summaryrefslogtreecommitdiffstats
path: root/nokiav2/docs/integration.rst
diff options
context:
space:
mode:
Diffstat (limited to 'nokiav2/docs/integration.rst')
-rw-r--r--nokiav2/docs/integration.rst134
1 files changed, 94 insertions, 40 deletions
diff --git a/nokiav2/docs/integration.rst b/nokiav2/docs/integration.rst
index df366bf6..32bae801 100644
--- a/nokiav2/docs/integration.rst
+++ b/nokiav2/docs/integration.rst
@@ -1,30 +1,44 @@
Integrate ONAP with Nokia VNFM
==============================
-The following section describes how to integrate the Nokia Virtualized Network Function Manager (VNFM) into ONAP.
+The following section describes how to integrate the Nokia
+Virtualized Network Function Manager (VNFM) into ONAP.
Prepare the VNFM
----------------
* Start the VNFM.
- - The VNFM must be able to communicate with the ONAP VF-C interface, the virtualized infrastructure manager (VIM) and the virtualized network function (VNF), so the VNFM must
- have the correct network setup. The VNFM uses lifecycle notifications (LCNs) to notify the VF-C about the executed changes, therefore, the LCN zone of the
- VNFM must be configured so that the VNFM is able to reach the VF-C LCN interface.
+ - The VNFM must be able to communicate with the ONAP VF-C interface, the
+ virtualized infrastructure manager (VIM) and the virtualized network
+ function (VNF), so the VNFM must have the correct network setup. The
+ VNFM uses lifecycle notifications (LCNs) to notify the VF-C about the
+ executed changes, therefore, the LCN zone of the VNFM must be configured
+ so that the VNFM is able to reach the VF-C LCN interface.
* Register driver in CBAM
- - Using SSH, log in to the CloudBand Application Manager (CBAM) virtual machine as cbam user and determine the Keycloak
- auto-generated admin password with the following command: ectl get /cbam/cluster/components/keycloak/admin_credentials/password
+ - Using SSH, log in to the CloudBand Application Manager (CBAM) virtual
+ machine as cbam user and determine the Keycloak auto-generated admin
+ password with the following
+ command:
+
+.. code-block:: bash
+
+ ectl get /cbam/cluster/components/keycloak/admin_credentials/password
- Copy the printout of the command.
- - Access the Keycloak login page with the following URL: https://<cbamIp>/auth/admin where <cbamIp> is the FQDN or IP
- address assigned to CBAM node during instantiation. Optionally, it may contain a port, for example, cbam.mycompany.com:port or 1.2.3.4:port.
+ - Access the Keycloak login page with the following
+ URL: https://<cbamIp>/auth/admin where <cbamIp> is the FQDN or IP
+ address assigned to CBAM node during instantiation. Optionally, it may
+ contain a port, for example, cbam.mycompany.com:port or 1.2.3.4:port.
Result: The Keycloak Administration Console login page loads up.
- - Log in to Keycloak with the 'admin' username and the auto-generated admin password you copied to clipboard, then change the auto-generated password and note the new password.
+ - Log in to Keycloak with the 'admin' username and the auto-generated admin
+ password you copied to clipboard, then change the auto-generated password
+ and note the new password.
Result: You are logged in to the Keycloak Administration Console.
@@ -38,27 +52,34 @@ Prepare the VNFM
- Result: The Add Client pane appears.
- - Set the Client ID to onapClientId and click Save. Note the Client ID which will be referred to as <clientId>.
+ - Set the Client ID to onapClientId and click Save. Note the Client ID
+ which will be referred to as <clientId>.
- - Result: The following notification appears: Success! The client has been created. The new client's profile page appears.
+ - Result: The following notification appears: Success!
+ The client has been created. The new client's profile page appears.
- Customize the following settings for the newly created client:
- - Access Type: select confidential. Keycloak will generate a client secret that serves as a type of password for your client.
+ - Access Type: select confidential. Keycloak will generate a client
+ secret that serves as a type of password for your client.
- - Make sure the following settings are ON: Standard Flow Enabled, Direct Access Grants Enabled, Service Accounts Enabled, Authorization Enabled
+ - Make sure the following settings are ON: Standard Flow Enabled,
+ Direct Access Grants Enabled, Service Accounts Enabled,
+ Authorization Enabled
- Type * in the Valid Redirect URIs field.
