 |
51 | ## eBPF Tools & Libraries
52 |
53 | [eBPF](https://ebpf.io/) is a technology that can run sandboxed programs in the Linux kernel without changing kernel source code or loading kernel modules. By making the Linux kernel programmable, infrastructure software can leverage existing layers, making them more intelligent and feature-rich without continuing to add additional layers of complexity to the system.
54 |
55 |
56 |
57 |
58 |
59 |
60 | **eBPF Architecture Overview. Credit: [eBPF.io](https://ebpf.io/)**
61 |
62 | [eBPF for Windows](https://github.com/microsoft/ebpf-for-windows) is an eBPF implementation that runs on top of Windows. eBPF is a well-known technology for providing programmability and agility, especially for extending an OS kernel, for use cases such as DoS protection and observability. [Cilium L4 Load Balancer using eBPF-for-Windows](https://github.com/microsoft/ebpf-for-windows-demo/blob/main/cilium/load_balancer/docs/CiliumL4LBSetup.md)
63 |
64 |
65 |
66 |
67 |
68 |
69 | **eBPF for Windows Architecture Overview. Credit: [Microsoft](https://cloudblogs.microsoft.com/opensource/2021/05/10/making-ebpf-work-on-windows/)**
70 |
71 | [XDP(eXpress Data Path)](https://www.tigera.io/learn/guides/ebpf/) is a technology that allows developers to attach eBPF programs to low-level hooks, implemented by network device drivers in the Linux kernel(since version 4.8), as well as generic hooks that run after the device driver. XDP can be used to achieve high-performance packet processing in an eBPF architecture, primarily using kernel bypass.
72 |
73 | [AF_XDP](https://01.org/linuxgraphics/gfx-docs/drm/networking/af_xdp.html) is an address family that is optimized for high performance packet processing.
74 |
75 | [BPF Compiler Collection (BCC)](https://github.com/iovisor/bcc) is a toolkit for creating efficient kernel tracing and manipulation programs, and includes several useful tools and examples. It makes use of extended BPF (Berkeley Packet Filters), formally known as eBPF, a new feature that was first added to Linux 3.15. Though, much of what BCC uses requires Linux 4.1 and above.
76 |
77 |
78 |
79 |
80 |
81 |
82 | **BCC performance tools. Credit: [Brendan Gregg](https://github.com/iovisor/bcc/blob/master/images/bcc_tracing_tools_2019.png)**
83 |
84 | [Bpftrace](https://github.com/iovisor/bpftrace) is a high-level tracing language for Linux eBPF. Its language is inspired by awk and C, and predecessor tracers such as DTrace and SystemTap. bpftrace uses LLVM as a backend to compile scripts to eBPF bytecode and makes use of BCC as a library for interacting with the Linux eBPF subsystem as well as existing Linux tracing capabilities and attachment points.
85 |
86 | [Cilium](https://github.com/cilium/cilium) is an open source project that provides eBPF-powered networking, security and observability. It has been specifically designed from the ground up to bring the advantages of eBPF to the world of Kubernetes and to address the new scalability, security and visibility requirements of container workloads.
87 |
88 | [Falco](https://github.com/falcosecurity/falco) is a behavioral activity monitor designed to detect anomalous activity in applications. Falco audits a system at the Linux kernel layer with the help of eBPF. It enriches gathered data with other input streams such as container runtime metrics and Kubernetes metrics, and allows to continuously monitor and detect container, application, host, and network activity.
89 |
90 | [Katran](https://github.com/facebookincubator/katran) is a C++ library and eBPF program to build a high-performance layer 4 load balancing forwarding plane. Katran leverages the XDP infrastructure from the Linux kernel to provide an in-kernel facility for fast packet processing. Its performance scales linearly with the number of NIC's receive queues and it uses RSS friendly encapsulation for forwarding to L7 load balancers.
91 |
92 | [Hubble](https://github.com/cilium/hubble) is a fully distributed networking and security observability platform for cloud native workloads. It is built on top of Cilium and eBPF to enable deep visibility into the communication and behavior of services as well as the networking infrastructure in a completely transparent manner.
93 |
94 | [Pixie](https://docs.pixielabs.ai/) is an open-source observability tool for Kubernetes applications. It's used to view the high-level state of your cluster (service maps, cluster resources, application traffic) and also drill down into more detailed views (pod state, flame graphs, individual full-body application requests).
95 |
96 | [BumbleBee](https://github.com/solo-io/bumblebee) is a tool that helps to build, run and distribute eBPF programs using [OCI images](https://opencontainers.org/). It allows you to focus on writing eBPF code, while taking care of the user space components that automatically exposing your data as metrics or logs.
97 |
98 | [Sysmon for Linux](https://github.com/Sysinternals/SysmonForLinux) is a tool that monitors and logs system activity including process lifetime, network connections, file system writes, and more. Sysmon works across reboots and uses advanced filtering to help identify malicious activity as well as how intruders and malware operate on your network.
99 |
100 | [KubeArmor](https://kubearmor.io/) is a cloud-native runtime security enforcement system that restricts the behavior (such as process execution, file access, and networking operations) of pods, containers, and nodes (VMs) at the system level. It leverages [Linux security modules (LSMs)](https://www.kernel.org/doc/html/latest/admin-guide/LSM/index.html) such as [AppArmor](https://www.apparmor.net/), [SELinux](https://selinuxproject.org/), or [BPF-LSM](https://docs.kernel.org/bpf/prog_lsm.html) to enforce the user-specified policies.
101 |
102 | [Caretta](https://github.com/groundcover-com/caretta) is a lightweight, standalone tool that instantly creates a visual network map of the services running in your cluster. It leverages eBPF to efficiently map all service network interactions in a K8s cluster, and Grafana to query and visualize the collected data.
103 |
104 | [dae](https://github.com/daeuniverse/dae) is a Linux high-performance transparent proxy solution based on eBPF.
105 |
106 | [eunomia-bpf](https://eunomia.dev/) is a compiler and runtime framework to help you Build, Distribute and Run CO-RE eBPF programs easier with JSON and Webassembly OCI images.
107 |
108 | [Kindling](https://github.com/kindlingproject/kindling) is an eBPF-based cloud native monitoring tool, which aims to help users understand the app behavior from kernel to code stack. With trace profiling, we hope the user can understand the application's behavior easily and find the root cause in seconds. It also provides an easy way to get an overview of network flows in the Kubernetes environment, and many built-in network monitor dashboards like TCP retransmit, DNS, throughput, and TPS.
109 |
110 | [Odigos](https://odigos.io/) is a tool for Distributed tracing without code changes. It instantly monitor any application using OpenTelemetry and eBPF.
111 |
112 | [SSHLog](http://www.sshlog.com/) is a Linux daemon written in C++ and Python that passively monitors OpenSSH servers via eBPF. It's configurable, any combination of features may be enabled, disabled, or customized. It works with your existing OpenSSH server process, no alternative SSH daemon is required. Simply install the sshlog package to begin monitoring SSH.
113 |
114 | [L3AFD](https://l3af.io/) is the primary component of the L3AF control plane. It's a daemon that orchestrates and manages multiple eBPF programs. L3AFD runs on each node where the user wishes to run eBPF programs. L3AFD reads configuration data and manages the execution and monitoring of eBPF programs running on the node.
115 |
116 | [Wachy](https://github.com/rubrikinc/wachy) is a tool that provides a UI for interactive eBPF-based userspace performance debugging.
117 |
118 | [Merbridge](https://merbridge.io/) is a tool that uses eBPF to speed up your Service Mesh like crossing an Einstein-Rosen Bridge.
119 |
120 | [DeepFlow](https://github.com/deepflowys/deepflow) is a highly automated observability platform for cloud-native developers. Using new technologies such as eBPF, WASM, and OpenTelemetry, DeepFlow innovatively implements core mechanisms such as AutoTracing, AutoMetrics, AutoTagging, and SmartEncoding, which greatly avoids code instrumentation and significantly reduces the resource overhead of back-end data warehouses.
121 |
122 | [Parca](https://parca.dev/) is a tool for continuous profiling for analysis of CPU and memory usage, down to the line number and throughout time. Saving infrastructure cost, improving performance, and increasing reliability.
123 |
124 | [loxilb](https://www.loxilb.io/) is a tool that provides service type external load-balancer for K8s using eBPF as its core engine. It powers Edge|5G|IoT|XaaS Apps.
125 |
126 | [kube-loxilb](https://github.com/loxilb-io/kube-loxilb) is loxilb's implementation of kubernetes service load-balancer spec which includes support for load-balancer class, IPAM (shared or exclusive) etc.
127 |
128 | [loxi-ccm](https://github.com/loxilb-io/loxi-ccm) is a tool that provides an implementation of kubernetes load-balancer spec but it runs as a part of cloud-provider and provides load-balancer life-cycle management as part of it.
129 |
130 | [loxicmd](https://github.com/loxilb-io/loxicmd) is the command-line tool for loxilb. It is equivalent of "kubectl" for loxilb.
131 |
132 | [Kubectl-trace](https://github.com/iovisor/kubectl-trace) is a kubectl plugin that allows for scheduling the execution of bpftrace(8) programs in Kubernetes clusters. kubectl-trace does not require installation of any components directly onto a Kubernetes cluster in order to execute bpftrace programs. When pointed to a cluster, it schedules a temporary job called trace-runner that executes bpftrace.
133 |
134 | [Ply](https://github.com/iovisor/ply) is a dynamic tracer for Linux which is built upon eBPF. It has been designed with embedded systems in mind, is written in C and all that ply needs to run is libc and a modern Linux kernel with eBPF support, meaning, it does not depend on LLVM for its program generation. It has a C-like syntax for writing scripts and is heavily inspired by awk(1) and dtrace(1).
135 |
136 | [Tracee](https://github.com/aquasecurity/tracee) is a Runtime Security and forensics tool for Linux. It is using Linux eBPF technology to trace your system and applications at runtime, and analyze collected events to detect suspicious behavioral patterns.
137 |
138 | [bpfcov](https://github.com/elastic/bpfcov) is a source-code based coverage for eBPF programs actually running in the Linux kernel.
139 |
140 | [eCapture](https://github.com/ehids/ecapture) is a tool that captures SSL/TLS text content without CA cert using eBPF.
141 |
142 | [Tetragon](https://github.com/cilium/tetragon) is a eBPF-based Security Observability and Runtime Enforcement.
143 |
144 | [SkyWalking](https://github.com/apache/skywalking) is an open source APM system, including monitoring, tracing, diagnosing capabilities for distributed system in Cloud Native architecture.
145 |
146 | [Skydive](https://github.com/skydive-project/skydive) is an open source real-time network topology and protocols analyzer. It aims to provide a comprehensive way of understanding what is happening in the network infrastructure.
147 |
148 | The [Linux kernel](https://www.kernel.org/) contains the eBPF runtime required to run eBPF programs. It implements the bpf(2) system call for interacting with programs, maps, BTF and various attachment points where eBPF programs can be executed from. The kernel contains a eBPF verifier in order to check programs for safety and a JIT compiler to translate programs to native machine code. User space tooling such as bpftool and libbpf are also maintained as part of the upstream kernel.
149 |
150 | [Landlock LSM(Linux Security Module)](https://www.kernel.org/doc/html/latest/security/landlock.html) is a framework to create scoped access-control (sandboxing). Landlock is designed to be usable by unprivileged processes while following the system security policy enforced by other access control mechanisms (DAC, LSM, etc.).
151 |
152 | [LLVM compiler](https://llvm.org/) infrastructure contains the eBPF backend required to translate programs written in a C-like syntax to eBPF instructions. LLVM generates eBPF ELF files which contain program code, map descriptions, relocation information and BTF meta data. These ELF files contain all necessary information for eBPF loaders such as libbpf to prepare and load programs into the Linux kernel.
153 |
154 | [Gobpf](https://github.com/iovisor/gobpf) is a Go-based library which provides Go bindings for the BCC framework as well as low-level routines to load and use eBPF programs from ELF files.
155 |
156 | [rbpf](https://github.com/qmonnet/rbpf) is a Rust virtual machine and JIT compiler for eBPF programs.
157 |
158 | [Libbpfgo](https://github.com/aquasecurity/libbpfgo) is a Go wrapper around libbpf. It supports BPF CO-RE and its goal is to be a complete implementation of libbpf APIs. It uses CGo to call into linked versions of libbpf.
159 |
160 | [Libbpf](https://github.com/libbpf/libbpf) is a C/C++ based library which is maintained as part of the upstream Linux kernel. It contains an eBPF loader which takes over processing LLVM generated eBPF ELF files for loading into the kernel. libbpf received a major boost in capabilities and sophistication and closed many existing gaps with BCC as a library. It also supports important features not available in BCC such as global variables and BPF skeletons.
161 |
162 | [Libbpf-rs](https://github.com/libbpf/libbpf-rs) is a safe, idiomatic, and opinionated wrapper API around libbpf written in Rust. libbpf-rs, together with libbpf-cargo (libbpf cargo plugin) allows to write 'compile once run everywhere' (CO-RE) eBPF programs.
163 |
164 | [Redbpf](https://github.com/redsift/redbpf) is a Rust eBPF toolchain that contains a collection of Rust libraries to work with BPF/eBPF programs.
165 |
166 | [redcanary-ebpf-sensor](https://github.com/redcanaryco/redcanary-ebpf-sensor) - A set of BPF programs that gather security relevant event data from the Linux kernel. The BPF programs are combined into a single ELF file from which individual probes can be selectively loaded, depending on the running operating system and kernel version.
167 |
168 | [bpflock - Lock Linux machines](https://github.com/linux-lock/bpflock) is an eBPF driven security tool for locking and auditing Linux machines.
169 |
170 | [coroot-node-agent](https://github.com/coroot/coroot-node-agent) is an eBPF based Prometheus exporter that gathers comprehensive container metrics such as container-to-container TCP connections, network latency, CPU delay accounting, log summaries, cloud instance metadata, etc.
171 |
172 | [Kernel-collector](https://github.com/netdata/kernel-collector) is a Linux Kernel eBPF Collectors developed by Netdata.
173 |
174 | [socket-connect-bpf](https://github.com/p-/socket-connect-bpf/) is a BPF/eBPF Linux command line utility that writes human-readable information about each application that makes new (network) connections to the standard output.
175 |
176 | [Polycube](https://github.com/polycube-network/polycube) is an eBPF/XDP-based software framework for fast network services(such as bridges, routers, firewalls, and others) running in the Linux kernel. Polycube services, called cubes, can be composed to build arbitrary service chains and provide custom network connectivity to namespaces, containers, virtual machines, and physical hosts.
177 |
178 | ### Books & Tutorials
179 | [Back to the Top](https://github.com/mikeroyal/eBPF-Guide#table-of-contents)
180 |
181 | - [BPF Performance Tools (book) by Brendan Gregg](https://www.brendangregg.com/bpf-performance-tools-book.html). **[GitHub repo](https://github.com/brendangregg/bpf-perf-tools-book) for book**.
182 |
183 | - [Systems Performance: Enterprise and the Cloud, 2nd Edition (2020) by Brendan Gregg](https://www.brendangregg.com/systems-performance-2nd-edition-book.html)
184 |
185 | - [Security Observability with eBPF by Jed Salazar & Natalia Reka Ivanko](https://www.oreilly.com/library/view/security-observability-with/9781492096719/)
186 |
187 | - [What Is eBPF? by Liz Rice](https://www.oreilly.com/library/view/what-is-ebpf/9781492097266/)
188 |
189 | - [The Beginner's Guide to eBPF by Liz Rice](https://github.com/lizrice/ebpf-beginners)
190 |
191 | - [eBPF - From a Programmer’s Perspective by Niclas Hedam (PDF)](https://hed.am/papers/2021-EBPF.pdf)
192 |
193 | - [Learn eBPF Tracing: Tutorial and Examples by Brendan Gregg](https://www.brendangregg.com/blog/2019-01-01/learn-ebpf-tracing.html)
194 |
195 | - [eBPF Instruction Set — The Linux Kernel documentation](https://www.kernel.org/doc/html/latest/bpf/instruction-set.html)
196 |
197 | - [How We Used eBPF to Build Programmable Packet Filtering in Magic Firewall | Cloudflare](https://blog.cloudflare.com/programmable-packet-filtering-with-magic-firewall/)
198 |
199 | - [eBPF assembly with LLVM by Quentin Monnet](https://qmonnet.github.io/whirl-offload/2020/04/12/llvm-ebpf-asm/)
200 |
201 | # LLVM Development
202 | [Back to the Top](https://github.com/mikeroyal/eBPF-Guide#table-of-contents)
203 |
204 |
205 |
206 |
207 |
208 |
209 | ## LLVM Learning Resources
210 |
211 | [LLVM](https://github.com/llvm/) is a library that has collection of modular/reusable compiler and toolchain components (assemblers, compilers, and debuggers). With these components LLVM can be used as a compiler framework, providing a front-end(parser and lexer) and a back-end (code that converts LLVM's representation to actual machine code).
212 |
213 | [Clang](https://clang.llvm.org/) is a language front-end and tooling infrastructure for languages in the C language family (C, C++, Objective C/C++, OpenCL, CUDA, and RenderScript) for the LLVM project.
