CNCF TOC Meeting
Mar 5, 2019
© 2018 Cloud Native Computing Foundation
1
LF Antitrust Policy Notice
CNCF meetings involve participation by industry competitors, and it is the intention of the Linux Foundation to conduct all of its activities in accordance with applicable antitrust and competition laws. It is therefore extremely important that attendees adhere to meeting agendas, and be aware of, and not participate in, any activities that are prohibited under applicable US state, federal or foreign antitrust and competition laws.
Examples of types of actions that are prohibited at CNCF meetings and in connection with Linux Foundation activities are described in the Linux Foundation Antitrust Policy available at http://www.linuxfoundation.org/antitrust-policy. If you have questions about these matters, please contact your company counsel, or if you are a member of the Linux Foundation, feel free to contact Andrew Updegrove of the firm of Gesmer Updegrove LLP, which provides legal counsel to the Linux Foundation.
© 2018 Cloud Native Computing Foundation
2
Meeting Logistics
© 2018 Cloud Native Computing Foundation
3
TOC - Members Present Today
Note: TOC meetings require a quorum of two-thirds of the TOC total members to take a vote or make any decision. If a TOC meeting fails to meet the quorum requirement, discussions may proceed, however there shall be no voting or decisions.
© 2018 Cloud Native Computing Foundation
4
Agenda
© 2018 Cloud Native Computing Foundation
5
Congrats Containerd!
© 2018 Cloud Native Computing Foundation
6
KubeCon + CloudNativeCon
Cloud Native Computing Foundation
7
FYI: Summer of Code + CNCF
© 2018 Cloud Native Computing Foundation
8
Project Presentation Meetings
© 2018 Cloud Native Computing Foundation
9
Projects and End User Community (Cheryl)
© 2018 Cloud Native Computing Foundation
10
Case studies
I would like every non-sandbox CNCF project to publish a case study in 2019. It requires a one hour interview, either over the phone or at KubeCon CloudNativeCon.
Note that case studies are only for end users, ie. organizations that do not sell cloud native services.
© 2018 Cloud Native Computing Foundation
11
End User Forums
The goal is to enable CNCF projects and SIGs to meet the End User Community and gather requirements and feedback.
Project maintainers and SIG leads can sign up for a 30 minute Q&A slot.
Already scheduled: Fluentd, containerd, ContribEx/Scheduling/Multicluster SIGS, CloudEvents & Serverless WG
© 2018 Cloud Native Computing Foundation
12
CNCF SIGs
© 2018 Cloud Native Computing Foundation
13
CNCF SIGs
A CNCF SIG will oversee and coordinate the interests pertaining to a logical area of needs of end users and/or projects. Examples of such areas include security, testing, observability, storage, networking, etc. The area overseen by a SIG is typically met by a set of CNCF projects, and may also represent a cross-cutting feature group shared by several projects (like security and observability). SIG’s are:
CNCF SIGs are modelled on Kubernetes SIGS. Differences are intended to be minimal to avoid confusion - unavoidable differences are described here.
© 2018 Cloud Native Computing Foundation
14
CNCF SIGs: Examples
© 2018 Cloud Native Computing Foundation
15
CNCF SIGs: Next Steps
© 2018 Cloud Native Computing Foundation
16
OPA Annual/Incubation Review
Torin Sandall - openpolicyagent.org
https://github.com/cncf/toc/pull/199
© 2018 Cloud Native Computing Foundation
17
Open Policy Agent (OPA)
openpolicyagent.org
Community
| March '17-'18 | March '18-'19 | Recent Velocity (approx/week) |
Commits | 410 commits (93% Styra) | 480 commits (74.58% styra, 7.08% chef, 4.58% cisco, 13.75% other) | n/a |
Contributors | 17 | 41 | n/a |
Docker Hub pulls | ~80,000 | ~480,000 | 10,000 |
Slack | 123 | 604 | 15 new users |
Repos w/ .rego files | n/a | ~100 | 2 new repos |
GitHub Stars | 260 | 1800 | 19 new stars |
See CNCF's DevStats for more details.
openpolicyagent.org
Progress since entering Sandbox
openpolicyagent.org
Gatekeeper project
Gatekeeper brings new maintainers to the OPA organization from Google and Microsoft.
openpolicyagent.org
Production
Pre-production
Evaluating
See KubeCon Austin '17 and Seattle '18 talks.
openpolicyagent.org
Use Case: Authorization
Uses OPA to enforce access control in microservices across a variety of languages and frameworks for thousands of instances in their cloud infrastructure. Netflix takes advantage of OPA's ability to bring in contextual information and data from remote resources in order to evaluate policies in a flexible and consistent manner. For a description of how Netflix has architected access control with OPA check out this talk from KubeCon Austin 2017.
openpolicyagent.org
Use Case: API Authorization
Integrates OPA to implement IAM-style access control and enumerate user->resource permissions in Chef Automate V2. The integration utilizes OPA's Partial Evaluation feature to reduce evaluation time (in exchange for higher update latency.)
openpolicyagent.org
Use Case: k8s Admission Control
Uses OPA as a validating and mutating admission controller to implement various security, multi-tenancy, and risk management policies across approximately 50 clusters and 1,000 namespaces. For more information on how Intuit uses OPA see this talk from KubeCon Seattle 2018.
openpolicyagent.org
Use Case: k8s admission control
Uses OPA for a mix of validating and mutating admission control use cases in their Kubernetes clusters. Use cases include patching image pull secrets, load balancer properties, and tolerations based on context stored on namespaces. OPA is deployed on multiple clusters with ~100 nodes and ~300 namespaces total.
openpolicyagent.org
A Fortune 100 Company...
