Tungstenfabric Release Master

Total Page:16

File Type:pdf, Size:1020Kb

Tungstenfabric Release Master TungstenFabric Release master Tungsten Fabric Project Jul 05, 2021 CONTENTS 1 Documentation Structure 3 1.1 User Documentation...........................................3 1.1.1 Getting Started.........................................3 1.1.2 Releases.............................................3 1.2 About Tungsten Fabric.......................................... 38 1.2.1 Contribute to Tungsten Fabric................................. 38 1.2.2 Getting Started as a Contributor................................ 40 1.2.3 Processes before submitting a blueprint............................ 44 1.2.4 Blueprint Submission...................................... 44 1.2.5 Code Submission........................................ 46 1.2.6 Test plan Submission...................................... 46 1.2.7 Tungsten Fabric JIRA workflow................................ 46 1.2.8 How to review a patch in Gerrit................................. 48 1.2.9 RST conventions........................................ 50 1.2.10 Writing style.......................................... 69 1.3 Infrastructure............................................... 84 1.4 Administration.............................................. 84 1.4.1 Documentation Structure.................................... 84 1.5 Tungsten Fabric Governance....................................... 87 1.5.1 Docs Structure......................................... 87 1.5.2 Governance Documents..................................... 110 1.5.3 Current Committee Membership................................ 111 1.5.4 Elections............................................ 111 1.5.5 Overview of the Tungsten Fabric Community and Governance Groups............ 111 1.5.6 Acronym Reference....................................... 113 1.6 Tungsten Fabric installation and upgrade guide............................. 113 1.6.1 Documentation Structure.................................... 113 1.7 Tungsten Fabric networking and security user guide.......................... 417 1.7.1 Documentation Structure.................................... 418 1.8 Tungsten Fabric Service Provider Focused Features Guide....................... 421 1.8.1 Documentation Structure.................................... 421 1.9 Tungsten Fabric Analytics and Troubleshooting Guide......................... 444 1.9.1 Documentation Structure.................................... 444 1.10 Tungsten Fabric fabric lifecycle management guide........................... 479 1.10.1 Documentation Structure.................................... 479 1.11 Tungsten Fabric cloud-native user guide................................. 484 1.11.1 Documentation Structure.................................... 485 1.12 Tungsten Fabric Operator........................................ 526 1.12.1 Documentation Structure.................................... 526 i 2 Licensing 547 ii TungstenFabric, Release master Important: To report a bug for any part of the Tungsten Fabric project, including documentation, please use the Tungsten Fabric Jira. Tungsten Fabric (formerly known as OpenContrail) is a secure software defined networking project designed for the cloud native, multicloud environment. Placing it on top of any IP network allows you to have a single portal for defining, monitoring, and analyzing your entire multicloud network, its security, and its performance. Using Tungsten Fabric, you can write and deploy network and security policies that are portable to any cloud environ- ment. All of your clouds can have a consistent and easily maintainable configuration. Standardized policies will make your security team happy, too. CONTENTS 1 TungstenFabric, Release master 2 CONTENTS CHAPTER ONE DOCUMENTATION STRUCTURE 1.1 User Documentation The user documentation covers details such as quick start guides and releases. 