Home Blog Page 866

Navigating OPNFV’s Brahmaputra Release

opnfv brahmaputra infographic final 2 0-1This week, we celebrate the second OPNFV platform release: Brahmaputra. I am so proud of the entire OPNFV community who have come together to create this incredibly rich and diverse experience that marks significant progress toward a deployable open source platform for NFV. It’s our first full experience with a massively parallel simultaneous release process and demonstrates that we can meet the complex challenge of collaborating upstream to advance the ecosystem. (Learn more about Brahmaputra here: www.opnfv.org/brahmaputra)

Brahmaputra software delivers enhanced testing capabilities (system and performance), new deployment and integration scenarios (weaving in new controllers and installers), improved automation of our continuous integration and continuous deployment toolchain, and last (but not least) many new carrier-grade features (such as IPv6, VPN configuration, fault detection, resource reservation, and dataplane acceleration).

But what I’m most proud of is the growth and strength of our community: Systems integration is hard, requires diligent collaboration, and is essential in our march toward NFV viability. It’s been said before, but bears repeating: the strength of any open source project depends on the community involved in developing it.

What we’ve seen with Brahmaputra is key stakeholders collaborating across the industry and a marked increase in community engagement overall. For example, 35 projects were involved in the Brahmaputra release, compared to just five in Arno. That’s a six-fold increase in just ten months! Even more telling is the more than 140 developers involved in the release—which means we’ve seen developer participation in OPNFV as a whole increase five-fold since August of 2015.

But at the same time, so much of what we do is upstream collaboration, which has also grown in size and impact with Brahmaputra. A great deal of the effort going on behind the scenes is in working with other communities, including KVM, OVS, OpenStack, Linux kernel, OpenDaylight Project, ONOS, Open Contrail, ETSI, and IETF. If you think about how many developers across all these various organizations have contributed to the release, it’s a feat that could only be achieved through open source development.

Brahmaputra represents a significant milestone in project maturity. It’s now “lab-ready,” which means it provides a viable starting point for evolving NFV use cases (such as SFC and L3VPN) and composing services in an actual lab environment. It brings improvements to platform-level testing and project infrastructure, including framework and documentation updates that set the stage for further development of the platform, but also scenarios that can be tested now.

Brahmaputra’s continuous integration mechanisms provide a stable framework for deploying and testing new use cases across the extensive Pharos community labs, which played a pivotal role in the development of Brahmaputra as they were used for release validation along with the OPNFV bare metal lab hosted by the Linux Foundation.

OPNFV releases are centered around scenarios, i.e., compositions of components and their configuration as well as associated installation, integration and testing. Brahmaputra will deliver the entire set of deployment scenarios incrementally, with additional scenarios becoming available in a set of release editions as they achieve stability. Moving forward, we’ll continue to improve the platform tooling, enhance testing capabilities, and work with upstream communities to introduce new features.

I encourage you to get involved! Today you can download OPNFV Brahmaputra and if you’re a developer, join the mailing lists or weekly Technical Steering Committee (TSC) calls to help shape the direction of OPNFV. We’ll be hosting our first plugfest the week of May 9th at at the CableLabs headquarters in Louisville, CO, which will provide a great opportunity to collaborate and test interoperability of different products with the Brahmaputra release.

Comments from OPNFV Brahmaputra Developers

“I am proud of the Brahmaputra release for its lab-readiness–we will be able to develop innovative applications, experiment with new use cases and demonstrate the interoperability of the platform. I am particularly proud of the IPv6 feature in OPNFV, which extends the current capabilities of the Neutron Router and the ODL L3 Router to any VM that is managed by OPNFV and acts as an IPv6 vRouter. Thus, it allows flexible service design, provisioning and deployment on OPNFV.” – Bin Hu

“This release includes the results of the NFV feature development pipeline, which start from the real operator requirements and go through code development in the relevant upstream projects towards a reliable NFV platform, powered by open collaboration.” – Ryota Mibu, NEC/Doctor Lead

chris 0About the author: Chris Price leads open source industry collaboration for Ericsson in the areas of NFV, Cloud & SDN from the CTO’s office in Sweden and is an active member of the technical steering comitee’s of the OpenDaylight and OPNFV Projects.  Chris’ experiences include leading Ericssons’ IP&Broadband network architecture and standardization teams with a rich history in development of systems and technology in the areas of network management, policy control and user service management, user session control plane solutions, and DPI technologies.

Cloning Linux from a Bundle

tux-smallIf you find yourself on an unreliable Internet connection and need to perform a fresh clone of Linux.git, you may find it tricky to do so if your connection resets before you are able to complete the clone. There is currently no way to resume a git clone using git, but there is a neat trick you can use instead of cloning directly — using git bundle files.

Here is how you would do it.

  1. Start with “wget -c“, which tells wget to continue interrupted downloads. If your connection resets, just rerun the same command while in the same directory, and it will pick up where it left off:

    wget -c https://cdn.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/clone.bundle
  2. Once the download is completed, verify that the bundle has downloaded correctly:

    git bundle verify clone.bundle
    ...
    clone.bundle is okay
    
  3. Next, clone from the bundle:

    git clone clone.bundle linux
    
  4. Now, point the origin to the live git repository and get the latest changes:

    cd linux
    git remote remove origin
    git remote add origin https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
    git pull origin master
    

Once this is done, you can delete the “clone.bundle” file, unless you think you will need to perform a fresh clone again in the future.

