Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

GitOps Zero-Conf|Trust|Touch XIoT (SONiC and connected device) management #1362

Open
1 of 10 tasks
mmaymann opened this issue Jun 13, 2023 · 0 comments
Open
1 of 10 tasks

Comments

@mmaymann
Copy link

mmaymann commented Jun 13, 2023

I suggest we extend SONiC with KubernetesNative device management, to leverage the power of K8s and its ecosystem:
Backend: https://github.com/kcp-dev/kcp
SONiC: https://github.com/k3d-io/k3d

Functionality is similar to (what I interpret as) the thoughts behind Hedgehog, 100% free OSS, focusing on existing K8s projects and on Zero-Conf|Trust|Touch XIoT management - using Git(Ops) as single source of truth of desired state.

Disclaimer: I have already suggested this in the K8s project, but it was closed and I was asked to request this feature here.

Desired state of SONiC devices are stored in Git and managed by Kcp as K3d nodes, pods and validating admission policies:

  • GitOps managed Kcp
  • SONiC devices = Kcp workloads = K3d (gateway+spine=dual MLAG? cluster) nodes
  • SONiC apps = K3d pods: K8s deprecated Docker from v1.20: Docker -> Containerd migration+support
  • SONiC ports = K3d ValAdmPolicy / CiliumHostFirewall: Attestation, Isolation, Provisioning, Guest, BYOD, XIoT1, XIoT2, ...:
  • - ZeroConf XIoT Onboarding (Spire):
    -- FDO Rendezvous -> ITAM -> XIoT categorization: Unknown, XIoT1, XIoT2, ...
    -- CaptivePortal -> Guest/MDM/BYOD management
  • - ZeroTrust XIoT Attestation (Spire):
    -- 802.1x EAP(oL)-TLS X.509 certificate check
    --- TPM_Certify_Info(2) (PCR status): Firmware vers., BootLoader, OS vers., firewall enabled, antivirus enabled, ...
    --- Spire-TPM-plugin and missing Keylime functionality
    --- MUD -> ITAM -> XIoT identification
    --- SBOM -> ITAM -> continuous lightweight vulnerability scanning -> proactive remediation actions
    -- (P)NAC/ACL: SpireServer -> SONiC NAC
  • - ZeroTouch XIoT Provisioning:
    -- AWS IoT Greengrass
    -- Tinkerbell:
    --- RackN DigitalRebar functionality
    --- RedFish functionality

Monsoon opportunities after migrating SONiC to K3d:

  • Migrate to Etcd
  • Security enhancement using outbound connections with defacto-standard OTel agent
  • Non-invasive kernel-level observability instrumentation and kernel-level runtime security enforcement with eBPF
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant