1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
|
.. This work is licensed under a Creative Commons Attribution 4.0 International License.
.. http://creativecommons.org/licenses/by/4.0
.. Copyright 2018 Amdocs, Bell Canada
.. Links
.. _Helm: https://docs.helm.sh/
.. _Helm Charts: https://github.com/kubernetes/charts
.. _Kubernetes: https://Kubernetes.io/
.. _Docker: https://www.docker.com/
.. _Nexus: https://nexus.onap.org/#welcome
.. _AWS Elastic Block Store: https://aws.amazon.com/ebs/
.. _Azure File: https://docs.microsoft.com/en-us/azure/storage/files/storage-files-introduction
.. _GCE Persistent Disk: https://cloud.google.com/compute/docs/disks/
.. _Gluster FS: https://www.gluster.org/
.. _Kubernetes Storage Class: https://Kubernetes.io/docs/concepts/storage/storage-classes/
.. _Assigning Pods to Nodes: https://Kubernetes.io/docs/concepts/configuration/assign-pod-node/
.. _developer-guide-label:
OOM Developer Guide
###################
.. figure:: oomLogoV2-medium.png
:align: right
ONAP consists of a large number of components, each of which are substantial
projects within themselves, which results in a high degree of complexity in
deployment and management. To cope with this complexity the ONAP Operations
Manager (OOM) uses a Helm_ model of ONAP - Helm being the primary management
system for Kubernetes_ container systems - to drive all user driven life-cycle
management operations. The Helm model of ONAP is composed of a set of
hierarchical Helm charts that define the structure of the ONAP components and
the configuration of these components. These charts are fully parameterized
such that a single environment file defines all of the parameters needed to
deploy ONAP. A user of ONAP may maintain several such environment files to
control the deployment of ONAP in multiple environments such as development,
pre-production, and production.
The following sections describe how the ONAP Helm charts are constructed.
.. contents::
:depth: 3
:local:
..
Container Background
====================
Linux containers allow for an application and all of its operating system
dependencies to be packaged and deployed as a single unit without including a
guest operating system as done with virtual machines. The most popular
container solution is Docker_ which provides tools for container management
like the Docker Host (dockerd) which can create, run, stop, move, or delete a
container. Docker has a very popular registry of containers images that can be
used by any Docker system; however, in the ONAP context, Docker images are
built by the standard CI/CD flow and stored in Nexus_ repositories. OOM uses
the "standard" ONAP docker containers and three new ones specifically created
for OOM.
Containers are isolated from each other primarily via name spaces within the
Linux kernel without the need for multiple guest operating systems. As such,
multiple containers can be deployed with little overhead such as all of ONAP
can be deployed on a single host. With some optimization of the ONAP components
(e.g. elimination of redundant database instances) it may be possible to deploy
ONAP on a single laptop computer.
Helm Charts
===========
A Helm chart is a collection of files that describe a related set of Kubernetes
resources. A simple chart might be used to deploy something simple, like a
memcached pod, while a complex chart might contain many micro-service arranged
in a hierarchy as found in the `aai` ONAP component.
Charts are created as files laid out in a particular directory tree, then they
can be packaged into versioned archives to be deployed. There is a public
archive of `Helm Charts`_ on GitHub that includes many technologies applicable
to ONAP. Some of these charts have been used in ONAP and all of the ONAP charts
have been created following the guidelines provided.
The top level of the ONAP charts is shown below:
.. graphviz::
digraph onap_top_chart {
rankdir="LR";
{
node [shape=folder]
oValues [label="values.yaml"]
oChart [label="Chart.yaml"]
dev [label="dev.yaml"]
prod [label="prod.yaml"]
crb [label="clusterrolebindings.yaml"]
secrets [label="secrets.yaml"]
}
{
node [style=dashed]
vCom [label="component"]
}
onap -> oValues
onap -> oChart
onap -> templates
onap -> resources
oValues -> vCom
resources -> environments
environments -> dev
environments -> prod
templates -> crb
templates -> secrets
}
Within the `values.yaml` file at the `onap` level, one will find a set of
boolean values that control which of the ONAP components get deployed as shown
below:
.. code-block:: yaml
aaf: # Application Authorization Framework
enabled: false
<...>
so: # Service Orchestrator
enabled: true
By setting these flags a custom deployment can be created and used during
deployment by using the `-f` Helm option as follows::
> helm install local/onap -name development -f dev.yaml
Note that there are one or more example deployment files in the
`onap/resources/environments/` directory. It is best practice to create a unique
deployment file for each environment used to ensure consistent behaviour.