The “clone.bundle” files are generated weekly on Sunday, so they should contain most objects you need, even during kernel merge windows when there are lots of changes committed daily.

OpenSSL Update Fixes Drown Vulnerability

The Drown attack decrypts TLS sessions on servers supporting SSL v2 and using RSA key exchange. Drown is different from other attacks against TLS in that it doesn’t need servers to be using the older version; the attack will succeed as long as the targeted system supports SSL v2. The cross-protocol attack (CVE-2016-0800) could lead to decryption of any encrypted session using SSL/TLS protocols as long as the server supports SSL v2 and uses RSA key exchange, the researchers said in their technical paper.

By making repeated SSL v2 connection requests, researchers uncovered bits of information about the server’s private RSA key. After enough requests, researchers were able to obtain the private key to decode the TLS sessions. The attack scope widens if the organization reuses that private RSA key across servers, even if different certificates are used.

The attack is made worse by two additional implementation vulnerabilities in OpenSSL, prompting the project team to release versions 1.0.2g and 1.0.1s to address the issues.

Read more at InfoWorld

RDO Kilo ML2&OVS&VLAN Mutti Node Deployment on Fedora 23

Current post follows up  Hackery to get going RDO Kilo on Fedora 23 . To complete packstack run for two nodes Controller/Network and Compute setup I had to apply as pre-installation following patches, otherwise neutron puppet crashed on Fedora 23 :-
1. Fix vs_port usage in Red Hat distros https://review.openstack.org/#/c/273174/   

2. Explicitly say that ovs_redhat parent is ovs https://review.openstack.org/#/c/189301/

************************************************************************
As post-installation patch for python-glanceclient  17.0-3 on F23
***********************************************************************
Convert headers to lower-case when parsing metadata

https://review.openstack.org/#/c/244899/

To be able to work with python-urllib3 1.13.1 installed on F23.  In other words,  to rebuild python-glanceclient-0.17.0-3.fc23.src.rpm and re-install rpms produced by the build , followed by `openstack-service restart`.  Would I have separated Storage Node glance client should be patched on both Storage node and Controller as well.

Complete text maybe seen here

 

 

 

 

 

How to install WordPress with Apache, MariaDB and PHP 7 on Arch Linux

WordPress is a popular, dynamic, blog-focused content management system. The software is built upon a LAMP or LEMP stack and features an extensive plugin framework and theme system, which allows site owners and developers to deploy easy-to-use and powerful publishing tools. This tutorial will help you how to install and configure WordPress with Apache2, MariaDB and PHP 7 on Arch Linux.

Read more at HowtoForge

8 IoT Operating Systems Powering the Future

Unlike PCs and mobile devices, there’s a wide variety of commercial and open source operating systems powering the IoT. Here are eight leading contenders and the best use-cases for them.

The tech industry is spending a great deal of time focusing its efforts on the Internet of Things (IoT) boom. Both for-profit technology companies and open source community members are promoting their operating system as the one to choose for a multitude of IoT purposes. But the fact is, not every OS is ideal for every IoT use. Because of this, there’s going to be some variety in the IoT OS space.

Read more at Information Week

 

Linux Mint Devs Explain Timeline of Website Hack

linux-mint-devs-explain copyThey received a lot of help from the community. The Linux Mint team is recovering from the website attack in February that seriously affected their credibility. The lead developer of the project, Clement Lefebvre explained in great detail everything that happened.

…The team is now working to fix the image of the project and the first step in this process is to inform the users about everything that happened. Nothing was held back, and we now know the entire timeline of the events.

IoT Can Be Hard, But Red Hat and Eurotech Are Teaming Up to Make It Easier

Through a new partnership, they’re building an end-to-end architecture to simplify integration. Italy-based Eurotech offers machine-to-machine platforms and other IoT products. Red Hat plans to combine its open-source Red Hat Enterprise Linux and Red Hat JBoss middleware with Eurotech’s Everyware Software Framework and Eurotech Everyware Cloud to create an end-to-end architecture for IoT. This will let enterprises integrate operational data from computing equipment at the edge of the network with cloud-based back-end services.

Enterprise IoT needs computing capability at the edges of networks so companies don’t have to ship masses of data to the cloud for real-time processing. Instead, data aggregation and transformation, plus data integration and routing, can take place close to the operational devices.

Read more at PCWorld

OPNFV Promises More Powerful Platform

With its second software release, named for the Indian river Brahmaputra, the OPNFV is flexing its muscle as an organization, showing off not only more robust capability for testing NFV use cases and functionality but also key feature enhancements. The biggest takeaway, however, is a more robust platform that can take in the work of diverse upstream groups in the virtualization space and a much larger development community, moving forward more quickly.

Those key features include such things as the ability to spin up and configure Layer 3 virtual private networks, support for IPv6 and its testing, and initial service function chaining using OpenDaylight’s Beryllium SDN controller.

Read more at LightReading

Shippable 4.0 Sets Sail with Improved Docker Integration

Developers are facing more work than ever as workflow pipelines shift them into creating new builds dozens or even hundreds of times a day. When server platform provider Packet.net set out to optimize their on-premise build system, it looked to Shippable to help them reach its goals. By onboarding Shippable, the company saw an increase of eight times over their original build times.

This week, Shippable has introduced a variety of new features including customizable Docker workflows, better pipeline visualization, and more in its version 4.0 release…. The first thing users will notice about Shippable v4.0 is its increased flexibility. Developers can use the tools and platforms they’re working with currently to automate their build and deployment pipelines.

Read more at The New Stack