Project Description
Network management is very important for cloud and Edge. CNF(cloud-native network function) is next-generation VNF. CNF will be supported in Edge computing in the future. It is very important specially in 5G network. A cloud-native 5G network provides the completely digitized platform necessary to deploy new cloud services and to take advantage of cloud-native 5G benefits like massive IoT, edge computing, and network slicing. Cloud Native Network Functions will ultimately help operators pivot from Non-standlone (NSA) 5G architecture which depends on a 4G core network to operate, to standalone (SA) 5G. Standalone 5G pairs 5G radios with a cloud-native 5G core network. We would like to build a demo network based on K8S.
Goal for this Hackweek
- prepare environment for CNF demo
- build K8s cloud
- build a demo of the CNF
- Change source code and document
Resources
comment: # https://github.com/cncf/cnf-testsuite/
comment: # https://github.com/cncf/cnf-testbed/
Looking for hackers with the skills:
This project is part of:
Hack Week 22
Activity
Comments
-
almost 3 years ago by epenchev | Reply
This looks an interesting POC from RedHat https://www.redhat.com/architect/autoscale-5g-core, and they shared the knowledge as well https://github.com/fenar/cnvopen5gcore/tree/Release-1.0 . It's based on open5gs (https://github.com/open5gs/open5gs) for the 5G CNF, Istio for service mesh and UERANSIM for 5G UE and RAN simulator. Although it's applied and configured to run on RedHat Openshift I think it will be cool to have something like this on Rancher
as well. -
almost 3 years ago by lizhang | Reply
For network stack, here is the reference. For performance of network, SRIOV, DPDK should be used. For vswitch, VPP has much better performance then OVS. https://ligato.io/blog/cnf-ligato-fdio/ https://cloud.redhat.com/blog/building-cnf-applications-with-openshift-pipelines
Similar Projects
Rewrite Distrobox in go (POC) by fabriziosestito
Description
Rewriting Distrobox in Go.
Main benefits:
- Easier to maintain and to test
- Adapter pattern for different container backends (LXC, systemd-nspawn, etc.)
Goals
- Build a minimal starting point with core commands
- Keep the CLI interface compatible: existing users shouldn't notice any difference
- Use a clean Go architecture with adapters for different container backends
- Keep dependencies minimal and binary size small
- Benchmark against the original shell script
Resources
- Upstream project: https://github.com/89luca89/distrobox/
- Distrobox site: https://distrobox.it/
- ArchWiki: https://wiki.archlinux.org/title/Distrobox
Technical talks at universities by agamez
Description
This project aims to empower the next generation of tech professionals by offering hands-on workshops on containerization and Kubernetes, with a strong focus on open-source technologies. By providing practical experience with these cutting-edge tools and fostering a deep understanding of open-source principles, we aim to bridge the gap between academia and industry.
For now, the scope is limited to Spanish universities, since we already have the contacts and have started some conversations.
Goals
- Technical Skill Development: equip students with the fundamental knowledge and skills to build, deploy, and manage containerized applications using open-source tools like Kubernetes.
- Open-Source Mindset: foster a passion for open-source software, encouraging students to contribute to open-source projects and collaborate with the global developer community.
- Career Readiness: prepare students for industry-relevant roles by exposing them to real-world use cases, best practices, and open-source in companies.
Resources
- Instructors: experienced open-source professionals with deep knowledge of containerization and Kubernetes.
- SUSE Expertise: leverage SUSE's expertise in open-source technologies to provide insights into industry trends and best practices.
SUSE Edge Image Builder MCP by eminguez
Description
Based on my other hackweek project, SUSE Edge Image Builder's Json Schema I would like to build also a MCP to be able to generate EIB config files the AI way.
Realistically I don't think I'll be able to have something consumable at the end of this hackweek but at least I would like to start exploring MCPs, the difference between an API and MCP, etc.
Goals
- Familiarize myself with MCPs
- Unrealistic: Have an MCP that can generate an EIB config file
Resources
SUSE Edge Image Builder json schema by eminguez
Description
Current SUSE Edge Image Builder tool doesn't provide a json schema (yes, I know EIB uses yaml but it seems JSON Schema can be used to validate YAML documents yay!) that defines the configuration file syntax, values, etc.
Having a json schema will make integrations straightforward, as once the json schema is in place, it can be used as the interface for other tools to consume and generate EIB definition files (like TUI wizards, web UIs, etc.)
I'll make use of AI tools for this so I'd learn more about vibe coding, agents, etc.
Goals
- Learn about json schemas
- Try to implement something that can take the EIB source code and output an initial json schema definition
- Create a PR for EIB to be adopted
- Learn more about AI tools and how those can help on similar projects.
Resources
- json-schema.org
- suse-edge/edge-image-builder
- Any AI tool that can help me!