Introduction

Welcome to the Edge Cloud Project page. This page covers a brief description of the aim of project and the planned activities.

This project's aim is to develop a cutting edge distributed cloud technology and use cases for highly distributed and edge deployments and contribute towards open source projects like OpenStack and Kubernetes.

Develop a robust security for the edge cloud infrastructure by implementing a distributed control plane, which not only will provide enhanced security, but will also help to overcome in the event of a failure of one authentication system.

We will perform evaluation of workloads, behavior and portability in distributed control plane of edge environments.  Evaluations includes load balancing, availability, partitioning and behavioral analysis of workloads running in container mesh environments, compared to traditionally networked machines. Further studying the impact on applications when running in central versus edge environments including resource and bandwidth constrained environments.

In practice, as part of the project, we will create our own cloud infrastructure. The plan is to install OpenStack on the machines, install Kubernetes on top of it and federate the nodes. 

Key Summary T Created Updated Due Assignee Reporter P Status Resolution
Loading...
Refresh


As a first step towards reaching highly available, partitioned and secure communication between the edge sites, we are starting with a centralized control plane architecture deployment.

Security

The users are authenticated using keystone with the help of LDAP and AD in the backend and also support an External Identity Provider authentication. 

The users will be assigned roles to implement RBAC for the various services available in Openstack.

To overcome the threat of single point of failure, we plan to implement a distributed control plane and federate the large/medium edge sites. Independent control plane is placed within each edge site. In the event of any problem or failure in the central data center, the edge site can authenticate the users. Due to the use of IDP, with the help of federation, user can authenticate in any edge site he may visit.

Keystone to Keystone federation to enable federation between edge clouds using openstack.

To enable trust, Keystone in the role of CA will sign the images before storing in the database.

Performance test when different flavours of OS is installed in each edge cloud.

More details of activities are provided at: Security Aspect for Edge Cloud

Deployment

There are various deployment options for infrastructure (IaaS → Openstack) and platform (PaaS → kubernetes) where evaluation for edge cloud performance vs cost, throughput, latency and packet delay, scaling, availability and partitioning, replication, and load balancing can take place. Evaluation of these params of various deployment options can be done using OpenStack Rally and Yardstick. We also test StarlingX and modify its infrastructure to avoid single point of failure. 

Starting point is to have the centralized control plane(the initial "basic" edge cloud) up and running, then investigate different deployment options, including: OpenStack on Kubernetes and Kubernetes on Openstack. Then test these deployment options again for the distributed control plane architecture and evaluate performance of the edge cloud infrastructure, because centralized control plane can have issues with partitioning, load balancing, replications, and single point of failure. We try to improve the performance of distributed control plane without spending lots of effort in maintaining the cloud.  

We will also investigate various database engines such as RDBMSs (availability and consistency), and dynamo db (availability and partitioning) and improving the throughput and consistency for linux containers (LXC), docker containers, kata containers.

For messaging queue protocols we experiment RabbitMQ and Qpid to perform high availability load balancer such as HAProxy and high availability resource manager such as Linux Pacemaker

More details of activities are provided at: Deployment Aspects for Edge Cloud Thesis

Integrity

This aspect considers how different components of the cloud work together and what solutions there could be to increase compatibility. It is also important to find ways of avoiding vendor lock-in as this opens up many opportunities for users.

First, setting up a basic cloud architecture is required.

Then, different operation systems will be installed on different edges to test the compatibility, the drawbacks and the opportunities this provides us.

Installing Kubernetes Federation v2 is the next step. For this, we need multiple clusters. Federation helps us in migration and multi cluster management.

More details of activities are provided at: Integrity aspects for edge cloud thesis

Project members and contributors:

  • Christopher Price
  • Fatih Degirmenci
  • Sofia Wallin
  • Ali Shokrollahi Yancheshmeh
  • Gábor Finta
  • Khaled Jendi
  • Latha Paramatmuni

0 Comments

You are not logged in. Any changes you make will be marked as anonymous. You may want to Log In if you already have an account.