To aid in the long term supportability of ONAP, a set of common charts have
been created (and will be expanded in subsequent releases of ONAP) that can be
used by any of the ONAP components by including the common component in its
`requirements.yaml` file. The common components are arranged as follows:
.. graphviz::
digraph onap_common_chart {
rankdir="LR";
{
node [shape=folder]
mValues [label="values.yaml"]
ccValues [label="values.yaml"]
comValues [label="values.yaml"]
comChart [label="Chart.yaml"]
ccChart [label="Chart.yaml"]
mChart [label="Chart.yaml"]
mReq [label="requirements.yaml"]
mService [label="service.yaml"]
mMap [label="configmap.yaml"]
ccName [label="_name.tpl"]
ccNS [label="_namespace.tpl"]
}
{
cCom [label="common"]
mTemp [label="templates"]
ccTemp [label="templates"]
}
{
more [label="...",style=dashed]
}
common -> comValues
common -> comChart
common -> cCom
common -> mysql
common -> more
cCom -> ccChart
cCom -> ccValues
cCom -> ccTemp
ccTemp -> ccName
ccTemp -> ccNS
mysql -> mValues
mysql -> mChart
mysql -> mReq
mysql -> mTemp
mTemp -> mService
mTemp -> mMap
}
The common section of charts consists of a set of templates that assist with
parameter substitution (`_name.tpl` and `_namespace.tpl`) and a set of charts
for components used throughout ONAP. Initially `mysql` is in the common area but
this will expand to include other databases like `mariadb-galera`, `postgres`,
and `cassandra`. Other candidates for common components include `redis` and
`kafka`. When the common components are used by other charts they are
instantiated each time. In subsequent ONAP releases some of the common
components could be a setup as services that are used by multiple ONAP
components thus minimizing the deployment and operational costs.
All of the ONAP components have charts that follow the pattern shown below:
.. graphviz::
digraph onap_component_chart {
rankdir="LR";
{
node [shape=folder]
cValues [label="values.yaml"]
cChart [label="Chart.yaml"]
cService [label="service.yaml"]
cMap [label="configmap.yaml"]
cFiles [label="config file(s)"]
}
{
cCharts [label="charts"]
cTemp [label="templates"]
cRes [label="resources"]
}
{
sCom [label="component",style=dashed]
}
component -> cValues
component -> cChart
component -> cCharts
component -> cTemp
component -> cRes
cTemp -> cService
cTemp -> cMap
cRes -> config
config -> cFiles
cCharts -> sCom
}
Note that the component charts may include a hierarchy of components and in
themselves can be quite complex.
Configuration of the components varies somewhat from component to component but
generally follows the pattern of one or more `configmap.yaml` files which can
directly provide configuration to the containers in addition to processing
configuration files stored in the `config` directory. It is the responsibility
of each ONAP component team to update these configuration files when changes
are made to the project containers that impact configuration.
The following section describes how the hierarchical ONAP configuration system is
key to management of such a large system.
Configuration Management
========================
ONAP is a large system composed of many components - each of which are complex
systems in themselves - that needs to be deployed in a number of different
ways. For example, within a single operator's network there may be R&D
deployments under active development, pre-production versions undergoing system
testing and production systems that are operating live networks. Each of these
deployments will differ in significant ways, such as the version of the
software images deployed. In addition, there may be a number of application
specific configuration differences, such as operating system environment
variables. The following describes how the Helm configuration management
system is used within the OOM project to manage both ONAP infrastructure
configuration as well as ONAP components configuration.
