Task #6869
Updated by Nico Schottelius over 5 years ago
For proper growth and stability, we need to challenge our setup. We will try to replace opennebula with ucloud and at the same time challenge OpenStack. This is not only a technical, but also a public project, which Sanghee will write the public story of. Requirements: * a fully portable cloud management system that is API based, exposes all internals w/o secret keys ** supporting console via guacamole ** users in ldap ** api authentication in ungleich-otp ** firewalling in ufirewall (or similar) * A great team * To be built in less than 100 days h2. Technology stack * python3 ** easy to read * flask ** easy to understand * ldap ** well known * ungleich-otp * etcd ** storing VMs, networks, etc. * nft (Linux), pf (BSD) * JSON ** describing the data, easy to handle * Prometheus ** For monitoring hosts and VMs * VXLAN ** For networks h2. Technical requirements * ucloud should be portable ** While the primary target is Linux, it should run on FreeBSD/OpenBSD as well * There should be no single point of failure ** APIs should be announced via BGP to the routers ** Switches will then use ECMP to load balance ** All APIs write to a distributed data store (v1: etcd) -> all data is distributed, too. * Fast dead host detection ** Dead hosts should be detected fast, VMs should be rescheduled fast h2. Components h3. Scheduler The scheduler knows about hosts, their capacities and their usage. The scheduler decides which VM gets scheduled where. The scheduler is also responsible for rescheduling VMs (f.i. due to another host becoming better for a specific VM). h3. Network manager Creates and manages virtual layer 2 networks. Basically does the following: * Create VXLAN with correct IPv6 multicast address h3. IPAM Network address manager. Provides dhcpd/dhcp6d/router advertisements. h3. Metadata Provides access to to * public ssh keys * other data users provide h3. Firewall The VMs should not be able to interfere with other VMs or hosts in a malicious way. The following protective measures need to be implemented: * prevent dhcpd answers in public networks * prevent router advertisements in public networks Note to Nico: ping reyk for possible involvement