What is the current blocking issue?
Hi Marco Platania,
We had to reinstalled ONAP today because we changed something in our physical cloud.
So I will keep u informed if the issue is still present at the end of the day when my platform will be reinstalled and at the same step.
Thanks for your support!
Hi Marco Platania,
I deployed the vFW demo and the blocking issues closeloop and policy.
When I look into the drools log , the policy can't be excuted because there is a guard and APPC do not allowed this action.
Here are the log of the network.log
Thanks a lot Brian, I very appreciate your feedback.
I rerun the ./demo-k8s.sh onap instantiateVFW to instantiate the demo. I can see in the ONAP policy portal that, the version of the vFW policy has changed and now match the correct UUID. ( see print screen)
And now the AAI querry error are no more present.
I can see the events from the my VNF to DCAE TCA and from DCAE TCA to Policy
But I can't see any event from Policy to APPC-CL.
What is the URL to see APPC-CL events ?
When I run the ./demo-k8s.sh onap vfwclosedloop 10.0.0.5
The policy is not triggered and the stream are not placed back to 5.
Thanks
I dont think 10.0.0.5 is the right IP (that is the oam IP and I always use an external IP but perhaps it works in your environment.
"APPC_CL" is the topic in Dublin but policy is the publisher so it wont be created till Policy tries to send an event to APPc.
curl -X GET \
'http://<k8-host>:30227/events/APPC-CL/g1/c3?timeout=5000' \
-H 'accept: application/json' \
-H 'cache-control: no-cache' \
-H 'postman-token: 7688ec36-deb6-a3d8-79d5-06e78bb1296b'
on the drools engine I would check network.log and error.log to see what Policy is saying - if it has multiple failed tries on the controlLoopName it may have locked it - you will have to wait (30 minutes or so for the lock to expire) . I would set traffic streams to 5 via the APPC restconf interface or curl to the vPNG to let it soak for a while. I also like to check that the DCAE output topic is empty before I start to wait for the clear (the vPNG is aggressive in its VES traffic (every 10 seconds by default)
Hi Brian,
The 10.0.0.5 is the good IP address in my environnement. It's the public IP of the vPKG.
I'm using Cassablanca and running the APPC querry command return to me a topic not found error:
Here is the last line of the network.log
[2019-07-02T18:36:58.096+00:00|DMAAP-source-unauthenticated.DCAE_CL_OUTPUT][IN|DMAAP|unauthenticated.DCAE_CL_OUTPUT]
{"closedLoopEventClient":"DCAE_INSTANCE_ID.dcae-tca","policyVersion":"v0.0.1","policyName":"DCAE.Config_tca-hi-lo","policyScope":"DCAE","target_type":"VNF","AAI":{"generic-vnf.vnf-name":"demofwl01fwl"},"closedLoopAlarmStart":1562092523391759,"closedLoopEventStatus":"ONSET","closedLoopControlName":"ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a","version":"1.0.2","target":"generic-vnf.vnf-name","requestID":"c0fd9ca8-12a7-48be-acae-9ab218a7ef05","from":"DCAE"}
[2019-07-02T18:36:58.096+00:00|DMAAP-source-unauthenticated.DCAE_CL_OUTPUT][IN|DMAAP|unauthenticated.DCAE_CL_OUTPUT]
