- New White House tariff exemptions for electronics could offer temporary break for tech
- The Growing Cost of Non-Compliance and the Need for Security-First Solutions
- The Art of Delegation in a Digital Age: Empowering Teams, Not Just Offloading Tasks
- I compared two of the best Roborock models on the market - and it came down to the wire
- I found the smartest (and cheapest) way to protect your laptop's charging port
Groundcover grows funding for eBPF-based observability tech

Groundcover’s expanded eBPF approach goes beyond traditional network monitoring, Azulay said: “eBPF is no longer just about network monitoring. We use it as an x-ray into operations flowing through the kernel of the operating system.”
Groundcover uses eBPF to provide full application-level traces. Azulay explained that the system can see the payload of the request and the response. He noted that, for example, if a user is sending a prompt to OpenAI, Groundcover’s eBPF-based technology will see the exact prompt and the response from the server.
How Groundcover uses eBPF to enable observability
Groundcover uses two types of eBPF probes to get information. The first type is kernel space, which gets information coming directly into the Linux kernel at an operating system level. The second is via user space probes, which gives visibility into running applications.
“We can actually observe things happening in the application stack,” Azulay explained. “Even if a packet is encrypted when it goes through the Linux kernel, we know how to observe it before encryption in the actual application stack.”
Unlike traditional network-focused eBPF tools, he claimed that Groundcover’s approach provides full application monitoring, performance profiling and detailed transaction insights.
“eBPF kind of replaces a lot of the things we expect” from an application performance monitoring (APM) solution, Azulay said. “It’s not just sitting on the network layer seeing packets go through a wire. It’s much more sophisticated, with context about the application.”