When it comes to open-source innovation, Red Hat is committed to pushing technological boundaries and enhancing the capabilities of cutting-edge solutions. As we look back at 2023, we’ll discuss Red Hat's role in advancing Extended Berkeley Packet Filter (eBPF) technology, from collaborative contributions to the Linux kernel to strategic implementations within Red Hat's portfolio, and explore the intersection of innovation, performance, security capabilities and networking within the evolving landscape of eBPF.
Kernel upstream collaborations
Red Hat engineers actively collaborated with the Linux kernel community to push critical eBPF enhancements to upstream projects. These contributions include optimizations, bug fixes and the introduction of new features, reinforcing Red Hat's dedication to the open source ecosystem.
Some of the highlights include:
- HID eBPF: Allowing Human Interface Device drivers to be written in eBPF, which will allow for fewer drivers to live in the kernel
- Netfilter eBPF: Enabling the attachment of eBPF programs to Netfilter hooks, adding new use cases for networking eBPF programs
- XDP hints: Providing the foundations for XDP programs to be able to use the hardware offload capabilities of Network Interface Cards (NICs)
- AF_XDP improvements: Adding multi-buffer support and virtual ethernet driver optimizations
- Contributing documentation for eBPF maps
Tooling and framework development
Recognizing the importance of developer tools and frameworks in harnessing the power of eBPF, Red Hat invested in the development of user-friendly tools and frameworks. This helps engineers use eBPF more efficiently for performance monitoring, systems security and networking tasks.
Red Hat Enterprise Linux (RHEL) 9 receives regular updates to its eBPF capabilities, including important tooling like libbpf, bpftool, bcc and bpftrace. In addition, the xdp-tools project has included 3 new utilities to make working with XDP easier:
- xdp-bench for running benchmarks of XDP on the receive side
- xdp-monitor for monitoring XDP errors and statistics using kernel tracepoints
- xdp-trafficgen for generating traffic and sending it out through the XDP driver hook
As the hype around eBPF continues, we’re anticipating an uptake in software that includes eBPF programs. To that end, we’ve focused on providing bpfman, an eBPF program manager that aims to simplify the deployment of eBPF enabled software on Linux and Kubernetes. bpfman has been submitted to the CNCF Sandbox.
Broadened community engagement and support
Red Hat continues to foster a vibrant eBPF community by actively participating in conferences, webinars and meetups. Through these engagements, we share our knowledge and best practices, and collaborate with the broader ecosystem of contributors to help drive the evolution of eBPF.
Here are some highlights of our eBPF talks in 2023:
- eBPF 201: Supercharging Your eBPF Dev Process for Cloud Native Apps - Sanjeev Rampal & Donald Hunter
- Survive eBPF Deployment with Bpfd - Andrew Stoycos, Red Hat & Shane Utt, Kong
- XDP: Past, Present and Future - Netdevconf 0x17 - Toke Høiland-Jørgensen
We maintain xdp-tutorial as a valuable resource for getting started with XDP as well as bpf-examples as a showcase of how eBPF can be used.
Research and development
As eBPF evolves, Red Hat continues to explore the potential of eBPF to enhance and revolutionize networking, security and observability capabilities. Through cutting-edge research initiatives, we aim to push the boundaries of what is possible in this rapidly advancing landscape, enhancing our products to not only meet but exceed the evolving needs of our customers.
One such effort is the Hybrid Networking Stack (HNS), a new approach to high performance cloud native networking which uses in-kernel eBPF technologies advancements, specifically XDP and AF_XDP, as well as the Cloud Native Data Plane (CNDP) framework, to provide a cloud native Linux based alternative to DPDK. Ongoing efforts include Kubernetes integration via the AF_XDP Device Plugin as well as a migration path from DPDK to AF_XDP without having to modify the DPDK application. Additionally, our research project with Karlstad University is entering its third year and has been featured in a number of research papers.
Red Hat's usage of eBPF
As a leading provider of open-source solutions, in 2023 Red Hat strategically integrated eBPF into its portfolio to address diverse challenges across various domains.