1.1.1 Getting Started Getting Started with Tungsten Fabric This directory contains community generated documentation on how to get started as a user of Tungsten Fabric, including installation and basic usage. Getting Started with tf-devstack Repository: https://gerrit.tungsten.io/r/admin/repos/tungstenfabric/tf-devstack README Documentation: https://gerrit.tungsten.io/r/gitweb?p=tungstenfabric/tf-devstack.git;a=blob;f=README. md;hb=HEAD Instructional Blog Post: https://tungsten.io/getting-started-with-tungsten-fabric-using-tf-devstack/ 1.1.2 Releases Tungsten Fabric 5.1 Release Release Notes: Tungsten Fabric 5.1 Table of Contents Introduction New and Changed Features Supported Platforms Tungsten Fabric 5.1 Known Behavior Resolved Issues Deprecated Items Revision History 3 TungstenFabric, Release master Tungsten Fabric Release 5.1 Release Notes Release 5.1 July 2019 Table of Contents • Introduction • New and Changed Features • New and Changed Features in Tungsten Fabric Release 5.1 • BGPaaS Peer Zone Collection • Installing Tungsten Fabric with Mesos • Adding a New Compute Node to an Existing Containerized Tungsten Fabric Cluster • Support for Edge Routed Bridging • Routing Policies Match on Extended Communities • Support for OpenShift 3.11 • Support for Kubernetes 1.12 • Auto-provisioning of IPtable Filtering Rules on Tungsten Fabric Nodes • Certificate Lifecycle Management Using Red Hat Identity Management • Support for Controlling the Maximum Flow Scale Supported on a Virtual Machine Inter- face • Support for Multiple Network Interfaces in Kubernetes • Support for Prefix-Based Fat Flow • Enable TLS Communication Between Analytics and Kafka • Support for Route Reflectors • Support for Tungsten Fabric on Windows Operating System • Support for EVPN Multicast Type 6 Selective Multicast Ethernet Tag Routes • Support for MPLS L3VPN InterAS Option C • Support for Virtual Port Group • Supported Platforms Tungsten Fabric 5.1 • Known Behavior • Resolved Issues • Deprecated Items • Requesting Technical Support • Revision History 4 Chapter 1. Documentation Structure TungstenFabric, Release master Introduction Tungsten Fabric is an open, standards-based software solution that delivers network virtualization and service au- tomation for federated cloud networks. It provides self-service provisioning, improves network troubleshooting and diagnostics, and enables service chaining for dynamic application environments across enterprise virtual private cloud (VPC), managed Infrastructure as a Service (IaaS), and Networks Functions Virtualization (NFV) use cases. These release notes accompany Release 5.1 of Tungsten Fabric. They describe new features, limitations, and known problems. These release notes are displayed on the Tungsten Fabric Documentation Web page at https://tungstenfabric.github.io/ website. New and Changed Features The features listed in this section are new or changed as of Tungsten Fabric Release 5.1. A brief description of each new feature is included. • New and Changed Features in Tungsten Fabric Release 5.1 New and Changed Features in Tungsten Fabric Release 5.1 The features listed in this section are new as of Tungsten Fabric Release 5.1. BGPaaS Peer Zone Collection Starting with Tungsten Fabric Release 5.1, to better support high availability (HA) architectures, BGPaaS supports control node zone selection, with options available to configure BGPaaS control node zone peers. This capability enables you to set up primary and secondary control node zones, which can have one or more control nodes. For more information, see BGP as a Service. Installing Tungsten Fabric with Mesos Starting with Tungsten Fabric Release 5.1, Tungsten Fabric supports Mesosphere DC/OS. Tungsten Fabric overlay and non-overlay network virtualization features are available in Apache Mesos environment. For more information, see Installing Tungsten Fabric with Mesos. Adding a New Compute Node to an Existing Containerized Tungsten Fabric Cluster Starting with Tungsten Fabric Release 5.1, Tungsten Fabric supports the adding of a new compute node to the existing OpenStack cluster by configuring the instances.yaml file. For more information, see Adding a New Compute Node to Existing Containerized Tungsten Fabric Cluster. 1.1. User Documentation 5 TungstenFabric, Release master Support for Edge Routed Bridging Starting with Tungsten Fabric Release 5.1, the edge-routed bridging (ERB) for QFX series switches feature configures the inter-VN unicast traffic routing to occur at the leaf (ToR) switches in an IP CLOS with underlay connectivity topology. The ERB feature introduces the ERB-UCAST-Gateway and CRB-MCAST-Gateway roles in release 5.1. ERB is supported on the following devices running only Junos OS release 18.1R3: • QFX5110-48S • QFX5110-32Q • QFX10002-36Q • QFX10002-72Q • QFX10008 • QFX10016 For more information, see Edge Routed Bridging for QFX Series Switches. Routing Policies Match on Extended Communities Tungsten Fabric Release 5.1 supports extended communities on the import routing policy function. Release 5.1 allows import routing policy terms to match on extended communities and import routing policy actions to add, set, and re- move extended communities. Filtering routes based on extended communities prevent advertising unnecessary service interface and static routes from the control node. For more information, see Creating a Routing Policy With External Communities in Contrail Command. Support for OpenShift 3.11 Tungsten Fabric Release 5.1 supports the installation of a standalone Red Hat OpenShift Container Platform version 3.11 cluster using ansible-openshift as the deployment tool. For more information, see Installing a Standalone Red Hat OpenShift Container Platform 3.11 Cluster Using OpenShift Ansible