One of the artifacts that OOM/Kubernetes uses to deploy ONAP components is the
deployment specification, yet another yaml file. Within these deployment specs
are a number of parameters as shown in the following mariadb example:
.. code-block:: yaml
apiVersion: extensions/v1beta1
kind: Deployment
metadata:
name: mariadb
spec:
<...>
template:
<...>
spec:
hostname: mariadb
containers:
- args:
image: nexus3.onap.org:10001/mariadb:10.1.11
name: "mariadb"
env:
- name: MYSQL_ROOT_PASSWORD
value: password
- name: MARIADB_MAJOR
value: "10.1"
<...>
imagePullSecrets:
- name: onap-docker-registry-key
Note that within the deployment specification, one of the container arguments
is the key/value pair image: nexus3.onap.org:10001/mariadb:10.1.11 which
specifies the version of the mariadb software to deploy. Although the
deployment specifications greatly simplify deployment, maintenance of the
deployment specifications themselves become problematic as software versions
change over time or as different versions are required for different
deployments. For example, if the R&D team needs to deploy a newer version of
mariadb than what is currently used in the production environment, they would
need to clone the deployment specification and change this value. Fortunately,
this problem has been solved with the templating capabilities of Helm.
The following example shows how the deployment specifications are modified to
incorporate Helm templates such that key/value pairs can be defined outside of
the deployment specifications and passed during instantiation of the component.
.. code-block:: yaml
apiVersion: extensions/v1beta1
kind: Deployment
metadata:
name: mariadb
namespace: "{{ .Values.nsPrefix }}-mso"
spec:
<...>
template:
<...>
spec:
hostname: mariadb
containers:
- args:
image: {{ .Values.image.mariadb }}
imagePullPolicy: {{ .Values.pullPolicy }}
name: "mariadb"
env:
- name: MYSQL_ROOT_PASSWORD
value: password
- name: MARIADB_MAJOR
value: "10.1"
<...>
imagePullSecrets:
- name: "{{ .Values.nsPrefix }}-docker-registry-key"apiVersion: extensions/v1beta1
kind: Deployment
metadata:
name: mariadb
namespace: "{{ .Values.nsPrefix }}-mso"
spec:
<...>
template:
<...>
spec:
hostname: mariadb
containers:
- args:
image: {{ .Values.image.mariadb }}
imagePullPolicy: {{ .Values.pullPolicy }}
name: "mariadb"
env:
- name: MYSQL_ROOT_PASSWORD
value: password
- name: MARIADB_MAJOR
value: "10.1"
<...>
imagePullSecrets:
- name: "{{ .Values.nsPrefix }}-docker-registry-key"
This version of the deployment specification has gone through the process of
templating values that are likely to change between deployments. Note that the
image is now specified as: image: {{ .Values.image.mariadb }} instead of a
string used previously. During the deployment phase, Helm (actually the Helm
sub-component Tiller) substitutes the {{ .. }} entries with a variable defined
in a values.yaml file. The content of this file is as follows:
.. code-block:: yaml
nsPrefix: onap
pullPolicy: IfNotPresent
image:
readiness: oomk8s/readiness-check:2.0.0
mso: nexus3.onap.org:10001/openecomp/mso:1.0-STAGING-latest
mariadb: nexus3.onap.org:10001/mariadb:10.1.11
Within the values.yaml file there is an image section with the key/value pair
mariadb: nexus3.onap.org:10001/mariadb:10.1.11 which is the same value used in
the non-templated version. Once all of the substitutions are complete, the
resulting deployment specification ready to be used by Kubernetes.
Also note that in this example, the namespace key/value pair is specified in
the values.yaml file. This key/value pair will be global across the entire
ONAP deployment and is therefore a prime example of where configuration
hierarchy can be very useful.
When creating a deployment template consider the use of default values if
appropriate. Helm templating has built in support for DEFAULT values, here is
an example:
.. code-block:: yaml
imagePullSecrets:
- name: "{{ .Values.nsPrefix | default "onap" }}-docker-registry-key"
The pipeline operator ("|") used here hints at that power of Helm templates in
that much like an operating system command line the pipeline operator allow
over 60 Helm functions to be embedded directly into the template (note that the
Helm template language is a superset of the Go template language). These
functions include simple string operations like upper and more complex flow
control operations like if/else.
