Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[RA2 Ch04]: Networking part of Ch4 in RA2 #821

Merged
merged 6 commits into from
Jan 10, 2020
Merged

Conversation

CsatariGergely
Copy link
Collaborator

No description provided.

@CsatariGergely CsatariGergely changed the title Networking part of Ch4 in RA2 [RA2 Ch04]: Networking part of Ch4 in RA2 Dec 20, 2019
@walterkozlowski
Copy link
Collaborator

walterkozlowski commented Dec 23, 2019 via email

Copy link
Collaborator

@tomkivlin tomkivlin left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'll mark as approved as once @msidana's comments are resolved I'm happy.

@tomkivlin tomkivlin added this to PR Review in progress in old-RA2 via automation Dec 24, 2019
@tomkivlin tomkivlin added this to the Snezka milestone Dec 24, 2019
This change adds references to the different requirements from Ch01.
Copy link
Collaborator

@walterkozlowski walterkozlowski left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

My comments have not been addressed either. I do not understand why Nokia's DAMN solution is mandated here, versus for example Maltus. We have to discuss and decide if we either mandate one set of CNI plug-ins (in that case Maltus is a much more common and implemented in many reference architectures), or we leave few options for implementation. I would opt to start with the most common, and simplest, which in my view would be Maltus with Flannel, and then start adding others. In any case, this is where perhaps we should have a discussion internally but also with the Kubernetes group?

@msidana
Copy link
Collaborator

msidana commented Dec 30, 2019

My comments have not been addressed either. I do not understand why Nokia's DAMN solution is mandated here, versus for example Maltus. We have to discuss and decide if we either mandate one set of CNI plug-ins (in that case Maltus is a much more common and implemented in many reference architectures), or we leave few options for implementation. I would opt to start with the most common, and simplest, which in my view would be Maltus with Flannel, and then start adding others. In any case, this is where perhaps we should have a discussion internally but also with the Kubernetes group?

I agree with @walterkozlowski . I have nothing against DAMN or a particular solution but there should be a reasoning in the document on how and why we selected DANM/MULTUS. Once that is answered, we should also have a description of the REASON for selecting CALICO.

Comment on lines 41 to 44
The used CNI multiplexer/metapulgin must be [DANM](https://github.com/nokia/danm)
as it provides the possibility to use several other CNI plugins (`req.inf.ntw.16`) and provides an API based solution to administer the networks (`req.inf.ntw.10`) from a central point (`req.inf.ntw.11`).
[Calico](https://github.com/projectcalico/cni-plugin) must be used as the CNI what complies with the basic networking assumptions of Kubernetes based on the requirement `req.inf.ntw.02`.
For the network of signalling connections the built in IPVLAN CNI of DANM must be used as it provides NAT-less connectivity (`req.inf.ntw.03`). For the user plane network(s) fullfilling requirement `req.inf.ntw.04` the [User Space CNI](https://github.com/intel/userspace-cni-network-plugin) must be used.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@CsatariGergely thanks for this - it's helpful. What would make this complete, for me, is for the reasons that the alternatives (i.e. Multus, Flannel, etc.) are able to meet the requirements, as that is the unanswered question left open here.

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@tomkivlin is there anything still open here?

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

For Multus v DANM, yes. For the Calico part, I don't think it's as simple-a-comparison. For example, Flannel and Calico together (/canal) could deliver the requirements, yes? And there are other CNI plugins that also support NetworkPolicy such as Cilium and Weave Net.

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

TBH I don't think Canal is actively maintained by anyone, or is widely used
Agree Cilium could be an interesting alternative, however does its NP implementation work if your traffic is not in L7?

@CsatariGergely
Copy link
Collaborator Author

My comments have not been addressed either. I do not understand why Nokia's DAMN solution is mandated here, versus for example Maltus. We have to discuss and decide if we either mandate one set of CNI plug-ins (in that case Maltus is a much more common and implemented in many reference architectures), or we leave few options for implementation. I would opt to start with the most common, and simplest, which in my view would be Maltus with Flannel, and then start adding others. In any case, this is where perhaps we should have a discussion internally but also with the Kubernetes group?

I hoped, that my references to the requirements satisfied your comments. Would it be okay if I add a comparision table of DANM and Multus features in reference to the requirements? Can you please refer to the many reference architectures where Multus is implemented? I'm only aware of the KNI Blueprint family in Akraino what is similar to DANM's presence in the Akraino REC blueprint.