{"closedLoopEventClient":"DCAE_INSTANCE_ID.dcae-tca","policyVersion":"v0.0.1","policyName":"DCAE.Config_tca-hi-lo","policyScope":"DCAE","target_type":"VNF","AAI":{"generic-vnf.vnf-name":"demofwl01fwl"},"closedLoopAlarmStart":1562092533636400,"closedLoopEventStatus":"ONSET","closedLoopControlName":"ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a","version":"1.0.2","target":"generic-vnf.vnf-name","requestID":"d56f5e32-73ae-40e8-9f5e-eedca450193f","from":"DCAE"}
[2019-07-02T18:37:12.244+00:00|qtp214187874-59071]10.42.215.118 - - [02/Jul/2019:18:37:12 +0000] "GET /healthcheck HTTP/1.1" 200 278
[2019-07-02T18:37:27.308+00:00|qtp214187874-58456]10.42.215.118 - - [02/Jul/2019:18:37:27 +0000] "GET /healthcheck HTTP/1.1" 200 278
[2019-07-02T18:37:38.105+00:00|DMAAP-source-unauthenticated.DCAE_CL_OUTPUT][IN|DMAAP|unauthenticated.DCAE_CL_OUTPUT]
{"closedLoopEventClient":"DCAE_INSTANCE_ID.dcae-tca","policyVersion":"v0.0.1","policyName":"DCAE.Config_tca-hi-lo","policyScope":"DCAE","target_type":"VNF","AAI":{"generic-vnf.vnf-name":"demofwl01fwl"},"closedLoopAlarmStart":1562092543879603,"closedLoopEventStatus":"ONSET","closedLoopControlName":"ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a","version":"1.0.2","target":"generic-vnf.vnf-name","requestID":"8dd6e676-a57d-463c-b203-2acfd4ff21f1","from":"DCAE"}
[2019-07-02T18:37:38.105+00:00|DMAAP-source-unauthenticated.DCAE_CL_OUTPUT][IN|DMAAP|unauthenticated.DCAE_CL_OUTPUT]
{"closedLoopEventClient":"DCAE_INSTANCE_ID.dcae-tca","policyVersion":"v0.0.1","policyName":"DCAE.Config_tca-hi-lo","policyScope":"DCAE","target_type":"VNF","AAI":{"generic-vnf.vnf-name":"demofwl01fwl"},"closedLoopAlarmStart":1562092554118021,"closedLoopEventStatus":"ONSET","closedLoopControlName":"ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a","version":"1.0.2","target":"generic-vnf.vnf-name","requestID":"ef1491e8-b24c-41f3-8678-899d1024e10d","from":"DCAE"}
[2019-07-02T18:37:38.105+00:00|DMAAP-source-unauthenticated.DCAE_CL_OUTPUT][IN|DMAAP|unauthenticated.DCAE_CL_OUTPUT]
{"closedLoopEventClient":"DCAE_INSTANCE_ID.dcae-tca","policyVersion":"v0.0.1","policyName":"DCAE.Config_tca-hi-lo","policyScope":"DCAE","target_type":"VNF","AAI":{"generic-vnf.vnf-name":"demofwl01fwl"},"closedLoopAlarmStart":1562092564332680,"closedLoopEventStatus":"ONSET","closedLoopControlName":"ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a","version":"1.0.2","target":"generic-vnf.vnf-name","requestID":"c180175d-1689-44a2-9f5b-5de171f6d36a","from":"DCAE"}
[2019-07-02T18:37:42.355+00:00|qtp214187874-59174]10.42.215.118 - - [02/Jul/2019:18:37:42 +0000] "GET /healthcheck HTTP/1.1" 200 278
[2019-07-02T18:37:57.413+00:00|qtp214187874-59099]10.42.215.118 - - [02/Jul/2019:18:37:57 +0000] "GET /healthcheck HTTP/1.1" 200 278
[2019-07-02T18:37:58.056+00:00|DMAAP-source-unauthenticated.DCAE_CL_OUTPUT][IN|DMAAP|unauthenticated.DCAE_CL_OUTPUT]
{"closedLoopEventClient":"DCAE_INSTANCE_ID.dcae-tca","policyVersion":"v0.0.1","policyName":"DCAE.Config_tca-hi-lo","policyScope":"DCAE","target_type":"VNF","AAI":{"generic-vnf.vnf-name":"demofwl01fwl"},"closedLoopAlarmStart":1562092574558869,"closedLoopEventStatus":"ONSET","closedLoopControlName":"ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a","version":"1.0.2","target":"generic-vnf.vnf-name","requestID":"4be34bb6-5747-46af-a973-da395d10063a","from":"DCAE"}
[2019-07-02T18:38:12.473+00:00|qtp214187874-59156]10.42.215.118 - - [02/Jul/2019:18:38:12 +0000] "GET /healthcheck HTTP/1.1" 200 278
