Git Product home page Git Product logo

tag-network's Introduction

CNCF TAG Network

Primary Authors: Lee Calcote

Reviewed and Contributed to by: Matt Klein, Ken Owens

Introduction

With the increased prevalence of microservice-based distributed systems, networking as a discipline has never been more critical in the efficient operation of cloud native deployments. Networking primitives, including load balancing, observability, authentication, authorization, policy, rate limiting, QoS, mesh networks, legacy infrastructure bridging, and so on are now receiving substantial development and investment throughout the industry.

Mission Statement

TAG Network's charter is inspired from the CNCF Networking WG. With an ever steady eye to the needs of workloads and developers who create them and operators who run them, TAG Network's mission is to enable widespread and successful development, deployment and operation of resilient and intelligent network systems in cloud native environments through these activities to:

  1. Clarify and inform. Provide valuable and objective information to the TOC, End Users and Projects of the CNCF regarding areas considered in-scope. Strengthen the project ecosystem to meet the needs of end users and project contributors. Educate and inform users with unbiased, effective, and practically useful information.
  2. Collaborate and interrelate. Effectively interface with other related groups internal and external to the CNCF and connect the dots to facilitate meaningful collaborative progression of relevant topics. Engage more communities and create an on-ramp to effective TOC contribution & recognition.
  3. Assist and attract projects. Helping to maintain the continued health of CNCF networking-related projects. Focus attention and resources on helping foster project maturity, systematically across CNCF projects. Clarify relationship between projects, CNCF project staff, and community volunteers. Identify gaps in the landscape of CNCF networking-related projects. Find and attract projects to fill these gaps through invitation to present, diligence on proposed projects, and in essence, act as a funnel for TOC project reviews in this area.
  4. Afford impartial stewardship. Provide and maintain a vendor neutral venue for relevant thought validation, discussion, and project feedback. Establish procedures to assist where necessary.

In Scope

We strive to understand the fundamental characteristics of different networking approaches with respect to availability, scalability, performance, consistency, observability, security, ease-of-use, cost, performance and operational complexity; and relate these to their suitability to various cloud native use cases. Networks, network services and methodologies suitable for and commonly used in modern cloud-native environments are considered in scope:

  • Especially where these differ significantly from network systems and approaches previously commonly used in traditional enterprise data center environments.
  • Consideration for public, private, and hybrid cloud environments.
  • Network functions and services, including but not limited to, the discovery, monitoring, management, routing, load balancing, firewalling, quality of service, provided by service proxy, API gateway, service mesh, remote procedure call, coordination & service discovery.
  • Provide an umbrella TAG for the Service Mesh Working Group and Universal Data Plane API Working Group (UDPA-WG).
    • Networking WG will fold directly into TAG Network.
    • UDPA-WG will continue with existing calls and mailing list.
    • Service Mesh Working Group will primarily convene during the TAG Network meeting times.
  • Facilitating an understanding of network abstraction APIs for meshes, proxies and other network services.
  • Influence and provide guidance on the definition of network abstraction specifications. Network TAG may review and recommend adoption.
  • Networking extends to services and workloads not running on Kubernetes. Network TAG focuses on the integration and interoperability of networking running those workloads, not on those (physical) networking systems themselves unto their own.

Current CNCF Network-centric Projects

Generally, projects listed in the CNCF Landscape under the categories of Service Mesh, API Gateway, Coordination & Service Discovery, Service Proxy, Remote Procedure Call, and Cloud Native Network are considered in-scope of this TAG.

  • BFE
  • Cilium
  • CNI
  • CNI Genie
  • Contour
  • CoreDNS
  • Emissary Ingress
  • Envoy
  • gRPC
  • Istio
  • Kuma
  • Linkerd
  • MetalLB
  • NATS
  • Network Service Mesh

Out of Scope

Generally anything not considered in scope. The TAG may touch on physical networking hardware as it relates to the running of or interoperability of cloud native networking, but is not a stated focus of the TAG unto its own. See also Overlap and Relations with other Related Groups.

Overlap and Relations with other Groups and Projects

The area of networking interfaces with essentially all areas of the cloud native landscape.

