You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/guides/k3s-reference-architecture.md
+11-6Lines changed: 11 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -486,13 +486,13 @@ sudo kubectl describe pod test | grep "Container image"
486
486
* **Challenge:** A WAN outage at a retail store prevents POS terminals from restarting, halting revenue.
487
487
* **Solution:** Satellites cache critical POS images locally. If the WAN fails, terminals pull from `127.0.0.1:5050`. Updates are staged geographically via Ground Control groups to prevent global WAN saturation.
SUSE and Bosch have pioneered a hybrid cloud control architecture for Industrial IoT (IIoT), deploying highly complex microservices directly onto the factory floor via **K3s**.
491
+
SUSE and Bosch describe a hybrid cloud control and monitoring architecture for Industrial IoT (IIoT), where edge environments must remain secure and operational under constrained connectivity.
492
492
493
-
* **The Edge Workloads:** The factory operates a local **Private 5G Network** (Open5gs, AMF, SMF, UPF components) combined with advanced service meshes (Istio/Envoy), networking policies (Cilium/eBPF), and observability stacks (Prometheus/Grafana).
494
-
* **The Challenge:** These factory environments are heavily restricted or entirely air-gapped for security. A severed fiber link to the central cloud cannot be allowed to halt robotic manufacturing lines. If a local K3s node restarts, it must be able to pull these complex 5G and security images immediately to restore the control plane.
495
-
* **The Solution:** Harbor Satellite acts as the localized OCI registry layer within this architecture. During authorized maintenance windows, Ground Control synchronizes the required 5G Core and security images to the local Satellite. If the WAN drops during production, K3s pulls the critical Open5gs, Cilium, and Istio images directly from `127.0.0.1:5050`. For fully isolated environments, **Method 2 (Automated Direct Delivery)** injects these updates into K3s auto-import, ensuring continuous, uninterrupted manufacturing operations. *(Reference: [SUSE + Bosch Joint Architecture](https://www.suse.com/c/suse-and-bosch-pioneering-industrial-iot-with-a-hybrid-cloud-control-and-monitoring-architecture/))*
493
+
* **The Edge Workloads:** Manufacturing control, monitoring, and analytics workloads run on local edge Kubernetes nodes.
494
+
* **The Challenge:** Industrial sites often run on restricted networks and cannot afford downtime when WAN links degrade or fail.
495
+
* **The Solution:** Harbor Satellite acts as the local OCI registry layer. During connectivity windows, Ground Control synchronizes required images to each site. During outages, K3s pulls from the local Satellite mirror (`127.0.0.1:5050`), and for fully isolated environments, **Method 2 (Automated Direct Delivery)** preloads images into K3s auto-import. *(Reference: [SUSE + Bosch Joint Architecture](https://www.suse.com/c/suse-and-bosch-pioneering-industrial-iot-with-a-hybrid-cloud-control-and-monitoring-architecture/))*
496
496
497
497
### 7.3 Remote Fleet Management (Energy/Telecom)
498
498
@@ -518,10 +518,11 @@ Harbor Satellite serves as a critical **registry layer** within the broader SUSE
518
518
| **ATIP (Adaptive Telecom Infrastructure Platform)** | Complements telecom edge platforms with local image availability under constrained WAN links. |
519
519
| **Akri** | Works with edge device discovery workflows by ensuring discovered workloads have local image availability. |
520
520
| **Elemental** | Node provisioning automatically registers the Harbor Satellite via ZTR, providing end-to-end zero-touch edge bootstrapping. |
521
-
| **SPIFFE/SPIRE** | Replaces all rigid credential arrays with ephemeral cryptographic machine identities. |
522
521
523
522
---
524
523
524
+
> Note: SPIFFE/SPIRE is intentionally covered in the dedicated security section above as a cross-cutting identity layer, rather than a SUSE-edge component row.
525
+
525
526
## 9. References & Further Reading
526
527
527
528
To explore the underlying technologies and concepts discussed in this reference architecture, consult the following official resources:
@@ -537,6 +538,10 @@ To explore the underlying technologies and concepts discussed in this reference
537
538
* **[K3s Private Registry Configuration](https://docs.k3s.io/installation/private-registry)** : *Official Rancher/K3s documentation detailing how to configure `registries.yaml` for mirror routing and auto-importing.*
538
539
* **[SUSE + Bosch IIoT Architecture](https://www.suse.com/c/suse-and-bosch-pioneering-industrial-iot-with-a-hybrid-cloud-control-and-monitoring-architecture/)** : *The real-world enterprise case study demonstrating K3s running mission-critical workloads on restricted factory floors.*
539
540
* **[SUSE Edge Framework](https://documentation.suse.com/suse-edge/3.4/single-html/edge/edge.html)** : *Broader documentation on integrating SLE Micro, K3s, and GitOps at the edge.*
0 commit comments