Join Interactive Workshop on Cloud-Native Network Functions at Open Source Summit
ONAP and Kubernetes – two of the fastest-growing Linux Foundation projects – are coming together in the next generation of telecom architecture.
ONAP provides a comprehensive platform for real-time, policy-driven orchestration and automation of physical and virtual network functions, and Kubernetes is an open source system for automating deployment, scaling, and management of containerized applications. Telcos are now examining how these virtual network functions (VNFs) could evolve into cloud-native network functions (CNFs) running on Kubernetes.
In a three-hour interactive workshop on cloud-native network functions at Open Source Summit, Dan Kohn, Executive Director, Cloud Native Computing Foundation, and Arpit Joshipura, GM Networking & Orchestration, The Linux Foundation, will explain networking and cloud-native terms and concepts side by side.
“As the next-generation of telco architecture evolves, CSPs are exploring how their Virtual Network Functions (VNFs) can evolve into Cloud-native Network Functions (CNFs), ” said Joshipura. “This seminar will explore what’s involved in migrating from VNFs to CNFs, with a specific focus on the roles played by ONAP and Kubernetes. We hope to see a broad swatch of community members from both the container and networking spaces join us for an engaging and informative discussion in Vancouver.”
Session highlights will include:
- Migrating and automating network functions to virtual networking functions to CNFs
- Overview of sub-projects focusing on this migration, including cross-cloud CI, ONAP/OVP, FD.io/VPP, etc.
- The role for a service mesh, such as like Envoy, Istio, or Linkerd, in connecting CNFs with load balancing, canary deployments, policy enforcement, and more.
- What is involved in telcos adopting modern continuous integration / continuous deployment (CI/CD) tools to be able to rapidly innovate and improve their CNFs while retaining confidence in the reliability.
- Differing security needs of trusted (open source and vendor-provided) code vs. running untrusted code
- The role for security isolation technologies like gVisor or Kata
- Requirements of the underlying operating system
- Strengths and weaknesses of different network architectures such as multi-interface pods and Network Service Mesh
- Status of IPv6 and dual-stack support in Kubernetes
Additional registration is required for this session, but there is no extra fee. Space is limited in the workshop, so reserve your spot soon. And, if you plan to attend, please be willing to participate. Learn more and sign up now!
This article originally appeared at The Linux Foundation.