Due to requests in comments this change adds a comparision table of the
relevant requirements and additional features of DANM and Multus.
@petorre
Copy link
Collaborator

petorre commented Jan 2, 2020

Can you please refer to the many reference architectures where Multus is implemented? I'm only aware of the KNI Blueprint family in Akraino what is similar to DANM's presence in the Akraino REC blueprint.

In products from Red Hat, Ericsson and several other vendors.

@CsatariGergely
Copy link
Collaborator Author

Can you please refer to the many reference architectures where Multus is implemented? I'm only aware of the KNI Blueprint family in Akraino what is similar to DANM's presence in the Akraino REC blueprint.

In products from Red Hat, Ericsson and several other vendors.

I would rather call these vendor specific implementations and not reference architectures.

| Service based dicovery of all provisioned interfaces | Not supported | Supported |

[Calico](https://github.com/projectcalico/cni-plugin) must be used as the CNI what complies with the basic networking assumptions of Kubernetes based on the requirement `req.inf.ntw.02` due to it's capability to handle `NetworkPolicies`, what is missing from [Flannel](https://github.com/coreos/flannel-cni).
For the network of signalling connections the built in IPVLAN CNI of DANM must be used as it provides NAT-less connectivity (`req.inf.ntw.03`). For the user plane network(s) fullfilling requirement `req.inf.ntw.04` the [User Space CNI](https://github.com/intel/userspace-cni-network-plugin) must be used.
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

IMO MACVLAN is as valid as IPVLAN, depends on whether CNF requires L2, or L3 unique addresses


[Calico](https://github.com/projectcalico/cni-plugin) must be used as the CNI what complies with the basic networking assumptions of Kubernetes based on the requirement `req.inf.ntw.02` due to it's capability to handle `NetworkPolicies`, what is missing from [Flannel](https://github.com/coreos/flannel-cni).
For the network of signalling connections the built in IPVLAN CNI of DANM must be used as it provides NAT-less connectivity (`req.inf.ntw.03`). For the user plane network(s) fullfilling requirement `req.inf.ntw.04` the [User Space CNI](https://github.com/intel/userspace-cni-network-plugin) must be used.

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

and I maintain that SR-IOV Device Plugin managed VFs are must haves :)

in anycase, userspace CNI in itself is nothing. we might need to elaborate which backend we want to use behind it: OVS-DPDK, or VPP

@Levovar
Copy link

Levovar commented Jan 6, 2020

Even me as DANM author am not a fan of hardcoding implementation choices into an arch spec :)
Though I sincerely believe my solution supports more features than the others, but each to its own. All have merits, and popularity definitely became a technical attribute in recent years. I'm sure at some point Multus will be able to copy the missing extra features too.

Food for thought for Multus operators tho: how do you make sure in a K8s environment equipped with Multus that no CNFs can overstep their boundaries?
Let's say IPVLAN/MACVLAN is also supported in the same environment, as outlined by this document. What's stopping me as a CNF from creating an IPVLAN/MACVLAN type CRD using any VNI, subnet, or host device I want?
Let's say host-device CNI is also supported. Same question: how do you stop the CNF from taking away a whole PF from the host network namespace? For example the one dedicated for infra traffic.
The only answer I could ever come up with is "well, I don't allow CNFs to access network management API at all via RBAC" but then your LCM operations got way more complex - possibly multiple Helm charts per every CNF, constant need for tenant and cluster admin intervention etc.

BTW do we have a requirement for these security issues? Something like "CNI shall be able to reject CNF requests related to protected network resources"

Addressing incoming comments this change adds the option to use MACVLAN CNI,
lists the backend options for the User Space CNi and adds the SR-IOV
Device Plugin to the SR-IOV related note.
Copy link
Collaborator

@walterkozlowski walterkozlowski left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Still requires discussion and changes in my view. We cannot mandate "must" one vendor proprietary CNI plug-in.

@tomkivlin
Copy link
Collaborator

Still requires discussion and changes in my view. We cannot mandate "must" one vendor proprietary CNI plug-in.

My proposal is this: rather than avoiding a merge until all potential options are listed, @CsatariGergely could you modify the wording to suggest future additions can be made, e.g. "Here are the CNI plugins that conform:" and list what you have now. We can then raise subsequent PRs to add to the list, rather than waiting until all the options are ready to list before merging. @walterkozlowski would that be ok with you?