Recommended publications
  • Deliverable No. 5.3 Techniques to Build the Cloud Infrastructure Available to the Community
    Deliverable No. 5.3 Techniques to build the cloud infrastructure available to the community Grant Agreement No.: 600841 Deliverable No.: D5.3 Deliverable Name: Techniques to build the cloud infrastructure available to the community Contractual Submission Date: 31/03/2015 Actual Submission Date: 31/03/2015 Dissemination Level PU Public X PP Restricted to other programme participants (including the Commission Services) RE Restricted to a group specified by the consortium (including the Commission Services) CO Confidential, only for members of the consortium (including the Commission Services) Grant Agreement no. 600841 D5.3 – Techniques to build the cloud infrastructure available to the community COVER AND CONTROL PAGE OF DOCUMENT Project Acronym: CHIC Project Full Name: Computational Horizons In Cancer (CHIC): Developing Meta- and Hyper-Multiscale Models and Repositories for In Silico Oncology Deliverable No.: D5.3 Document name: Techniques to build the cloud infrastructure available to the community Nature (R, P, D, O)1 R Dissemination Level (PU, PP, PU RE, CO)2 Version: 1.0 Actual Submission Date: 31/03/2015 Editor: Manolis Tsiknakis Institution: FORTH E-Mail: [email protected] ABSTRACT: This deliverable reports on the technologies, techniques and configuration needed to install, configure, maintain and run a private cloud infrastructure for productive usage. KEYWORD LIST: Cloud infrastructure, OpenStack, Eucalyptus, CloudStack, VMware vSphere, virtualization, computation, storage, security, architecture. The research leading to these results has received funding from the European Community's Seventh Framework Programme (FP7/2007-2013) under grant agreement no 600841. The author is solely responsible for its content, it does not represent the opinion of the European Community and the Community is not responsible for any use that might be made of data appearing therein.
    [Show full text]
  • MCP Q4`18 Release Notes Version Q4-18 Mirantis Cloud Platform Release Notes Version Q4`18
    MCP Q4`18 Release Notes version q4-18 Mirantis Cloud Platform Release Notes version Q4`18 Copyright notice 2021 Mirantis, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. No part of this publication may be reproduced in any written, electronic, recording, or photocopying form without written permission of Mirantis, Inc. Mirantis, Inc. reserves the right to modify the content of this document at any time without prior notice. Functionality described in the document may not be available at the moment. The document contains the latest information at the time of publication. Mirantis, Inc. and the Mirantis Logo are trademarks of Mirantis, Inc. and/or its affiliates in the United States an other countries. Third party trademarks, service marks, and names mentioned in this document are the properties of their respective owners. ©2021, Mirantis Inc. Page 2 Mirantis Cloud Platform Release Notes version Q4`18 What’s new This section provides the details about the features and enhancements introduced with the latest MCP release version. Note The MCP integration of the community software projects, such as OpenStack, Kubernetes, OpenContrail, and Ceph, includes the integration of the features which the MCP consumers can benefit from. Refer to the MCP Q4`18 Deployment Guide for the software features that can be deployed and managed by MCP DriveTrain. MCP DriveTrain • Encryption of sensitive data in the Reclass model • Galera verification and restoration pipeline • Jenkins version upgrade • Partitioning table for the VCP images Encryption of sensitive data in the Reclass model SECURITY Implemented the GPG encryption to protect sensitive data in the Git repositories of the Reclass model as well as the key management mechanism for secrets encryption and decryption.