214 |
215 | [LLVM Project GitHub](https://github.com/llvm/llvm-project//)
216 |
217 | [LLVM Documentation](https://llvm.org/docs/index.html)
218 |
219 | [LLVM Discussion Forum](https://llvm.discourse.group/)
220 |
221 | [LLVM | Apple Developer Forums](https://developer.apple.com/forums/tags/llvm/)
222 |
223 | [Contributing to LLVM](https://llvm.org/docs/Contributing.html)
224 |
225 | [Getting Started with LLVM](https://llvm.org/docs/GettingStartedTutorials.html)
226 |
227 | [Getting Started with Clang](https://clang.llvm.org/get_started.html)
228 |
229 | [How To Setup Clang Tooling For LLVM](https://clang.llvm.org/docs/HowToSetupToolingForLLVM.html)
230 |
231 | [Using Clang-Tidy in Visual Studio](https://docs.microsoft.com/en-us/cpp/code-quality/clang-tidy)
232 |
233 | [Configure VS Code for Clang/LLVM on macOS](https://code.visualstudio.com/docs/cpp/config-clang-mac)
234 |
235 | ## LLVM Tools, Libraries and Frameworks
236 |
237 | [Visual Studio Code](https://code.visualstudio.com/) is a code editor redefined and optimized for building and debugging modern web and cloud applications.
238 |
239 | [Code Server](https://coder.com/) is a tool that allows you to run [VS Code](https://code.visualstudio.com/) on any machine anywhere and access it in the browser.
240 |
241 | [Clang-Format](https://marketplace.visualstudio.com/items?itemName=xaver.clang-format) is a tool to format C/C++/Java/JavaScript/Objective-C/Objective-C++/Protobuf code.
242 |
243 | [Clang-Tidy](https://clang.llvm.org/extra/clang-tidy/) is a clang-based C++ "linter" tool. Its purpose is to provide an extensible framework for diagnosing and fixing typical programming errors, like style violations, interface misuse, or bugs that can be deduced via static analysis. clang-tidy is modular and provides a convenient interface for writing new checks.
244 |
245 | [Clangd](https://marketplace.visualstudio.com/items?itemName=llvm-vs-code-extensions.vscode-clangd) is a Visual Studio Code extension that provides C/C++ language IDE features for VS Code using [clangd](https://clangd.llvm.org/).
246 |
247 | [LLD](https://lld.llvm.org/) is a linker from the LLVM project that is a drop-in replacement for system linkers and runs much faster than them. It also provides features that are useful for toolchain developers. The linker supports ELF (Unix), PE/COFF (Windows), Mach-O (macOS) and WebAssembly in descending order.
248 |
249 | [TinyGo](https://tinygo.org/) is a Go compiler(based on LLVM) intended for use in small places such as microcontrollers, WebAssembly (Wasm), and command-line tools.
250 |
251 | [FileCheck](https://llvm.org/docs/CommandGuide/FileCheck.html) is a flexible pattern matching file verifier.
252 |
253 | [tblgen](https://llvm.org/docs/CommandGuide/tblgen.html) is a description to C++ Code.
254 |
255 | [clang-tblgen](https://llvm.org/docs/CommandGuide/clang-tblgen.html) is a description to C++ Code for Clang.
256 |
257 | [lldb-tblgen](https://llvm.org/docs/CommandGuide/lldb-tblgen.html) is a description to C++ Code for LLDB.
258 |
259 | [llvm-tblgen](https://llvm.org/docs/CommandGuide/llvm-tblgen.html) is a target description to C++ Code for LLVM.
260 |
261 | [mlir-tblgen](https://llvm.org/docs/CommandGuide/mlir-tblgen.html) is a description to C++ Code for MLIR.
262 |
263 | [lit](https://llvm.org/docs/CommandGuide/lit.html) is a LLVM Integrated Tester.
264 |
265 | [llvm-exegesis](https://llvm.org/docs/CommandGuide/llvm-exegesis.html) is a LLVM Machine Instruction Benchmark.
266 |
267 | [llvm-locstats](https://llvm.org/docs/CommandGuide/llvm-locstats.html) is a calculate statistics on DWARF debug location.
268 |
269 | [llvm-pdbutil](https://llvm.org/docs/CommandGuide/llvm-pdbutil.html) is a PDB File forensics and diagnostics.
270 |
271 | [llvm-profgen](https://llvm.org/docs/CommandGuide/llvm-profgen.html) is a LLVM SPGO profile generation tool
272 |
273 | [bugpoint](https://llvm.org/docs/CommandGuide/bugpoint.html) is a automatic test case reduction tool.
274 |
275 | [llvm-extract](https://llvm.org/docs/CommandGuide/llvm-extract.html) is a extract a function from an LLVM module.
276 |
277 | [llvm-bcanalyzer](https://llvm.org/docs/CommandGuide/llvm-bcanalyzer.html) is a LLVM bitcode analyzer.
278 |
279 | [llvm-addr2line](https://llvm.org/docs/CommandGuide/llvm-addr2line.html) is a drop-in replacement for addr2line.
280 |
281 | [llvm-ar](https://llvm.org/docs/CommandGuide/llvm-ar.html) is a LLVM archiver.
282 |
283 | [llvm-cxxfilt](https://llvm.org/docs/CommandGuide/llvm-cxxfilt.html) is a LLVM symbol name demangler.
284 |
285 | [llvm-install-name-tool](https://llvm.org/docs/CommandGuide/llvm-install-name-tool.html) is a LLVM tool for manipulating install-names and rpaths.
286 |
287 | [llvm-nm](https://llvm.org/docs/CommandGuide/llvm-nm.html) is a list LLVM bitcode and object file’s symbol table.
288 |
289 | [llvm-objcopy](https://llvm.org/docs/CommandGuide/llvm-objcopy.html) is a object copying and editing tool.
290 |
291 | [llvm-objdump](https://llvm.org/docs/CommandGuide/llvm-objdump.html) is a LLVM’s object file dumper.
292 |
293 | [llvm-ranlib](https://llvm.org/docs/CommandGuide/llvm-ranlib.html) is a generates an archive index.
294 |
295 | [llvm-readelf](https://llvm.org/docs/CommandGuide/llvm-readelf.html) is a GNU-style LLVM Object Reader.
296 |
297 | [llvm-size](https://llvm.org/docs/CommandGuide/llvm-size.html) is a print size information.
298 |
299 | [llvm-strings](https://llvm.org/docs/CommandGuide/llvm-strings.html) is a print strings.
300 |
301 | [llvm-strip](https://llvm.org/docs/CommandGuide/llvm-strip.html) is a object stripping tool.
302 |
303 | # GO Development
304 | [Back to the Top](https://github.com/mikeroyal/eBPF-Guide#table-of-contents)
305 |
306 |
307 |
308 |
309 |
310 |
311 | ## Go Learning Resources
312 |
313 | [Go](https://golang.org/) is an open source programming language that makes it easy to build simple, reliable, and efficient software.
314 |
315 | [Golang Contribution Guide](https://golang.org/doc/contribute.html)
316 |
317 | [Google Developers Training](https://developers.google.com/training/)
318 |
319 | [Google Developers Certification](https://developers.google.com/certification/)
320 |
321 | [Uber's Go Style Guide](https://github.com/uber-go/guide/blob/master/style.md)
322 |
323 | [GitLab's Go standards and style guidelines](https://docs.gitlab.com/ee/development/go_guide/)
324 |
325 | [Effective Go](https://golang.org/doc/effective_go.html)
326 |
327 | [Go: The Complete Developer's Guide (Golang) on Udemy](https://www.udemy.com/course/go-the-complete-developers-guide/)
328 |
329 | [Getting Started with Go on Coursera](https://www.coursera.org/learn/golang-getting-started)
330 |
331 | [Programming with Google Go on Coursera](https://www.coursera.org/specializations/google-golang)
332 |
333 | [Learning Go Fundamentals on Pluralsight](https://www.pluralsight.com/courses/go-fundamentals)
334 |
335 | [Learning Go on Codecademy](https://www.codecademy.com/learn/learn-go)
336 |
337 | ## Go Tools and Frameworks
338 |
339 | [golang tools](https://pkg.go.dev/golang.org/x/tools) holds the source for various packages and tools that support the Go programming language.
340 |
341 | [Go in Visual Studio Code](https://code.visualstudio.com/docs/languages/go) is an extension that gives you language features like IntelliSense, code navigation, symbol search, bracket matching, snippets, and many more that will help you in Golang development.
342 |
343 | [Traefik](https://github.com/traefik/traefik) is a modern HTTP reverse proxy and load balancer that makes deploying microservices easy. Traefik integrates with your existing infrastructure components (Docker, Swarm mode, Kubernetes, Marathon, Consul, Etcd, Rancher, Amazon ECS, etc.) and configures itself automatically and dynamically. Pointing Traefik at your orchestrator should be the only configuration step you need.
344 |
345 | [Gitea](https://github.com/go-gitea/gitea) is Git with a cup of tea, painless self-hosted git service. Using Go, this can be done with an independent binary distribution across all platforms which Go supports, including Linux, macOS, and Windows on x86, amd64, ARM and PowerPC architectures.
346 |
347 | [OpenFaaS](https://github.com/openfaas/faas) is Serverless Functions Made Simple. It makes it easy for developers to deploy event-driven functions and microservices to Kubernetes without repetitive, boiler-plate coding. Package your code or an existing binary in a Docker image to get a highly scalable endpoint with auto-scaling and metrics.
348 |
349 | [micro](https://github.com/zyedidia/micro) is a terminal-based text editor that aims to be easy to use and intuitive, while also taking advantage of the capabilities of modern terminals. As its name indicates, micro aims to be somewhat of a successor to the nano editor by being easy to install and use. It strives to be enjoyable as a full-time editor for people who prefer to work in a terminal, or those who regularly edit files over SSH.
350 |
351 | [Gravitational Teleport](https://github.com/gravitational/teleport) is a modern security gateway for remotely accessing into Clusters of Linux servers via SSH or SSH-over-HTTPS in a browser or Kubernetes clusters.
352 |
353 | [NATS](https://nats.io/) is a simple, secure and performant communications system for digital systems, services and devices. NATS is part of the Cloud Native Computing Foundation (CNCF). NATS has over 30 client language implementations, and its server can run on-premise, in the cloud, at the edge, and even on a Raspberry Pi. NATS can secure and simplify design and operation of modern distributed systems.
354 |
355 | [Act](https://github.com/nektos/act) is a GO program that allows you to run our GitHub Actions locally.
356 |
357 | [Fiber](https://gofiber.io/) is an [Express](https://github.com/expressjs/express) inspired web framework built on top of [Fasthttp](https://github.com/valyala/fasthttp), the fastest HTTP engine for Go. Designed to ease things up for fast development with zero memory allocation and performance in mind.
358 |
359 | [Glide](https://github.com/Masterminds/glide) is a vendor Package Management for Golang.
360 |
361 | [BadgerDB](https://github.com/dgraph-io/badger) is an embeddable, persistent and fast key-value (KV) database written in pure Go. It is the underlying database for [Dgraph](https://dgraph.io/), a fast, distributed graph database. It's meant to be a performant alternative to non-Go-based key-value stores like RocksDB.
362 |
363 | [Go kit](https://github.com/go-kit/kit) is a programming toolkit for building microservices (or elegant monoliths) in Go. We solve common problems in distributed systems and application architecture so you can focus on delivering business value.
364 |
365 | [Codis](https://github.com/CodisLabs/codis) is a proxy based high performance Redis cluster solution written in Go.
366 |
367 | [zap](https://github.com/uber-go/zap) is a blazing fast, structured, leveled logging in Go.
368 |
369 | [HttpRouter](https://github.com/julienschmidt/httprouter) is a lightweight high performance HTTP request router (also called multiplexer or just mux for short) for Go.
370 |
371 | [Gorilla WebSocket](https://github.com/gorilla/websocket) is a Go implementation of the WebSocket protocol.
372 |
373 | [Delve](https://github.com/go-delve/delve) is a debugger for the Go programming language.
374 |
375 | [GORM](https://github.com/go-gorm/gorm) is a fantastic ORM library for Golang, aims to be developer friendly.
376 |
377 | [Go Patterns](https://github.com/tmrts/go-patterns) is a curated collection of idiomatic design & application patterns for Go language.
378 |
379 | # C/C++ Development
380 | [Back to the Top](https://github.com/mikeroyal/eBPF-Guide#table-of-contents)
381 |
382 |
383 |
384 |
385 |
386 |
387 | ## C/C++ Learning Resources
388 |
389 | [C++](https://www.cplusplus.com/doc/tutorial/) is a cross-platform language that can be used to build high-performance applications developed by Bjarne Stroustrup, as an extension to the C language.
390 |
391 | [C](https://www.iso.org/standard/74528.html) is a general-purpose, high-level language that was originally developed by Dennis M. Ritchie to develop the UNIX operating system at Bell Labs. It supports structured programming, lexical variable scope, and recursion, with a static type system. C also provides constructs that map efficiently to typical machine instructions, which makes it one was of the most widely used programming languages today.
392 |
393 | [Embedded C](https://en.wikipedia.org/wiki/Embedded_C) is a set of language extensions for the C programming language by the [C Standards Committee](https://isocpp.org/std/the-committee) to address issues that exist between C extensions for different [embedded systems](https://en.wikipedia.org/wiki/Embedded_system). The extensions hep enhance microprocessor features such as fixed-point arithmetic, multiple distinct memory banks, and basic I/O operations. This makes Embedded C the most popular embedded software language in the world.
394 |
395 | [C & C++ Developer Tools from JetBrains](https://www.jetbrains.com/cpp/)
396 |
397 | [Open source C++ libraries on cppreference.com](https://en.cppreference.com/w/cpp/links/libs)
398 |
399 | [C++ Graphics libraries](https://cpp.libhunt.com/libs/graphics)
400 |
401 | [C++ Libraries in MATLAB](https://www.mathworks.com/help/matlab/call-cpp-library-functions.html)
402 |
403 | [C++ Tools and Libraries Articles](https://www.cplusplus.com/articles/tools/)
404 |
405 | [Google C++ Style Guide](https://google.github.io/styleguide/cppguide.html)
406 |
407 | [Introduction C++ Education course on Google Developers](https://developers.google.com/edu/c++/)
408 |
409 | [C++ style guide for Fuchsia](https://fuchsia.dev/fuchsia-src/development/languages/c-cpp/cpp-style)
410 |
411 | [C and C++ Coding Style Guide by OpenTitan](https://docs.opentitan.org/doc/rm/c_cpp_coding_style/)
412 |
413 | [Chromium C++ Style Guide](https://chromium.googlesource.com/chromium/src/+/master/styleguide/c++/c++.md)
414 |
415 | [C++ Core Guidelines](https://github.com/isocpp/CppCoreGuidelines/blob/master/CppCoreGuidelines.md)
416 |
417 | [C++ Style Guide for ROS](http://wiki.ros.org/CppStyleGuide)
418 |
419 | [Learn C++](https://www.learncpp.com/)
420 |
421 | [Learn C : An Interactive C Tutorial](https://www.learn-c.org/)
422 |
423 | [C++ Institute](https://cppinstitute.org/free-c-and-c-courses)
424 |
425 | [C++ Online Training Courses on LinkedIn Learning](https://www.linkedin.com/learning/topics/c-plus-plus)
426 |
427 | [C++ Tutorials on W3Schools](https://www.w3schools.com/cpp/default.asp)
428 |
429 | [Learn C Programming Online Courses on edX](https://www.edx.org/learn/c-programming)
430 |
431 | [Learn C++ with Online Courses on edX](https://www.edx.org/learn/c-plus-plus)
432 |
433 | [Learn C++ on Codecademy](https://www.codecademy.com/learn/learn-c-plus-plus)
434 |
435 | [Coding for Everyone: C and C++ course on Coursera](https://www.coursera.org/specializations/coding-for-everyone)
436 |
437 | [C++ For C Programmers on Coursera](https://www.coursera.org/learn/c-plus-plus-a)
438 |
439 | [Top C Courses on Coursera](https://www.coursera.org/courses?query=c%20programming)
440 |
441 | [C++ Online Courses on Udemy](https://www.udemy.com/topic/c-plus-plus/)
442 |
443 | [Top C Courses on Udemy](https://www.udemy.com/topic/c-programming/)
444 |
445 | [Basics of Embedded C Programming for Beginners on Udemy](https://www.udemy.com/course/embedded-c-programming-for-embedded-systems/)
446 |
447 | [C++ For Programmers Course on Udacity](https://www.udacity.com/course/c-for-programmers--ud210)
448 |
449 | [C++ Fundamentals Course on Pluralsight](https://www.pluralsight.com/courses/learn-program-cplusplus)
450 |
451 | [Introduction to C++ on MIT Free Online Course Materials](https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-096-introduction-to-c-january-iap-2011/)
452 |
453 | [Introduction to C++ for Programmers | Harvard ](https://online-learning.harvard.edu/course/introduction-c-programmers)
454 |
455 | [Online C Courses | Harvard University](https://online-learning.harvard.edu/subject/c)
456 |
457 |
458 | ## C/C++ Tools and Frameworks
459 |
460 | [AWS SDK for C++](https://aws.amazon.com/sdk-for-cpp/)
461 |
462 | [Azure SDK for C++](https://github.com/Azure/azure-sdk-for-cpp)
463 |
464 | [Azure SDK for C](https://github.com/Azure/azure-sdk-for-c)
465 |
466 | [C++ Client Libraries for Google Cloud Services](https://github.com/googleapis/google-cloud-cpp)
467 |
468 | [Visual Studio](https://visualstudio.microsoft.com/) is an integrated development environment (IDE) from Microsoft; which is a feature-rich application that can be used for many aspects of software development. Visual Studio makes it easy to edit, debug, build, and publish your app. By using Microsoft software development platforms such as Windows API, Windows Forms, Windows Presentation Foundation, and Windows Store.
469 |
470 | [Visual Studio Code](https://code.visualstudio.com/) is a code editor redefined and optimized for building and debugging modern web and cloud applications.
