ebpf-sig: Orchestrating eBPF programs in Fedora
2024-08-08 , Rocky (Breakout 2)

Explore how eBPF, available since Linux 4.4, revolutionizes kernel-level
operations without source code modification. Discover the newly formed
ebpf-sig group's efforts in Fedora to promote eBPF usage and integrate
bpfman as a key tool.

Within Fedora, we bootstrapped and created the ebpf-sig group just recently
in order promote ebpf usage and one of our first work topics has been to add
a self contained change to have bpfman available.

bpfman, serves as a pivotal tool in this domain. It simplifies eBPF
application deployment and management. While it also works with Kubernetes
clusters, offering a Custom Resource (CR) operator for streamlined
operations the Fedora package aims to serve as a simple tool to not only
deploy but to orchestrate secure ebpf programs.

Our presentation will delve into bpfman's evolution, stemming from the Rust
library Aya for eBPF development. We'll explore practical aspects like
deploying applications, and how the user experience is greatly enhanced in
comparison to current available tools.

Security concerns surrounding eBPF application, SELinux and eBPF token will
be addressed, along with insights into integration challenges and ongoing
collaborative efforts within the ebpf and the rust sig-groups in Fedora.

Notably, eBPF's adoption by industry giants like Google, Netflix, Shopify,
and Cloudflare underscores its relevance, prompting an insightful discussion
on its orchestration in Fedora and Kubernetes.

See also: View recording on YouTube

Daniel is a Principal Software Engineer for OpenShift Engineering at Red Hat. He’s been involved in the creation of the ebpf-sig group in Fedora and the development of bpfman. He's interested in networking and observability technolgies with container systems such as Kubernetes and OpenShift. He’s been a PTL (Project Team Lead) at some projects in OpenStack, a member of the Kubernetes SIG Group and part of the panel for the Leveraging Containers and OpenStack.