Copy link
Collaborator

@tomkivlin tomkivlin left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

As suggested in previous comment, modify wording to imply future additions to a list can be made.

@walterkozlowski
Copy link
Collaborator

walterkozlowski commented Jan 9, 2020 via email

@tomkivlin
Copy link
Collaborator

@walterkozlowski great. @CsatariGergely would you be ok to make the suggested change, or shall I?

@CsatariGergely
Copy link
Collaborator Author

@walterkozlowski is it okay if I add an editors note saying:
"> Editors note: The following chapter lists a set of CNI plugins compliant with the Reference Architecture. The list of compliant components might change in future releases." ?

As we were not able to agree on the set of CNI plugins this
change adds a note that the list can be changed in the future.
@tomkivlin
Copy link
Collaborator

@walterkozlowski if you're able to approve this in your morning, we can look to merge, thanks.

@msidana
Copy link
Collaborator

msidana commented Jan 9, 2020

@walterkozlowski is it okay if I add an editors note saying:
"> Editors note: The following chapter lists a set of CNI plugins compliant with the Reference Architecture. The list of compliant components might change in future releases." ?

Can we also remove the MUST here and change it to MAY, rephrasing The used CNI multiplexer/metapulgin must be DANM ..to something like CNI multiplexer/metapulgin like Multus, DANM etc may be used... so that the RA doesn't enforces a particular choice.

@walterkozlowski
Copy link
Collaborator

I agree with @msidana and I asked before for changing MUST to MAY in relation to use DAMN. @CsatariGergely can you please change it so we can approve it.

@walterkozlowski
Copy link
Collaborator

walterkozlowski commented Jan 10, 2020 via email

This change switches the "must" statements regarding to CNI-s to
"may" statements and adds a cladification text to the related
editors note how this will be fixed in the next releases.
@CsatariGergely
Copy link
Collaborator Author

I have not approved as I have not seen any changes. Looks to me like still DAMN is mandated as MUST. AM I looking at the wrong spot? Regards Walter From: Tom Kivlin notifications@github.com Sent: Friday, 10 January 2020 2:39 AM To: cntt-n/CNTT CNTT@noreply.github.com Cc: Kozlowski, Walter Walter.Kozlowski@team.telstra.com; Mention mention@noreply.github.com Subject: Re: [cntt-n/CNTT] [RA2 Ch04]: Networking part of Ch4 in RA2 (#821) [External Email] This email was sent from outside the organisation – be cautious, particularly with links and attachments. @walterkozlowskihttps://github.com/walterkozlowski if you're able to approve this in your morning, we can look to merge, thanks. — You are receiving this because you were mentioned. Reply to this email directly, view it on GitHub<#821?email_source=notifications&email_token=AMONQF7BWR7HSN4PLGOGK5LQ45AIZA5CNFSM4J53N3U2YY3PNVWWK3TUL52HS4DFVREXG43VMVBW63LNMVXHJKTDN5WW2ZLOORPWSZGOEIQXAUA#issuecomment-572616784>, or unsubscribehttps://github.com/notifications/unsubscribe-auth/AMONQF7IAA53ZM3WQX2Q4JTQ45AIZANCNFSM4J53N3UQ.

I've added the editors note what we agreed on the meeting...

@CsatariGergely
Copy link
Collaborator Author

@walterkozlowski is it okay if I add an editors note saying:
"> Editors note: The following chapter lists a set of CNI plugins compliant with the Reference Architecture. The list of compliant components might change in future releases." ?

Can we also remove the MUST here and change it to MAY, rephrasing The used CNI multiplexer/metapulgin must be DANM ..to something like CNI multiplexer/metapulgin like Multus, DANM etc may be used... so that the RA doesn't enforces a particular choice.

As we already discussed it is the target of the RA to enforce a particular choice. For the current release I've softened the musts to mays for the CNI plugins, but in a later release we shall be able to agree on a set.

@petorre
Copy link
Collaborator

petorre commented Jan 10, 2020

As we already discussed it is the target of the RA to enforce a particular choice. For the current release I've softened the musts to mays for the CNI plugins, but in a later release we shall be able to agree on a set.

I agree with this.
While prioritizing the choices into Must, we should look into already defined principles of Interoperability in relevant timeframe.