    [Show full text]
  • Google Cloud Platform (GCP): Возможности И Преимущества
    Google Cloud Platform (GCP): возможности и преимущества Дмитрий Новаковский, Олег Ивонин Январь 2017 Кто мы? Дмитрий Новаковский / [email protected] ● Customer Engineer @ Google Netherlands B.V. ● Поддержка продаж и разработка решений на основе GCE, GKE, GAE ● В прошлом: ○ IaaS/PaaS (OpenStack @ Mirantis) ○ SaaS (ETAdirect @ TOA Technologies/Oracle) Олег Ивонин / [email protected] ● Cloud Web Solutions Engineer @ Google Netherlands B.V. ● Разработка инструментов для анализа стоимости конфигураций и планирования архитектуры облачных решений на основе GCP ○ Google Cloud Platform Pricing Calculator и другие О чем мы расскажем? ● Часть 1: Google Cloud Platform 101 ○ Наборы облачных сервисов и их назначение ○ Преимущества на рынке ● Часть 2: Инфраструктурные сервисы GCP (IaaS/PaaS) ○ GCE - Виртуальные машины ○ GKE - Оркестрация Docker контейнеров ○ GAE - NoOps/PaaS окружения ● Часть 3: Big Data и Machine Learning инструменты GCP ● Часть 4: Примеры, итоги и вопросы/ответы Disclaimer Google Cloud Platform 4 Часть 1: Google Cloud Platform 101 Google Cloud Platform 5 Путь IT-инфраструктуры в “облако” Storage Processing Memory Network Storage Processing Memory Network Physical / Self-Service / Serverless / Colo / VPS Elastic / IaaS NoOps / PaaS Google Cloud Platform 6 Что такое Google Cloud Platform? GCP - это набор коммерческих облачных сервисов, основанных на разработках и опыте Google в для собственных продуктов: ● Google Search ● YouTube ● Google Maps ● и др. Google’s Data Research Flume MapReduce Dremel Millwheel TensorFlow GFS Megastore
    [Show full text]
  • Entrust Nshield Hsms and Mirantis Kubernetes Engine Enhance The
    Entrust nShield HSMs and Mirantis Kubernetes Engine Enhance the Security of Containerized Applications Integrated solution enables application developers to easily access high assurance cryptographic services HIGHLIGHTS THE PROBLEM • Support today’s fast-paced application Developers lack ability to access container deployment environments cryptographic functions for their • Provide secure access to Entrust applications nShield® hardware security modules Modern application development uses (HSMs) containers and Kubernetes to standardize • Allow critical cryptographic key software design and facilitate continuous management to run transparently integration and continuous delivery (CI/CD). • Establish a FIPS 140-2 and Common The process enables developers to deploy Criteria certified root of trust new applications with the assurance that they’ll run reliably in any user environment. • Help facilitate auditing and compliance A critical component of the software with data security regulations development process is the security of the CI/CD software supply chain. To date, adding an HSM root of trust for container deployments has been difficult. LEARN MORE AT ENTRUST.COM Enhancing the security of containerized applications THE CHALLENGE THE SOLUTION Enabling access to cryptographic Mirantis Kubernetes Engine services without impacting and Entrust nShield HSMs development process Mirantis Kubernetes Engine is a market- While the security of applications developed leading container platform for accelerating using containers and Kubernetes is
    [Show full text]
  • Forrester: Multicloud Container Development Platforms, Q3 2020
