summaryrefslogtreecommitdiffstats
path: root/docs/development/actors
diff options
context:
space:
mode:
Diffstat (limited to 'docs/development/actors')
-rw-r--r--docs/development/actors/actors.rst11
-rw-r--r--docs/development/actors/cds/cds.rst421
2 files changed, 432 insertions, 0 deletions
diff --git a/docs/development/actors/actors.rst b/docs/development/actors/actors.rst
new file mode 100644
index 00000000..4a5dad33
--- /dev/null
+++ b/docs/development/actors/actors.rst
@@ -0,0 +1,11 @@
+.. This work is licensed under a Creative Commons Attribution 4.0 International License.
+
+.. _policy-development-doc:
+
+Policy Platform Actor Development Guidelines
+--------------------------------------------
+
+.. toctree::
+ :maxdepth: 1
+
+ cds/cds.rst
diff --git a/docs/development/actors/cds/cds.rst b/docs/development/actors/cds/cds.rst
new file mode 100644
index 00000000..0e49da84
--- /dev/null
+++ b/docs/development/actors/cds/cds.rst
@@ -0,0 +1,421 @@
+.. This work is licensed under a
+.. Creative Commons Attribution 4.0 International License.
+.. http://creativecommons.org/licenses/by/4.0
+
+CDS actor support in Policy
+###########################
+
+.. contents::
+ :depth: 4
+
+1. Overview of CDS Actor support in Policy
+==========================================
+ONAP Policy Framework now enables Controller Design Studio (CDS) as one of the supported actors.
+This allows the users to configure Operational Policy to use CDS as an actor to remedy a situation.
+
+Behind the scene, when an incoming event is received and validated against rules, Policy uses gRPC to trigger
+the CBA (Controller Blueprint Archive: CDS artifact) as configured in the operational policy and providing CDS
+with all the input parameters that is required to execute the chosen CBA.
+
+2. Objective
+============
+The goal of the user guide is to clarify the contract between Policy and CDS so that a CBA developer can respect
+this input contract towards CDS when implementing the CBA.
+
+3. Contract between Policy and CDS
+==================================
+Policy upon receiving an incoming event from DCAE fires the rules and decides which actor to trigger.
+If the CDS actor is the chosen, Policy triggers the CBA execution using gRPC.
+
+The parameters required for the execution of a CBA are internally handled by Policy.
+It makes uses of the incoming event, the operational policy configured and AAI lookup to build the CDS request payload.
+
+3.1 CDS Blueprint Execution Payload format as invoked by Policy
+---------------------------------------------------------------
+Below are the details of the contract established between Policy and CDS to enable the automation of a remediation
+action within the scope of a closed loop usecase in ONAP.
+
+The format of the input payload for CDS follows the below guidelines, hence a CBA developer must consider this when
+implementing the CBA logic.
+For the sake of simplicity a JSON payload is used instead of a gRPC payload and each attribute of the child-nodes
+is documented.
+
+3.1.1 CommonHeader
+******************
+
+The "commonHeader" field in the CBA execute payload is built by policy.
+
+=============================== =========== ================================================================
+ "commonHeader" field name type Description
+=============================== =========== ================================================================
+subRequestId string Generated by Policy. Is a UUID and used internally by policy.
+requestId string Inserted by Policy. Maps to the UUID sent by DCAE i.e. the ID
+ used throughout the closed loop lifecycle to identify a request.
+originatorId string Generated by Policy and fixed to "POLICY"
+=============================== =========== ================================================================
+
+3.1.2 ActionIdentifiers
+***********************
+
+The "actionIdentifiers" field uniquely identifies the CBA and the workflow to execute.
+
+==================================== =========== =============================================================
+ "actionIdentifiers" field name type Description
+==================================== =========== =============================================================
+mode string Inserted by Policy and fixed to "sync" presently.
+blueprintName string Inserted by Policy. Maps to the attribute that holds the
+ blueprint-name in the operational policy configuration.
+blueprintVersion string Inserted by Policy. Maps to the attribute that holds the
+ blueprint-version in the operational policy configuration.
+actionName string Inserted by Policy. Maps to the attribute that holds the
+ action-name in the operational policy configuration.
+==================================== =========== =============================================================
+
+3.1.3 Payload
+*************
+
+The "payload" JSON node is generated by Policy for the action-name specified in the "actionIdentifiers" field
+which is eventually supplied through the operational policy configuration as indicated above.
+
+3.1.3.1 Action request object
+^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
+
+The "$actionName-request" object is generated by CDS for the action-name specified in the "actionIdentifiers" field.