@tomkivlin
Copy link
Collaborator

Given the changes @CsatariGergely has made in line with requests from @walterkozlowski, myself and others, I will mark this as ready to be merged for the Snezka release. Of course subsequent Issues can be created and added to the RA2 Core Backlog (just use the Backlog label and the RA2 Core project when creating the issue, the rest is automated).

@tomkivlin tomkivlin added Force Merged Forced Merge due to lack of activities online approved and removed Force Merged Forced Merge due to lack of activities labels Jan 10, 2020
@rabiabdel rabiabdel added the Force Merged Forced Merge due to lack of activities label Jan 10, 2020
@cntt-n cntt-n merged commit b9efeaf into master Jan 10, 2020
old-RA2 automation moved this from PR Review in progress to Done Jan 10, 2020
@cntt-n cntt-n deleted the 642-networking-in-ra2-ch4 branch January 10, 2020 17:13
rabiabdel added a commit that referenced this pull request Jan 10, 2020
* RA2 Ch4 - Host OS, Kubernetes, Container Runtime and Storage content (#874)

* RA2 Ch04 Initial Content

* Update chapter04.md

* RA2 Ch4 - HA notes

* RA2 Ch4 move content to Ch3

Host OS description

* RA2 Ch4 - updates to 4.2, 4.3, 4.4

Updates to Host OS, Kubernetes, Runtimes sections

* RA2 Ch4 - add more detail

* RA2 Ch4 storage updates

Storage updates, added OCI and changed status.

* RA2 Ch3 - typo correction

4-1 --> 3-1

* RA2 Ch4 - typos and updates

Typos and added note about etcd not running on worker nodes.

* RA2 Ch4 - added note about kubeadm

kubeadm driving Host OS versions

* RA2 Ch4 - remove rkt

Archived by CNCF

* RA2 Ch4 - remove note about Kata/gVisor

* RA2 Ch4 - update kubernetes version statement

added content to row60

* Update to 4.2 and Table 4-1 - remove specific operating systems and focus on kernel versions.

* RA2 Ch3 - typo correction

row54

* RA2 Ch4 - remove linux 4+ as redundant

* RA2 Ch4 - update to k8s version spec

row54

* RA2 Ch4 - 4.2 changes

row34/35

* RA2 Ch4 - merge conflict

* [RA2 Ch04]: Networking part of Ch4 in RA2 (#821)

* Initial commmit of the networking part of Ch4 in RA2

* Adding references to requirements

This change adds references to the different requirements from Ch01.

* Comparision between DANM and Multus added

Due to requests in comments this change adds a comparision table of the
relevant requirements and additional features of DANM and Multus.

* Adding MACVLAN and User Space CNI backend options

Addressing incoming comments this change adds the option to use MACVLAN CNI,
lists the backend options for the User Space CNi and adds the SR-IOV
Device Plugin to the SR-IOV related note.

* Add an eitors note about the list of CNI plugins

As we were not able to agree on the set of CNI plugins this
change adds a note that the list can be changed in the future.

* Must -> may for CNI-s

This change switches the "must" statements regarding to CNI-s to
"may" statements and adds a cladification text to the related
editors note how this will be fixed in the next releases.

* [RA-1 Ch02] update to handle multiple issues (#558)

* [RA-1 Ch02] update to handle multiple issues 

PR covers Issues #266, #314, #339 and #435

* [RA-1 Ch02] Updated

[RA-1 Ch02] Updated to resolve valuable feedback from multiple folks and @collivier suggested changes to Block storage and networking.

Resolves Issues #266,  #314, #339  and #435

* [RA-1 Ch02] Resolve Issues

[RA-1 Ch02] Resolve Issues
Changes to 'req.inf.com.08' and add 'req.inf.com.09'

* [RA-1 Ch02] Resolve "remote Block Storage"

Changed:
| `req.inf.stg.01` | Storage | The Architecture **must** provide remote (not directly attached to the host) Block storage for VM Instances. |
|--------|-------|------------------------|

* [RA-1 Ch02} Resolve 2.3 Architecture introduction

[RA-1 Ch02} Resolve 2.3 Architecture introduction as per @CsatariGergely

* [RA-1 Ch02] Commented out req.sec.ntw.01/02 

[RA-1 Ch02] Commented out req.sec.ntw.01 and req.sec.ntw.02

Co-authored-by: Rabi Abdel <45387599+rabiabdel@users.noreply.github.com>

* [RA1 Ch08] Add gaps in openstack release ocata, pike and stein (#843)

* [RI1 Ch08] Add gaps in openstack release ocata, pike and stein

* Add API versions
* Add features of pike and stein
* Add upgrade check for Stein

Fixes #842

* Add nova features

* Fix JWT short form and remaining services

* Update table of content

* Move into RA-8 from RI-8

* Delete Deprecated Annex (#933)

* [RI Ch07] Sridhar ch7 sec5and6 (#931)

* Chapter-7: Section 5 and 6.

