summaryrefslogtreecommitdiffstats
path: root/samples/scenarios
AgeCommit message (Collapse)AuthorFilesLines
2018-11-09Refresh SDC guide for Istio 1.0earrage1-12/+32
- Add description of new VirtualService and Gateway resources in Istio 1.0 - Modify manual inject commands to match Istio 1.0 - Update tracing UI graphic with Jaeger that is integrated with Istio 1.0 - Update Istio pod listing - Update how to expose Prometheus and Jaeger - Fix the commands to remove Istio 1.0 - Modify SDC yaml for local Docker registry case Change-Id: I51e2b876699eae48714e94e33e56191364a0dbe5 Signed-off-by: earrage <eddie.arrage@huawei.com>
2018-11-09change the doc for the istio 1.0Ace Lee1-30/+0
prometheus has been installed in istio 1.0 so we need to delete the view.sh file. but we need to change to to NodePort way to expose the port Change-Id: I8ae6bc1c251ba5effbc94efe984384af6e64adfc Signed-off-by: Ace Lee <liyin11@huawei.com>
2018-10-30Update modsecurity image docker registryJingLu51-1/+1
The clover-ns-modsecurity-crs docker image is now built by Jenkins and uploaded to the OPNFV docker hub. This patch updates the modsecurity deployment kubernetes manifest to pull image from OPNFV docker hub. Change-Id: I7e8afd27f726600de9247fc98fe3f5d491000f1c Signed-off-by: JingLu5 <lvjing5@huawei.com>
2018-10-11Add nginx services control functionalityearrage2-4/+48
- Modify nginx server template to use clover-controller in clover-system namespace for file upload - Add ability to set nginx server paths and move uploaded files in clover-controller and set/get file upload metadata - Add cloverctl commands to set nginx server and lb configurations - Add example yaml files to configure nginx server and lb v1/v2 from cloverctl - Modify service definition for http-lb versions to distinguish the two versions for GRPC messaging from clover-controller in SDC deployment yaml Change-Id: I5c6866c5ff3de358939c58ea8c0bde64a69c6eca Signed-off-by: earrage <eddie.arrage@huawei.com>
2018-09-07Add ModSecurity config guideJingLu52-3/+68
This patch adds ModSecurity config guide. This patch also deploy the modsecurity and ext_authz filter to clover-gateway namespace. Change-Id: I5ab21e6337b8f8b839ddd028370df378686bd017 Signed-off-by: JingLu5 <lvjing5@huawei.com>
2018-08-31Merge "Add envoy.ext_authz filter"Stephen Wong1-0/+24
2018-08-29Bug fix in SDC after istio to 1.0.0Ace Lee1-12/+33
JIRA: CLOVER-84 There will be some Bug in SDC after we upgrade the Istio to 1.0.0 Istio 1.0 have some concept, for example : virtualservice gateway. So we change the yaml file using the 1.0.0 concepts. Add mirror function Change-Id: Id138cfec2c7d94b44eb508a056c91e193ac1b08b Signed-off-by: Ace Lee <liyin11@huawei.com>
2018-08-28Add envoy.ext_authz filterJingLu51-0/+24
JIRA: CLOVER-86 This external authorization HTTP filter calls an external HTTP service (ModSecuruty service) to check if the incoming HTTP request is authorized or not. If the request is deemed unauthorized then the request will be denied normally with 403 (Forbidden) response. Change-Id: I0fe14c73defec027c54f42713cbdf69b0b83e102 Signed-off-by: JingLu5 <lvjing5@huawei.com>
2018-08-10upgrade istio to 1.0.0Ace Lee1-1/+1
JIRA: CLOVER-84 we change the env in clover and change some deploy script. will upgrade the doc later Change-Id: I73a78afb91676efc3278b623c5d263a4a215ccd9 Signed-off-by: Ace Lee <liyin11@huawei.com>
2018-08-01Merge "Adding cassandra service with a separate yaml file."Stephen Wong1-1/+0
2018-07-23Adding cassandra service with a separate yaml file.iharijono1-1/+0
- Left the file samples/scenarios/service_delivery_controller_opnfv.yaml unchanged. - Added a yaml definition of Cassandra StatefulSet and its service into a separate file under tools directory - Cassandra Service run with 1 replica - Deleted 'data-plane-ns' and use 'default' instead for cassandra containers. - Revoked changes for samples/scenarios/service_delivery_controller_opnfv.yaml. - Added new line (Wutien suggested it) JIRA: CLOVER-000 Change-Id: I2bb4249cf2523f5011d6fefc69dc469a90e20eaf Signed-off-by: iharijono <indra.harijono@huawei.com>
2018-05-30Adding clearwater IMS yaml and clearwater live test dockerfile to test istio ↵Muhammad Shaikh (Salman)14-0/+363
service-mesh Checking into CLEARWATER_ISTIO branch This part of the project is intended to validate the clearwater IMS with istio service-mesh. Change-Id: Ia5ba86301a363fcf9cfe0bac525606b0d897713e Signed-off-by: Muhammad Shaikh (Salman) <muhammad.shaikh@huawei.com>
2018-04-13Add SDC deploy/clean scriptsEddie Arrage3-0/+80
- Added deploy/clean scripts for use in Clover container - Deployment of entire SDC scenario - Deployment includes istio install for manual sidecar injection without TLS authentication (deploy.sh) - Added Jaeger tracing and Prometheus monitoring install (view.sh) - Exposes NodePort for monitoring/tracing to access UIs outside of cluster - Clean.sh attempts to remove all of the above Change-Id: Id9548a77d71465a814a6e0cb1cbdf02d37235590 Signed-off-by: Eddie Arrage <eddie.arrage@huawei.com>
2018-04-03Added toplevel manifests for SDC sample scenarioEddie Arrage2-1/+722
- Added missing k8s manifest yaml files for overall service delivery controller scenario - cannot be deployed coherently without this manifest - One file for private docker registry and one for opnfv public registry - Outlined in JIRA ticket CLOVER-16 and validated per description - Includes ingress rule, community redis pod/service and deployments for http-lb (v1/v2), snort-ids, proxy-access-controller, and clover-server1-5 - All above pod/deployment naming matches default container configuration - Tested with istio manual injection Change-Id: Ia03782b38020d744ab00c99adbf4832d15bbd9f3 Signed-off-by: Eddie Arrage <eddie.arrage@huawei.com>
2018-03-31Develop snort IDS and content inspect serviceEddie Arrage1-0/+1
- Initial commit to show potential structure of a sample service - This wil be part of a larger sample application currently dubbed Service Delivery Controller - Docker container needs to be built and employs open-source Linux packages - Service is deployable in Istio service mesh using provided yaml - Control snort daemon and add custom rules with GRPC messaging - Process snort alerts actively and send to redis and upstream service mesh components - Integrates a web server for better HTTP signature detection - Improved build script for CI with variables - Render k8s yaml snort manifest dynamically with command line options - Improve snort_client sample script for runtime modifications including passing args on CLI, error checking - Update nginx proxy interface - Added logging to snort server and alert process Change-Id: Ic56f9fcd9ed21f64b84b85ac8ee280d69af7b7c9 Signed-off-by: Eddie Arrage <eddie.arrage@huawei.com>