Uses OPA to implement validating admission control and fine-grained authorization policies in production on ~10 Kubernetes clusters with ~1,000 nodes. They also integrate OPA into their PKI as part of a Certificate RA that serves these clusters.
openpolicyagent.org
Thank you!
github.com/open-policy-agent/opa
Incubation Proposal: https://github.com/cncf/toc/pull/199
slack.openpolicyagent.org
CNF Test Bed
© 2018 Cloud Native Computing Foundation
29
CNF Testbed
VNFs
CNFs
BARE-METAL�SERVER
BARE-METAL�SERVER
IDENTICAL HARDWARE
IDENTICAL NETWORKING CODE
OPENSTACK
VIRTUAL MACHINE
VM
#include
#include
KUBERNETES
CONTAINER
© 2019 Cloud Native Computing Foundation
30
How Can You Engage?
© 2019 Cloud Native Computing Foundation
31
Thank You!
© 2018 Cloud Native Computing Foundation
32
Project Review/Backlog
© 2018 Cloud Native Computing Foundation
33
Upcoming Meetings
© 2018 Cloud Native Computing Foundation
34
Thank You
© 2018 Cloud Native Computing Foundation
35
Keycloak
https://github.com/keycloak/keycloak
© 2018 Cloud Native Computing Foundation
36
Open Source Identity and Access Management
for Modern Applications and Services
https://www.keycloak.org
Stian Thorgersen (Red Hat)
Bolesław Dawidowicz (Red Hat)
What is Keycloak?
Keycloak Overview
Feature Highlights
Easily secure apps and services
Clustering
Authorization Services
Istio Service Mesh
Project Origins
https://github.com/keycloak/keycloak/graphs/contributors
Community
Stats updated 28 September 2018
Website Visits
www.keycloak.org - unique visitors per week
Active Contributors
Amazon* | Aitio Finland | Codegy | Eurodata AG | Airpas Aviation | Topicus | Acando | msg-systems | Stocksoftware |
RedHat* | Alfresco | Cofinpro | Exponea | HealthPartners | Kisters | QSD | Nicologies | Heidelberg Mobil |
Samsung* | Amplify Learning | CoreFiling | Stocksoftware | Linkyard | Quest Software | Ocrolus. | Tom Sawyer Software | |
Talend* | AOE | Crystalline | First8 | Iris-it | MC2 DEV | Service Planet | Ordami | Cambio Healthcare Systems |
Uber* | Arktekk | Cupenya | Fit2Cloud | Itesoft | Metaphor | Simacan B.V. | Owlr-com | European Commission - Joint Research Center |
Hitachi* | Canoo | DigitalState | GiavaCMS | Jive | Morphean | Smartling | Pandium | Polish Air Navigation Services Agency |
Mesosphere* | CNRS ATILF | Equinux | GoodBytes | Kantega | Unify | SoftwareMill | Perficient | 3River Development LLC |
Telekom-PD | Tradeshift | Virginia Tech | Trilogy Group | Promergent | * CNCF Members | |||
Obtained from GitHub Profiles of contributors to https://github.com/keycloak/keycloak
Public References
Accenture
Actinver
Akvo Foundation
Appier
BISPRO
Bluestem Brands, Inc
Bundesversicherungsamt
Capgemini
Chassi
CloudNative Inc.
Copenhagen Optimization
Curecomp GmbH
Cybertech
Devsu
Devoxx / Voxxed
DUENE e.V - project
DukeCon
European Synchrotron Radiation Facility
Fluance AG
Hewlett-Packard Enterprise
Hitachi
INEAT
Inventage
ISAAC
ITROI Solutions
Kindly Ops, LLC
msg systems ag
Netdava International
Ohio Supercomputer Center
Okta
PharmaPartners B.V.
Plivo
Price Insight
Prodesan
Quest Software
Research Industrial Software Engineering (RISE)
Sportsbet.com.au
Stack Labs
Storebrand
Synekus
Synetek Solutions
Taklane
TrackingSport
TRT9 - Brasil
UnitedHealthcare
+ More individuals
From recent Keycloak community survey
Recognition
https://www.thoughtworks.com/radar/platforms/keycloak
Keycloak is an open source identity and access management solution that makes it easy to secure applications or microservices with little to no code
How Keycloak is deployed
From recent Keycloak community survey
Why Keycloak fits CNCF?
What do we expect from CNCF?
Roadmap Highlights