2025-05-08 TSC Minutes

2025-05-08 TSC Minutes

 

Representatives & Attendees

TSC Members

Company

TSC Members

Company

TSC Members may indicate their attendance by changing the cell background for their name to green.

@Sana Tariq (Chairperson)

TELUS, Canada

@Ciaran Johnston (Ericsson) (Vice-Chairperson)

Ericsson

@Avinash Bhat

Samsung Electronics Co Ltd

@Timo Perala

Nokia

@Sagar Arora

OpenAirInterface Software Alliance (OSA)

@balaji varadaraju

Red Hat

@Vishal Varvate

Capgemini India

@Eric Debeau

Orange

@Bernard Tsai

Deutsche Telekom

@Kandan Kathirvel

Google Cloud

@Hunor Demeter

VMWare by Broadcom

@Seshu Kumar Mudiganti

WindRiver

@Phil Porras

SRI International

@Raj Panchapakesan

AccuKnox Inc

Iain Wilkinson

Vodafone

Community members may @ tag themselves below to show their attendance.

 


You can add action items anywhere in the minutes by typing “/action” and pressing enter

Action Items:

 

LF Staff:

Agenda

The project's Antitrust Policy, which you can find linked from the LF and project websites. The policy is important where multiple companies, including potential industry competitors, are participating in meetings. Please review and if you have any questions, please contact your company legal counsel. Members of the LF may contact Andrew Updegrove at the firm Gesmer Updegrove LLP, which provides legal counsel to the LF.

Key Updates

  • Nephio event options

  • Kubenet plans for moving to a foundation - @Wim Henderickx if available

  • Feedback report from LFN board meeting - @Sana Tariq / @Ciaran Johnston (Ericsson)

  • Repo audit - volunteer needed - review repo list ownership: Nephio Github Repositories

SIG Status

Network Architecture

  • .

Automation

  • .

Release

  • .

Security

  • .

Other Updates

  • .

Action Items Review

Minutes

Nephio events

Limited options for in person events in 2025

TSC requested to provide input on wanted in-person events in 2026 to plan for this in good time

We could line up some virtual developer meetings in 2025

  • porch development, use cases etc

@balaji varadaraju , @Ciaran Johnston (Ericsson) to bring up in SIG NW Arch

Proposal to start a wiki page for brainstorming ideas for 2026 in-person meetings @Ciaran Johnston (Ericsson) to set up a page

Kubenet

Wim not available this week, defer to next week

Repo list

Wiki page representing the repos presented

Meeting at 8am PT May 13, 2025 to triage the list - as much population of the list beforehand is appreciated.

Other updates - Git repo access

Bala: there is not a way to add members to the org and then add them to a repo - they can only be added to the repos directly

Audit the github teams to determine which are needed and which are not needed - @Casey Cain and @Ciaran Johnston (Ericsson)
Determine the mechanism for a SIG owner to add people to a github team - @Casey Cain and @balaji varadaraju

SIG Network Architecture

Service Assurance is the big theme coming in R6 that we have not had previously. We will be exposing the platform health

Platform updates, github and gitlab support will also be added

We may not have infrastructure and groundwork ready for a GenAI hackathon - rather we will provide a few user stories for R6 to drive this, such as package generation or similar as a technical preview in the R6 release.

SIG Automation

Bare Metal PRs are coming through

Free5GC operators are being analyzed to determine what is needed here

There is a need for a modelling discussion to address package revisions, as well as how packages are tagged in repos. Quite ambiguous now, needs to be determined - discussion requested at modelling subcommittee

R5 planning status - in good shape. Coule be presented at the next TSC

SIG Security

Security scans - extra scans are needed on a periodic basis to ensure more periodic scanning of Nephio packages, not just once-off

  • Administrator access is needed to Dockerhub to perform periodic scans on released Nephio/Porch images. SIG-Security needs this access from SIG-Release

  • Infrastructure code has yaml files, ansible scripts, bash scripts, terraform scripts etc. There are tools that check these types of files for vulnerabilities in “infrastructure as code”. Would this be of interest to SIG-Release because SIG-Security already has done some work in this area. SIG-Security will raise a PR on test-infra to bring in this tooling.

SIG release

No updates