ONAP Application Configuration
------------------------------
Dependency Management
---------------------
These Helm charts describe the desired state
of an ONAP deployment and instruct the Kubernetes container manager as to how
to maintain the deployment in this state. These dependencies dictate the order
in-which the containers are started for the first time such that such
dependencies are always met without arbitrary sleep times between container
startups. For example, the SDC back-end container requires the Elastic-Search,
Cassandra and Kibana containers within SDC to be ready and is also dependent on
DMaaP (or the message-router) to be ready - where ready implies the built-in
"readiness" probes succeeded - before becoming fully operational. When an
initial deployment of ONAP is requested the current state of the system is NULL
so ONAP is deployed by the Kubernetes manager as a set of Docker containers on
one or more predetermined hosts. The hosts could be physical machines or
virtual machines. When deploying on virtual machines the resulting system will
be very similar to "Heat" based deployments, i.e. Docker containers running
within a set of VMs, the primary difference being that the allocation of
containers to VMs is done dynamically with OOM and statically with "Heat".
Example SO deployment descriptor file shows SO's dependency on its mariadb
data-base component:
SO deployment specification excerpt:
.. code-block:: yaml
apiVersion: extensions/v1beta1
kind: Deployment
metadata:
name: {{ include "common.name" . }}
namespace: {{ include "common.namespace" . }}
labels:
app: {{ include "common.name" . }}
chart: {{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }}
release: {{ .Release.Name }}
heritage: {{ .Release.Service }}
spec:
replicas: {{ .Values.replicaCount }}
template:
metadata:
labels:
app: {{ include "common.name" . }}
release: {{ .Release.Name }}
spec:
initContainers:
- command:
- /root/ready.py
args:
- --container-name
- so-mariadb
env:
...
Kubernetes Container Orchestration
==================================
The ONAP components are managed by the Kubernetes_ container management system
which maintains the desired state of the container system as described by one
or more deployment descriptors - similar in concept to OpenStack HEAT
Orchestration Templates. The following sections describe the fundamental
objects managed by Kubernetes, the network these components use to communicate
with each other and other entities outside of ONAP and the templates that
describe the configuration and desired state of the ONAP components.
Name Spaces
-----------
Within the namespaces are Kubernetes services that provide external connectivity to pods that host Docker containers.
ONAP Components to Kubernetes Object Relationships
--------------------------------------------------
Kubernetes deployments consist of multiple objects:
- **nodes** - a worker machine - either physical or virtual - that hosts
multiple containers managed by Kubernetes.
- **services** - an abstraction of a logical set of pods that provide a
micro-service.
- **pods** - one or more (but typically one) container(s) that provide specific
application functionality.
- **persistent volumes** - One or more permanent volumes need to be established
to hold non-ephemeral configuration and state data.
The relationship between these objects is shown in the following figure:
.. .. uml::
..
.. @startuml
.. node PH {
.. component Service {
.. component Pod0
.. component Pod1
.. }
.. }
..
.. database PV
.. @enduml
.. figure:: kubernetes_objects.png
OOM uses these Kubernetes objects as described in the following sections.
Nodes
~~~~~
OOM works with both physical and virtual worker machines.
* Virtual Machine Deployments - If ONAP is to be deployed onto a set of virtual
machines, the creation of the VMs is outside of the scope of OOM and could be
done in many ways, such as
* manually, for example by a user using the OpenStack Horizon dashboard or
AWS EC2, or
* automatically, for example with the use of a OpenStack Heat Orchestration
Template which builds an ONAP stack, Azure ARM template, AWS CloudFormation
Template, or
* orchestrated, for example with Cloudify creating the VMs from a TOSCA
template and controlling their life cycle for the life of the ONAP
deployment.
* Physical Machine Deployments - If ONAP is to be deployed onto physical
machines there are several options but the recommendation is to use Rancher
along with Helm to associate hosts with a Kubernetes cluster.
Pods
~~~~
A group of containers with shared storage and networking can be grouped
together into a Kubernetes pod. All of the containers within a pod are
co-located and co-scheduled so they operate as a single unit. Within ONAP
Amsterdam release, pods are mapped one-to-one to docker containers although
this may change in the future. As explained in the Services section below the
use of Pods within each ONAP component is abstracted from other ONAP
components.
Services
~~~~~~~~
OOM uses the Kubernetes service abstraction to provide a consistent access
point for each of the ONAP components independent of the pod or container
architecture of that component. For example, the SDNC component may introduce
OpenDaylight clustering as some point and change the number of pods in this
component to three or more but this change will be isolated from the other ONAP
components by the service abstraction. A service can include a load balancer
on its ingress to distribute traffic between the pods and even react to dynamic
changes in the number of pods if they are part of a replica set.