    LICENSED FOR INDIVIDUAL USE ONLY The Forrester Wave™: Multicloud Container Development Platforms, Q3 2020 The Eight Providers That Matter Most And How They Stack Up by Dave Bartoletti and Charlie Dai September 15, 2020 Why Read This Report Key Takeaways In our 29-criterion evaluation of multicloud Red Hat-IBM, Google, And Rancher Lead The container development platform providers, we Pack identified the eight most significant ones — Forrester’s research uncovered a market in which Canonical, D2iQ, Google, Mirantis, Platform9 Red Hat-IBM, Google, and Rancher are Leaders; Systems, Rancher, Red Hat-IBM, VMware — VMware, D2iQ, and Platform9 Systems are and researched, analyzed, and scored them. Strong Performers; and Mirantis and Canonical This report shows how each provider measures are Contenders. up and helps infrastructure and operations Dev Experience, Distributed Operations, And professionals select the right one for their needs. Ecosystem Integrations Are Key Differentiators As developers and technology teams race to meet the demand for cloud-native applications, developer experience and development services, distributed infrastructure operations, and rich ecosystem partnerships and integrations will dictate which platform providers will lead the pack. This PDF is only licensed for individual use when downloaded from forrester.com or reprints.forrester.com. All other distribution prohibited. FORRESTER.COM FOR INFRASTRUCTURE & OPERATIONS PROFESSIONALS The Forrester Wave™: Multicloud Container Development Platforms, Q3 2020 The Eight Providers
    [Show full text]
  • View Whitepaper
    INFRAREPORT Top M&A Trends in Infrastructure Software EXECUTIVE SUMMARY 4 1 EVOLUTION OF CLOUD INFRASTRUCTURE 7 1.1 Size of the Prize 7 1.2 The Evolution of the Infrastructure (Public) Cloud Market and Technology 7 1.2.1 Original 2006 Public Cloud - Hardware as a Service 8 1.2.2 2016 - 2010 - Platform as a Service 9 1.2.3 2016 - 2019 - Containers as a Service 10 1.2.4 Container Orchestration 11 1.2.5 Standardization of Container Orchestration 11 1.2.6 Hybrid Cloud & Multi-Cloud 12 1.2.7 Edge Computing and 5G 12 1.2.8 APIs, Cloud Components and AI 13 1.2.9 Service Mesh 14 1.2.10 Serverless 15 1.2.11 Zero Code 15 1.2.12 Cloud as a Service 16 2 STATE OF THE MARKET 18 2.1 Investment Trend Summary -Summary of Funding Activity in Cloud Infrastructure 18 3 MARKET FOCUS – TRENDS & COMPANIES 20 3.1 Cloud Providers Provide Enhanced Security, Including AI/ML and Zero Trust Security 20 3.2 Cloud Management and Cost Containment Becomes a Challenge for Customers 21 3.3 The Container Market is Just Starting to Heat Up 23 3.4 Kubernetes 24 3.5 APIs Have Become the Dominant Information Sharing Paradigm 27 3.6 DevOps is the Answer to Increasing Competition From Emerging Digital Disruptors. 30 3.7 Serverless 32 3.8 Zero Code 38 3.9 Hybrid, Multi and Edge Clouds 43 4 LARGE PUBLIC/PRIVATE ACQUIRERS 57 4.1 Amazon Web Services | Private Company Profile 57 4.2 Cloudera (NYS: CLDR) | Public Company Profile 59 4.3 Hortonworks | Private Company Profile 61 Infrastructure Software Report l Woodside Capital Partners l Confidential l October 2020 Page | 2 INFRAREPORT
    [Show full text]
  • Red Hat Hyperconverged Infrastructure for Cloud 13
    Red Hat Hyperconverged Infrastructure for Cloud 13 Release Notes Release notes for Red Hat Hyperconverged Infrastructure for Cloud Last Updated: 2018-07-13 Red Hat Hyperconverged Infrastructure for Cloud 13 Release Notes Release notes for Red Hat Hyperconverged Infrastructure for Cloud Legal Notice Copyright © 2018 Red Hat, Inc. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/ . In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries. Node.js ® is an official trademark of Joyent. Red Hat Software Collections is not formally related to or endorsed by the official Joyent Node.js open source or commercial project.
