Agent Working Group
Mission Statement
The Open Horizon project's Agent Working Group exists to facilitate use and development of the Open Horizon platform by collaborating with all interested parties to enhance the capabilities and features of the Open Horizon agent to meet new and emerging use cases
Leadership
Working Group Chair: @Doug Larson
Mailing List
Agent mail alias: open-horizon-agent@lists.lfedge.org
To subscribe or unsubscribe via the World Wide Web, visit: https://lists.lfedge.org/g/open-horizon-agent
Discussion Forum
#open-horizon-agent on https://chat.lfx.linuxfoundation.org/
Meeting Time
Agent Meetings are open to the public, and are held bi-weekly, starting July 27th 2020.
Agent Working Group meetings are held every other Monday at 8:30am PT (find your local time here)
To subscribe to the meeting invitation, please visit Community Meetings & Calendar: https://lists.lfedge.org/g/open-horizon-agent/calendar
----
LF Edge Working Group 2 is inviting you to a scheduled Zoom meeting.
Topic: Open Horizon Agent WG Meeting
Time: Oct 5, 2020 08:30 AM Pacific Time (US and Canada)
Every 2 weeks on Mon, until Dec 11, 2023
Please download and import the following iCalendar (.ics) files to your calendar system.
Weekly: https://zoom.us/meeting/tJAkf-mvqT4jEtGjQRlTcROfQH_K8nJW8sNA/ics?icsToken=98tyKuCspzMqHdOQuRGCRowIHYqgc-3wtiVEj7d6li7XDxRQUCzwB8p9GepxOu-I
Join Zoom Meeting
https://zoom.us/j/94980775985?pwd=clk0bFhwVU5SNVFLa1JUWHZZNTRDQT09
Meeting ID: 949 8077 5985
Passcode: 177315
One tap mobile
+13462487799,,94980775985# US (Houston)
+16699006833,,94980775985# US (San Jose)
Dial by your location
+1 346 248 7799 US (Houston)
+1 669 900 6833 US (San Jose)
+1 253 215 8782 US (Tacoma)
+1 312 626 6799 US (Chicago)
+1 929 205 6099 US (New York)
+1 301 715 8592 US (Germantown)
888 788 0099 US Toll-free
877 853 5247 US Toll-free
Meeting ID: 949 8077 5985
Find your local number: https://zoom.us/u/av0XQgb3W
Working Group Meeting Minutes
2023
March 20:
April 03:
April 17:
May 01:
May 15:
May 29:
June 12:
June 26:
July 10:
July 24:
August 07:
August 21:
September 04:
September 18:
October 02:
October 16:
October 30:
November 13:
November 27:
December 11:
2022
January 10: Cancelled, see chat room for details.
January 24: Cancelled
February 7: Slides, Recording, Jeff Kinard's slides on node policy v2 changes
February 21: Cancelled
March 21: Slides, mimik-integration-slides, Recording
May 16: cancelled
May 30: cancelled
July 25: Cancelled
August 22: Cancelled
Sept 5: Cancelled
Sept 19: Slides, Recording
Oct 3: Slides, Recording
Oct 17: Cancelled
Oct 31: Slides, Recording
Dec 26: Cancelled
2021
Jan 25, 2021: Cancelled
Mar 8, 2021: Cancelled
Apr 19, 2021: Cancelled
May 31. 2021: Cancelled
Oct 4, 2021: Cancelled - no agenda items
Oct 18, 2021: Slides, Recording
Nov 1, 2021: Cancelled
Nov 15, 2021: Cancelled
Nov 29, 2021: Cancelled
Dec 13, 2021: Cancelled
Dec 27, 2021: Cancelled
2020
Jul 27, 2020: Slides, Meeting Minutes; Meeting Recording, Shared Links
Aug 10, 2020: Slides, Meeting Minutes; Meeting Recording, Shared Links for August 10, 2020.html
Aug 24, 2020: Slides, Meeting Recording
Oct 5, 2020: Slides, Recording - Meeting was cancelled
Dec 14, 2020: Cancelled
Dec 28, 2020: Cancelled
Sub-groups
2023
AccuKnox has proposed an Isolation-centric workstream. A sub-group has been formed and meets Wednesdays at 12 noon ET/9am PT.
Initial meeting 2023-07-26, recording: 35 minutes
Discussed options, capabilities, and eventually actionable goals. AccuKnox will create a Feature Candidate proposal containing our notes from the meeting.
Ideas:
If an attack is in progress or there is some other security policy violation, how should that information be surfaced from KubeArmor to Open Horizon? What should OH do about it? Should we extend the deployment policy to allow constraints to address and potentially terminate the agreement?
How should OH/IEAM integrate with KubeArmor and Discovery Engine? DE includes thresholds and targets for notifications, as well as automated security policy generation.
How do we address Day 1 deployment of KubeArmor? Only use their containerized version and deploy that way? Or extend our agent installation script to allow installing systems version of KubeArmor?
How should OH facilitate KubeArmor control plane messaging through anax?
2022
AccuKnox presented a proposal to the TSC for a series of POCs solving security use cases. We've formed a 2022 sub-group to evaluate those.
POC Zero:
Target environment is x86-based hosts, device agent
Goal is to observe/audit Agent interactions, generate policy based on those interactions, and enforce the policy
Services will be deployed during observation and enforcement but not observed
POC One:
Target environment is x86-based hosts, device agent
Goal is to observe/audit Docker-based applications and their interactions, generate policy based on those interactions, and enforce the policy
2022 Meeting:
Feb 25: Recording
June 13: Slides, Recording
June 27: Recording (demo begins at 7:05 in the recording)
August 8: Final demo of POCs zero and one (demo begins at 1:12 in the recording)
Documents
TBA