- Click Save.
- - Result: The following notification appears: Success! Your changes have been saved to the client.
+ - Result: The following notification appears: Success!
+ Your changes have been saved to the client.
- Note the Client Secret which will be referred to as <clientSecret>:
- Select the Credentials tab.
- - From the Client Authenticator drop-down list, select the Client ID and Secret and check the value of Secret.
+ - From the Client Authenticator drop-down list, select the
+ Client ID and Secret and check the value of Secret.
- Add a new user on Keycloak:
@@ -76,25 +97,33 @@ Prepare the VNFM
- Click Save.
- - Result: The following notification appears: Success! The user has been created. The new user's profile page appears.
+ - Result: The following notification appears: Success! The user
+ has been created. The new user's profile page appears.
- - Create a password for the user: select the Credentials tab on the user profile and set the password.
+ - Create a password for the user: select the Credentials tab
+ on the user profile and set the password.
- - Note: The user is prompted to change this password when logging in to CBAM for the first time.
+ - Note: The user is prompted to change this password when
+ logging in to CBAM for the first time.
- Assign the "user" role to the created user:
- Select the Role Mappings tab on the user profile.
- - Select the "user" role from the Available Roles box, then click Add selected.
+ - Select the "user" role from the Available Roles box,
+ then click Add selected.
- - Access the CBAM GUI login page with the following URL: https://<cbamIp> where <cbamIp> is the FQDN or IP address assigned to CBAM node during instantiation. Optionally, it may contain a port, for example, cbam.mycompany.com:port or 1.2.3.4:port.
+ - Access the CBAM GUI login page with the following
+ URL: https://<cbamIp> where <cbamIp> is the FQDN or IP address
+ assigned to CBAM node during instantiation. Optionally, it may
+ contain a port, for example, cbam.mycompany.com:port or 1.2.3.4:port.
- Log in to CBAM GUI using the created user.
- Change and note the password which will be referred to as <onapPassword>.
- - Using SSH, add SSL certificates for all VIM connections or disable certificate verification as follows:
+ - Using SSH, add SSL certificates for all VIM connections or disable
+ certificate verification as follows:
- For insecure connection (all certificates are automatically trusted)
@@ -116,9 +145,12 @@ Prepare /ets/hosts file on your laptop
Note: This is an optional step with which it is easier to copy paste URLs
-* Using the OpenStack Horizon Dashboard, find the ONAP servers you have deployed and note their IP addresses.
+* Using the OpenStack Horizon Dashboard, find the ONAP servers you have
+ deployed and note their IP addresses.
-* Depending on your operating system, use the respective method to prepare an /ets/hosts file to link the DNS servers to the corresponding IP addresses, see the table below:
+* Depending on your operating system, use the respective method to prepare
+ an /ets/hosts file to link the DNS servers to the corresponding
+ IP addresses, see the table below:
+-------------------+---------------------------------+
| IP address | DNS entry |
@@ -141,7 +173,9 @@ Note: This is an optional step with which it is easier to copy paste URLs
Add the VNFM driver to ONAP
---------------------------
-- Locate and note the IP address of the MSB (MSB_IP) on the OpenStack Horizon Dashboard. Look at the VM instances of ONAP and find one with vm1-multi-service name. This is where the MSB is located.
+- Locate and note the IP address of the MSB (MSB_IP) on the OpenStack Horizon
+ Dashboard. Look at the VM instances of ONAP and find one with
+ vm1-multi-service name. This is where the MSB is located.
- Create VIM in A&AI Note:
@@ -161,9 +195,11 @@ Add the VNFM driver to ONAP
- Note: Cloud credentials are supplied by the VNF integrator.
- - To obtain the value of the Auth URL field and the tenant id (which will be required later), follow these steps:
+ - To obtain the value of the Auth URL field and the tenant
+ id (which will be required later), follow these steps:
- - Note: The actual steps depend on the OpenStack Dashboard version and vendor.
+ - Note: The actual steps depend on the OpenStack Dashboard
+ version and vendor.
- Go to OpenStack Horizon Dashboard.
@@ -175,7 +211,9 @@ Add the VNFM driver to ONAP
- Copy the value of Authentication URL and paste it in the Auth URL field.
- - Note the value of Project ID: this is the <tenantId> which will be required later (Repeat this step for all tenants planned to be used within the VIM.)