Adding contents from Sections 5 and 6 of Chapter-7

Signed-off-by: Sridhar K. N. Rao <sridhar.rao@spirent.com>

* Fixed Typos and removed wrong special chars.

Signed-off-by: Sridhar K. N. Rao <sridhar.rao@spirent.com>

Co-authored-by: Rabi Abdel <51988225+rabi-abdel@users.noreply.github.com>

* [RC1] Fill all gaps already tracked as issues in CNTT (#918)

* Fill all gaps already tracked as issues in CNTT

Port VTP test cases to Xtesting [1] is key because the TC doesn't conform
to the principles and requirements defined.

#917

Signed-off-by: Cédric Ollivier <cedric.ollivier@orange.com>

* Precise the gaps to avoid confusion

Signed-off-by: Cédric Ollivier <cedric.ollivier@orange.com>

* Add tab for the new TC

Signed-off-by: Cédric Ollivier <cedric.ollivier@orange.com>

* [RA-1 Ch04] Update Figure 4-1 (#927)

* [RA-1 Ch04] Update Figure 4-1

[RA-1 Ch04] @iangardner22 Updated Figure 4-1 and added network descriptions
(I am making the changes on behalf of @iangardner22)

* [RA-1 Ch04] Upload latest version of Figure 4-1

[RA-1 Ch04] Upload latest version of Figure 4-1

* [RA-1 Ch04] Re upload of new Figure 4-1

[RA-1 Ch04] Re upload of new Figure 4-1

* [RA-1 Ch04] Delete Figure_4_1_OpenStack_Network_Layout_20200110

[RA-1 Ch04] Delete Figure_4_1_OpenStack_Network_Layout_20200110 -- will be updated with modified version

* [RA-1 Ch04] Upload corrected version of Figure 4-1

* [WIP] [RI Ch07] Update Deployment Cookbook (#817)

* Topology Diagram

Description of lab topology, aligning with OPNFV Pharos.

Signed-off-by: beierl <mbeierl@vmware.com>

#406

* [RI1 Ch06]i Topology Diagram

Description of lab topology, aligning with OPNFV Pharos.

Signed-off-by: beierl <mbeierl@vmware.com>

* [WIP] [RI Ch07] Update Deployment Cookbook 

#797

* Create path for Airship vs. future installers

* Adds requirements

Added section on hardware used and information about how
to get VPN access and what routes are available.

* Adds requirements

Added section on hardware used and information about how
to get VPN access and what routes are available.

* Revert "Adds requirements"

This reverts commit b25e762.

* Changes to Ch 07 only

Cleanup of chapter 6 in this PR so that it does not
interfere with any other PR.

* Changes to Ch 07 only

Cleanup of chapter 6 in this PR so that it does not
interfere with any other PR.

Co-authored-by: Rabi Abdel <45387599+rabiabdel@users.noreply.github.com>

* [RC] One missing word (nit) (#934)

Signed-off-by: Cédric Ollivier <cedric.ollivier@orange.com>

Co-authored-by: Tom Kivlin <52716470+tomkivlin@users.noreply.github.com>
Co-authored-by: Gergely Csatari <gergely.csatari@nokia.com>
Co-authored-by: Pankaj Goyal <52107136+pgoyal01@users.noreply.github.com>
Co-authored-by: Deepanshu Bhatia <deep23bhatia@gmail.com>
Co-authored-by: Mark Shostak (AT&T) <49962775+markshostak@users.noreply.github.com>
Co-authored-by: Sridhar K N Rao <ngignir@gmail.com>
Co-authored-by: Rabi Abdel <51988225+rabi-abdel@users.noreply.github.com>
Co-authored-by: collivier <ollivier.cedric@gmail.com>
Co-authored-by: Mark Beierl <mbeierl@vmware.com>
cntt-n pushed a commit that referenced this pull request Jan 10, 2020
* Preperatin for Snezka release

* sync (#935)

* RA2 Ch4 - Host OS, Kubernetes, Container Runtime and Storage content (#874)

* RA2 Ch04 Initial Content

* Update chapter04.md

* RA2 Ch4 - HA notes

* RA2 Ch4 move content to Ch3

Host OS description

* RA2 Ch4 - updates to 4.2, 4.3, 4.4

Updates to Host OS, Kubernetes, Runtimes sections

* RA2 Ch4 - add more detail

* RA2 Ch4 storage updates

Storage updates, added OCI and changed status.