[2019-07-02T18:38:27.576+00:00|qtp214187874-59044]10.42.215.118 - - [02/Jul/2019:18:38:27 +0000] "GET /healthcheck HTTP/1.1" 200 278
[2019-07-02T18:38:38.029+00:00|DMAAP-source-unauthenticated.DCAE_CL_OUTPUT][IN|DMAAP|unauthenticated.DCAE_CL_OUTPUT]
{"closedLoopEventClient":"DCAE_INSTANCE_ID.dcae-tca","policyVersion":"v0.0.1","policyName":"DCAE.Config_tca-hi-lo","policyScope":"DCAE","target_type":"VNF","AAI":{"generic-vnf.vnf-name":"demofwl01fwl"},"closedLoopAlarmStart":1562092615466644,"closedLoopEventStatus":"ONSET","closedLoopControlName":"ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a","version":"1.0.2","target":"generic-vnf.vnf-name","requestID":"969e2274-54a4-4a2b-88b5-4487b7955c00","from":"DCAE"}
[2019-07-02T18:38:38.029+00:00|DMAAP-source-unauthenticated.DCAE_CL_OUTPUT][IN|DMAAP|unauthenticated.DCAE_CL_OUTPUT]
{"closedLoopEventClient":"DCAE_INSTANCE_ID.dcae-tca","policyVersion":"v0.0.1","policyName":"DCAE.Config_tca-hi-lo","policyScope":"DCAE","target_type":"VNF","AAI":{"generic-vnf.vnf-name":"demofwl01fwl"},"closedLoopAlarmStart":1562092625700395,"closedLoopEventStatus":"ONSET","closedLoopControlName":"ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a","version":"1.0.2","target":"generic-vnf.vnf-name","requestID":"2f072c9c-c9f5-4b30-9759-6299143a7227","from":"DCAE"}
[2019-07-02T18:38:43.013+00:00|qtp214187874-58731]10.42.215.118 - - [02/Jul/2019:18:38:42 +0000] "GET /healthcheck HTTP/1.1" 200 278
[2019-07-02T18:38:58.017+00:00|DMAAP-source-unauthenticated.DCAE_CL_OUTPUT][IN|DMAAP|unauthenticated.DCAE_CL_OUTPUT]
{"closedLoopEventClient":"DCAE_INSTANCE_ID.dcae-tca","policyVersion":"v0.0.1","policyName":"DCAE.Config_tca-hi-lo","policyScope":"DCAE","target_type":"VNF","AAI":{"generic-vnf.vnf-name":"demofwl01fwl"},"closedLoopAlarmStart":1562092635936114,"closedLoopEventStatus":"ONSET","closedLoopControlName":"ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a","version":"1.0.2","target":"generic-vnf.vnf-name","requestID":"4c108a0e-c260-4243-ad40-2194ab215436","from":"DCAE"}
[2019-07-02T18:38:58.018+00:00|DMAAP-source-unauthenticated.DCAE_CL_OUTPUT][IN|DMAAP|unauthenticated.DCAE_CL_OUTPUT]
{"closedLoopEventClient":"DCAE_INSTANCE_ID.dcae-tca","policyVersion":"v0.0.1","policyName":"DCAE.Config_tca-hi-lo","policyScope":"DCAE","target_type":"VNF","AAI":{"generic-vnf.vnf-name":"demofwl01fwl"},"closedLoopAlarmStart":1562092646176233,"closedLoopEventStatus":"ONSET","closedLoopControlName":"ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a","version":"1.0.2","target":"generic-vnf.vnf-name","requestID":"8e52b45f-02d7-4728-ad5e-6cece09293a3","from":"DCAE"}
[2019-07-02T18:38:58.018+00:00|DMAAP-source-unauthenticated.DCAE_CL_OUTPUT][IN|DMAAP|unauthenticated.DCAE_CL_OUTPUT]
{"closedLoopEventClient":"DCAE_INSTANCE_ID.dcae-tca","policyVersion":"v0.0.1","policyName":"DCAE.Config_tca-hi-lo","policyScope":"DCAE","target_type":"VNF","AAI":{"generic-vnf.vnf-name":"demofwl01fwl"},"closedLoopAlarmStart":1562092656414659,"closedLoopEventStatus":"ONSET","closedLoopControlName":"ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a","version":"1.0.2","target":"generic-vnf.vnf-name","requestID":"6ca057dc-909e-4a1b-8ae0-e5d7b1d5b2a1","from":"DCAE"}
[2019-07-02T18:38:58.086+00:00|qtp214187874-59009]10.42.215.118 - - [02/Jul/2019:18:38:58 +0000] "GET /healthcheck HTTP/1.1" 200 278