471 |
472 | [Vcpkg](https://github.com/microsoft/vcpkg) is a C++ Library Manager for Windows, Linux, and MacOS.
473 |
474 | [ReSharper C++](https://www.jetbrains.com/resharper-cpp/features/) is a Visual Studio Extension for C++ developers developed by JetBrains.
475 |
476 | [AppCode](https://www.jetbrains.com/objc/) is constantly monitoring the quality of your code. It warns you of errors and smells and suggests quick-fixes to resolve them automatically. AppCode provides lots of code inspections for Objective-C, Swift, C/C++, and a number of code inspections for other supported languages. All code inspections are run on the fly.
477 |
478 | [CLion](https://www.jetbrains.com/clion/features/) is a cross-platform IDE for C and C++ developers developed by JetBrains.
479 |
480 | [Code::Blocks](https://www.codeblocks.org/) is a free C/C++ and Fortran IDE built to meet the most demanding needs of its users. It is designed to be very extensible and fully configurable. Built around a plugin framework, Code::Blocks can be extended with plugins.
481 |
482 | [CppSharp](https://github.com/mono/CppSharp) is a tool and set of libraries which facilitates the usage of native C/C++ code with the .NET ecosystem. It consumes C/C++ header and library files and generates the necessary glue code to surface the native API as a managed API. Such an API can be used to consume an existing native library in your managed code or add managed scripting support to a native codebase.
483 |
484 | [Conan](https://conan.io/) is an Open Source Package Manager for C++ development and dependency management into the 21st century and on par with the other development ecosystems.
485 |
486 | [High Performance Computing (HPC) SDK](https://developer.nvidia.com/hpc) is a comprehensive toolbox for GPU accelerating HPC modeling and simulation applications. It includes the C, C++, and Fortran compilers, libraries, and analysis tools necessary for developing HPC applications on the NVIDIA platform.
487 |
488 | [Thrust](https://github.com/NVIDIA/thrust) is a C++ parallel programming library which resembles the C++ Standard Library. Thrust's high-level interface greatly enhances programmer productivity while enabling performance portability between GPUs and multicore CPUs. Interoperability with established technologies such as CUDA, TBB, and OpenMP integrates with existing software.
489 |
490 | [Boost](https://www.boost.org/) is an educational opportunity focused on cutting-edge C++. Boost has been a participant in the annual Google Summer of Code since 2007, in which students develop their skills by working on Boost Library development.
491 |
492 | [Automake](https://www.gnu.org/software/automake/) is a tool for automatically generating Makefile.in files compliant with the GNU Coding Standards. Automake requires the use of GNU Autoconf.
493 |
494 | [Cmake](https://cmake.org/) is an open-source, cross-platform family of tools designed to build, test and package software. CMake is used to control the software compilation process using simple platform and compiler independent configuration files, and generate native makefiles and workspaces that can be used in the compiler environment of your choice.
495 |
496 | [GDB](http://www.gnu.org/software/gdb/) is a debugger, that allows you to see what is going on `inside' another program while it executes or what another program was doing at the moment it crashed.
497 |
498 | [GCC](https://gcc.gnu.org/) is a compiler Collection that includes front ends for C, C++, Objective-C, Fortran, Ada, Go, and D, as well as libraries for these languages.
499 |
500 | [GSL](https://www.gnu.org/software/gsl/) is a numerical library for C and C++ programmers. It is free software under the GNU General Public License. The library provides a wide range of mathematical routines such as random number generators, special functions and least-squares fitting. There are over 1000 functions in total with an extensive test suite.
501 |
502 | [OpenGL Extension Wrangler Library (GLEW)](https://www.opengl.org/sdk/libs/GLEW/) is a cross-platform open-source C/C++ extension loading library. GLEW provides efficient run-time mechanisms for determining which OpenGL extensions are supported on the target platform.
503 |
504 | [Libtool](https://www.gnu.org/software/libtool/) is a generic library support script that hides the complexity of using shared libraries behind a consistent, portable interface. To use Libtool, add the new generic library building commands to your Makefile, Makefile.in, or Makefile.am.
505 |
506 | [Maven](https://maven.apache.org/) is a software project management and comprehension tool. Based on the concept of a project object model (POM), Maven can manage a project's build, reporting and documentation from a central piece of information.
507 |
508 | [TAU (Tuning And Analysis Utilities)](http://www.cs.uoregon.edu/research/tau/home.php) is capable of gathering performance information through instrumentation of functions, methods, basic blocks, and statements as well as event-based sampling. All C++ language features are supported including templates and namespaces.
509 |
510 | [Clang](https://clang.llvm.org/) is a production quality C, Objective-C, C++ and Objective-C++ compiler when targeting X86-32, X86-64, and ARM (other targets may have caveats, but are usually easy to fix). Clang is used in production to build performance-critical software like Google Chrome or Firefox.
511 |
512 | [OpenCV](https://opencv.org/) is a highly optimized library with focus on real-time applications. Cross-Platform C++, Python and Java interfaces support Linux, MacOS, Windows, iOS, and Android.
513 |
514 | [Libcu++](https://nvidia.github.io/libcudacxx) is the NVIDIA C++ Standard Library for your entire system. It provides a heterogeneous implementation of the C++ Standard Library that can be used in and between CPU and GPU code.
515 |
516 | [ANTLR (ANother Tool for Language Recognition)](https://www.antlr.org/) is a powerful parser generator for reading, processing, executing, or translating structured text or binary files. It's widely used to build languages, tools, and frameworks. From a grammar, ANTLR generates a parser that can build parse trees and also generates a listener interface that makes it easy to respond to the recognition of phrases of interest.
517 |
518 | [Oat++](https://oatpp.io/) is a light and powerful C++ web framework for highly scalable and resource-efficient web application. It's zero-dependency and easy-portable.
519 |
520 | [JavaCPP](https://github.com/bytedeco/javacpp) is a program that provides efficient access to native C++ inside Java, not unlike the way some C/C++ compilers interact with assembly language.
521 |
522 | [Cython](https://cython.org/) is a language that makes writing C extensions for Python as easy as Python itself. Cython is based on Pyrex, but supports more cutting edge functionality and optimizations such as calling C functions and declaring C types on variables and class attributes.
523 |
524 | [Spdlog](https://github.com/gabime/spdlog) is a very fast, header-only/compiled, C++ logging library.
525 |
526 | [Infer](https://fbinfer.com/) is a static analysis tool for Java, C++, Objective-C, and C. Infer is written in [OCaml](https://ocaml.org/).
527 |
528 | # Rust Development
529 | [Back to the Top](https://github.com/mikeroyal/eBPF-Guide#table-of-contents)
530 |
531 |
532 |
533 |
534 |
535 |
536 | ## Rust Learning Resources
537 |
538 | [Rust](https://www.rust-lang.org) is a multi-paradigm programming language focused on performance and safety. Rust has a comparable amount of runtime to C and C++, and has set up its standard library to be amenable towards OS development. Specifically, the standard library is split into two parts: core and std. Core is the lowest-level aspects only, and doesn't include things like allocation, threading, and other higher-level features.
539 |
540 | [The Rust Language Reference](https://doc.rust-lang.org/nightly/reference/)
541 |
542 | [The Rust Programming Language Book](https://doc.rust-lang.org/book/)
543 |
544 | [Learning Rust](https://www.rust-lang.org/learn)
545 |
546 | [Why AWS loves Rust](https://aws.amazon.com/blogs/opensource/why-aws-loves-rust-and-how-wed-like-to-help/)
547 |
548 | [Rust Programming courses on Udemy](https://www.udemy.com/courses/search/?src=ukw&q=Rust)
549 |
550 | [Safety in Systems Programming with Rust at Standford by Ryan Eberhardt](https://reberhardt.com/blog/2020/10/05/designing-a-new-class-at-stanford-safety-in-systems-programming.html)
551 |
552 | [WebAssembly meets Kubernetes with Krustlet using Rust](https://cloudblogs.microsoft.com/opensource/2020/04/07/announcing-krustlet-kubernetes-rust-kubelet-webassembly-wasm/)
553 |
554 | [Microsoft's Project Verona](https://github.com/microsoft/verona/blob/master/docs/explore.md)
555 |
556 | ## Rust Tools and Frameworks
557 |
558 | [Cargo](https://github.com/rust-lang/cargo) is a package manager that downloads your Rust project’s dependencies and compiles your project.
559 |
560 | [Crater](https://crater.rust-lang.org/) is a tool to run experiments across parts of the Rust ecosystem. Its primary purpose is to detect regressions in the Rust compiler, and it does this by building a large number of crates, running their test suites and comparing the results between two versions of the Rust compiler. It can operate locally (with Docker as the only dependency) or distributed on the cloud. It can operate locally (with Docker as the only dependency) or distributed on the cloud.
561 |
562 | [VSCode-Rust](https://github.com/rust-lang/vscode-rust) is plugin that adds language support for Rust to Visual Studio Code. Rust support is powered by a separate language server - either by the official Rust Language Server (RLS) or rust-analyzer, depending on the user's preference. If you don't have it installed, the extension will install it for you (with permission). This extension is built and maintained by the Rust IDEs and editors team with the focus on providing a stable, high quality extension that makes the best use of the respective language server.
563 |
564 | [Apache Arrow](https://github.com/apache/arrow) is a development platform for in-memory analytics. It contains a set of technologies that enable big data systems to process and move data fast. Arrow's libraries are available for C, C++, C#, Go, Java, JavaScript, MATLAB, Python, R, Ruby, and Rust.
565 |
566 | [Wasmer](https://wasmer.io/) enables super lightweight containers based on [WebAssembly](https://webassembly.org/) that can run anywhere such as the Desktop to the Cloud and IoT devices, and also embedded in [any programming language](https://github.com/wasmerio/wasmer#language-integrations).
567 |
568 | [Firecracker](https://firecracker-microvm.github.io) is an open source virtualization technology that is purpose-built for creating and managing secure, multi-tenant container and function-based services that provide serverless operational models. Firecracker runs workloads in lightweight virtual machines, called microVMs, which combine the security and isolation properties provided by hardware virtualization technology with the speed and flexibility of containers. Firecracker has also been integrated in container runtimes, for example [Kata Containers](https://github.com/kata-containers/documentation/wiki/Initial-release-of-Kata-Containers-with-Firecracker-support) and [Weaveworks Ignite](https://github.com/weaveworks/ignite).
569 |
570 | [Tokio](https://github.com/tokio-rs/tokio) is an event-driven, non-blocking I/O platform for writing asynchronous applications with the Rust programming language.
571 |
572 | [TiKV](https://github.com/tikv/tikv) is an open-source distributed transactional key-value database that also provides classical key-vlue APIs, but also transactional APIs with ACID compliance.
573 |
574 | [Sonic](https://crates.io/crates/sonic-server) is a fast, lightweight and schema-less search backend similar to Elasticsearch in some use-cases.
575 |
576 | [Hyper](https://github.com/hyperium/hyper) is a fast and correct HTTP library for Rust.
577 |
578 | [Rocket](https://github.com/SergioBenitez/Rocket) is an async web framework for Rust with a focus on usability, security, extensibility, and speed.
579 |
580 | [Clippy](https://rust-lang.github.io/rust-clippy/) is a collection of lints to catch common mistakes and improve your Rust code.
581 |
582 | [Servo](https://github.com/servo/servo) is a prototype web browser engine written in the Rust language.
583 |
584 | [Vector](https://vector.dev/) is a high-performance, end-to-end (agent & aggregator) observability data platform that puts the user in control of their observability data.
585 |
586 | [RustPython](https://github.com/RustPython/RustPython) is a Python Interpreter written in Rust.
587 |
588 | [Miri](https://github.com/rust-lang/miri) is an interpreter for Rust's mid-level intermediate representation. It can run binaries and test suites of cargo projects and detect certain classes of undefined behavior. Miri will alsowill also tell you about memory leaks: when there is memory still allocated at the end of the execution, and that memory is not reachable from a global static, Miri will raise an error.
589 |
590 | [Chalk](https://rust-lang.github.io/chalk/book/) is an implementation and definition of the Rust trait system using a PROLOG-like logic solver.
591 |
592 | [stdarch](https://doc.rust-lang.org/stable/core/arch/) is Rust's standard library vendor-specific APIs and run-time feature detection.
593 |
594 | [Simpleinfra](https://github.com/rust-lang/simpleinfra) is rep that contains the tools and automation written by the Rust infrastructure team to manage our services. Using some of the tools in this repo require privileges only infra team members have.
595 |
596 | [Rustlings](https://github.com/rust-lang/rustlings) is a small set of exercises to get you used to reading and writing Rust code.
597 |
598 | [Krustlet](https://krustlet.dev/) acts as a Kubernetes Kubelet(written in Rust) by listening on the event stream for new pods that the scheduler assigns to it based on specific Kubernetes [tolerations](https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/). The project is currently experimental.
599 |
600 | ## Rust-based Operating Systems
601 |
602 | [Redox](https://www.redox-os.org) is a Unix-like Operating System written in Rust, aiming to bring the innovations of Rust to a modern microkernel and full set of applications. Acitvely being developed by [Jeremy Soeller](https://gitlab.redox-os.org/jackpot51).
603 |
604 | [Bottlerocket OS](https://github.com/bottlerocket-os/bottlerocket) is an open-source Linux-based operating system meant for hosting containers. Bottlerocket focuses on security and maintainability, providing a reliable, consistent, and safe platform for container-based workloads.
605 |
606 | [Tock](https://www.tockos.org) is an embedded operating system designed for running multiple concurrent, mutually distrustful applications on Cortex-M and RISC-V based embedded platforms. Tock's design centers around protection, both from potentially malicious applications and from device drivers. Tock uses two mechanisms to protect different components of the operating system. First, the kernel and device drivers are written in Rust, a systems programming language that provides compile-time memory safety, type safety and strict aliasing. Tock uses Rust to protect the kernel (the scheduler and hardware abstraction layer) from platform specific device drivers as well as isolate device drivers from each other. Second, Tock uses memory protection units to isolate applications from each other and the kernel.
607 |
608 | [Rust on Chrome OS](https://chromium.googlesource.com/chromiumos/docs/+/master/rust_on_cros.md) is a document that provides information on creating Rust projects for installation within Chrome OS and Chrome OS SDK.
609 |
610 | [Writing an OS in Rust ](https://os.phil-opp.com) is a blog series creates a small operating system in the Rust programming language by [Philipp Oppermann](https://github.com/phil-opp).
611 |
612 | # Networking
613 | [Back to the Top](https://github.com/mikeroyal/eBPF-Guide#table-of-contents)
614 |
615 |
616 |
617 |
618 |
619 |
620 | ## Network Learning Resources
621 |
622 | [AWS Certified Security - Specialty Certification](https://aws.amazon.com/certification/certified-security-specialty/)
623 |
624 | [Microsoft Certified: Azure Security Engineer Associate](https://docs.microsoft.com/en-us/learn/certifications/azure-security-engineer)
625 |
626 | [Google Cloud Certified Professional Cloud Security Engineer](https://cloud.google.com/certification/cloud-security-engineer)
627 |
628 | [Cisco Security Certifications](https://www.cisco.com/c/en/us/training-events/training-certifications/certifications/security.html)
629 |
630 | [The Red Hat Certified Specialist in Security: Linux](https://www.redhat.com/en/services/training/ex415-red-hat-certified-specialist-security-linux-exam)
631 |
632 | [Linux Professional Institute LPIC-3 Enterprise Security Certification](https://www.lpi.org/our-certifications/lpic-3-303-overview)
633 |
634 | [Cybersecurity Training and Courses from IBM Skills](https://www.ibm.com/skills/topics/cybersecurity/)
635 |
636 | [Cybersecurity Courses and Certifications by Offensive Security](https://www.offensive-security.com/courses-and-certifications/)
637 |
638 | [Citrix Certified Associate – Networking(CCA-N)](http://training.citrix.com/cms/index.php/certification/networking/)
639 |
640 | [Citrix Certified Professional – Virtualization(CCP-V)](https://www.globalknowledge.com/us-en/training/certification-prep/brands/citrix/section/virtualization/citrix-certified-professional-virtualization-ccp-v/)
641 |
642 | [CCNP Routing and Switching](https://learningnetwork.cisco.com/s/ccnp-enterprise)
643 |
644 | [Certified Information Security Manager(CISM)](https://www.isaca.org/credentialing/cism)
645 |
646 | [Wireshark Certified Network Analyst (WCNA)](https://www.wiresharktraining.com/certification.html)
647 |
648 | [Juniper Networks Certification Program Enterprise (JNCP)](https://www.juniper.net/us/en/training/certification/)
649 |
650 | [Networking courses and specializations from Coursera](https://www.coursera.org/browse/information-technology/networking)
651 |
652 | [Network & Security Courses from Udemy](https://www.udemy.com/courses/it-and-software/network-and-security/)
653 |
654 | [Network & Security Courses from edX](https://www.edx.org/learn/cybersecurity)
655 |
656 | ## Networking Tools & Concepts
657 |
658 | [Qt Network Authorization](https://doc.qt.io/qt-6/qtnetworkauth-index.html) is a tool that provides a set of APIs that enable Qt applications to obtain limited access to online accounts and HTTP services without exposing users' passwords.
659 |
660 | [cURL](https://curl.se/) is a computer software project providing a library and command-line tool for transferring data using various network protocols(HTTP, HTTPS, FTP, FTPS, SCP, SFTP, TFTP, DICT, TELNET, LDAP LDAPS, MQTT, POP3, POP3S, RTMP, RTMPS, RTSP, SCP, SFTP, SMB, SMBS, SMTP or SMTPS). cURL is also used in cars, television sets, routers, printers, audio equipment, mobile phones, tablets, settop boxes, media players and is the Internet transfer engine for thousands of software applications in over ten billion installations.