Persistent Volumes
~~~~~~~~~~~~~~~~~~
To enable ONAP to be deployed into a wide variety of cloud infrastructures a
flexible persistent storage architecture, built on Kubernetes persistent
volumes, provides the ability to define the physical storage in a central
location and have all ONAP components securely store their data.
When deploying ONAP into a public cloud, available storage services such as
`AWS Elastic Block Store`_, `Azure File`_, or `GCE Persistent Disk`_ are
options. Alternatively, when deploying into a private cloud the storage
architecture might consist of Fiber Channel, `Gluster FS`_, or iSCSI. Many
other storage options existing, refer to the `Kubernetes Storage Class`_
documentation for a full list of the options. The storage architecture may vary
from deployment to deployment but in all cases a reliable, redundant storage
system must be provided to ONAP with which the state information of all ONAP
components will be securely stored. The Storage Class for a given deployment is
a single parameter listed in the ONAP values.yaml file and therefore is easily
customized. Operation of this storage system is outside the scope of the OOM.
.. code-block:: yaml
Insert values.yaml code block with storage block here
Once the storage class is selected and the physical storage is provided, the
ONAP deployment step creates a pool of persistent volumes within the given
physical storage that is used by all of the ONAP components. ONAP components
simply make a claim on these persistent volumes (PV), with a persistent volume
claim (PVC), to gain access to their storage.
The following figure illustrates the relationships between the persistent
volume claims, the persistent volumes, the storage class, and the physical
storage.
.. graphviz::
digraph PV {
label = "Persistance Volume Claim to Physical Storage Mapping"
{
node [shape=cylinder]
D0 [label="Drive0"]
D1 [label="Drive1"]
Dx [label="Drivex"]
}
{
node [shape=Mrecord label="StorageClass:ceph"]
sc
}
{
node [shape=point]
p0 p1 p2
p3 p4 p5
}
subgraph clusterSDC {
label="SDC"
PVC0
PVC1
}
subgraph clusterSDNC {
label="SDNC"
PVC2
}
subgraph clusterSO {
label="SO"
PVCn
}
PV0 -> sc
PV1 -> sc
PV2 -> sc
PVn -> sc
sc -> {D0 D1 Dx}
PVC0 -> PV0
PVC1 -> PV1
PVC2 -> PV2
PVCn -> PVn
# force all of these nodes to the same line in the given order
subgraph {
rank = same; PV0;PV1;PV2;PVn;p0;p1;p2
PV0->PV1->PV2->p0->p1->p2->PVn [style=invis]
}
subgraph {
rank = same; D0;D1;Dx;p3;p4;p5
D0->D1->p3->p4->p5->Dx [style=invis]
}
}
In-order for an ONAP component to use a persistent volume it must make a claim
against a specific persistent volume defined in the ONAP common charts. Note
that there is a one-to-one relationship between a PVC and PV. The following is
an excerpt from a component chart that defines a PVC:
.. code-block:: yaml
Insert PVC example here
OOM Networking with Kubernetes
------------------------------
- DNS
- Ports - Flattening the containers also expose port conflicts between the containers which need to be resolved.
Node Ports
~~~~~~~~~~
Pod Placement Rules
-------------------
OOM will use the rich set of Kubernetes node and pod affinity /
anti-affinity rules to minimize the chance of a single failure resulting in a
loss of ONAP service. Node affinity / anti-affinity is used to guide the
Kubernetes orchestrator in the placement of pods on nodes (physical or virtual
machines). For example:
- if a container used Intel DPDK technology the pod may state that it as
affinity to an Intel processor based node, or
- geographical based node labels (such as the Kubernetes standard zone or
region labels) may be used to ensure placement of a DCAE complex close to the
VNFs generating high volumes of traffic thus minimizing networking cost.
Specifically, if nodes were pre-assigned labels East and West, the pod
deployment spec to distribute pods to these nodes would be:
.. code-block:: yaml
nodeSelector:
failure-domain.beta.Kubernetes.io/region: {{ .Values.location }}
- "location: West" is specified in the `values.yaml` file used to deploy
one DCAE cluster and "location: East" is specified in a second `values.yaml`
file (see OOM Configuration Management for more information about
configuration files like the `values.yaml` file).
