SPIFFE
SA is at cluster level.
So Nepheo could not use SA
Every CSP has workload identity
spiffe is standard:
- spiffe id. It is URL.
- spiffe verifiable documents (SVIDs): cert or toekn
- The spiffe workload API.
spire: spiffe Runtime Environment.
- A toolchain of API for establising trust based on spifee
- provides out of the box attestation plugins
Expiry is short. can be 4 hours. So no need of revocation
* spire agent can be colocated. it is dameonset in K8s.
=========
Nephio
ss7, sigtra, ngin, CN model (e.g. ORAN)
DISH is on AWS
CP based requirement for identity
Nephio SIG security wiki page has all details
Porch : Package Orchestration KPT
KPT does in place substitution
5G requirements / usecases
IMS, SMO , IMS
LF article about Nephio spifee implementation at LF wiki
Catalog packages at GitOps
Each cluster shall have its own repo
Identity federation is based on cert chain.
R3 Oct 23 of Nephio.
It is proposed solution. It will be upstream.
Workload identity solution shall not be native to specific cloud provider.
Identity federation across CSPs.
Google, E//, RedHat are in Nephio
SPIRE's alternative may be due to speicfic attestion plugin
What protocol between SPIRE Agent and SPIRE server? Bootstrap trust. it is pre-provision aspect. REST API and TLS. x.509 cert will be pulled. protocol is spire specific
Today's attestation is based on SA, pod labels, namespace.
CA, Cert Manager can be used.
Network Automation
Telecom Networks are complex due to multi layer, multi vendor
N/w Management -> SDN -> Intent Based Networking (programable and declarative) -> Cloud Native Networking
Earlier Monolithic NMS with FCAPS
Now : CICD, Microservice, K8s.
NSP (N/s Service Platform) is for IP and optical domain
It has API (OpenAPI Spec).
Model-driven mediation
Framework has orchestration
Contributed by Nokia: Kubenet, gNMIc, SDCIO
1. Unified Artifactory Manager Component
It uses Kubespray
UAM creates CRs. CRs are consumed by deployer. Deployer is short lived job.
2. Telemetry:
A: internal NSP components
B: External system
Four Core Principle
1. Model driven
2. Vendor & Mediation Agnostic
3. Horizontal scale
4. Resilent
Six Layers
6. Analytics and optimization layer
5. o/p / storage layer : Kafka
3.and 4 make it model driven
4. Normalization Layer
3. Mapping layer
2. Collector layer (SNMP, gNMI)
1. N/w layer
Architecture
UAM, Restconf GW
source : from network using SNMP, gNMI
Sink: influxDB, Prm, VErtica, Kafka, PostgreSQL, File
Source and Sink are connected using NATS. NATS also connected with multiple transform worker using transformer CR from UAM
gNMIc
1. single mode
2. CLI mode (auto complete option)
3. cluster mode (more replica. one is leader).
Kubenet and SDCIO
declarative model and event driven reconciliation. It is more n/w automation using K8s. Gitops principle.
Arch:
SDCIO Schema Driven Configuration.
IPAM etc are CRD to build abstract network configuration.
Config CR and ConfigSet CR, RunningConfig, UnmanagedConfig. It has different backend own etcd.
YANG by schema server.
==========================
BNG, CUPS specific implementation
Kubenet Nephio are solving same problem? May be overlap.
APIs for sink? customer provides sink.
Kubenet is automation. more than NMS
Slide 21: Cisco Prime