661 |
662 | [cURL Fuzzer](https://github.com/curl/curl-fuzzer) is a quality assurance testing for the curl project.
663 |
664 | [DoH](https://github.com/curl/doh) is a stand-alone application for DoH (DNS-over-HTTPS) name resolves and lookups.
665 |
666 | [Authelia](https://www.authelia.com/) is an open-source highly-available authentication server providing single sign-on capability and two-factor authentication to applications running behind [NGINX](https://nginx.org/en/).
667 |
668 | [nginx(engine x)](https://nginx.org/en/) is an HTTP and reverse proxy server, a mail proxy server, and a generic TCP/UDP proxy server, originally written by Igor Sysoev.
669 |
670 | [Proxmox Virtual Environment(VE)](https://www.proxmox.com/en/) is a complete open-source platform for enterprise virtualization. It inlcudes a built-in web interface that you can easily manage VMs and containers, software-defined storage and networking, high-availability clustering, and multiple out-of-the-box tools on a single solution.
671 |
672 | [Wireshark](https://www.wireshark.org/) is a very popular network protocol analyzer that is commonly used for network troubleshooting, analysis, and communications protocol development. Learn more about the other useful [Wireshark Tools](https://wiki.wireshark.org/Tools) available.
673 |
674 | [HTTPie](https://github.com/httpie/httpie) is a command-line HTTP client. Its goal is to make CLI interaction with web services as human-friendly as possible. HTTPie is designed for testing, debugging, and generally interacting with APIs & HTTP servers.
675 |
676 | [HTTPStat](https://github.com/reorx/httpstat) is a tool that visualizes curl statistics in a simple layout.
677 |
678 | [Wuzz](https://github.com/asciimoo/wuzz) is an interactive cli tool for HTTP inspection. It can be used to inspect/modify requests copied from the browser's network inspector with the "copy as cURL" feature.
679 |
680 | [Websocat](https://github.com/vi/websocat) is a ommand-line client for WebSockets, like netcat (or curl) for ws:// with advanced socat-like functions.
681 |
682 | - Connection: In networking, a connection refers to pieces of related information that are transferred through a network. This generally infers that a connection is built before the data transfer (by following the procedures laid out in a protocol) and then is deconstructed at the at the end of the data transfer.
683 |
684 | - Packet: A packet is, generally speaking, the most basic unit that is transferred over a network. When communicating over a network, packets are the envelopes that carry your data (in pieces) from one end point to the other.
685 |
686 | Packets have a header portion that contains information about the packet including the source and destination, timestamps, network hops. The main portion of a packet contains the actual data being transferred. It is sometimes called the body or the payload.
687 |
688 | - Network Interface: A network interface can refer to any kind of software interface to networking hardware. For instance, if you have two network cards in your computer, you can control and configure each network interface associated with them individually.
689 |
690 | A network interface may be associated with a physical device, or it may be a representation of a virtual interface. The "loop-back" device, which is a virtual interface to the local machine, is an example of this.
691 |
692 | - LAN: LAN stands for "local area network". It refers to a network or a portion of a network that is not publicly accessible to the greater internet. A home or office network is an example of a LAN.
693 |
694 | - WAN: WAN stands for "wide area network". It means a network that is much more extensive than a LAN. While WAN is the relevant term to use to describe large, dispersed networks in general, it is usually meant to mean the internet, as a whole.
695 | If an interface is connected to the WAN, it is generally assumed that it is reachable through the internet.
696 |
697 | - Protocol: A protocol is a set of rules and standards that basically define a language that devices can use to communicate. There are a great number of protocols in use extensively in networking, and they are often implemented in different layers.
698 |
699 | Some low level protocols are TCP, UDP, IP, and ICMP. Some familiar examples of application layer protocols, built on these lower protocols, are HTTP (for accessing web content), SSH, TLS/SSL, and FTP.
700 |
701 | - Port: A port is an address on a single machine that can be tied to a specific piece of software. It is not a physical interface or location, but it allows your server to be able to communicate using more than one application.
702 |
703 | - Firewall: A firewall is a program that decides whether traffic coming into a server or going out should be allowed. A firewall usually works by creating rules for which type of traffic is acceptable on which ports. Generally, firewalls block ports that are not used by a specific application on a server.
704 |
705 | - NAT: Network address translation is a way to translate requests that are incoming into a routing server to the relevant devices or servers that it knows about in the LAN. This is usually implemented in physical LANs as a way to route requests through one IP address to the necessary backend servers.
706 |
707 | - VPN: Virtual private network is a means of connecting separate LANs through the internet, while maintaining privacy. This is used as a means of connecting remote systems as if they were on a local network, often for security reasons.
708 |
709 | ## Network Layers
710 |
711 | While networking is often discussed in terms of topology in a horizontal way, between hosts, its implementation is layered in a vertical fashion throughout a computer or network. This means is that there are multiple technologies and protocols that are built on top of each other in order for communication to function more easily. Each successive, higher layer abstracts the raw data a little bit more, and makes it simpler to use for applications and users. It also allows you to leverage lower layers in new ways without having to invest the time and energy to develop the protocols and applications that handle those types of traffic.
712 |
713 | As data is sent out of one machine, it begins at the top of the stack and filters downwards. At the lowest level, actual transmission to another machine takes place. At this point, the data travels back up through the layers of the other computer. Each layer has the ability to add its own "wrapper" around the data that it receives from the adjacent layer, which will help the layers that come after decide what to do with the data when it is passed off.
714 |
715 | One method of talking about the different layers of network communication is the OSI model. OSI stands for [Open Systems Interconnect](https://en.wikipedia.org/wiki/OSI_model).This model defines seven separate layers. The layers in this model are:
716 |
717 | - Application: The application layer is the layer that the users and user-applications most often interact with. Network communication is discussed in terms of availability of resources, partners to communicate with, and data synchronization.
718 |
719 | - Presentation: The presentation layer is responsible for mapping resources and creating context. It is used to translate lower level networking data into data that applications expect to see.
720 |
721 | - Session: The session layer is a connection handler. It creates, maintains, and destroys connections between nodes in a persistent way.
722 |
723 | - Transport: The transport layer is responsible for handing the layers above it a reliable connection. In this context, reliable refers to the ability to verify that a piece of data was received intact at the other end of the connection. This layer can resend information that has been dropped or corrupted and can acknowledge the receipt of data to remote computers.
724 |
725 | - Network: The network layer is used to route data between different nodes on the network. It uses addresses to be able to tell which computer to send information to. This layer can also break apart larger messages into smaller chunks to be reassembled on the opposite end.
726 |
727 | - Data Link: This layer is implemented as a method of establishing and maintaining reliable links between different nodes or devices on a network using existing physical connections.
728 |
729 | - Physical: The physical layer is responsible for handling the actual physical devices that are used to make a connection. This layer involves the bare software that manages physical connections as well as the hardware itself (like Ethernet).
730 |
731 | The TCP/IP model, more commonly known as the Internet protocol suite, is another layering model that is simpler and has been widely adopted.It defines the four separate layers, some of which overlap with the OSI model:
732 |
733 | - Application: In this model, the application layer is responsible for creating and transmitting user data between applications. The applications can be on remote systems, and should appear to operate as if locally to the end user.
734 | The communication takes place between peers network.
735 |
736 | - Transport: The transport layer is responsible for communication between processes. This level of networking utilizes ports to address different services. It can build up unreliable or reliable connections depending on the type of protocol used.
737 |
738 | - Internet: The internet layer is used to transport data from node to node in a network. This layer is aware of the endpoints of the connections, but does not worry about the actual connection needed to get from one place to another. IP addresses are defined in this layer as a way of reaching remote systems in an addressable manner.
739 |
740 | - Link: The link layer implements the actual topology of the local network that allows the internet layer to present an addressable interface. It establishes connections between neighboring nodes to send data.
741 |
742 | ### Interfaces
743 | **Interfaces** are networking communication points for your computer. Each interface is associated with a physical or virtual networking device. Typically, your server will have one configurable network interface for each Ethernet or wireless internet card you have. In addition, it will define a virtual network interface called the "loopback" or localhost interface. This is used as an interface to connect applications and processes on a single computer to other applications and processes. You can see this referenced as the "lo" interface in many tools.
744 |
745 | ## Network Protocols
746 |
747 | Networking works by piggybacks on a number of different protocols on top of each other. In this way, one piece of data can be transmitted using multiple protocols encapsulated within one another.
748 |
749 | **Media Access Control(MAC)** is a communications protocol that is used to distinguish specific devices. Each device is supposed to get a unique MAC address during the manufacturing process that differentiates it from every other device on the internet. Addressing hardware by the MAC address allows you to reference a device by a unique value even when the software on top may change the name for that specific device during operation. Media access control is one of the only protocols from the link layer that you are likely to interact with on a regular basis.
750 |
751 | **The IP protocol** is one of the fundamental protocols that allow the internet to work. IP addresses are unique on each network and they allow machines to address each other across a network. It is implemented on the internet layer in the IP/TCP model. Networks can be linked together, but traffic must be routed when crossing network boundaries. This protocol assumes an unreliable network and multiple paths to the same destination that it can dynamically change between. There are a number of different implementations of the protocol. The most common implementation today is IPv4, although IPv6 is growing in popularity as an alternative due to the scarcity of IPv4 addresses available and improvements in the protocols capabilities.
752 |
753 | **ICMP: internet control message protocol** is used to send messages between devices to indicate the availability or error conditions. These packets are used in a variety of network diagnostic tools, such as ping and traceroute. Usually ICMP packets are transmitted when a packet of a different kind meets some kind of a problem. Basically, they are used as a feedback mechanism for network communications.
754 |
755 | **TCP: Transmission control protocol** is implemented in the transport layer of the IP/TCP model and is used to establish reliable connections. TCP is one of the protocols that encapsulates data into packets. It then transfers these to the remote end of the connection using the methods available on the lower layers. On the other end, it can check for errors, request certain pieces to be resent, and reassemble the information into one logical piece to send to the application layer. The protocol builds up a connection prior to data transfer using a system called a three-way handshake. This is a way for the two ends of the communication to acknowledge the request and agree upon a method of ensuring data reliability. After the data has been sent, the connection is torn down using a similar four-way handshake. TCP is the protocol of choice for many of the most popular uses for the internet, including WWW, FTP, SSH, and email. It is safe to say that the internet we know today would not be here without TCP.
756 |
757 | **UDP: User datagram protocol** is a popular companion protocol to TCP and is also implemented in the transport layer. The fundamental difference between UDP and TCP is that UDP offers unreliable data transfer. It does not verify that data has been received on the other end of the connection. This might sound like a bad thing, and for many purposes, it is. However, it is also extremely important for some functions. It’s not required to wait for confirmation that the data was received and forced to resend data, UDP is much faster than TCP. It does not establish a connection with the remote host, it simply fires off the data to that host and doesn't care if it is accepted or not. Since UDP is a simple transaction, it is useful for simple communications like querying for network resources. It also doesn't maintain a state, which makes it great for transmitting data from one machine to many real-time clients. This makes it ideal for VOIP, games, and other applications that cannot afford delays.
758 |
759 | **HTTP: Hypertext transfer protocol** is a protocol defined in the application layer that forms the basis for communication on the web. HTTP defines a number of functions that tell the remote system what you are requesting. For instance, GET, POST, and DELETE all interact with the requested data in a different way.
760 |
761 | **FTP: File transfer protocol** is in the application layer and provides a way of transferring complete files from one host to another. It is inherently insecure, so it is not recommended for any externally facing network unless it is implemented as a public, download-only resource.
762 |
763 | **DNS: Domain name system** is an application layer protocol used to provide a human-friendly naming mechanism for internet resources. It is what ties a domain name to an IP address and allows you to access sites by name in your browser.
764 |
765 | **SSH: Secure shell** is an encrypted protocol implemented in the application layer that can be used to communicate with a remote server in a secure way. Many additional technologies are built around this protocol because of its end-to-end encryption and ubiquity. There are many other protocols that we haven't covered that are equally important. However, this should give you a good overview of some of the fundamental technologies that make the internet and networking possible.
766 |
767 | [REST(REpresentational State Transfer)](https://www.codecademy.com/articles/what-is-rest) is an architectural style for providing standards between computer systems on the web, making it easier for systems to communicate with each other.
768 |
769 | [JSON Web Token (JWT)](https://jwt.io) is a compact URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is digitally signed using JSON Web Signature (JWS).
770 |
771 | [OAuth 2.0](https://oauth.net/2/) is an open source authorization framework that enables applications to obtain limited access to user accounts on an HTTP service, such as Amazon, Google, Facebook, Microsoft, Twitter GitHub, and DigitalOcean. It works by delegating user authentication to the service that hosts the user account, and authorizing third-party applications to access the user account.
772 |
773 | # Kubernetes
774 | [Back to the Top](https://github.com/mikeroyal/ebpf-Guide#table-of-contents)
775 |
776 |
777 |
778 |
779 |
780 |
781 | ## Kubernetes Learning Resources
782 |
783 | [Kubernetes (K8s)](https://kubernetes.io/) is an open-source system for automating deployment, scaling, and management of containerized applications.
784 |
785 | [Getting Kubernetes Certifications](https://training.linuxfoundation.org/certification/catalog/?_sft_technology=kubernetes)
786 |
787 | [Getting started with Kubernetes on AWS](https://aws.amazon.com/kubernetes/)
788 |
789 | [Kubernetes on Microsoft Azure](https://azure.microsoft.com/en-us/topic/what-is-kubernetes/)
790 |
791 | [Intro to Azure Kubernetes Service](https://docs.microsoft.com/en-us/azure/aks/kubernetes-dashboard)
792 |
793 | [Azure Red Hat OpenShift ](https://azure.microsoft.com/en-us/services/openshift/)
794 |
795 | [Getting started with Google Cloud](https://cloud.google.com/learn/what-is-kubernetes)
796 |
797 | [Getting started with Kubernetes on Red Hat](https://www.redhat.com/en/topics/containers/what-is-kubernetes)
798 |
799 | [Getting started with Kubernetes on IBM](https://www.ibm.com/cloud/learn/kubernetes)
800 |
801 | [Red Hat OpenShift on IBM Cloud](https://www.ibm.com/cloud/openshift)
802 |
803 | [Enable OpenShift Virtualization on Red Hat OpenShift](https://developers.redhat.com/blog/2020/08/28/enable-openshift-virtualization-on-red-hat-openshift/)
804 |
805 | [YAML basics in Kubernetes](https://developer.ibm.com/technologies/containers/tutorials/yaml-basics-and-usage-in-kubernetes/)
806 |
807 | [Elastic Cloud on Kubernetes](https://www.elastic.co/elastic-cloud-kubernetes)
808 |
809 | [Docker and Kubernetes](https://www.docker.com/products/kubernetes)
810 |
811 | [Running Apache Spark on Kubernetes](http://spark.apache.org/docs/latest/running-on-kubernetes.html)
812 |
813 | [Kubernetes Across VMware vRealize Automation](https://blogs.vmware.com/management/2019/06/kubernetes-across-vmware-cloud-automation-services.html)
814 |
815 | [VMware Tanzu Kubernetes Grid](https://tanzu.vmware.com/kubernetes-grid)
816 |
817 | [All the Ways VMware Tanzu Works with AWS](https://tanzu.vmware.com/content/blog/all-the-ways-vmware-tanzutm-works-with-aws)
818 |
819 | [VMware Tanzu Education](https://tanzu.vmware.com/education)
820 |
821 | [Using Ansible in a Cloud-Native Kubernetes Environment](https://www.ansible.com/blog/how-useful-is-ansible-in-a-cloud-native-kubernetes-environment)
822 |
823 | [Managing Kubernetes (K8s) objects with Ansible](https://docs.ansible.com/ansible/latest/collections/community/kubernetes/k8s_module.html)
824 |
825 | [Setting up a Kubernetes cluster using Vagrant and Ansible](https://kubernetes.io/blog/2019/03/15/kubernetes-setup-using-ansible-and-vagrant/)
826 |
827 | [Running MongoDB with Kubernetes](https://www.mongodb.com/kubernetes)
828 |
829 | [Kubernetes Fluentd](https://docs.fluentd.org/v/0.12/articles/kubernetes-fluentd)
830 |
831 | [Understanding the new GitLab Kubernetes Agent](https://about.gitlab.com/blog/2020/09/22/introducing-the-gitlab-kubernetes-agent/)
832 |
833 | [Intro Local Process with Kubernetes for Visual Studio 2019](https://devblogs.microsoft.com/visualstudio/introducing-local-process-with-kubernetes-for-visual-studio%E2%80%AF2019/)
834 |
835 | [Kubernetes Contributors](https://www.kubernetes.dev/)
836 |
837 | [KubeAcademy from VMware](https://kube.academy/)
838 |
839 | [Kubernetes Tutorials from Pulumi](https://www.pulumi.com/docs/tutorials/kubernetes/)
840 |
841 | [Kubernetes Playground by Katacoda](https://www.katacoda.com/courses/kubernetes/playground)
842 |
843 | [Scalable Microservices with Kubernetes course from Udacity ](https://www.udacity.com/course/scalable-microservices-with-kubernetes--ud615)
844 |
845 | ## Kubernetes Tools, Frameworks, and Projects
846 |
847 | [Open Container Initiative](https://opencontainers.org/about/overview/) is an open governance structure for the express purpose of creating open industry standards around container formats and runtimes.
