TCP/IP Bypass with eBPF in Istio
This solution aims to bypass TCP/IP stack to accelerate service mesh, it benefits two scenarios:
- p2p communication with sidecar injected
- p2p communication without sidecar injected
This solution is totally independent, which
- does not require changes to linux kernel
- does not require changes to Istio and Envoy (>= v1.10)
- does not require changes to CNI plugin
15%~20% latency decrease is expected for p2p communication on the same host.
System Requirements
- Minimal: Distribution with kernel version >= 4.18
- Optimal: Ubuntu 20.04 with Linux 5.4.0-74-generic
Build Docker Image and Load eBPF Program
Build docker image:
$ docker build --network=host -t bpf_bypass_tcpip .
Load eBPF program via docker command:
$ docker run -v /sys/fs:/sys/fs --net=host --privileged --name tcpip-bypass bpf_bypass_tcpip
Load eBPF program via setting up a deamonset:
$ kubectl apply -f bypass-tcpip-daemonset.yaml
Unload eBPF program via destroying Docker container or deamonset