Node affinity can also be used to achieve geographic redundancy if pods are
assigned to multiple failure domains. For more information refer to `Assigning
Pods to Nodes`_.
.. note::
One could use Pod to Node assignment to totally constrain Kubernetes when
doing initial container assignment to replicate the Amsterdam release
OpenStack Heat based deployment. Should one wish to do this, each VM would
need a unique node name which would be used to specify a node constaint
for every component. These assignment could be specified in an environment
specific values.yaml file. Constraining Kubernetes in this way is not
recommended.
Kubernetes has a comprehensive system called Taints and Tolerations that can be
used to force the container orchestrator to repel pods from nodes based on
static events (an administrator assigning a taint to a node) or dynamic events
(such as a node becoming unreachable or running out of disk space). There are
no plans to use taints or tolerations in the ONAP Beijing release. Pod
affinity / anti-affinity is the concept of creating a spacial relationship
between pods when the Kubernetes orchestrator does assignment (both initially
an in operation) to nodes as explained in Inter-pod affinity and anti-affinity.
For example, one might choose to co-located all of the ONAP SDC containers on a
single node as they are not critical runtime components and co-location
minimizes overhead. On the other hand, one might choose to ensure that all of
the containers in an ODL cluster (SDNC and APPC) are placed on separate nodes
such that a node failure has minimal impact to the operation of the cluster.
An example of how pod affinity / anti-affinity is shown below:
Pod Affinity / Anti-Affinity
.. code-block:: yaml
apiVersion: v1
kind: Pod
metadata:
name: with-pod-affinity
spec:
affinity:
podAffinity:
requiredDuringSchedulingIgnoredDuringExecution:
- labelSelector:
matchExpressions:
- key: security
operator: In
values:
- S1
topologyKey: failure-domain.beta.Kubernetes.io/zone
podAntiAffinity:
preferredDuringSchedulingIgnoredDuringExecution:
- weight: 100
podAffinityTerm:
labelSelector:
matchExpressions:
- key: security
operator: In
values:
- S2
topologyKey: Kubernetes.io/hostname
containers:
- name: with-pod-affinity
image: gcr.io/google_containers/pause:2.0
This example contains both podAffinity and podAntiAffinity rules, the first
rule is is a must (requiredDuringSchedulingIgnoredDuringExecution) while the
second will be met pending other considerations
(preferredDuringSchedulingIgnoredDuringExecution). Preemption Another feature
that may assist in achieving a repeatable deployment in the presence of faults
that may have reduced the capacity of the cloud is assigning priority to the
containers such that mission critical components have the ability to evict less
critical components. Kubernetes provides this capability with Pod Priority and
Preemption. Prior to having more advanced production grade features available,
the ability to at least be able to re-deploy ONAP (or a subset of) reliably
provides a level of confidence that should an outage occur the system can be
brought back on-line predictably.
Health Checks
-------------
Monitoring of ONAP components is configured in the agents within JSON files and
stored in gerrit under the consul-agent-config, here is an example from the AAI
model loader (aai-model-loader-health.json):
.. code-block:: json
{
"service": {
"name": "A&AI Model Loader",
"checks": [
{
"id": "model-loader-process",
"name": "Model Loader Presence",
"script": "/consul/config/scripts/model-loader-script.sh",
"interval": "15s",
"timeout": "1s"
}
]
}
}
Liveness Probes
---------------
These liveness probes can simply check that a port is available, that a
built-in health check is reporting good health, or that the Consul health check
is positive. For example, to monitor the SDNC component has following liveness
probe can be found in the SDNC DB deployment specification:
.. code-block:: yaml
sdnc db liveness probe
livenessProbe:
exec:
command: ["mysqladmin", "ping"]
initialDelaySeconds: 30 periodSeconds: 10
timeoutSeconds: 5
The 'initialDelaySeconds' control the period of time between the readiness
probe succeeding and the liveness probe starting. 'periodSeconds' and
'timeoutSeconds' control the actual operation of the probe. Note that
containers are inherently ephemeral so the healing action destroys failed
containers and any state information within it. To avoid a loss of state, a
persistent volume should be used to store all data that needs to be persisted
over the re-creation of a container. Persistent volumes have been created for
the database components of each of the projects and the same technique can be
used for all persistent state information.