+
+The "$actionName-request" object contains:
+
+* a field called "resolution-key" which CDS uses to store the resolved parameters into the CDS context
+* a child node object called "$actionName-properties" which holds a map of all the parameters that serve
+ as inputs to the CBA. It presently holds the below information:
+
+ * all the AAI enriched attributes
+ * additional parameters embedded in the Control Loop Event format which is sent by DCAE (analytics application).
+ * any static information supplied through operational policy configuration which is not specific to an event
+ but applies across all the events.
+
+The data description for the action request object fields is as below:
+
+- Resolution-key
+
+===================================== =========== ======================================================================
+ "$actionName-request" field name type Description
+===================================== =========== ======================================================================
+resolution-key string Generated by Policy. Is a UUID, generated each time CBA execute
+ request is invoked.
+===================================== =========== ======================================================================
+
+- Action properties object
+
+======================================== =============== ===============================================================
+ "$actionName-properties" field name type Description
+======================================== =============== ===============================================================
+[$aai_node_type.$aai_attribute] map Inserted by Policy after performing AAI enrichment.
+ Is a map that contains AAI parameters for the target and
+ conforms to the notation: $aai_node_type.$aai_attribute.
+ E.g. for PNF the map looks like below.
+
+ .. code-block:: json
+
+ {
+ "pnf.equip-vendor":"Vendor-A",
+ "pnf.ipaddress-v4-oam":"10.10.10.10",
+ "pnf.in-maint":false,
+ "pnf.pnf-ipv4-address":"3.3.3.3",
+ "pnf.resource-version":"1570746989505",
+ "pnf.nf-role":"ToR DC101",
+ "pnf.equip-type":"Router",
+ "pnf.equip-model":"model-123456",
+ "pnf.frame-id":"3",
+ "pnf.pnf-name":"demo-pnf"
+ }
+data json object Inserted by Policy. Maps to the static payload supplied
+ OR string through operational policy configuration. Used to hold
+ any static information which applies across all the
+ events as described above. If the value of the data
+ field is a valid JSON string it is converted to a JSON
+ object, else will be retained as a string.
+[$additionalEventParams] map Inserted by Policy. Maps to the map of
+ additionalEvent parameters embedded into the
+ Control Loop Event message from DCAE.
+======================================== =============== ===============================================================
+
+
+
+3.1.4 Summing it up: CBA execute payload generation as done by Policy
+*********************************************************************
+
+Putting all the above information together below is the REST equivalent of the CDS blueprint execute gRPC request
+generated by Policy.
+
+REST equivalent of the gRPC request from Policy to CDS to execute a CBA.
+
+.. code-block:: bash
+
+ curl -X POST \
+ 'http://{{ip}}:{{port}}/api/v1/execution-service/process' \
+ -H 'Authorization: Basic Y2NzZGthcHBzOmNjc2RrYXBwcw==' \
+ -H 'Content-Type: application/json' \
+ -H 'cache-control: no-cache' \
+ -d '{
+ "commonHeader":{
+ "subRequestId":"{generated_by_policy}",
+ "requestId":"{req_id_from_DCAE}",
+ "originatorId":"POLICY"
+ },
+ "actionIdentifiers":{
+ "mode":"sync",
+ "blueprintName":"{blueprint_name_from_operational_policy_config}",
+ "blueprintVersion":"{blueprint_version_from_operational_policy_config}",
+ "actionName":"{blueprint_action_name_from_operational_policy_config}"
+ },
+ "payload":{
+ "$actionName-request":{
+ "resolution-key":"{generated_by_policy}",
+ "$actionName-properties":{
+ "$aai_node_type.$aai_attribute_1":"",
+ "$aai_node_type.$aai_attribute_2":"",
+ .........
+ "data":"{static_payload_data_from_operational_policy_config}",
+ "$additionalEventParam_1":"",
+ "$additionalEventParam_2":"",
+ .........
