The Red Hat Ecosystem Catalog is the official source for discovering and learning more about the Red Hat Ecosystem of both Red Hat and certified third-party products and services.
We’re the world’s leading provider of enterprise open source solutions—including Linux, cloud, container, and Kubernetes. We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.
Formerly known as MantisNet Tawon CVF
F5 eBPF Observability (EOB) provides real-time, eBPF-powered visibility for cloud-native and Kubernetes environments at service provider scale. Built on a lightweight, microservices-based architecture, EOB delivers deep insight into containerized traffic and behavior with minimal overhead.
EOB focuses on live messaging and metadata extraction to support troubleshooting, service assurance, and security analytics, with packet capture available for targeted root-cause analysis. Deployed as a single eBPF-based agent per Kubernetes node via a DaemonSet, EOB eliminates per-pod instrumentation and sidecars, operates in encrypted environments, and integrates seamlessly with Red Hat OpenShift.
The following information was extracted from the dockerfile and other sources.
| Canonical image ID | F5 BIG-IP eBPF Observability (EOB) - Operator |
| Provider | Mantis Networks |
| Architecture | amd64 |
The following evidence verifies the image's security and build process compliance with mandated internal standards.
| Security audit date | 3/25/2026, 4:23:32 PM |
| Container certification |
Use a registry service account token to authenticate your container client. This allows you to pull images without using your personal Red Hat credentials, which is recommended for CI/CD pipelines and automated deployments.
Run the following command, then enter your registry token credentials when prompted by the terminal.
Pull the image
Use the following instructions to get images from a Red Hat container registry using your Red Hat login.
Run the following command, then enter your login credentials when prompted by the terminal.
Pull the image