Skip to main content

Nokia Container Services

Boost your efficiency and agility with containerized cloud-native infrastructure and management

Nokia Container Services (NCS) is a turn-key Containers as a Service (CaaS) offering for deploying, orchestrating, monitoring and managing containers and container-based applications for Telco cloud use cases. It offers the access controls, security and high availability functions to support always-on services.

Why do companies need Container Services?

Cloud computing in all market segments is moving towards containerized workloads and applications, based on microservices. The evolution to cloud based microservices promises greater agility and granular scalability compared to the large and monolithic network functions. Tools to manage and govern the cloud computing world are changing , and this is where Nokia Container Services can help.

How does Nokia Container Services (NCS) work?

Nokia Container Services (NCS) packages the necessary tools and capabilities for carrier grade, container-based cloud infrastructure. It offers CSPs turn-key Containers-as-a-Service (CaaS) virtualization on which to deploy their network, OSS, BSS and even IT applications. NCS is a platform which provides CaaS functionality for on-premises deployments of containerized applications, on bare metal or in CBIS/OpenStack environments.

Kubernetes as the core of the NCS platform

The platform ismulti-tenant & carrier grade. Nokia has embraced Kubernetes as the core of the NCS platform. To that end, Nokia has preintegrated dozens of best-of-breed Open Source components and has built automation tooling around them, which help CSPs streamline operations and support the TCO reduction you envision. With NCS, CSPs have the freedom to deploy anywhere, or Nokia can support transition from existing infrastructure to a cloud-native infrastructure.

Features and benefits

Application management

Facilitate the management of applications using Helm and providing command line lifecycle management (LCM) commands. Helm Charts help you define, install, and upgrade applications; while application profiles help define and manage complex applications. These capabilities improve productivity by capturing deployment steps in manageable, editable code. Errors are reduced through reusable Helm charts, with production ready charts coming from application developers, which are the same they used all through development.

Cluster networking

Support various Container Networking Interfaces (CNIs), including Calico, Weave, SR-IOV, Multus, and Nokia’s Docker Advanced Network Manager (DANM). Each CNI offers focused capabilities, such as DANM focused on Kubernetes clusters running Telco workloads, which enables you to configure clusters that best suit your needs.

Storage management

Storage interfaces are also important components to ensure support for a wide range of cluster persistent storage options, including different CNIs, including transaction performance optimized Cinder; Rook for scalable, distributed storage solutions; Ceph to run on Kubernetes; and locally mounted disk drives, partitions or directories.

High availability

Provide high availability to ensure continuous operations by offering resilient and redundant critical cluster services in active-active mode across three Control nodes, including Kubernetes API servers with constant API access health checks; Cooperative, key-value store services (ETCD); DNS services on each Control node; and image registry and chart repository services. Moreover, disaster recovery provides cluster level backup to a remote server.

Secure and protected

Nokia takes securing your cloud infrastructure seriously by addressing security requirements and practices from a wide set of national and international security guidelines and regulatory organizations. And Nokia’s Design for Security product development guidelines include many security process requirements, including ongoing vulnerability assessments. The system’s security is complimented by Kubernetes’s own security capabilities, including encrypted internal and external communications, role-based access control, and comprehensive logging and audit reporting.

Ready to talk?