+ }
+ }
+ }
+ }'
+
+3.1.5 Examples
+**************
+
+Sample CBA execute request generated by Policy for PNF target type when "data" field is a string:
+
+.. code-block:: bash
+
+ curl -X POST \
+ 'http://{{ip}}:{{port}}/api/v1/execution-service/process' \
+ -H 'Authorization: Basic Y2NzZGthcHBzOmNjc2RrYXBwcw==' \
+ -H 'Content-Type: application/json' \
+ -H 'cache-control: no-cache' \
+ -d '{
+ "commonHeader":{
+ "subRequestId":"14384b21-8224-4055-bb9b-0469397db801",
+ "requestId":"d57709fb-bbec-491d-a2a6-8a25c8097ee8",
+ "originatorId":"POLICY"
+ },
+ "actionIdentifiers":{
+ "mode":"sync",
+ "blueprintName":"PNF-demo",
+ "blueprintVersion":"1.0.0",
+ "actionName":"reconfigure-pnf"
+ },
+ "payload":{
+ "reconfigure-pnf-request":{
+ "resolution-key":"8338b828-51ad-4e7c-ac8b-08d6978892e2",
+ "reconfigure-pnf-properties":{
+ "pnf.equip-vendor":"Vendor-A",
+ "pnf.ipaddress-v4-oam":"10.10.10.10",
+ "pnf.in-maint":false,
+ "pnf.pnf-ipv4-address":"3.3.3.3",
+ "pnf.resource-version":"1570746989505",
+ "pnf.nf-role":"ToR DC101",
+ "pnf.equip-type":"Router",
+ "pnf.equip-model":"model-123456",
+ "pnf.frame-id":"3",
+ "pnf.pnf-name":"demo-pnf",
+ "data": "peer-as=64577",
+ "peer-group":"demo-peer-group",
+ "neighbor-address":"4.4.4.4"
+ }
+ }
+ }
+ }'
+
+Sample CBA execute request generated by Policy for VNF target type when "data" field is a valid JSON string:
+
+.. code-block:: bash
+
+ curl -X POST \
+ 'http://{{ip}}:{{port}}/api/v1/execution-service/process' \
+ -H 'Authorization: Basic Y2NzZGthcHBzOmNjc2RrYXBwcw==' \
+ -H 'Content-Type: application/json' \
+ -H 'cache-control: no-cache' \
+ -d '{
+ "commonHeader":{
+ "subRequestId":"14384b21-8224-4055-bb9b-0469397db801",
+ "requestId":"d57709fb-bbec-491d-a2a6-8a25c8097ee8",
+ "originatorId":"POLICY"
+ },
+ "actionIdentifiers":{
+ "mode":"sync",
+ "blueprintName":"vFW-CDS",
+ "blueprintVersion":"1.0.0",
+ "actionName":"config-deploy"
+ },
+ "payload":{
+ "config-deploy-request":{
+ "resolution-key":"6128eb53-0eac-4c79-855c-ff56a7b81141",
+ "config-deploy-properties":{
+ "service-instance.service-instance-id":"40004db6-c51f-45b0-abab-ea4156bae422",
+ "generic-vnf.vnf-id":"8d09e3bd-ae1d-4765-b26e-4a45f568a092",
+ "data":{
+ "active-streams":"7"
+ }
+ }
+ }
+ }
+ }'
+
+4. Operational Policy configuration to use CDS as an actor
+==========================================================
+
+TODO: Update the documentation once Operational Policy is made TOSCA compliant as per:
+https://wiki.onap.org/display/DW/TOSCA+Compliant+Policy+Types
+
+Until then below is how to configure the Operational Policy to use CDS as an actor using the Policy API.
+
+For integration testing use CLAMP UI to configure the Operational Policy
+
+4.1 Background
+--------------
+For detailed description of the Operational Policy YAML specification refer to:
+
+* https://gerrit.onap.org/r/gitweb?p=policy/drools-applications.git;a=blob;f=controlloop/common/policy-yaml/README-v2.0.0.md;h=eadaf658a52eac0d0cf6603025ef8b4c760f553b;hb=refs/heads/master
+* https://wiki.onap.org/display/DW/Control+Loop+Operational+Policy
+
+4.2 Control Loop Operational Policy YAML to use the CDS actor
+-------------------------------------------------------------
+
+Below is a template for configuring the Operational Policy to use CDS as an actor.