Environment Files
~~~~~~~~~~~~~~~~~
MSB Integration
===============
The \ `Microservices Bus
Project <https://wiki.onap.org/pages/viewpage.action?pageId=3246982>`__ provides
facilities to integrate micro-services into ONAP and therefore needs to
integrate into OOM - primarily through Consul which is the backend of
MSB service discovery. The following is a brief description of how this
integration will be done:
A registrator to push the service endpoint info to MSB service
discovery.
- The needed service endpoint info is put into the kubernetes yaml file
as annotation, including service name, Protocol,version, visual
range,LB method, IP, Port,etc.
- OOM deploy/start/restart/scale in/scale out/upgrade ONAP components
- Registrator watch the kubernetes event
- When an ONAP component instance has been started/destroyed by OOM,
Registrator get the notification from kubernetes
- Registrator parse the service endpoint info from annotation and
register/update/unregister it to MSB service discovery
- MSB API Gateway uses the service endpoint info for service routing
and load balancing.
Details of the registration service API can be found at \ `Microservice
Bus API
Documentation <https://wiki.onap.org/display/DW/Microservice+Bus+API+Documentation>`__.
ONAP Component Registration to MSB
----------------------------------
The charts of all ONAP components intending to register against MSB must have
an annotation in their service(s) template. A `sdc` example follows:
.. code-block:: yaml
apiVersion: v1
kind: Service
metadata:
labels:
app: sdc-be
name: sdc-be
namespace: "{{ .Values.nsPrefix }}"
annotations:
msb.onap.org/service-info: '[
{
"serviceName": "sdc",
"version": "v1",
"url": "/sdc/v1",
"protocol": "REST",
"port": "8080",
"visualRange":"1"
},
{
"serviceName": "sdc-deprecated",
"version": "v1",
"url": "/sdc/v1",
"protocol": "REST",
"port": "8080",
"visualRange":"1",
"path":"/sdc/v1"
}
]'
...
MSB Integration with OOM
------------------------
A preliminary view of the OOM-MSB integration is as follows:
.. figure:: MSB-OOM-Diagram.png
A message sequence chart of the registration process:
.. uml::
participant "OOM" as oom
participant "ONAP Component" as onap
participant "Service Discovery" as sd
participant "External API Gateway" as eagw
participant "Router (Internal API Gateway)" as iagw
box "MSB" #LightBlue
participant sd
participant eagw
participant iagw
end box
== Deploy Servcie ==
oom -> onap: Deploy
oom -> sd: Register service endpoints
sd -> eagw: Services exposed to external system
sd -> iagw: Services for internal use
== Component Life-cycle Management ==
oom -> onap: Start/Stop/Scale/Migrate/Upgrade
oom -> sd: Update service info
sd -> eagw: Update service info
sd -> iagw: Update service info
== Service Health Check ==
sd -> onap: Check the health of service
sd -> eagw: Update service status
sd -> iagw: Update service status
MSB Deployment Instructions
---------------------------
MSB is helm installable ONAP component which is often automatically deployed.
To install it individually enter::
> helm install <repo-name>/msb
.. note::
TBD: Vaidate if the following procedure is still required.
Please note that Kubernetes authentication token must be set at
*kubernetes/kube2msb/values.yaml* so the kube2msb registrator can get the
access to watch the kubernetes events and get service annotation by
Kubernetes APIs. The token can be found in the kubectl configuration file
*~/.kube/config*
More details can be found here `MSB installation <http://onap.readthedocs.io/en/latest/submodules/msb/apigateway.git/docs/platform/installation.html>`__.
.. MISC
.. ====
.. Note that although OOM uses Kubernetes facilities to minimize the effort
.. required of the ONAP component owners to implement a successful rolling upgrade
.. strategy there are other considerations that must be taken into consideration.
.. For example, external APIs - both internal and external to ONAP - should be
.. designed to gracefully accept transactions from a peer at a different software
.. version to avoid deadlock situations. Embedded version codes in messages may
.. facilitate such capabilities.
..
.. Within each of the projects a new configuration repository contains all of the
.. project specific configuration artifacts. As changes are made within the
.. project, it's the responsibility of the project team to make appropriate
.. changes to the configuration data.
|