Language Selection

English French German Italian Portuguese Spanish

Canonical introduces Charmed OSM to enable telcos with network functions management and orchestration

Filed under

Canonical, the publishers of Ubuntu, today announced Charmed OSM – a pure upstream Open Source MANO (OSM) distribution designed for production-grade, highly available and scalable deployments. Charmed OSM provides telecommunications service providers (TSPs) with a generic approach to network functions management and orchestration, allowing them to benefit from cost reduction resulting from the adoption of network functions virtualisation (NFV) technology.

Charmed OSM is a pure upstream OSM distribution. Telcos are assured of a predictable release cadence and upgrade path as Charmed OSM will be released within two weeks of the upstream, enabling them to benefit from the latest features. Charmed OSM is supported under Ubuntu Advantage to provide critical security patches, 24/7 support and production-grade SLAs for maximum uptime and stability.

“OSM allows TSPs to move from traditional, legacy networking services to cloud-native network functions and benefit from reduced CAPEX and OPEX, and DevOps agility,” said Tytus Kurek, Product Manager for Charmed OSM at Canonical. “However, telcos need an OSM distribution that is stable, secure, supported and easy to operate. Charmed OSM brings all of that together, enabling a smooth transition and painless adoption.”

Read more

Also: Canonical Releases Charmed OSM As Its Latest Enterprise Push

Canonical intros OSM distributon platform for telco NFV

  • Canonical intros OSM distributon platform for telco NFV

    Canonical, the publishers of Ubuntu, announced Charmed OSM, a new platform for telecom operators to virtualise network functions. Charmed is a pure upstream Open Source MANO (OSM) distribution, providing a generic platform to develop NFV.

    Operators can be assured of a predictable release cadence and upgrade path as Charmed OSM will be released within two weeks of the upstream, enabling them to benefit from the latest features, Canonical said. The platform is supported under the Ubuntu Advantage to provide critical security patches, 24/7 support and production-grade SLAs for maximum uptime and stability.

    The company claims providers can reduce deployment times of complex OSM clusters from weeks to hours in an automated process with Juju, the application modelling tool offered with Charmed. Juju charms are collections of scripts and metadata which contain all necessary logic required to install, configure and connect applications.

8th OSM Hackfest: the highlights

  • 8th OSM Hackfest: the highlights

    The 8th OSM Hackfest is over, but the OSM (Open Source MANO) project continues to evolve and is now looking forward to landing release SEVEN. It was an exciting week in Lucca, Italy. We’ve seen a lot of interest from those who attended the event for the first time and a strong commitment from the community to drive the project towards new challenges.

    This was also an important week for Canonical as we’ve officially launched our own distribution – Charmed OSM!


    By delegating an experienced team of telco experts, Canonical delivered a plenary session about native charms and a presentation about CNF (container network function) workloads deployment with Juju K8s charms, a feature that is expected in OSM release SEVEN. The session about native charms followed with a brief update on a new charm tech framework. The charm tech framework is event-based which makes charming experience much more intuitive. An example of how to migrate from the reactive framework to the new framework was provided too. The charm tech framework is coming with Juju 2.7 release.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

today's howtos

Events: KVM Forum 2019 and "Bar Charts for Diversity"

  • A recap of KVM Forum 2019

    The 13th KVM Forum virtualization conference took place in Lyon, France in October 2019. One might think that development may have finished on the Kernel Virtual Machine (KVM) module that was merged in Linux 2.6.20 in 2007, but this year's conference underscored the amount of work still being done, particularly on side-channel attack mitigation, I/O device assignment with VFIO and mdev, footprint reduction with micro virtual machines (VMs), and with the ability to run VMs nested within VMs. Many talks also involved the virtual machine monitor (VMM) user-space programs that use the KVM kernel module—of which QEMU is the most widely used.

  • Enhancing KVM for guest protection and security

    A key tenet in KVM is to reuse as much Linux infrastructure as possible and focus specifically on processor virtualization. Back in 2007, this meant a smaller code base and less friction with the other kernel subsystems, especially when compared with other virtualization technologies such as Xen. This led to KVM being merged into the mainline with relative ease. But now, in the era of microarchitectural vulnerabilities, the priorities have shifted, and the KVM's reliance on other kernel subsystems can be a liability. For one thing, the host kernel widens the TCB (Trusted Computing Base) and makes for a larger attack surface. In addition, kernel data structures such as the direct memory map give Linux access to guest memory even when it is not strictly necessary and make it impossible to fully enforce the principle of least privilege. In his talk "Enhancing KVM for Guest Protection and Security" (slides [PDF]) presented at KVM Forum 2019, long-time KVM contributor Jun Nakajima explained this risk and suggested some strategies to mitigate it.

  • Bar charts for diversity

    At the Linux App Summit I gave an unconference talk titles Hey guys, this conference is for everyone. The “hey guys” part refers to excluding people from a talk or making them feel uncomfortable – you can do this unintentionally, and the take-away of the talk was that you, (yes, you) can be better. I illustrated this mostly with conversational distance, a favorite topic of mine that I can demonstrate easily on stage. There’s a lot of diversity in how far people stand away from strangers, while explaining something they care about. The talk wasn’t recorded, but I’ve put the slides up. Another side of diversity can be dealt with by statistics. Since I’m a mathematician, I have a big jar of peanuts and raisins in the kitchen. Late at night I head down to the kitchen and grab ten items from the jar. Darn, all of them are raisins. What are the odds!? Well, a lot depends on whether there are any peanuts in the jar at all; what percentage is peanuts; whether I’m actually picking things randomly or not. There’s a convenient tool that Katarina Behrens pointed me to, which can help figure this out. Even if there’s only a tiny fraction of peanuts in the jar, there’s an appreciable chance of getting one (e.g. change the percentage on that page to 5% and you’ll see).

Linux on the MAG1 8.9 inch mini-laptop (Ubuntu and Fedora)

The Magic Ben MAG1 mini-laptop is a 1.5 pound notebook computer that measures about 8.2″ x 5.8″ x 0.7″ and which features an 8.9 inch touchscreen display and an Intel Core m3-8100Y processor. As I noted in my MAG1 review, the little computer also has one of the best keyboards I’ve used on a laptop this small and a tiny, but responsive trackpad below the backlit keyboard. Available from GeekBuying for $630 and up, the MAG1 ships with Windows 10, but it’s also one of the most Linux-friendly mini-laptops I’ve tested to date. [...] I did not install either operating system to local storage, so I cannot comment on sleep, battery life, fingerprint authentication, or other features that you’d only be able to truly test by fully installing Ubuntu, Fedora, or another GNU/Linux-based operating system. But running from a liveUSB is a good way to kick the tires and see if there are any obvious pain points before installing an operating system, and for the most part the two operating systems I tested look good to go. Booting from a flash drive is also pretty easy. Once you’ve prepared a bootable drive using Rufus, UNetbootin, or a similar tool, just plug it into the computer’s USB port, hit the Esc key during startup to bring up the UEFI/SETUP utility. Read more Also: Top 10 technical skills that will get you hired in 2020

Android Leftovers