848 |
849 | [Buildah](https://buildah.io/) is a command line tool to build Open Container Initiative (OCI) images. It can be used with Docker, Podman, Kubernetes.
850 |
851 | [Podman](https://podman.io/) is a daemonless, open source, Linux native tool designed to make it easy to find, run, build, share and deploy applications using Open Containers Initiative (OCI) Containers and Container Images. Podman provides a command line interface (CLI) familiar to anyone who has used the Docker Container Engine.
852 |
853 | [Containerd](https://containerd.io) is a daemon that manages the complete container lifecycle of its host system, from image transfer and storage to container execution and supervision to low-level storage to network attachments and beyond. It is available for Linux and Windows.
854 |
855 | [Google Kubernetes Engine (GKE)](https://cloud.google.com/kubernetes-engine/) is a managed, production-ready environment for running containerized applications.
856 |
857 | [Azure Kubernetes Service (AKS)](https://azure.microsoft.com/en-us/services/kubernetes-service/) is serverless Kubernetes, with a integrated continuous integration and continuous delivery (CI/CD) experience, and enterprise-grade security and governance. Unite your development and operations teams on a single platform to rapidly build, deliver, and scale applications with confidence.
858 |
859 | [Amazon EKS](https://docs.aws.amazon.com/eks/latest/userguide/what-is-eks.html) is a tool that runs Kubernetes control plane instances across multiple Availability Zones to ensure high availability.
860 |
861 | [AWS Controllers for Kubernetes (ACK)](https://aws.amazon.com/blogs/containers/aws-controllers-for-kubernetes-ack/) is a new tool that lets you directly manage AWS services from Kubernetes. ACK makes it simple to build scalable and highly-available Kubernetes applications that utilize AWS services.
862 |
863 | [Container Engine for Kubernetes (OKE)](https://www.oracle.com/cloud-native/container-engine-kubernetes/) is an Oracle-managed container orchestration service that can reduce the time and cost to build modern cloud native applications. Unlike most other vendors, Oracle Cloud Infrastructure provides Container Engine for Kubernetes as a free service that runs on higher-performance, lower-cost compute.
864 |
865 | [Anthos](https://cloud.google.com/anthos/docs/concepts/overview) is a modern application management platform that provides a consistent development and operations experience for cloud and on-premises environments.
866 |
867 | [Red Hat Openshift](https://www.openshift.com/) is a fully managed Kubernetes platform that provides a foundation for on-premises, hybrid, and multicloud deployments.
868 |
869 | [OKD](https://okd.io/) is a community distribution of Kubernetes optimized for continuous application development and multi-tenant deployment. OKD adds developer and operations-centric tools on top of Kubernetes to enable rapid application development, easy deployment and scaling, and long-term lifecycle maintenance for small and large teams.
870 |
871 | [Odo](https://odo.dev/) is a fast, iterative, and straightforward CLI tool for developers who write, build, and deploy applications on Kubernetes and OpenShift.
872 |
873 | [Kata Operator](https://github.com/openshift/kata-operator) is an operator to perform lifecycle management (install/upgrade/uninstall) of [Kata Runtime](https://katacontainers.io/) on Openshift as well as Kubernetes cluster.
874 |
875 | [Thanos](https://thanos.io/) is a set of components that can be composed into a highly available metric system with unlimited storage capacity, which can be added seamlessly on top of existing Prometheus deployments.
876 |
877 | [OpenShift Hive](https://github.com/openshift/hive) is an operator which runs as a service on top of Kubernetes/OpenShift. The Hive service can be used to provision and perform initial configuration of OpenShift 4 clusters.
878 |
879 | [Rook](https://rook.io/) is a tool that turns distributed storage systems into self-managing, self-scaling, self-healing storage services. It automates the tasks of a storage administrator: deployment, bootstrapping, configuration, provisioning, scaling, upgrading, migration, disaster recovery, monitoring, and resource management.
880 |
881 | [VMware Tanzu](https://tanzu.vmware.com/tanzu) is a centralized management platform for consistently operating and securing your Kubernetes infrastructure and modern applications across multiple teams and private/public clouds.
882 |
883 | [Kubespray](https://kubespray.io/) is a tool that combines Kubernetes and Ansible to easily install Kubernetes clusters that can be deployed on [AWS](https://github.com/kubernetes-sigs/kubespray/blob/master/docs/aws.md), GCE, [Azure](https://github.com/kubernetes-sigs/kubespray/blob/master/docs/azure.md), [OpenStack](https://github.com/kubernetes-sigs/kubespray/blob/master/docs/openstack.md), [vSphere](https://github.com/kubernetes-sigs/kubespray/blob/master/docs/vsphere.md), [Packet](https://github.com/kubernetes-sigs/kubespray/blob/master/docs/packet.md) (bare metal), Oracle Cloud Infrastructure (Experimental), or Baremetal.
884 |
885 | [KubeInit](https://github.com/kubeinit/kubeinit) provides Ansible playbooks and roles for the deployment and configuration of multiple Kubernetes distributions.
886 |
887 | [Rancher](https://rancher.com/) is a complete software stack for teams adopting containers. It addresses the operational and security challenges of managing multiple Kubernetes clusters, while providing DevOps teams with integrated tools for running containerized workloads.
888 |
889 | [K3s](https://github.com/rancher/k3s) is a highly available, certified Kubernetes distribution designed for production workloads in unattended, resource-constrained, remote locations or inside IoT appliances.
890 |
891 | [Helm](https://helm.sh/) is a Kubernetes Package Manager tool that makes it easier to install and manage Kubernetes applications.
892 |
893 | [Knative](https://knative.dev/) is a Kubernetes-based platform to build, deploy, and manage modern serverless workloads. Knative takes care of the operational overhead details of networking, autoscaling (even to zero), and revision tracking.
894 |
895 | [KubeFlow](https://www.kubeflow.org/) is a tool dedicated to making deployments of machine learning (ML) workflows on Kubernetes simple, portable and scalable.
896 |
897 | [Kubebox](https://github.com/astefanutti/kubebox) is a Terminal and Web console for Kubernetes.
898 |
899 | [Kubsec](https://github.com/controlplaneio/kubesec) is a Security risk analysis for Kubernetes resources.
900 |
901 | [Replex](https://www.replex.io/) is a Kubernetes Governance and Cost Management for the Cloud-Native Enterprise.
902 |
903 | [Virtual Kubelet](https://virtual-kubelet.io/) is an open-source [Kubernetes kubelet](https://kubernetes.io/docs/reference/generated/kubelet/) implementation that masquerades as a kubelet.
904 |
905 | [Telepresence](https://www.telepresence.io/) is a fast, local development for Kubernetes and OpenShift microservices.
906 |
907 | [Weave Scope](https://www.weave.works/oss/scope/) is a tool that automatically detects processes, containers, hosts. No kernel modules, no agents, no special libraries, no coding. It seamless integration with Docker, Kubernetes, DCOS and AWS ECS.
908 |
909 | [Nuclio](https://nuclio.io/) is a high-performance "serverless" framework focused on data, I/O, and compute intensive workloads. It is well integrated with popular data science tools, such as [Jupyter](https://jupyter.org/) and [Kubeflow](https://www.kubeflow.org/); supports a variety of data and streaming sources; and supports execution over CPUs and GPUs.
910 |
911 | [Supergiant Control](https://github.com/supergiant/control) is a tool that manages the lifecycle of clusters on your infrastructure and allows deployment of applications via HELM. Its deployment and configuration workflows will help you to get up and running with Kubernetes faster.
912 |
913 | [Supergiant Capacity - Beta](https://github.com/supergiant/capacity) is a tool that ensures that the right hardware is available for the required resource load of your Kubernetes cluster at any given time. This helps prevent over-provisioning of your container environment and overspending on your hardware budget.
914 |
915 | [Test suite for Kubernetes](https://github.com/mrahbar/k8s-testsuite) is a test suite consists of two Helm charts for network bandwith testing and load testing a Kuberntes cluster.
916 |
917 | [Keel](https://github.com/keel-hq/keel) is a Kubernetes Operator to automate Helm, DaemonSet, StatefulSet & Deployment updates.
918 |
919 | [Kube Monkey](https://github.com/asobti/kube-monkey) is an implementation of Netflix's Chaos Monkey for Kubernetes clusters. It randomly deletes Kubernetes (k8s) pods in the cluster encouraging and validating the development of failure-resilient services.
920 |
921 | [Kube State Metrics (KSM)](https://github.com/kubernetes/kube-state-metrics) is a simple service that listens to the Kubernetes API server and generates metrics about the state of the objects. It's not focused on the health of the individual Kubernetes components, but rather on the health of the various objects inside, such as deployments, nodes and pods.
922 |
923 | [Sonobuoy](https://sonobuoy.io/) is a diagnostic tool that makes it easier to understand the state of a Kubernetes cluster by running a choice of configuration tests in an accessible and non-destructive manner.
924 |
925 | [PowerfulSeal](https://github.com/powerfulseal/powerfulseal) is a powerful testing tool for your Kubernetes clusters, so that you can detect problems as early as possible.
926 |
927 | [Test Infra](https://github.com/kubernetes/test-infra) is a repository contains tools and configuration files for the testing and automation needs of the Kubernetes project.
928 |
929 | [cAdvisor (Container Advisor)](https://github.com/google/cadvisor) is a tool that provides container users an understanding of the resource usage and performance characteristics of their running containers. It's a running daemon that collects, aggregates, processes, and exports information about running containers. Specifically, for each container it keeps resource isolation parameters, historical resource usage, histograms of complete historical resource usage and network statistics.
930 |
931 | [Etcd](https://etcd.io/) is a distributed key-value store that provides a reliable way to store data that needs to be accessed by a distributed system or cluster of machines. Etcd is used as the backend for service discovery and stores cluster state and configuration for Kubernetes.
932 |
933 | [OpenEBS](https://openebs.io/) is a Kubernetes-based tool to create stateful applications using Container Attached Storage.
934 |
935 | [Container Storage Interface (CSI)](https://www.architecting.it/blog/container-storage-interface/) is an API that lets container orchestration platforms like Kubernetes seamlessly communicate with stored data via a plug-in.
936 |
937 | [MicroK8s](https://microk8s.io/) is a tool that delivers the full Kubernetes experience. In a Fully containerized deployment with compressed over-the-air updates for ultra-reliable operations. It is supported on Linux, Windows, and MacOS.
938 |
939 | [Charmed Kubernetes](https://ubuntu.com/kubernetes/features) is a well integrated, turn-key, conformant Kubernetes platform, optimized for your multi-cloud environments developed by Canonical.
940 |
941 | [Grafana Kubernetes App](https://grafana.com/grafana/plugins/grafana-kubernetes-app) is a toll that allows you to monitor your Kubernetes cluster's performance. It includes 4 dashboards, Cluster, Node, Pod/Container and Deployment. It allows for the automatic deployment of the required Prometheus exporters and a default scrape config to use with your in cluster Prometheus deployment.
942 |
943 | [KubeEdge](https://kubeedge.io/en/) is an open source system for extending native containerized application orchestration capabilities to hosts at Edge.It is built upon kubernetes and provides fundamental infrastructure support for network, app. deployment and metadata synchronization between cloud and edge.
944 |
945 | [Lens](https://k8slens.dev/) is the most powerful IDE for people who need to deal with Kubernetes clusters on a daily basis. It has support for MacOS, Windows and Linux operating systems.
946 |
947 | [kind](https://kind.sigs.k8s.io/) is a tool for running local Kubernetes clusters using Docker container “nodes”. It was primarily designed for testing Kubernetes itself, but may be used for local development or CI.
948 |
949 | [Flux CD](https://fluxcd.io/) is a tool that automatically ensures that the state of your Kubernetes cluster matches the configuration you've supplied in Git. It uses an operator in the cluster to trigger deployments inside Kubernetes, which means that you don't need a separate continuous delivery tool.
950 |
951 |
952 | # Databases
953 | [Back to the Top](https://github.com/mikeroyal/eBPF-Guide#table-of-contents)
954 |
955 |
956 |
957 |
958 |
959 |
960 |
961 |
962 |
963 |
964 |
965 | ## SQL/NoSQL Learning Resources
966 |
967 | [SQL](https://en.wikipedia.org/wiki/SQL) is a standard language for storing, manipulating and retrieving data in relational databases.
968 |
969 | [NoSQL](https://www.ibm.com/cloud/blog/sql-vs-nosql) is a database that is interchangeably referred to as "nonrelational, or "non-SQL" to highlight that the database can handle huge volumes of rapidly changing, unstructured data in different ways than a relational (SQL-based) database with rows and tables.
970 |
971 | [Transact-SQL(T-SQL)](https://docs.microsoft.com/en-us/sql/t-sql/language-reference) is a Microsoft extension of SQL with all of the tools and applications communicating to a SQL database by sending T-SQL commands.
972 |
973 | [Introduction to Transact-SQL](https://docs.microsoft.com/en-us/learn/modules/introduction-to-transact-sql/)
974 |
975 | [SQL Tutorial by W3Schools](https://www.w3schools.com/sql/)
976 |
977 | [Learn SQL Skills Online from Coursera](https://www.coursera.org/courses?query=sql)
978 |
979 | [SQL Courses Online from Udemy](https://www.udemy.com/topic/sql/)
980 |
981 | [SQL Online Training Courses from LinkedIn Learning](https://www.linkedin.com/learning/topics/sql)
982 |
983 | [Learn SQL For Free from Codecademy](https://www.codecademy.com/learn/learn-sql)
984 |
985 | [GitLab's SQL Style Guide](https://about.gitlab.com/handbook/business-ops/data-team/platform/sql-style-guide/)
986 |
987 | [OracleDB SQL Style Guide Basics](https://oracle.readthedocs.io/en/latest/sql/basics/style-guide.html)
988 |
989 | [Tableau CRM: BI Software and Tools](https://www.salesforce.com/products/crm-analytics/overview/)
990 |
991 | [Databases on AWS](https://aws.amazon.com/products/databases/)
992 |
993 | [Best Practices and Recommendations for SQL Server Clustering in AWS EC2.](https://docs.aws.amazon.com/AWSEC2/latest/WindowsGuide/aws-sql-clustering.html)
994 |
995 | [Connecting from Google Kubernetes Engine to a Cloud SQL instance.](https://cloud.google.com/sql/docs/mysql/connect-kubernetes-engine)
996 |
997 | [Educational Microsoft Azure SQL resources](https://docs.microsoft.com/en-us/sql/sql-server/educational-sql-resources?view=sql-server-ver15)
998 |
999 | [MySQL Certifications](https://www.mysql.com/certification/)
1000 |
1001 | [SQL vs. NoSQL Databases: What's the Difference?](https://www.ibm.com/cloud/blog/sql-vs-nosql)
1002 |
1003 | [What is NoSQL?](https://aws.amazon.com/nosql/)
1004 |
1005 | ## SQL/NoSQL Tools and Databases
1006 |
1007 | [Netdata](https://github.com/netdata/netdata) is high-fidelity infrastructure monitoring and troubleshooting, real-time monitoring Agent collects thousands of metrics from systems, hardware, containers, and applications with zero configuration. It runs permanently on all your physical/virtual servers, containers, cloud deployments, and edge/IoT devices, and is perfectly safe to install on your systems mid-incident without any preparation.
1008 |
1009 | [Azure Data Studio](https://github.com/Microsoft/azuredatastudio) is an open source data management tool that enables working with SQL Server, Azure SQL DB and SQL DW from Windows, macOS and Linux.
1010 |
1011 | [Azure SQL Database](https://azure.microsoft.com/en-us/services/sql-database/) is the intelligent, scalable, relational database service built for the cloud. It’s evergreen and always up to date, with AI-powered and automated features that optimize performance and durability for you. Serverless compute and Hyperscale storage options automatically scale resources on demand, so you can focus on building new applications without worrying about storage size or resource management.
1012 |
1013 | [Azure SQL Managed Instance](https://azure.microsoft.com/en-us/services/azure-sql/sql-managed-instance/) is a fully managed SQL Server Database engine instance that's hosted in Azure and placed in your network. This deployment model makes it easy to lift and shift your on-premises applications to the cloud with very few application and database changes. Managed instance has split compute and storage components.
1014 |
1015 | [Azure Synapse Analytics](https://azure.microsoft.com/en-us/services/synapse-analytics/) is a limitless analytics service that brings together enterprise data warehousing and Big Data analytics. It gives you the freedom to query data on your terms, using either serverless or provisioned resources at scale. It brings together the best of the SQL technologies used in enterprise data warehousing, Spark technologies used in big data analytics, and Pipelines for data integration and ETL/ELT.
1016 |
1017 | [MSSQL for Visual Studio Code](https://marketplace.visualstudio.com/items?itemName=ms-mssql.mssql) is an extension for developing Microsoft SQL Server, Azure SQL Database and SQL Data Warehouse everywhere with a rich set of functionalities.
1018 |
1019 | [SQL Server Data Tools (SSDT)](https://docs.microsoft.com/en-us/sql/ssdt/download-sql-server-data-tools-ssdt) is a development tool for building SQL Server relational databases, Azure SQL Databases, Analysis Services (AS) data models, Integration Services (IS) packages, and Reporting Services (RS) reports. With SSDT, a developer can design and deploy any SQL Server content type with the same ease as they would develop an application in Visual Studio or Visual Studio Code.
1020 |
1021 | [Bulk Copy Program](https://docs.microsoft.com/en-us/sql/tools/bcp-utility) is a command-line tool that comes with Microsoft SQL Server. BCP, allows you to import and export large amounts of data in and out of SQL Server databases quickly snd efficeiently.