    [Show full text]
  • Openstack Cloud Learning
    Michael Mullins FILE:MULLINS.odp / / Page 1 Senior IT Specialist [email protected] OpenStack Cloud Learning 11th Swiss OpenStack User Group Meetup with Docker IBM Cloud Transformation Lab for Data Science Vulkanstrasse 106, 8010 Zurich, Switzerland Michael Mullins Mirantis OpenStack Certified Professional IBM Certified Solution Advisor Cloud Computing Architecture v4 Brocade Certified vRouter Engineer All opinions expressed in this presentation are my own Michael Mullins FILE:MULLINS.odp / / Page 2 Senior IT Specialist [email protected] Agenda Introduction Why we need to learn OpenStack? Why? OpenStack skills, supply & demand Sources of learning What? Learning roadmaps Hosted OpenStack trials & demos How? Building your own Summary Michael Mullins FILE:MULLINS.odp / / Page 3 Senior IT Specialist [email protected] Why we need to learn OpenStack? OpenStack Engineers make 36% more then an average cloud engineer – OpenStack foundation Mirantis Certified OpenStack Engineers make > $136K - Glassdoor 14 million Cloud jobs to be created by end of 2015 – BSA Software Alliance OpenStack is growing so fast that the talent pool is not deep enough to fill the positions available – Rackspace Last but not least, We like OpenStack Michael Mullins FILE:MULLINS.odp / / Page 4 Senior IT Specialist [email protected] OpenStack skills, supply & demand We are seeing shorter life cycles for Tech World Wide Web Smartphone Virtualisation Public Cloud lConsumer confidence Private Cloud lThe geek factor lOpEx versus CapEx Training
    [Show full text]
  • Brief: Openstack Is Now Ready for Business
    FOR CIOS Brief: OpenStack Is Now Ready For Business Robust Technology And A Strong Community Make This Open Source Cloud A Good Choice For Powering New Enterprise Applications by Paul Miller and Lauren E. Nelson September 9, 2015 | Updated: September 16, 2015 Why Read This Brief Key Takeaways The open source cloud computing project OpenStack Is Now A Technologically Credible OpenStack has come a long way since NASA Platform Upon Which To Grow and Rackspace launched it in 2010. Backed OpenStack’s latest release offers CIOs the right by leading technology infrastructure providers tools to build an agile BT estate in support of including Cisco, Dell, EMC, HP, IBM, Intel, and the applications for their organization’s rapidly VMware, OpenStack underpins significant expanding systems of engagement. Broad workloads at an increasingly diverse set of industry support for, and ongoing development of, organizations, including BMW, CERN, Comcast, the core open source components of OpenStack eBay, and Wal-Mart. For CIOs engaged in broader diminish the risk of vendor lock-in and expensive programs to win, serve, and retain customers — long-term licensing commitments. and refocus business technology (BT) spend — a Partners Make It Easier To Manage planned and pragmatic rollout of OpenStack OpenStack’s Remaining Rough Edges now demands serious consideration. This Some see strategic advantage in nurturing or brief highlights lessons learned by OpenStack hiring talent to build and manage all aspects of adopters, illustrating the technology’s role in their OpenStack deployment. But the dominant driving and sustaining change as CIOs move to model behind most successful OpenStack embrace the age of the customer.