  • Current CNCF Network-centric Projects - we maintain close communication with these projects and their communities to avoid unnecessary duplication of effort and inconsistent messaging wherever possible.
  • Kubernetes Network SIG - is focused towards Kubernetes-specific network abstractions, interfaces, and implementations of these interfaces. We maintain close communication with this Kubernetes SIG, with several individuals actively involved in both. Our aim is to avoid unnecessary duplication of effort by the two groups, and maintain clear and consistent messaging by the two groups to our end user community and projects.
  • CNCF Security TAG - works on the more general area of cloud-native security including authentication, authorization, encryption, accounting, auditing and related topics. Each of these topics are directly applicable and often implemented as network services. We defer as much as possible to this group to deal with general security-related issues, and liaise closely with them on how to deal with network-specific security as these are a continual area of concern.
  • CNCF App Delivery TAG - will be focussed on the development, deployment, operation and testing of cloud-native applications. We collaborate with this TAG where this pertains to Networking and Traffic, particularly around application deployment, debugging, and monitoring.
  • CNCF Storage TAG - primarily with respect to service discovery as cloud native name services as related etcd.
  • Service Mesh Performance - this project defines an industry standard definition for capturing service mesh performance profiles and a standard set of measures and metrics that represent those profiles with the goal of developing an open source standard index to understand these.
  • Service Mesh Interface (SMI) - is a standard interface for service meshes on Kubernetes.
  • Multi-Vendor Service Mesh Interoperation - specifies a set of API standards for enabling service mesh federation.

Responsibilities and Deliverables

Clarify and further concepts of cloud native networking, traffic management and common design patterns and best practices of these network services. Explore definition and practicality of new cloud native networking technologies focused on serving distributed applications.

Responsibilities

  • Identification of areas in need of focus in cloud native networking.
  • Ensure perspectives of users, customers, and vendors are represented.
  • Facilitate an understanding of the boundaries between related network technologies , including but not limited to API gateways, client libraries, service meshes, proxies, service and name directories, management, control and data planes, policy, security, and so on.
  • Facilitate an understanding of network services and an expansion of the definition of what these are as existing types are reincarnated or new types emerge in a cloud native way.
  • Evaluation of project proposals and facilitation of their diligence. Establish a framework for evaluation.
  • Work on integrating common tooling into different projects, particularly where that tooling is a CNCF project (but the targets may not be).
  • Growing CNCF external relationships with interested parties, e.g. NIST, ONAP, LFEdge and other security standards bodies.
  • Develop and maintain a relevant landscape and whitepapers. Provide common design patterns and best practices.

Deliverables

  • Proposed project review - a pre-review of upcoming project proposed for adoption, allowing projects to have a soft review, gauge and garner CNCF interest.
    • Provide recommendations for new CNCF projects.
  • New projects - recommendation of sandbox projects where exploration is needed.
  • TAG reports to TOC - scheduled regular reporting to ToC on ongoing and completed work.
  • Cloud Native networking whitepaper(s) - framework document for the cloud native traffic and networking space.
  • Cloud Native Networking Patterns
  • Network Landscape - a deeper and category-specific project landscape (e.g. service mesh landscape).
  • Existing project review - review of previously adopted projects as a health check of projects in the category.

Governance and Operations

This TAG follows the standard operating model provided by the TOC unless otherwise stated here.

Operating Model

Chairs:

In accordance with the elections and terms follow the governance.

Communications

tag-network's People

Contributors

amye avatar angellk avatar beriberikix avatar caniszczyk avatar edwarnicke avatar hzxuzhonghu avatar leecalcote avatar linsun avatar lizrice avatar nicholasjackson avatar orlinvasilev avatar riaankleinhans avatar robertkielty avatar rochaporto avatar sergiopozoh avatar xmulligan avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

tag-network's Issues

Representing Kubernetes ontology in MeshModel

As an extension of #21:

Network topologies and graph databases go hand-in-hand. The OpenAPI specifications for Kubernetes provides taxonomy, but augmenting a graph data model with formalized ontologies enables any number of capabilities, one of the more straightforward is the inferencing requisite for natural language processing, and consequently, a human-centric query / response interaction becomes becomes possible. More importantly, more advanced systems can be built when a graph data model of connected systems is upgraded to be a knowledge semantic graph. Deliverables (among other items):

  • Model capabilities browser
  • Import/export of models and components as OCI images
  • augmentation of cuelang-based component generator

Landscape Graph: Kubernetes ontology and subgraph module design

This issue tracks the coordination of participating Service Mesh Working Group projects and the TAG Observability Landscape Graph initiative.

