ONAP on ServiceMesh (London)
Status <London
Default deployment:
ONAP pods providing TLS (HTTPs) interfaces
Retrieve certificates during startup from AAF Certificate Manager
ONAP pod interface is exposed via service using "NodePort" (if cluster external access is required)
Hosts expose the "NodePort" via its Host IPs
Example (SDC-UI):
https://<HostIP>:30207/sdc1/portal
London (Development)
Removal of AAF
ONAP pods providing non-TLS (HTTP) interfaces
ONAP pod interface is exposed via service using "NodePort" (if cluster external access is required)
Hosts expose the "NodePort" via its Host IPs
Example (SDC-UI):
http://<HostIP>:30207/sdc1/portal
London (Production)
ONAP pods provide non-TLS (HTTP) interfaces
Encrypted communication via Envoy Proxies (nTLS) provided by ServiceMesh (Istio)
ONAP pod interface is exposed through Ingress (Istio-Gateway)
Service access via hostname (configured by Gateway/VirtualService in Ingress GW)
External TLS interface on Ingress Gateway
Authentication/Authorisation via oauth2-proxy and Keycloak
Example (SDC-UI):