* RA2 Ch3 - typo correction

4-1 --> 3-1

* RA2 Ch4 - typos and updates

Typos and added note about etcd not running on worker nodes.

* RA2 Ch4 - added note about kubeadm

kubeadm driving Host OS versions

* RA2 Ch4 - remove rkt

Archived by CNCF

* RA2 Ch4 - remove note about Kata/gVisor

* RA2 Ch4 - update kubernetes version statement

added content to row60

* Update to 4.2 and Table 4-1 - remove specific operating systems and focus on kernel versions.

* RA2 Ch3 - typo correction

row54

* RA2 Ch4 - remove linux 4+ as redundant

* RA2 Ch4 - update to k8s version spec

row54

* RA2 Ch4 - 4.2 changes

row34/35

* RA2 Ch4 - merge conflict

* [RA2 Ch04]: Networking part of Ch4 in RA2 (#821)

* Initial commmit of the networking part of Ch4 in RA2

* Adding references to requirements

This change adds references to the different requirements from Ch01.

* Comparision between DANM and Multus added

Due to requests in comments this change adds a comparision table of the
relevant requirements and additional features of DANM and Multus.

* Adding MACVLAN and User Space CNI backend options

Addressing incoming comments this change adds the option to use MACVLAN CNI,
lists the backend options for the User Space CNi and adds the SR-IOV
Device Plugin to the SR-IOV related note.

* Add an eitors note about the list of CNI plugins

As we were not able to agree on the set of CNI plugins this
change adds a note that the list can be changed in the future.

* Must -> may for CNI-s

This change switches the "must" statements regarding to CNI-s to
"may" statements and adds a cladification text to the related
editors note how this will be fixed in the next releases.

* [RA-1 Ch02] update to handle multiple issues (#558)

* [RA-1 Ch02] update to handle multiple issues 

PR covers Issues #266, #314, #339 and #435

* [RA-1 Ch02] Updated

[RA-1 Ch02] Updated to resolve valuable feedback from multiple folks and @collivier suggested changes to Block storage and networking.

Resolves Issues #266,  #314, #339  and #435

* [RA-1 Ch02] Resolve Issues

[RA-1 Ch02] Resolve Issues
Changes to 'req.inf.com.08' and add 'req.inf.com.09'

* [RA-1 Ch02] Resolve "remote Block Storage"

Changed:
| `req.inf.stg.01` | Storage | The Architecture **must** provide remote (not directly attached to the host) Block storage for VM Instances. |
|--------|-------|------------------------|

* [RA-1 Ch02} Resolve 2.3 Architecture introduction

[RA-1 Ch02} Resolve 2.3 Architecture introduction as per @CsatariGergely

* [RA-1 Ch02] Commented out req.sec.ntw.01/02 

[RA-1 Ch02] Commented out req.sec.ntw.01 and req.sec.ntw.02

Co-authored-by: Rabi Abdel <45387599+rabiabdel@users.noreply.github.com>

* [RA1 Ch08] Add gaps in openstack release ocata, pike and stein (#843)

* [RI1 Ch08] Add gaps in openstack release ocata, pike and stein

* Add API versions
* Add features of pike and stein
* Add upgrade check for Stein

Fixes #842

* Add nova features

* Fix JWT short form and remaining services

* Update table of content

* Move into RA-8 from RI-8

* Delete Deprecated Annex (#933)

* [RI Ch07] Sridhar ch7 sec5and6 (#931)

* Chapter-7: Section 5 and 6.

Adding contents from Sections 5 and 6 of Chapter-7

Signed-off-by: Sridhar K. N. Rao <sridhar.rao@spirent.com>

* Fixed Typos and removed wrong special chars.

Signed-off-by: Sridhar K. N. Rao <sridhar.rao@spirent.com>

Co-authored-by: Rabi Abdel <51988225+rabi-abdel@users.noreply.github.com>

* [RC1] Fill all gaps already tracked as issues in CNTT (#918)

* Fill all gaps already tracked as issues in CNTT

Port VTP test cases to Xtesting [1] is key because the TC doesn't conform
to the principles and requirements defined.