+
+.. code-block:: bash
+
+ controlLoop:
+ version: 2.0.0
+ controlLoopName: {{Unique ID for the Control Loop, must match one of the IDs defined in the list of policies below}}
+ trigger_policy: {{ID of operation policy defined below to specify which policy to trigger first}}
+ timeout: {{Overall timeout for the Control loop Operational policy}}
+ abatement: false
+ policies:
+ - id: {{ID of the Operation policy}}
+ name: {{Name of the Operation policy}}
+ description: {{Description of the Operation policy}}
+ actor: {{Identifies the actor of choice for remediation, in this case: CDS}}
+ recipe: {{Identifies the CDS action-name}}
+ target:
+ resourceID: {{SDC resource ID: E.g. modelInvariant ID of the vFW generic VNF; empty for PNF}}
+ type: {{Identifies the type of target, possible values: VNF, PNF}}
+ payload:
+ artifact_name: {{Name of the blueprint to execute if CDS is the actor}}
+ artifact_version: {{Version of the blueprint to execute if CDS is the actor}}
+ mode: async
+ data: {{Additional static data required by the blueprint if CDS is the actor}}
+ retry: 0
+ timeout: {{Timeout in seconds for the actor to perform the operation}}
+ success: final_success
+ failure: final_failure
+ failure_timeout: final_failure_timeout
+ failure_retries: final_failure_retries
+ failure_exception: final_failure_exception
+ failure_guard: final_failure_guard
+
+E.g. Sample Operational Policy YAML for vFW usecase:
+
+.. code-block:: bash
+
+ controlLoop:
+ version: 2.0.0
+ controlLoopName: ControlLoop-vFirewall-7e4fbe9c-d612-4ec5-bbf8-605aeabdb677
+ trigger_policy: unique-policy-id-1-modifyConfig
+ timeout: 60
+ abatement: false
+ policies:
+ - id: unique-policy-id-1-modifyConfig
+ name: modifyconfig-cds-actor
+ description:
+ actor: CDS
+ recipe: modify-config
+ target:
+ resourceID: 7e4fbe9c-d612-4ec5-bbf8-605aeabdb677
+ type: VNF
+ payload:
+ artifact_name: vFW-CDS
+ artifact_version: 1.0.0
+ data: '{"active-streams":"7"}'
+ retry: 0
+ timeout: 30
+ success: final_success
+ failure: final_failure
+ failure_timeout: final_failure_timeout
+ failure_retries: final_failure_retries
+ failure_exception: final_failure_exception
+ failure_guard: final_failure_guard
+
+4.3 API to configure the Control Loop Operational policy
+--------------------------------------------------------
+
+Once the YAML is built, we need to encode it in order to embed it into the payload to configure the operational policy.
+Assuming the YAML is saved into a file by name "policy.yaml", use the below script to encode the spaces and tabs:
+
+.. code-block:: bash
+
+ #!/usr/env/bin python3
+ import urllib
+ with open('policy.yaml') as f:
+ v = f.read()
+ v = urllib.quote_plus(v)
+ print(v)
+
+The encoded YAML data from the above step needs to be substituted into the following payload template to create
+the operational policy.
+
+Note: In the below rest endpoint, the hostname points to K8S service "policy-api" and internal port 6969.
+
+.. code-block:: bash
+
+ curl -X POST \
+ https://{$POLICY_API_URL}:{$POLICY_API_SERVICE_PORT}/policy/api/v1/policytypes/onap.policies.controlloop.Operational/versions/1.0.0/policies \
+ -H 'Authorization: Basic aGVhbHRoY2hlY2s6emIhWHp0RzM0' \
+ -H 'Accept: application/json' \
+ -H 'Content-Type: application/json' \
+ -d '{
+ "policy-id" : "operational.modifyconfig",
+ "content" : "$encoded_yaml_data"
+ }'
+
+The response to this rest endpoint returns something like below:
+
+.. code-block:: bash
+
+ {
+ "policy-id": "operational.modifyconfig",
+ "policy-version": "1",
+ "content": "$data"
+ }
+
+To run the below request, for policy-version use the response above into the format "${policy-version_from_last_call}.0.0")
+Note: In the rest endpoint URI, the hostname points to the service "policy-pap" and internal port 6969.
+
+.. code-block:: bash
+
+ curl -X POST \
+ https://{$POLICY_PAP_URL}:{$POLICY_PAP_SERVICE_PORT}/policy/pap/v1/pdps/policies \
+ -H 'Authorization: Basic aGVhbHRoY2hlY2s6emIhWHp0RzM0' \
+ -H 'Accept: application/json' \
+ -H 'Content-Type: application/json' \
+ -d '{
+ "policies": [
+ {
+ "policy-id": "operational.modifyconfig",
+ "policy-version": "1.0.0"
+ }
+ ]
+ }'
+
+To view the configured policies use the below REST API.
+
+.. code-block:: bash
+
+ curl -X GET \
+ https://{$POLICY_API_URL}:{$POLICY_API_SERVICE_PORT}/policy/api/v1/policytypes/onap.policies.controlloop.Operational/versions/1.0.0/policies/operational.modifyconfig \
+ -H 'Authorization: Basic aGVhbHRoY2hlY2s6emIhWHp0RzM0' \
+ -H 'Content-Type: application/json' \