Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

ITEMDETAILS
R8 Presentation
Recording mp4
Audio only

Key Contacts -  rouzaut Amy Zwarico Paweł Pawlak 

Executive Summary - All ONAP applications should generate logs that can be collected by Kubernetes. 

...

Key Contacts -  Olivier Phenix Seshu Kumar Mudiganti Neil Derraugh  Mike Elliott rodrigo lima

Executive Summary - Allow ONAP to run in a multi-tenant environment, where each tenant can manage access to his service designs, instances, and namespace-specific component

...

Organization Mgmt, Sales Strategies -There is no additional organizational management or sales strategies for this requirement outside of a service providers "normal" ONAP deployment and its attendant organizational resources from a service provider. 


Identification of events that compromise the ONAP system (REQ-464)

Key Contacts - rouzaut  Amy Zwarico Paweł Pawlak  

Executive Summary - 

Implementation is done to identify events that compromise the system.

This information feedback is done because only an intervention can stop this risk.

The events are logged and according to rules have intervened according to the risks.

 External system must be use to save and display the log

Secure protocol  must be use to transfert the log between ONAP and external system

Business Impact - Improves the security posture of ONAP by lessening the risk. 

Business Markets - All operators and service provider.

Funding/Financial Impacts - N/A

Organization Mgmt, Sales Strategies -There is no additional organizational management or sales strategies for this requirement outside of a service providers "normal" ONAP deployment and its attendant organizational resources from a service provider.