Network topologies and graph databases go hand-in-hand. The OpenAPI specifications for Kubernetes provides taxonomy, but augmenting a graph data model with formalized ontologies enables any number of capabilities, one of the more straightforward is the inferencing requisite for natural language processing, and consequently, a human-centric query / response interaction becomes becomes possible. More importantly, more advanced systems can be built when a graph data model of connected systems is upgraded to be a knowledge semantic graph.

Deliverables (among other items):

  • a Kubernetes ontology using OWL as a popular (and mature) way of doing this.
  • a cuelang-based component generator

Mapping CNCF Landscape one Relationship-at-a-time

Description:
While the OpenAPI specifications for Kubernetes offer a taxonomy, integrating a graph data model with formalized ontologies unlocks a multitude of capabilities. Among these, enabling inferencing necessary for natural language processing stands out as a straightforward application. This, in turn, facilitates the possibility of a human-centric query/response interaction. Importantly, advancing to a knowledge semantic graph from a connected systems' graph data model opens the door to building more sophisticated systems.

-Expected Outcome:
- Identifying new technologies from CNCF landscape and creating ne w YAML-formatted definition of one or more relationships.
- Documentation of each relationship - per component.
- Development of new types of genealogies - new types of ways in which resources relate to one another and how these relationships might be visualized.

Recommended Skills:
Familiarity with Helm charts and Artifact Hub, basic familiarity with Kubernetes, familiarity with CNCF different projects would be helpful

Mapping Kubernetes Resources: Identifying relationships between all standard and custom resources

Description

The OpenAPI specifications for Kubernetes provides taxonomy, but augmenting a graph data model with formalized ontologies enables any number of capabilities, one of the more straightforward is the inferencing requisite for natural language processing, and consequently, a human-centric query / response interaction becomes becomes possible. More importantly, more advanced systems can be built when a graph data model of connected systems is upgraded to be a knowledge semantic graph.

Objectives

  • YAML-formatted definition of one or more relationships per Kubernetes resource.
  • Documentation of each relationship - per component.
  • Development of new types of genealogies - new types of ways in which resources relate to one another and how these relationships might be visualized.
  • Verification of functional relationships

Contributor Resources

  • Recommended Skills: DevOps, Kubernetes Administration, Light familiarity with all of the CNCF projects and a desire to study each project and their operators/resources.

Create GitHub issue templates

GitHub issue templates for this repo will help guide the community when engaging SIG Network for:

  • general presentations
  • project proposals
  • suggestions

Technical Content Creation: CNCF Challenges

Technical Content Creation: CNCF Challenges

  • Description: On a periodic basis, the CNCF would like to present a public challenge to those that are interested in participating (e.g. “Challenge: Distributed Tracing with Jaeger”).

Your mission in this internship is technical content creation of said challenges through use of markdown, Meshery, and any number of other CNCF projects. Challenges will be created using the Meshery Playground and potentially published in the proposed CNCF Hub. They will be similar too, but slightly different from these example tutorials.

Understand that your challenges will be promoted through CNCF channels, reviewed by various project maintainers, and that each challenger (participant) will receive a certain number of points, depending upon whether or not they successfully complete the challenges that you create and in what timeframe they complete those challenges (the faster, the more points). Your challenges will need to vary in level of difficulty.

Expected Outcome:

  • 10+ new challenges published in CNCF Hub (and Meshery Catalog and Artifact Hub).

  • Challenges can contain more than one objective. Points are earned for each objective completed.

  • Bonus: Extend one or more of Meshery’s Learning Paths.

  • Recommended Skills: written English, Kubernetes, DevOps, and familiarity with any number of other CNCF projects, like Prometheus, CoreDNS, Istio, Jaeger, Helm, Harbor, OPA, Rook, SPIFEE, Flux, Argo, Flux, Falco, etc., Jekyll, strong organizational skills

  • Mentor(s): Lee Calcote (@leecalcote, [email protected]), Nic Jackson (@nicholasjackson, [email protected])

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.