#917

Signed-off-by: Cédric Ollivier <cedric.ollivier@orange.com>

* Precise the gaps to avoid confusion

Signed-off-by: Cédric Ollivier <cedric.ollivier@orange.com>

* Add tab for the new TC

Signed-off-by: Cédric Ollivier <cedric.ollivier@orange.com>

* [RA-1 Ch04] Update Figure 4-1 (#927)

* [RA-1 Ch04] Update Figure 4-1

[RA-1 Ch04] @iangardner22 Updated Figure 4-1 and added network descriptions
(I am making the changes on behalf of @iangardner22)

* [RA-1 Ch04] Upload latest version of Figure 4-1

[RA-1 Ch04] Upload latest version of Figure 4-1

* [RA-1 Ch04] Re upload of new Figure 4-1

[RA-1 Ch04] Re upload of new Figure 4-1

* [RA-1 Ch04] Delete Figure_4_1_OpenStack_Network_Layout_20200110

[RA-1 Ch04] Delete Figure_4_1_OpenStack_Network_Layout_20200110 -- will be updated with modified version

* [RA-1 Ch04] Upload corrected version of Figure 4-1

* [WIP] [RI Ch07] Update Deployment Cookbook (#817)

* Topology Diagram

Description of lab topology, aligning with OPNFV Pharos.

Signed-off-by: beierl <mbeierl@vmware.com>

#406

* [RI1 Ch06]i Topology Diagram

Description of lab topology, aligning with OPNFV Pharos.

Signed-off-by: beierl <mbeierl@vmware.com>

* [WIP] [RI Ch07] Update Deployment Cookbook 

#797

* Create path for Airship vs. future installers

* Adds requirements

Added section on hardware used and information about how
to get VPN access and what routes are available.

* Adds requirements

Added section on hardware used and information about how
to get VPN access and what routes are available.

* Revert "Adds requirements"

This reverts commit b25e762.

* Changes to Ch 07 only

Cleanup of chapter 6 in this PR so that it does not
interfere with any other PR.

* Changes to Ch 07 only

Cleanup of chapter 6 in this PR so that it does not
interfere with any other PR.

Co-authored-by: Rabi Abdel <45387599+rabiabdel@users.noreply.github.com>

* [RC] One missing word (nit) (#934)

Signed-off-by: Cédric Ollivier <cedric.ollivier@orange.com>

Co-authored-by: Tom Kivlin <52716470+tomkivlin@users.noreply.github.com>
Co-authored-by: Gergely Csatari <gergely.csatari@nokia.com>
Co-authored-by: Pankaj Goyal <52107136+pgoyal01@users.noreply.github.com>
Co-authored-by: Deepanshu Bhatia <deep23bhatia@gmail.com>
Co-authored-by: Mark Shostak (AT&T) <49962775+markshostak@users.noreply.github.com>
Co-authored-by: Sridhar K N Rao <ngignir@gmail.com>
Co-authored-by: Rabi Abdel <51988225+rabi-abdel@users.noreply.github.com>
Co-authored-by: collivier <ollivier.cedric@gmail.com>
Co-authored-by: Mark Beierl <mbeierl@vmware.com>

* resolve conflicts in Ch07

* Update README.md

* erevert

* update version number

Co-authored-by: Rabi Abdel <45387599+rabiabdel@users.noreply.github.com>
Co-authored-by: Tom Kivlin <52716470+tomkivlin@users.noreply.github.com>
Co-authored-by: Gergely Csatari <gergely.csatari@nokia.com>
Co-authored-by: Pankaj Goyal <52107136+pgoyal01@users.noreply.github.com>
Co-authored-by: Deepanshu Bhatia <deep23bhatia@gmail.com>
Co-authored-by: Mark Shostak (AT&T) <49962775+markshostak@users.noreply.github.com>
Co-authored-by: Sridhar K N Rao <ngignir@gmail.com>
Co-authored-by: collivier <ollivier.cedric@gmail.com>
Co-authored-by: Mark Beierl <mbeierl@vmware.com>
@tomkivlin tomkivlin added the Archive Archive Item label Feb 11, 2020
@project-bot project-bot bot moved this from Done to Archive in old-RA2 Feb 11, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Archive Archive Item Force Merged Forced Merge due to lack of activities
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

9 participants