    [Show full text]
  • Triliovault and Mirantis Cloud Platform the Smart Solution for Business Data Protection and Recovery
    SOLUTIONS SHEET TrilioVault and Mirantis Cloud Platform The Smart Solution for Business Data Protection and Recovery Introduction on OpenStack. More forward-looking DevOps groups are recognizing this and are building data protection Trilio, the creators of the first and only comprehensive solutions into their environments at the beginning of data protection platform native to OpenStack, is a their OpenStack journey. preferred provider of backup and recovery solutions for Mirantis Cloud Platform, offering enhanced data retention, protection, and integrity for workloads TrilioVault running on OpenStack. Organizations that rely on TrilioVault is the industry’s first native backup and Mirantis for their OpenStack deployments can have recovery solution for OpenStack. Developed out confidence knowing that tenants backed by the of Raksha – the first data-protection-as-a-service TrilioVault application and data recovery solution will specification for OpenStack – and authored by Trilio’s enjoy greater resiliency and operational efficiencies. founders, TrilioVault was designed and built from the ground up specifically for OpenStack. Adhering to OpenStack Benefits the characteristics required by cloud environments, TrilioVault’s flexible, fault-tolerant, forever scalable OpenStack transforms traditional data centers into solution provides seamless self-service, multi-tenant, software-defined infrastructure (networking, storage, policy-based comprehensive backup and rapid recovery essentially SD-everything). The widespread adoption of workloads running in OpenStack. Deployment can of OpenStack has made cloud infrastructure a source happen at any point in the journey and is completely of competitive advantage. non-disruptive. Overcoming Challenges Mirantis Once an OpenStack application goes into deployment, Mirantis Cloud Platform (MCP) is an agile, operations- backup and recovery—along with comprehensive data centric infrastructure platform that offers new protection—become a key business requirement.
    [Show full text]
  • Contrail Software Is the Visualization Tool of Choice When Managing and Controlling Access to Your Environmental Data Is Critical
    Contrail® Total Control of Your Environmental Network Data and Information Distribution Contrail software is the visualization tool of choice when managing and controlling access to your environmental data is critical. Contrail supports the real-time data collection, processing, archiving and dissemination of your hydrological, meteorological and other environmental data in one place. Contrail gives users instant access to what they need, when they need it, on any Web-enabled device. HIGHLIGHTS Contrail collects, validates, processes for alarming and notification, displays on maps, graphs and tables, archives, exports and disseminates hydro-meteorological Seamless integration of data from data and information, including gauge-adjusted radar rainfall and inundation many sensor types and 35+ source maps. Encompassed are tools and reports for sensor management, rainfall and types (e.g., ALERT2, SCADA, Modbus, stream-related reporting, maintenance, and custom alarm and notification features. and many others) OneRain’s solutions enable management of and quick access to water-related Complete data management and emergency action plan (EAP) content, links to any outside resources, webcam video automated archiving feeds from difficult sites, and many other web-hosted tools. Unlimited number of users–desktop and mobile Web-accessible (no special Makes Decision-Critical Support Data Highly Available app to install except on the hosting Contrail is used for operational decision support and emergency operations, post- servers) event analysis, model calibration and planning in hydrology and flood early warning, Advanced multi-sensor alarm rules dam safety and reservoir operations, water resource management, road weather, and and notification management environmental monitoring applications. Historical and real-time data The Contrail application is configurable to suit specific user needs, for multiple user Ingests information such as USGS, groups and different types of users simultaneously.
    [Show full text]
  • IBM Tivoli Netcool/Omnibus Probe for Juniper Contrail: Reference Guide Chapter 1
    IBM® Tivoli® Netcool/OMNIbus Probe for Juniper Contrail 1.0 Reference Guide December 10, 2015 IBM SC27-8705-00 Note Before using this information and the product it supports, read the information in Appendix A, “Notices and Trademarks,” on page 19. Edition notice This edition (SC27-8705-00) applies to version 1.0 of IBM Tivoli Netcool/OMNIbus Probe for Juniper Contrail and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright International Business Machines Corporation 2015. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents About this guide.................................................................................................... v Document control page................................................................................................................................v Conventions used in this guide.................................................................................................................... v Chapter 1. Probe for Juniper Contrail..................................................................... 1 Summary...................................................................................................................................................... 1 Installing probes.......................................................................................................................................... 2 SSL-based connectivity................................................................................................................................3
    [Show full text]