1022 |
1023 | [SQL Server Migration Assistant](https://www.microsoft.com/en-us/download/details.aspx?id=54258) is a tool from Microsoft that simplifies database migration process from Oracle to SQL Server, Azure SQL Database, Azure SQL Database Managed Instance and Azure SQL Data Warehouse.
1024 |
1025 | [SQL Server Integration Services](https://docs.microsoft.com/en-us/sql/integration-services/sql-server-integration-services?view=sql-server-ver15) is a development platform for building enterprise-level data integration and data transformations solutions. Use Integration Services to solve complex business problems by copying or downloading files, loading data warehouses, cleansing and mining data, and managing SQL Server objects and data.
1026 |
1027 | [SQL Server Business Intelligence(BI)](https://www.microsoft.com/en-us/sql-server/sql-business-intelligence) is a collection of tools in Microsoft's SQL Server for transforming raw data into information businesses can use to make decisions.
1028 |
1029 | [Tableau](https://www.tableau.com/) is a Data Visualization software used in relational databases, cloud databases, and spreadsheets. Tableau was acquired by [Salesforce in August 2019](https://investor.salesforce.com/press-releases/press-release-details/2019/Salesforce-Completes-Acquisition-of-Tableau/default.aspx).
1030 |
1031 | [DataGrip](https://www.jetbrains.com/datagrip/) is a professional DataBase IDE developed by Jet Brains that provides context-sensitive code completion, helping you to write SQL code faster. Completion is aware of the tables structure, foreign keys, and even database objects created in code you're editing.
1032 |
1033 | [RStudio](https://rstudio.com/) is an integrated development environment for R and Python, with a console, syntax-highlighting editor that supports direct code execution, and tools for plotting, history, debugging and workspace management.
1034 |
1035 | [MySQL](https://www.mysql.com/) is a fully managed database service to deploy cloud-native applications using the world's most popular open source database.
1036 |
1037 | [PostgreSQL](https://www.postgresql.org/) is a powerful, open source object-relational database system with over 30 years of active development that has earned it a strong reputation for reliability, feature robustness, and performance.
1038 |
1039 | [Amazon DynamoDB](https://aws.amazon.com/dynamodb/) is a key-value and document database that delivers single-digit millisecond performance at any scale. It is a fully managed, multiregion, multimaster, durable database with built-in security, backup and restore, and in-memory caching for internet-scale applications.
1040 |
1041 | [Apache Cassandra™](https://cassandra.apache.org/) is an open source NoSQL distributed database trusted by thousands of companies for scalability and high availability without compromising performance. Cassandra provides linear scalability and proven fault-tolerance on commodity hardware or cloud infrastructure make it the perfect platform for mission-critical data.
1042 |
1043 | [Apache HBase™](https://hbase.apache.org/) is an open-source, NoSQL, distributed big data store. It enables random, strictly consistent, real-time access to petabytes of data. HBase is very effective for handling large, sparse datasets. HBase serves as a direct input and output to the Apache MapReduce framework for Hadoop, and works with Apache Phoenix to enable SQL-like queries over HBase tables.
1044 |
1045 | [Hadoop Distributed File System (HDFS)](https://www.ibm.com/analytics/hadoop/hdfs) is a distributed file system that handles large data sets running on commodity hardware. It is used to scale a single Apache Hadoop cluster to hundreds (and even thousands) of nodes. HDFS is one of the major components of Apache Hadoop, the others being [MapReduce](https://www.ibm.com/analytics/hadoop/mapreduce) and [YARN](https://hadoop.apache.org/docs/current/hadoop-yarn/hadoop-yarn-site/YARN.html).
1046 |
1047 | [Apache Mesos](http://mesos.apache.org/) is a cluster manager that provides efficient resource isolation and sharing across distributed applications, or frameworks. It can run Hadoop, Jenkins, Spark, Aurora, and other frameworks on a dynamically shared pool of nodes.
1048 |
1049 | [Apache Spark](https://spark.apache.org/) is a unified analytics engine for big data processing, with built-in modules for streaming, SQL, machine learning and graph processing.
1050 |
1051 | [ElasticSearch](https://www.elastic.co/) is a search engine based on the Lucene library. It provides a distributed, multitenant-capable full-text search engine with an HTTP web interface and schema-free JSON documents. Elasticsearch is developed in Java.
1052 |
1053 | [Logstash](https://www.elastic.co/products/logstash) is a tool for managing events and logs. When used generically, the term encompasses a larger system of log collection, processing, storage and searching activities.
1054 |
1055 | [Kibana](https://www.elastic.co/products/kibana) is an open source data visualization plugin for Elasticsearch. It provides visualization capabilities on top of the content indexed on an Elasticsearch cluster. Users can create bar, line and scatter plots, or pie charts and maps on top of large volumes of data.
1056 |
1057 | [Trino](https://trino.io/) is a Distributed SQL query engine for big data. It is able to tremendously speed up [ETL processes](https://docs.microsoft.com/en-us/azure/architecture/data-guide/relational-data/etl), allow them all to use standard SQL statement, and work with numerous data sources and targets all in the same system.
1058 |
1059 | [Extract, transform, and load (ETL)](https://docs.microsoft.com/en-us/azure/architecture/data-guide/relational-data/etl) is a data pipeline used to collect data from various sources, transform the data according to business rules, and load it into a destination data store.
1060 |
1061 | [Redis(REmote DIctionary Server)](https://redis.io/) is an open source (BSD licensed), in-memory data structure store, used as a database, cache, and message broker. It provides data structures such as strings, hashes, lists, sets, sorted sets with range queries, bitmaps, hyperloglogs, geospatial indexes, and streams.
1062 |
1063 | [FoundationDB](https://www.foundationdb.org/) is an open source distributed database designed to handle large volumes of structured data across clusters of commodity servers. It organizes data as an ordered key-value store and employs ACID transactions for all operations. It is especially well-suited for read/write workloads but also has excellent performance for write-intensive workloads. FoundationDB was acquired by [Apple in 2015](https://techcrunch.com/2015/03/24/apple-acquires-durable-database-company-foundationdb/).
1064 |
1065 | [IBM DB2](https://www.ibm.com/analytics/db2) is a collection of hybrid data management products offering a complete suite of AI-empowered capabilities designed to help you manage both structured and unstructured data on premises as well as in private and public cloud environments. Db2 is built on an intelligent common SQL engine designed for scalability and flexibility.
1066 |
1067 | [MongoDB](https://www.mongodb.com/) is a document database meaning it stores data in JSON-like documents.
1068 |
1069 | [OracleDB](https://www.oracle.com/database/) is a powerful fully managed database helps developers manage business-critical data with the highest availability, reliability, and security.
1070 |
1071 | [MariaDB](https://mariadb.com/) is an enterprise open source database solution for modern, mission-critical applications.
1072 |
1073 | [SQLite](https://sqlite.org/index.html) is a C-language library that implements a small, fast, self-contained, high-reliability, full-featured, SQL database engine.SQLite is the most used database engine in the world. SQLite is built into all mobile phones and most computers and comes bundled inside countless other applications that people use every day.
1074 |
1075 | [SQLite Database Browser](https://sqlitebrowser.org/) is an open source SQL tool that allows users to create, design and edits SQLite database files. It lets users show a log of all the SQL commands that have been issued by them and by the application itself.
1076 |
1077 | [InfluxDB](https://www.influxdata.com/) is an open source time series platform. This includes APIs for storing and querying data, processing it in the background for [ETL](https://docs.microsoft.com/en-us/azure/architecture/data-guide/relational-data/etl) or monitoring and alerting purposes, user dashboards, Internet of Things sensor data, and visualizing and exploring the data and more. It also has support for processing data from [Graphite](http://graphiteapp.org/).
1078 |
1079 | [Atlas](https://github.com/Netflix/atlas) is an in-memory dimensional [time series database](https://en.wikipedia.org/wiki/Time_series_database).
1080 |
1081 | [CouchbaseDB](https://www.couchbase.com/) is an open source distributed [multi-model NoSQL document-oriented database](https://en.wikipedia.org/wiki/Multi-model_database). It creates a key-value store with managed cache for sub-millisecond data operations, with purpose-built indexers for efficient queries and a powerful query engine for executing SQL queries.
1082 |
1083 | [dbWatch](https://www.dbwatch.com/) is a complete database monitoring/management solution for SQL Server, Oracle, PostgreSQL, Sybase, MySQL and Azure. Designed for proactive management and automation of routine maintenance in large scale on-premise, hybrid/cloud database environments.
1084 |
1085 | [Cosmos DB Profiler](https://hibernatingrhinos.com/products/cosmosdbprof) is a real-time visual debugger allowing a development team to gain valuable insight and perspective into their usage of Cosmos DB database. It identifies over a dozen suspicious behaviors from your application’s interaction with Cosmos DB.
1086 |
1087 | [Adminer](https://www.adminer.org/) is an SQL management client tool for managing databases, tables, relations, indexes, users. Adminer has support for all the popular database management systems such as MySQL, MariaDB, PostgreSQL, SQLite, MS SQL, Oracle, Firebird, SimpleDB, Elasticsearch and MongoDB.
1088 |
1089 | [DBeaver](https://dbeaver.io/) is an open source database tool for developers and database administrators. It offers supports for JDBC compliant databases such as MySQL, Oracle, IBM DB2, SQL Server, Firebird, SQLite, Sybase, Teradata, Firebird, Apache Hive, Phoenix, and Presto.
1090 |
1091 | [DbVisualizer](https://dbvis.com/) is a SQL management tool that allows users to manage a wide range of databases such as Oracle, Sybase, SQL Server, MySQL, H3, and SQLite.
1092 |
1093 | [AppDynamics Database](https://www.appdynamics.com/supported-technologies/database) is a management product for Microsoft SQL Server. With AppDynamics you can monitor and trend key performance metrics such as resource consumption, database objects, schema statistics and more, allowing you to proactively tune and fix issues in a High-Volume Production Environment.
1094 |
1095 | [Toad](https://www.quest.com/toad/) is a SQL Server DBMS toolset developed by Quest. It increases productivity by using extensive automation, intuitive workflows, and built-in expertise. This SQL management tool resolve issues, manage change and promote the highest levels of code quality for both relational and non-relational databases.
1096 |
1097 | [Lepide SQL Server](https://www.lepide.com/sql-storage-manager/) is an open source storage manager utility to analyse the performance of SQL Servers. It provides a complete overview of all configuration and permission changes being made to your SQL Server environment through an easy-to-use, graphical user interface.
1098 |
1099 | [Sequel Pro](https://sequelpro.com/) is a fast MacOS database management tool for working with MySQL. This SQL management tool helpful for interacting with your database by easily to adding new databases, new tables, and new rows.
1100 |
1101 | ## Contribute
1102 |
1103 | - [x] If would you like to contribute to this guide simply make a [Pull Request](https://github.com/mikeroyal/eBPF-Guide/pulls).
1104 |
1105 |
1106 | ## License
1107 | [Back to the Top](https://github.com/mikeroyal/eBPF-Guide#table-of-contents)
1108 |
1109 | Distributed under the [Creative Commons Attribution 4.0 International (CC BY 4.0) Public License](https://creativecommons.org/licenses/by/4.0/).
1110 |
1111 |
--------------------------------------------------------------------------------
/Security Glossary.md:
--------------------------------------------------------------------------------
1 | A list of Key Information Security Terms for Software and Hardware. **Sources:** [NIST Federal Information Processing Standards (FIPS)](https://csrc.nist.gov/publications/fips), the [Special Publication (SP) 800 series](https://csrc.nist.gov/publications/sp), [NIST Interagency Reports (NISTIRs)](https://csrc.nist.gov/publications/nistir), and from the [Committee for National Security Systems Instruction 4009 (CNSSI-4009)](https://www.cnss.gov/CNSS/issuances/Instructions.cfm).
2 |
3 |
4 | A
5 |
6 | Access – Ability and means to communicate with or otherwise interact with a system, to use system resources to handle information, to gain knowledge of the information the system contains, or to control system components and functions.
7 | SOURCE: CNSSI-4009
8 |
9 | Access Authority – An entity responsible for monitoring and granting access privileges for other authorized entities.
10 | SOURCE: CNSSI-4009
11 |
12 | Access Control – The process of granting or denying specific requests to: 1) obtain and use information and related information processing services; and 2) enter specific physical facilities (e.g., federal buildings, military establishments, border crossing entrances).
13 | SOURCE: FIPS 201; CNSSI-4009
14 |
15 | Access Control List (ACL) –
16 | * 1. A list of permissions associated with an object. The list specifies who or what is allowed to access the object and what operations are allowed to be performed on the object.
17 | * 2. A mechanism that implements access control for a system resource by enumerating the system entities that are permitted to access the resource and stating, either implicitly or explicitly, the access modes granted to each entity.
18 | SOURCE: CNSSI-4009
19 |
20 | Access Control Lists (ACLs) – A register of:
21 | * 1. users (including groups, machines, processes) who have been given permission to use a particular system resource, and
22 | * 2. the types of access they have been permitted.
23 | SOURCE: SP 800-12
24 |
25 | Access Control Mechanism – Security safeguards (i.e., hardware and software features, physical controls, operating procedures, management procedures, and various combinations of these) designed to detect and deny unauthorized
26 | access and permit authorized access to an information system.
27 | SOURCE: CNSSI-4009
28 |
29 | Access Level – A category within a given security classification limiting entry or
30 | system connectivity to only authorized persons.
31 | SOURCE: CNSSI-4009
32 |
33 | Access List – Roster of individuals authorized admittance to a controlled area.
34 | SOURCE: CNSSI-4009
35 |
36 | Access Point – A device that logically connects wireless client devices operating in infrastructure to one another and provides access to a distribution system, if connected, which is typically an organization’s enterprise wired network.
37 | SOURCE: SP 800-48; SP 800-121
38 |
39 | Access Profile – Association of a user with a list of protected objects the user may access.
40 | SOURCE: CNSSI-4009
41 |
42 | Access Type – Privilege to perform action on an object. Read, write, execute, append, modify, delete, and create are examples of access types.
43 | SOURCE: CNSSI-4009
44 |
45 | Activation Data – Private data, other than keys, that are required to access cryptographic modules.
46 | SOURCE: SP 800-32
47 |
48 | Active Attack – An attack that alters a system or data.
49 | SOURCE: CNSSI-4009
50 |
51 | Active Content – Software in various forms that is able to automatically carry out or trigger actions on a computer platform without the intervention of a user.
52 | SOURCE: CNSSI-4009
53 |
54 | Active Security Testing – Security testing that involves direct interaction with a target, such as sending packets to a target.
55 | SOURCE: SP 800-115
56 |
57 | Advanced Encryption Standard – (AES) The Advanced Encryption Standard specifies a U.S. government-approved cryptographic algorithm that can be used to protect electronic data. The AES algorithm is a symmetric block cipher that can encrypt (encipher) and decrypt (decipher) information. This standard specifies the Rijndael algorithm, a symmetric block cipher that can process data blocks of 128 bits, using cipher keys with lengths of 128, 192, and 256 bits.
58 | SOURCE: FIPS 197
59 |
60 | B
61 |
62 | Blacklisting – The process of the system invalidating a user ID based on the user’s inappropriate actions. A blacklisted user ID cannot be used to log on to the system, even with the correct authenticator. Blacklisting and lifting of a blacklisting are both security-relevant events. Blacklisting also applies to blocks placed against IP addresses to prevent inappropriate or unauthorized use of Internet resources.
63 | SOURCE: CNSSI-4009
64 |
65 | Blue Team –
66 | * 1. The group responsible for defending an enterprise’s use of
67 | information systems by maintaining its security posture against a
68 | group of mock attackers (i.e., the Red Team). Typically the Blue
69 | Team and its supporters must defend against real or simulated
70 | attacks 1) over a significant period of time, 2) in a representative
71 | operational context (e.g., as part of an operational exercise), and 3)
72 | according to rules established and monitored with the help of a
73 | neutral group refereeing the simulation or exercise (i.e., the White
74 | Team).
75 | * 2. The term Blue Team is also used for defining a group of
76 | individuals that conduct operational network vulnerability
77 | evaluations and provide mitigation techniques to customers who have
78 | a need for an independent technical review of their network security
79 | posture. The Blue Team identifies security threats and risks in the
80 | operating environment, and in cooperation with the customer,
81 | analyzes the network environment and its current state of security
82 | readiness. Based on the Blue Team findings and expertise,
83 | they provide recommendations that integrate into an overall
84 | community security solution to increase the customer's cyber security
85 | readiness posture. Often times a Blue Team is employed by itself or
86 | prior to a Red Team employment to ensure that the customer's
87 | networks are as secure as possible before having the Red Team test
88 | the systems.
89 | SOURCE: CNSSI-4009
90 |
91 | Body of Evidence (BoE) – The set of data that documents the information system’s adherence to the security controls applied. The BoE will include a Requirements Verification Traceability Matrix (RVTM) delineating where the selected security controls are met and evidence to that fact can be found. The BoE content required by an Authorizing Official will be adjusted according to the impact levels selected.
92 | SOURCE: CNSSI-4009
93 |
94 | Boundary – Physical or logical perimeter of a system.
95 | SOURCE: CNSSI-4009
96 |
97 | C
98 |
99 | Capstone Policies – Those policies that are developed by governing or coordinating institutions of Health Information Exchanges (HIEs). They provide overall requirements and guidance for protecting health information within those HIEs. Capstone Policies must address the requirements imposed by: (1) all laws, regulations, and guidelines at the federal, state, and local levels; (2) business needs; and (3) policies at the institutional and HIE levels.