+ - Note the value of Project ID: this is the <tenantId> which will be
+ required later (Repeat this step for all tenants planned to be used
+ within the VIM.)
- Click Save.
@@ -189,11 +227,15 @@ Add the VNFM driver to ONAP
- Repeat this step for all tenants planned to be used within the VIM.
- - Using a REST client of your choice, send a request to the following URL: https://aai.api.simpledemo.onap.org:8443/aai/v11/cloud-infrastructure/cloud-regions/cloud-region/<cloudOwner>/<cloudRegion>/tenants/tenant/<tenantId>
+ - Using a REST client of your choice, send a request to the following
+ URL: https://aai.api.simpledemo.onap.org:8443/aai/v11/cloud-infrastructure/cloud-regions/cloud-region/<cloudOwner>/<cloudRegion>/tenants/tenant/<tenantId>
- - download the content of the request: `aai.create.tenant.request.json <sample/aai.create.tenant.request.json>`
+ - download the content of the request:
+ `aai.create.tenant.request.json <sample/aai.create.tenant.request.json>`
- - In the request URL and in the content of the request, substitute <tenantId>, <cloudRegion> and <cloudOwner> with the respective values.
+ - In the request URL and in the content of the request,
+ substitute <tenantId>, <cloudRegion>
+ and <cloudOwner> with the respective values.
- HTTP method: PUT
@@ -217,9 +259,12 @@ Add the VNFM driver to ONAP
- Using a REST client of your choice, send a request to the following URL: https://aai.api.simpledemo.onap.org:8443/aai/v11/business/customers/customer/123456
- - download the content of the request: `aai.create.customer.request.json <sample/aai.create.customer.request.json>`
+ - download the content of the request:
+ `aai.create.customer.request.json <sample/aai.create.customer.request.json>`
- - In the downloaded content of the request, substitute <tenantName>, <tenantId>, <cloudRegion> and <cloudOwner> with the respective values.
+ - In the downloaded content of the request,
+ substitute <tenantName>, <tenantId>, <cloudRegion>
+ and <cloudOwner> with the respective values.
- HTTP method: PUT
@@ -241,7 +286,8 @@ Add the VNFM driver to ONAP
- Result: The ONAP platform opens
- - The VNFM has four end points. These end points must be configured in the external system configuration of the VNFM.
+ - The VNFM has four end points. These end points must be
+ configured in the external system configuration of the VNFM.
- Authentication endpoint: https://$CBAM_IP:443/auth/
@@ -303,7 +349,8 @@ Add the VNFM driver to ONAP
- Accept: application/json
- - Look for the previously registered VNFM and note the value of (vnfm-id) <vnfmId>.
+ - Look for the previously registered VNFM and
+ note the value of (vnfm-id) <vnfmId>.
Configure the SVNFM driver (generic)
@@ -333,9 +380,11 @@ Configure the SVNFM driver (generic)
- Execute the following command: docker ps
- - Find the required container and note the CONTAINER ID (first column/first row on the list).
+ - Find the required container and note the
+ CONTAINER ID (first column/first row on the list).
-- Verify if the VNFM driver has been successfully started by executing the following commands:
+- Verify if the VNFM driver has been successfully
+ started by executing the following commands:
.. code-block:: console
@@ -353,16 +402,21 @@ Configure the SVNFM driver (generic)
Configure the SVNFM driver (ONAP demo environment)
--------------------------------------------------
-This step is executed instead of the "Configure the SVNFM driver (generic)" in case of an ONAP demo environment.
+This step is executed instead of
+the "Configure the SVNFM driver (generic)" in case of
+an ONAP demo environment.
- Configure the already running instance:
- - Execute the following command: docker exec -it `docker ps | grep nokiav2 | awk '{print $1}'` /bin/bash
+ - Execute the following command:
+ docker exec -it `docker ps | grep nokiav2 | awk '{print $1}'` /bin/bash
- Edit /service/application.properties:
- - In this file, change the default values of the following keys to the correct values: vnfmId
+ - In this file, change the default values of the following
+ keys to the correct values: vnfmId
- Restart the VNFM service
- - Execute the following command: kill -9 `ps -ef | grep java | grep -v grep | awk '{print $2}'` \ No newline at end of file
+ - Execute the following command:
+ kill -9 `ps -ef | grep java | grep -v grep | awk '{print $2}'`