- Performance monitoring and optimization: RHEL has embraced eBPF for performance monitoring, allowing users to gain deeper insights into system behavior. With enhanced profiling capabilities, RHEL users can optimize their applications and infrastructure for peak performance and with the help of Kepler, OpenShift users can better optimize for energy efficiency.
- Systems security and compliance: eBPF's powerful capabilities for in-kernel programmability have been leveraged by Red Hat to strengthen security measures. Through the use of eBPF programs in Red Hat Advanced Cluster Security (ACS), customers can help protect their Kubernetes workloads on OpenShift.
- Networking innovations: In the networking domain, Red Hat utilized eBPF to introduce innovative solutions for packet filtering, traffic monitoring and network visibility. This led to more efficient and scalable networking solutions for Red Hat customers.
Looking ahead for eBPF
Red Hat envisions a continued evolution of eBPF, with a focus on addressing emerging challenges and unlocking new possibilities.
- We anticipate further advancements in eBPF to enhance performance monitoring and optimization capabilities. This includes refining tooling and frameworks to provide users with even more granular insights into system behavior.
- With an ever-growing threat landscape, we’re also seeking to extend eBPF to apply to more advanced IT security use cases. This includes developing new security modules and integrations that leverage eBPF's flexibility to adapt to evolving security challenges, along with an eBPF signing solution and privilege controls for programs looking to load eBPF.
- From a Red Hat product portfolio view, we’re looking to further deepen integration of eBPF, providing users with a more seamless and unified experience across the Red Hat ecosystem. This includes tighter integration with Red Hat OpenShift and other key solutions.
As Red Hat looks forward to 2024, we remain committed to pushing the boundaries of eBPF's capabilities, addressing emerging challenges and delivering innovative solutions to our users.
저자 소개
Dave Tucker is a Senior Principal Software Engineer at Red Hat leading networking projects within the Emerging Technologies group in the Office of the CTO. Starting his career in network engineering, Dave shifted to software development with a focus on Software Defined Networking in 2014. His journey through the tech industry is marked by a unique blend of technical marketing and product management expertise, alongside significant engineering roles. A notable milestone in Dave's career was his co-founding of Socketplane, a networking startup that was acquired by Docker in 2015. Currently, Dave is the driving force behind the bpfman project at Red Hat, which focuses on enhancing the security and deployment of eBPF programs on Linux and Kubernetes. Dave is an active Rust programmer and a recognized speaker at industry conferences, where he shares his knowledge and insights into network software development.
채널별 검색
오토메이션
기술, 팀, 인프라를 위한 IT 자동화 최신 동향
인공지능
고객이 어디서나 AI 워크로드를 실행할 수 있도록 지원하는 플랫폼 업데이트
오픈 하이브리드 클라우드
하이브리드 클라우드로 더욱 유연한 미래를 구축하는 방법을 알아보세요
보안
환경과 기술 전반에 걸쳐 리스크를 감소하는 방법에 대한 최신 정보
엣지 컴퓨팅
엣지에서의 운영을 단순화하는 플랫폼 업데이트
인프라
세계적으로 인정받은 기업용 Linux 플랫폼에 대한 최신 정보
애플리케이션
복잡한 애플리케이션에 대한 솔루션 더 보기
오리지널 쇼
엔터프라이즈 기술 분야의 제작자와 리더가 전하는 흥미로운 스토리
제품
- Red Hat Enterprise Linux
- Red Hat OpenShift Enterprise
- Red Hat Ansible Automation Platform
- 클라우드 서비스
- 모든 제품 보기
툴
체험, 구매 & 영업
커뮤니케이션
Red Hat 소개
Red Hat은 Linux, 클라우드, 컨테이너, 쿠버네티스 등을 포함한 글로벌 엔터프라이즈 오픈소스 솔루션 공급업체입니다. Red Hat은 코어 데이터센터에서 네트워크 엣지에 이르기까지 다양한 플랫폼과 환경에서 기업의 업무 편의성을 높여 주는 강화된 기능의 솔루션을 제공합니다.