100 | SOURCE: NISTIR-7497
101 |
102 | Capture – The method of taking a biometric sample from an end user.
103 | Source: FIPS 201
104 |
105 | Certificate Management – Process whereby certificates (as defined above) are generated, stored, protected, transferred, loaded, used, and destroyed.
106 | SOURCE: CNSSI-4009
107 |
108 | Certificate Management Authority – A Certification Authority (CA) or a Registration Authority (RA).
109 | SOURCE: SP 800-32
110 |
111 | Certificate Policy (CP) – A specialized form of administrative policy tuned to electronic transactions performed during certificate management. A Certificate Policy addresses all aspects associated with the generation, production, distribution, accounting, compromise recovery, and administration of digital certificates. Indirectly, a certificate policy can also govern the transactions conducted using a communications system protected by a certificate-based security system. By controlling critical certificate extensions, such policies and associated enforcement technology can support provision of the security services required by particular applications.
112 | SOURCE: CNSSI-4009; SP 800-32
113 |
114 | Certification Practice Statement – A statement of the practices that a Certification Authority employs in issuing, suspending, revoking, and renewing certificates and providing access to them, in accordance with specific requirements (i.e., requirements specified in this Certificate Policy, or requirements specified in a contract for services).
115 | SOURCE: SP 800-32; CNSSI-4009
116 |
117 | Certification Test and Evaluation – Software and hardware security tests conducted during development of an information system.
118 | SOURCE: CNSSI-4009
119 |
120 | Checksum – Value computed on data to detect error or manipulation.
121 | SOURCE: CNSSI-4009
122 |
123 | Cloud Computing - A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service Provider interaction. This cloud model is composed of five essential characteristics, three service models, and four deployment models
124 | SOURCE(s): NISTIR 8006 under Cloud computing from NIST SP 800-145 - Adapted
125 |
126 | Cryptographic Initialization – Function used to set the state of a cryptographic logic prior to key generation, encryption, or other operating mode.
127 | SOURCE: CNSSI-4009
128 |
129 | Cryptographic Key – A value used to control cryptographic operations, such as decryption, encryption, signature generation, or signature verification.
130 | SOURCE: SP 800-63
131 |
132 | D
133 |
134 | Data – A subset of information in an electronic format that allows it to be retrieved or transmitted.
135 | SOURCE: CNSSI-4009
136 |
137 | Data Aggregation – Compilation of individual data systems and data that could result in the totality of the information being classified, or classified at a higher level, or of beneficial use to an adversary.
138 | SOURCE: CNSSI-4009
139 |
140 | Data Origin Authentication – The process of verifying that the source of the data is as claimed and that the data has not been modified.
141 | SOURCE: CNSSI-4009
142 |
143 | Data Security – Protection of data from unauthorized (accidental or intentional) modification, destruction, or disclosure.
144 | SOURCE: CNSSI-4009
145 |
146 | Data Transfer Device (DTD) – Fill device designed to securely store, transport, and transfer electronically both COMSEC and TRANSEC key, designed to be backward compatible with the previous generation of COMSEC common fill devices, and programmable to support modern mission systems.
147 | SOURCE: CNSSI-4009
148 |
149 | Denial of Service (DoS) – The prevention of authorized access to resources or the delaying of time-critical operations. (Time-critical may be milliseconds or it may be hours, depending upon the service provided.)
150 | SOURCE: CNSSI-4009
151 |
152 | Differential Power Analysis – An analysis of the variations of the electrical power consumption of a cryptographic module, using advanced statistical methods and/or other techniques, for the purpose of extracting information correlated to cryptographic keys used in a cryptographic algorithm.
153 | SOURCE: FIPS 140-2
154 |
155 | Digital Evidence – Electronic information stored or transferred in digital form.
156 | SOURCE: SP 800-72
157 |
158 | Digital Forensics – The application of science to the identification, collection, examination, and analysis of data while preserving the integrity of the information and maintaining a strict chain of custody for the data.
159 | SOURCE: SP 800-86
160 |
161 | Digital Signature – An asymmetric key operation where the private key is used to digitally sign data and the public key is used to verify the signature. Digital signatures provide authenticity protection, integrity protection, and non-repudiation.
162 | SOURCE: SP 800-63
163 |
164 | Disaster Recovery Plan (DRP) – A written plan for recovering one or more information systems at an alternate facility in response to a major hardware or software failure or destruction of facilities.
165 | SOURCE: SP 800-34
166 |
167 | E
168 |
169 | Embedded Cryptographic System – Cryptosystem performing or controlling a function as an integral element of a larger system or subsystem.
170 | SOURCE: CNSSI-4009
171 |
172 | Embedded Cryptography - Cryptography engineered into an equipment or system whose basic function is not cryptographic.
173 | SOURCE: CNSSI-4009
174 |
175 | Encipher – Convert plain text to cipher text by means of a cryptographic system.
176 | SOURCE: CNSSI-4009
177 |
178 | Encode – Convert plain text to cipher text by means of a code.
179 | SOURCE: CNSSI-4009
180 |
181 | Encrypt – Generic term encompassing encipher and encode.
182 | SOURCE: CNSSI-4009
183 |
184 | Encrypted Key – A cryptographic key that has been encrypted using an Approved security function with a key encrypting key, a PIN, or a password in order to disguise the value of the underlying plaintext key.
185 | SOURCE: FIPS 140-2
186 |
187 | Encrypted Network – A network on which messages are encrypted (e.g., using DES, AES, or other appropriate algorithms) to prevent reading by unauthorized parties.
188 | SOURCE: SP 800-32
189 |
190 | Encryption – Conversion of plaintext to ciphertext through the use of a cryptographic algorithm.
191 | SOURCE: FIPS 185
192 |
193 | End-to-End Encryption – Encryption of information at its origin and decryption at its intended destination without intermediate decryption.
194 | SOURCE: CNSSI-4009
195 |
196 | End-to-End Security – Safeguarding information in an information system from point of origin to point of destination.
197 | SOURCE: CNSSI-4009
198 |
199 | F
200 |
201 | [Federal Risk and Authorization Management Program (FedRAMP)](https://www.gsa.gov/technology/government-it-initiatives/fedramp) is a government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services. FedRAMP empowers agencies to use modern cloud technologies, with emphasis on security and protection of federal information, and helps accelerate the adoption of secure, cloud solutions.
202 |
203 | [Federal Information Security Management Act (FISMA)](https://csrc.nist.gov/topics/laws-and-regulations/laws/fisma) is a United States federal law that defines a comprehensive framework to protect government information, operations, and assets against natural and manmade threats. This risk management framework was signed into law as part of the Electronic Government Act of 2002. Since 2002, FISMA's scope has widened to apply to state agencies that administer federal programs, or private businesses and service providers that hold a contract with the U.S. government.
204 |
205 | False Positive – An alert that incorrectly indicates that malicious activity is occurring.
206 | SOURCE: SP 800-61
207 |
208 | False Rejection – In biometrics, the instance of a security system failing to verify or identify an authorized person. It does not necessarily indicate a flaw in the biometric system; for example, in a fingerprint-based system, an incorrectly aligned finger on the scanner or dirt on the scanner can result in the scanner misreading the fingerprint, causing a false rejection of the authorized user.
209 | SOURCE: CNSSI-4009
210 |
211 | Federal Information Processing Standard (FIPS) – A standard for adoption and use by federal departments and agencies that has been developed within the Information Technology Laboratory and published by the National Institute of Standards and Technology, a part of the U.S. Department of Commerce. A FIPS covers some topic in information technology in order to achieve a common level of quality or some level of interoperability.
212 | SOURCE: FIPS 201
213 |
214 | File Encryption – The process of encrypting individual files on a storage medium and permitting access to the encrypted data only after proper authentication is provided.
215 | SOURCE: SP 800-111
216 |
217 | File Name Anomaly –
218 | * 1. A mismatch between the internal file header and its external
219 | extension.
220 | * 2. A file name inconsistent with the content of the file (e.g., renaming
221 | a graphics file with a non-graphical extension.
222 | SOURCE: SP 800-72
223 |
224 | File Protection – Aggregate of processes and procedures designed to inhibit unauthorized access, contamination, elimination, modification, or destruction of a file or any of its contents.
225 | SOURCE: CNSSI-4009
226 |
227 | File Security – Means by which access to computer files is limited to authorized users only.
228 | SOURCE: CNSSI-4009
229 |
230 | Firewall – A gateway that limits access between networks in accordance with local security policy.
231 | SOURCE: SP 800-32
232 |
233 | Forensics – The practice of gathering, retaining, and analyzing computer-related data for investigative purposes in a manner that maintains the integrity of the data.
234 | SOURCE: CNSSI-4009
235 |
236 | G
237 |
238 | Gateway – Interface providing compatibility between networks by converting transmission speeds, protocols, codes, or security measures.
239 | SOURCE: CNSSI-4009
240 |
241 | H
242 |
243 | Handshaking Procedures – Dialogue between two information systems for synchronizing, identifying, and authenticating themselves to one another.
244 | SOURCE: CNSSI-4009
245 |
246 | Hard Copy Key – Physical keying material, such as printed key lists, punched or printed key tapes, or programmable, read-only memories (PROM).
247 | SOURCE: CNSSI-4009
248 |
249 | Hardening – Configuring a host’s operating systems and applications to reduce the host’s security weaknesses.
250 | SOURCE: SP 800-123
251 |
252 | Hardware – The physical components of an information system.
253 | SOURCE: CNSSI-4009
254 |
255 | High Availability – A failover feature to ensure availability during device or component interruptions.
256 | SOURCE: SP 800-113
257 |
258 | I
259 |
260 | Identification – The process of verifying the identity of a user, process, or device, usually as a prerequisite for granting access to resources in an IT system.
261 | SOURCE: SP 800-47
262 |
263 | Identifier – Unique data used to represent a person’s identity and associated attributes. A name or a card number are examples of identifiers.
264 | SOURCE: FIPS 201
265 |
266 | Identity – A set of attributes that uniquely describe a person within a given context.
267 | SOURCE: SP 800-63
268 |
269 | Identity – The set of physical and behavioral characteristics by which an individual is uniquely recognizable.
270 | SOURCE: FIPS 201
271 |
272 | Identity Token – Smart card, metal key, or other physical object used to authenticate identity.
273 | SOURCE: CNSSI-4009
274 |
275 | Identity Validation – Tests enabling an information system to authenticate users or resources.
276 | SOURCE: CNSSI-4009
277 |
278 | Incident – A violation or imminent threat of violation of computer security policies, acceptable use policies, or standard security practices.
279 | SOURCE: SP 800-61
280 |
281 | Intellectual Property – Creations of the mind such as musical, literary, and artistic works; inventions; and symbols, names, images, and designs used in commerce, including copyrights, trademarks, patents, and related rights. Under intellectual property law, the holder of one of these abstract “properties” has certain exclusive rights to the creative work, commercial symbol, or invention by which it is covered.
282 | SOURCE: CNSSI-4009
283 |
284 | Internet Protocol (IP) – Standard protocol for transmission of data from source to destinations in packet-switched communications networks and interconnected systems of such networks.
285 | SOURCE: CNSSI-4009
286 |
287 | Intranet – A private network that is employed within the confines of a given enterprise (e.g., internal to a business or agency).
288 | SOURCE: CNSSI-4009
289 |
290 | Intrusion – Unauthorized act of bypassing the security mechanisms of a system.
291 | SOURCE: CNSSI-4009
292 |
293 | Intrusion Detection Systems (IDS) – Hardware or software product that gathers and analyzes information from various areas within a computer or a network to identify possible security breaches, which include both intrusions (attacks from outside the organizations) and misuse (attacks from within the organizations.)
294 | SOURCE: CNSSI-4009
295 |
296 | J
297 |
298 | Jamming – An attack in which a device is used to emit electromagnetic energy on a wireless network’s frequency to make it unusable.
299 | SOURCE: SP 800-48
300 |
301 | K
302 |
303 | Kerberos – A means of verifying the identities of principals on an open network. It accomplishes this without relying on the authentication, trustworthiness, or physical security of hosts while assuming all packets can be read, modified and inserted at will. It uses a trust broker model and symmetric cryptography to provide authentication and authorization of users and systems on the network.
304 | SOURCE: SP 800-95
305 |
306 | Key – A value used to control cryptographic operations, such as decryption, encryption, signature generation, or signature verification.
307 | SOURCE: SP 800-63
308 |
309 | Key Logger – A program designed to record which keys are pressed on a computer keyboard used to obtain passwords or encryption keys and thus bypass other security measures.
310 | SOURCE: SP 800-82
311 |
312 | L
313 |
314 | Least Privilege – The security objective of granting users only those accesses they need to perform their official duties.
315 | SOURCE: SP 800-12
316 |
317 | Level of Protection – Extent to which protective measures, techniques, and procedures must be applied to information systems and networks based on risk, threat, vulnerability, system interconnectivity considerations, and information assurance needs. Levels of protection are:
318 | * 1. Basic: information systems and networks requiring implementation of standard minimum security countermeasures.
319 | * 2. Medium: information systems and networks requiring layering of additional safeguards above the standard minimum security countermeasures.
320 | * 3. High: information systems and networks requiring the most stringent protection and rigorous security countermeasures.
321 | SOURCE: CNSSI-4009
322 |
323 | Likelihood of Occurrence – In Information Assurance risk analysis, a weighted factor based on a subjective analysis of the probability that a given threat is capable of exploiting a given vulnerability.
324 | SOURCE: CNSSI-4009
325 |
326 | M
327 |
328 | Malicious Code – Software or firmware intended to perform an unauthorized process that will have adverse impact on the confidentiality, integrity, or availability of an information system. A virus, worm, Trojan horse, or other code-based entity that infects a host. Spyware and some forms of adware are also examples of malicious code.
329 | SOURCE: SP 800-53; CNSSI-4009
330 |
331 | Malware – A program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victim’s data, applications, or operating system or of otherwise annoying or disrupting the victim.
332 | SOURCE: SP 800-83
333 |
334 | Man-in-the-middle Attack (MitM) – A form of active wiretapping attack in which the attacker intercepts and selectively modifies communicated data to masquerade as one or more of the entities involved in a communication association.
335 | SOURCE: CNSSI-4009
336 |
337 | Mandatory Access Control (MAC) – A means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (i.e., clearance) of users to access information of such sensitivity.
338 | SOURCE: SP 800-44
339 |
340 | Mandatory Access Control – Access controls (which) are driven by the results of a comparison between the user’s trust level or clearance and the sensitivity designation of the information.
341 | SOURCE: FIPS 191
342 |
343 | Masquerading –When an unauthorized agent claims the identity of another agent, it is said to be masquerading.
344 | SOURCE: SP 800-19
345 |
346 | Multilevel Security (MLS) – A concept of processing information with different classifications and categories that simultaneously permits access by users with different security clearances and denies access to users who lack authorization.
347 | SOURCE: CNSSI-4009
348 |
349 | N
350 |
351 | Needs Assessment (IT Security Awareness and Training) – A process that can be used to determine an organization’s awareness and training needs. The results of a needs assessment can provide justification to convince management to allocate adequate resources
352 | to meet the identified awareness and training needs.
353 | SOURCE: SP 800-50
354 |
355 | Network – Information system(s) implemented with a collection of interconnected components. Such components may include routers,
356 | hubs, cabling, telecommunications controllers, key distribution centers, and technical control devices.
357 | SOURCE: SP 800-53; CNSSI-4009
358 |
359 | Network Access – Access to an organizational information system by a user (or a process acting on behalf of a user) communicating through a network (e.g., local area network, wide area network, Internet).
360 | SOURCE: SP 800-53; CNSSI-4009
361 |
362 | Network Access Control (NAC) – A feature provided by some firewalls that allows access based on a user’s credentials and the results of health checks performed on the telework client device.
363 | SOURCE: SP 800-41
364 |
365 | Network Address Translation (NAT) – A routing technology used by many firewalls to hide internal system addresses from an external network through use of an addressing schema.
366 | SOURCE: SP 800-41
367 |
368 | O
369 |
370 | Object Identifier – A specialized formatted number that is registered with an internationally recognized standards organization. The unique alphanumeric/numeric identifier registered under the ISO registration standard to reference a specific object or object class. In the federal government PKI, they are used to uniquely identify each of the four policies and cryptographic algorithms supported.
371 | SOURCE: SP 800-32
372 |
373 | Open Storage – Any storage of classified national security information outside of approved containers. This includes classified information that is resident on information systems media and outside of an approved storage container, regardless of whether or not that media is in use (i.e., unattended operations).
374 | SOURCE: CNSSI-4009
375 |
376 | Operating System (OS) Fingerprinting – Analyzing characteristics of packets sent by a target, such as packet headers or listening ports, to identify the operating system in use on the target.
377 | SOURCE: SP 800-115
378 |
379 | Operations Code – Code composed largely of words and phrases suitable for general communications use.
380 | SOURCE: CNSSI-4009
381 |
382 | Organization – A federal agency, or, as appropriate, any of its operational elements.
383 | SOURCE: FIPS 200
384 |
385 | Overwrite Procedure – A software process that replaces data previously stored on storage media with a predetermined set of meaningless data or random patterns.
386 | SOURCE: CNSSI-4009
387 |
388 | P
389 |
390 | Packet Filter – A routing device that provides access control functionality for host addresses and communication sessions.
391 | SOURCE: SP 800-41
392 |
393 | Packet Sniffer – Software that observes and records network traffic.
394 | SOURCE: CNSSI-4009
395 |
396 | Password – A protected character string used to authenticate the identity of a computer system user or to authorize access to system resources.
397 | SOURCE: FIPS 181
398 |
399 | Password Cracking – The process of recovering secret passwords stored in a computer system or transmitted over a network.
400 | SOURCE: SP 800-115
401 |
402 | Password Protected – The ability to protect a file using a password access control, protecting the data contents from being viewed with the appropriate viewer unless the proper password is entered.
403 | SOURCE: SP 800-72
404 |
405 | Patch – An update to an operating system, application, or other software issued specifically to correct particular problems with the software.
406 | SOURCE: SP 800-123
407 |
408 | Payload – The input data to the CCM generation-encryption process that is both authenticated and encrypted.
409 | SOURCE: SP 800-38C
410 |
411 | Penetration Testing – A test methodology in which assessors, using all available documentation (e.g., system design, source code, manuals) and working under specific constraints, attempt to circumvent the security features of an information system.
412 | SOURCE: SP 800-53A
413 |
414 | Personal Identification Number (PIN) – A secret that a claimant memorizes and uses to authenticate his or her identity. PINs are generally only decimal digits.
415 | SOURCE: FIPS 201
416 |
417 | Phishing - A digital form of social engineering that uses authentic looking but bogus emails to request information from users or direct them to a fake Web site that requests information.
418 | SOURCE: SP 800-115
419 |
420 | Plaintext – Data input to the Cipher or output from the Inverse Cipher.
421 | SOURCE: FIPS 197
422 |
423 | Policy Mapping – Recognizing that, when a CA in one domain certifies a CA in another domain, a particular certificate policy in the second domain may be considered by the authority of the first domain to be equivalent (but not necessarily identical in all respects) to a particular certificate policy in the first domain.
424 | SOURCE: SP 800-15
425 |
426 | Port – A physical entry or exit point of a cryptographic module that provides access to the module for physical signals, represented by logical information flows (physically separated ports do not share the same physical pin or wire).
427 | SOURCE: FIPS 140-2
428 |
429 | Port Scanning – Using a program to remotely determine which ports on a system are open (e.g., whether systems allow connections through those ports).
430 | SOURCE: CNSSI-4009
431 |
432 | Portal – A high-level remote access architecture that is based on a server that offers teleworkers access to one or more applications through a single centralized interface.
433 | SOURCE: SP 800-46
434 |
435 | Privilege – A right granted to an individual, a program, or a process.
436 | SOURCE: CNSSI-4009
437 |
438 | Privileged Accounts – Individuals who have access to set “access rights” for users on a given system. Sometimes referred to as system or network administrative accounts.
439 | SOURCE: SP 800-12
440 |
441 | Probe – A technique that attempts to access a system to learn something about the system.
442 | SOURCE: CNSSI-4009
443 |
444 | Profiling – Measuring the characteristics of expected activity so that changes to it can be more easily identified.
445 | SOURCE: SP 800-61; CNSSI-4009
446 |
447 | Protocol – Set of rules and formats, semantic and syntactic, permitting information systems to exchange information.
448 | SOURCE: CNSSI-4009
449 |
450 | Protocol Data Unit – A unit of data specified in a protocol and consisting of protocol information and, possibly, user data.
451 | SOURCE: FIPS 188
452 |
453 | Protocol Entity – Entity that follows a set of rules and formats (semantic and syntactic) that determines the communication behavior of other entities.
454 | SOURCE: FIPS 188
455 |
456 | Proxy – A proxy is an application that “breaks” the connection between client and server. The proxy accepts certain types of traffic entering or leaving a network and processes it and forwards it. This effectively closes the straight path between the internal and external networks making it more difficult for an attacker to obtain internal addresses and other details of the organization’s internal network. Proxy servers are available for common Internet services; for example, a Hyper Text Transfer Protocol (HTTP) proxy used for Web access, and a Simple Mail Transfer Protocol (SMTP) proxy used for email.
457 | SOURCE: SP 800-44
458 |
459 | Proxy Server – A server that services the requests of its clients by forwarding those requests to other servers.
460 | SOURCE: CNSSI-4009
461 |
462 | Public Domain Software – Software not protected by copyright laws of any nation that may be freely used without permission of, or payment to, the creator, and that carries no warranties from, or liabilities to the creator.
463 | SOURCE: CNSSI-4009
464 |
465 | Public Key - A cryptographic key used with a public key cryptographic algorithm, uniquely associated with an entity, and which may be made public; it is used to verify a digital signature; this key is mathematically linked with a corresponding private key.
466 | SOURCE: FIPS 196
467 |
468 | Q
469 |
470 | Qualitative Assessment – Use of a set of methods, principles, or rules for assessing risk based on nonnumeric categories or levels.
471 | SOURCE: SP 800-30
472 |
473 | Quality of Service – The measurable end-to-end performance properties of a network service, which can be guaranteed in advance by a Service-Level Agreement between a user and a service provider, so as to satisfy specific customer application requirements. Note: These properties may include throughput (bandwidth), transit delay (latency), error rates, priority, security, packet loss, packet jitter, etc.
474 | SOURCE: CNSSI-4009
475 |
476 | Quantitative Assessment – Use of a set of methods, principles, or rules for assessing risks based on the use of numbers where the meanings and proportionality of values are maintained inside and outside the context of the assessment.
477 | SOURCE: SP 800-30
478 |
479 | Quarantine – Store files containing malware in isolation for future disinfection or examination.
480 | SOURCE: SP 800-69
481 |
482 | R
483 |
484 | Radio Frequency Identification (RFID) – A form of automatic identification and data capture (AIDC) that uses electric or magnetic fields at radio frequencies to transmit information.
485 | SOURCE: SP 800-98
486 |
487 | Read – Fundamental operation in an information system that results only in the flow of information from an object to a subject.
488 | SOURCE: CNSSI-4009
489 |
490 | Read Access – Permission to read information in an information system.
491 | SOURCE: CNSSI-4009
492 |
493 | Real-Time Reaction – Immediate response to a penetration attempt that is detected and diagnosed in time to prevent access.
494 | SOURCE: CNSSI-4009
495 |
496 | Red Team – A group of people authorized and organized to emulate a potential adversary’s attack or exploitation capabilities against an enterprise’s security posture. The Red Team’s objective is to improve enterprise Information Assurance by demonstrating the impacts of successful attacks and by demonstrating what works for the defenders (i.e., the Blue Team) in an operational environment.
497 | SOURCE: CNSSI-4009
498 |
499 | Red Team Exercise – An exercise, reflecting real-world conditions, that is conducted as a simulated adversarial attempt to compromise organizational missions and/or business processes to provide a comprehensive assessment of the security capability of the information system and organization.
500 | SOURCE: SP 800-53
501 |
502 | Remote Access – Access to an organizational information system by a user (or an information system acting on behalf of a user) communicating through an external network (e.g., the Internet).
503 | SOURCE: SP 800-53
504 |
505 | Repository – A database containing information and data relating to certificates as specified in a CP; may also be referred to as a directory.
506 | SOURCE: SP 800-32
507 |
508 | Risk Assessment – The process of identifying risks to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, and the Nation, arising through the operation of an information system. Part of risk management, incorporates threat and vulnerability analyses and considers mitigations provided by security controls planned or in place. Synonymous with risk analysis.
509 | SOURCE: SP 800-53; SP 800-53A; SP 800-37
510 |
511 | Risk Assessment Methodology – A risk assessment process, together with a risk model, assessment approach, and analysis approach.
512 | SOURCE: SP 800-30
513 |
514 | Risk Assessment Report – The report which contains the results of performing a risk assessment or the formal output from the process of assessing risk.
515 | SOURCE: SP 800-30
516 |
517 | Root Certification Authority – In a hierarchical Public Key Infrastructure, the Certification Authority whose public key serves as the most trusted datum (i.e., the beginning of trust paths) for a security domain.
518 | SOURCE: SP 800-32; CNSSI-4009
519 |
520 | Rootkit – A set of tools used by an attacker after gaining root-level access to a host to conceal the attacker’s activities on the host and permit the attacker to maintain root-level access to the host through covert means.
521 | SOURCE: CNSSI-4009
522 |
523 | S
524 | Safeguards – Protective measures prescribed to meet the security requirements (i.e., confidentiality, integrity, and availability) specified for an information system. Safeguards may include security features, management constraints, personnel security, and security of physical structures, areas, and devices. Synonymous with security controls and countermeasures.
525 | SOURCE: SP 800-53; SP 800-37; FIPS 200; CNSSI-4009
526 |
527 | Sandboxing- A restricted, controlled execution environment that prevents potentially malicious software, such as mobile code, from accessing any system resources except those for which the software is authorized.
528 | SOURCE: CNSSI-4009
529 |
530 | Scanning – Sending packets or requests to another system to gain information to be used in a subsequent attack.
531 | SOURCE: CNSSI-4009
532 |
533 | Secure Socket Layer (SSL) – A protocol used for protecting private information during transmission via the Internet.
534 | * **Note:** SSL works by using a public key to encrypt data that's transferred over the SSL connection. Most Web browsers support
535 | SSL, and many Web sites use the protocol to obtain confidential user information, such as credit card numbers. By convention, URLs that require an SSL connection start with “https:” instead of “http:.”
536 | SOURCE: CNSSI-4009
537 |
538 | Security Content Automation Protocol (SCAP) – A method for using specific standardized testing methods to enable automated vulnerability management, measurement, and policy compliance evaluation against a standardized set of security requirements.
539 | SOURCE: CNSSI-4009
540 |
541 | Signature – A recognizable, distinguishing pattern associated with an attack, such as a binary string in a virus or a particular set of keystrokes used to gain unauthorized access to a system.
542 | SOURCE: SP 800-61
543 |
544 | Signature Certificate – A public key certificate that contains a public key intended for verifying digital signatures rather than encrypting data or performing any other cryptographic functions.
545 | SOURCE: SP 800-32; CNSSI-4009
546 |
547 | Smart Card – A credit card-sized card with embedded integrated circuits that can store, process, and communicate information.
548 | SOURCE: CNSSI-4009
549 |
550 | Social Engineering – An attempt to trick someone into revealing information (e.g., a password) that can be used to attack systems or networks.
551 | SOURCE: SP 800-61
552 |
553 | Spam - Electronic junk mail or the abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages.
554 | SOURCE: CNSSI-4009
555 |
556 | Spoofing – “IP spoofing” refers to sending a network packet that appears to come from a source other than its actual source.
557 | SOURCE: SP 800-48
558 |
559 | Spyware – Software that is secretly or surreptitiously installed into an information system to gather information on individuals or
560 | organizations without their knowledge; a type of malicious code.
561 | SOURCE: SP 800-53; CNSSI-4009
562 |
563 | Steganography – The art and science of communicating in a way that hides the existence of the communication. For example, a child pornography image can be hidden inside another graphic image file, audio file, or other file format.
564 | SOURCE: SP 800-72; SP 800-101
565 |
566 | Supply Chain Attack – Attacks that allow the adversary to utilize implants or other vulnerabilities inserted prior to installation in order to infiltrate data, or manipulate information technology hardware, software, operating systems, peripherals (information technology products) or services at any point during the life cycle.
567 | SOURCE: CNSSI-4009
568 |
569 | System Development Life Cycle (SDLC) – The scope of activities associated with a system, encompassing the system’s initiation, development and acquisition, implementation, operation and maintenance, and ultimately its disposal that instigates another system initiation.
570 | SOURCE: SP 800-34; CNSSI-4009
571 |
572 | System Development Methodologies – Methodologies developed through software engineering to manage the complexity of system development. Development methodologies include software engineering aids and high-level design analysis tools.
573 | SOURCE: CNSSI-4009
574 |
575 | System Integrity – The quality that a system has when it performs its intended function in an unimpaired manner, free from unauthorized manipulation of the system, whether intentional or accidental.
576 | SOURCE: SP 800-27
577 |
578 | T
579 |
580 | Tailoring – The process by which a security control baseline is modified based on: (i) the application of scoping guidance; (ii) the specification of compensating security controls, if needed; and (iii) the specification of organization-defined parameters in the security controls via explicit assignment and selection statements.
581 | SOURCE: SP 800-37; SP 800-53; SP 800-53A; CNSSI-4009
582 |
583 | Tampering – An intentional event resulting in modification of a system, its intended behavior, or data.
584 | SOURCE: CNSSI-4009
585 |
586 | Telecommunications – Preparation, transmission, communication, or related processing of information (writing, images, sounds, or other data) by electrical, electromagnetic, electromechanical, electro-optical, or electronic means.
587 | SOURCE: CNSSI-4009
588 |
589 | Threat – Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, or the Nation through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service.
590 | SOURCE: SP 800-53; SP 800-53A; SP 800-27; SP 800-60; SP 800-
591 | 37; CNSSI-4009
592 |
593 | Threat Analysis – The examination of threat sources against system vulnerabilities to determine the threats for a particular system in a particular operational environment.
594 | SOURCE: SP 800-27
595 |
596 | Threat Assessment – Formal description and evaluation of threat to an information system.
597 | SOURCE: SP 800-53; SP 800-18
598 |
599 | Threat Monitoring – Analysis, assessment, and review of audit trails and other information collected for the purpose of searching out system events that may constitute violations of system security.
600 | SOURCE: CNSSI-4009
601 |
602 | Token – Something that the Claimant possesses and controls (typically a key or password) that is used to authenticate the Claimant’s identity.
603 | SOURCE: SP 800-63
604 |
605 | Tracking Cookie – A cookie placed on a user’s computer to track the user’s activity on different Web sites, creating a detailed profile of the user’s behavior.
606 | SOURCE: SP 800-83
607 |
608 | Traffic Analysis – A form of passive attack in which an intruder observes information about calls (although not necessarily the contents of the messages) and makes inferences, e.g., from the source and destination numbers, or frequency and length of the messages.
609 | SOURCE: SP 800-24
610 |
611 | Trojan Horse – A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program.
612 | SOURCE: CNSSI-4009
613 |
614 | U
615 |
616 | Unauthorized Access – Unauthorized Occurs when a user, legitimate or unauthorized, accesses a resource that the user is not permitted to use.
617 | SOURCE: FIPS 191
618 |
619 | Unauthorized Disclosure – An event involving the exposure of information to entities not authorized access to the information.
620 | SOURCE: SP 800-57 Part 1; CNSSI-4009
621 |
622 | User – Individual or (system) process authorized to access an information system.
623 | SOURCE: FIPS 200
624 |
625 | User Initialization – A function in the life cycle of keying material; the process whereby a user initializes its cryptographic application (e.g., installing and initializing software and hardware).
626 | SOURCE: SP 800-57 Part 1
627 |
628 | V
629 |
630 | Validation – The process of demonstrating that the system under consideration meets in all respects the specification of that system.
631 | SOURCE: FIPS 201
632 |
633 | Verification – Confirmation, through the provision of objective evidence, that specified requirements have been fulfilled (e.g., an entity’s requirements have been correctly defined, or an entity’s attributes have been correctly presented; or a procedure or function performs as intended and leads to the expected outcome).
634 | SOURCE: CNSSI-4009
635 |
636 | Virtual Machine (VM) – Software that allows a single host to run one or more guest operating systems.
637 | SOURCE: SP 800-115
638 |
639 | Virtual Private Network (VPN) – A virtual network, built on top of existing physical networks, that provides a secure communications tunnel for data and other information transmitted between networks.
640 | SOURCE: SP 800-46
641 |
642 | Virus – A computer program that can copy itself and infect a computer without permission or knowledge of the user. A virus might corrupt
643 | or delete data on a computer, use email programs to spread itself to other computers, or even erase everything on a hard disk.
644 | SOURCE: CNSSI-4009
645 |
646 | Vulnerability – Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.
647 | SOURCE: SP 800-53; SP 800-53A; SP 800-37; SP 800-60; SP 800-115; FIPS 200
648 |
649 | Vulnerability Assessment –Formal description and evaluation of the vulnerabilities in an information system.
650 | SOURCE: SP 800-53; SP 800-37
651 |
652 | W
653 |
654 | Web Content Filtering Software – A program that prevents access to undesirable Web sites, typically by comparing a requested Web site address to a list of known bad Web sites.
655 | SOURCE: SP 800-69
656 |
657 | Web Risk Assessment – Processes for ensuring Web sites are in compliance with applicable policies.
658 | SOURCE: CNSSI-4009
659 |
660 | Whitelist – A list of discrete entities, such as hosts or applications that are known to be benign and are approved for use within an organization and/or information system.
661 | SOURCE: SP 800-128
662 |
663 | Wi-Fi Protected Access-2 (WPA2) – The approved Wi-Fi Alliance interoperable implementation of the IEEE 802.11i security standard. For federal government use, the implementation must use FIPS-approved encryption, such as AES.
664 | SOURCE: CNSSI-4009
665 |
666 | Wireless Local Area Network (WLAN) – A group of wireless networking devices within a limited geographic area, such as an office building, that exchange data through radio communications. The security of each WLAN is heavily dependent on how well each WLAN component—including client devices, APs, and wireless switches—is secured throughout the WLAN lifecycle, from initial WLAN design and deployment through ongoing maintenance and monitoring.
667 | SOURCE: SP 800-153
668 |
669 | Write – Fundamental operation in an information system that results only in the flow of information from a subject to an object. See Access Type.
670 | SOURCE: CNSSI-4009
671 |
672 | Write Access – Permission to write to an object in an information system.
673 | SOURCE: CNSSI-4009
674 |
675 | Z
676 |
677 | Zeroize – To remove or eliminate the key from a cryptographic equipment or fill device.
678 | SOURCE: CNSSI-4009
679 |
680 | Zombie – A program that is installed on a system to cause it to attack other systems.
681 | SOURCE: SP 800-83
682 |
--------------------------------------------------------------------------------