[2019-07-02T18:39:13.170+00:00|qtp214187874-59160]10.42.215.118 - - [02/Jul/2019:18:39:13 +0000] "GET /healthcheck HTTP/1.1" 200 278
[2019-07-02T18:39:28.613+00:00|qtp214187874-58731]10.42.215.118 - - [02/Jul/2019:18:39:28 +0000] "GET /healthcheck HTTP/1.1" 200 278
[2019-07-02T18:39:38.116+00:00|DMAAP-source-unauthenticated.DCAE_CL_OUTPUT][IN|DMAAP|unauthenticated.DCAE_CL_OUTPUT]
{"closedLoopEventClient":"DCAE_INSTANCE_ID.dcae-tca","policyVersion":"v0.0.1","policyName":"DCAE.Config_tca-hi-lo","policyScope":"DCAE","target_type":"VNF","AAI":{"generic-vnf.vnf-name":"demofwl01fwl"},"closedLoopAlarmStart":1562092666651155,"closedLoopEventStatus":"ONSET","closedLoopControlName":"ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a","version":"1.0.2","target":"generic-vnf.vnf-name","requestID":"1cb286ff-8e3d-4765-92cb-0d320b1d814a","from":"DCAE"}
[2019-07-02T18:39:38.117+00:00|DMAAP-source-unauthenticated.DCAE_CL_OUTPUT][IN|DMAAP|unauthenticated.DCAE_CL_OUTPUT]
{"closedLoopEventClient":"DCAE_INSTANCE_ID.dcae-tca","policyVersion":"v0.0.1","policyName":"DCAE.Config_tca-hi-lo","policyScope":"DCAE","target_type":"VNF","AAI":{"generic-vnf.vnf-name":"demofwl01fwl"},"closedLoopAlarmStart":1562092676885741,"closedLoopEventStatus":"ONSET","closedLoopControlName":"ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a","version":"1.0.2","target":"generic-vnf.vnf-name","requestID":"14d3f875-bea2-4086-9b1a-066b0180d029","from":"DCAE"}
[2019-07-02T18:39:38.117+00:00|DMAAP-source-unauthenticated.DCAE_CL_OUTPUT][IN|DMAAP|unauthenticated.DCAE_CL_OUTPUT]
{"closedLoopEventClient":"DCAE_INSTANCE_ID.dcae-tca","policyVersion":"v0.0.1","policyName":"DCAE.Config_tca-hi-lo","policyScope":"DCAE","target_type":"VNF","AAI":{"generic-vnf.vnf-name":"demofwl01fwl"},"closedLoopAlarmStart":1562092687099029,"closedLoopEventStatus":"ONSET","closedLoopControlName":"ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a","version":"1.0.2","target":"generic-vnf.vnf-name","requestID":"e167ea51-dd08-42a9-aa1f-6addecf4bde4","from":"DCAE"}
[2019-07-02T18:39:43.679+00:00|qtp214187874-59188]10.42.215.118 - - [02/Jul/2019:18:39:43 +0000] "GET /healthcheck HTTP/1.1" 200 278
[2019-07-02T18:39:58.031+00:00|DMAAP-source-unauthenticated.DCAE_CL_OUTPUT][IN|DMAAP|unauthenticated.DCAE_CL_OUTPUT]
{"closedLoopEventClient":"DCAE_INSTANCE_ID.dcae-tca","policyVersion":"v0.0.1","policyName":"DCAE.Config_tca-hi-lo","policyScope":"DCAE","target_type":"VNF","AAI":{"generic-vnf.vnf-name":"demofwl01fwl"},"closedLoopAlarmStart":1562092697332231,"closedLoopEventStatus":"ONSET","closedLoopControlName":"ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a","version":"1.0.2","target":"generic-vnf.vnf-name","requestID":"66cb55a8-c596-467a-8e57-6338b96ecec9","from":"DCAE"}
[2019-07-02T18:39:58.031+00:00|DMAAP-source-unauthenticated.DCAE_CL_OUTPUT][IN|DMAAP|unauthenticated.DCAE_CL_OUTPUT]
{"closedLoopEventClient":"DCAE_INSTANCE_ID.dcae-tca","policyVersion":"v0.0.1","policyName":"DCAE.Config_tca-hi-lo","policyScope":"DCAE","target_type":"VNF","AAI":{"generic-vnf.vnf-name":"demofwl01fwl"},"closedLoopAlarmStart":1562092707559072,"closedLoopEventStatus":"ONSET","closedLoopControlName":"ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a","version":"1.0.2","target":"generic-vnf.vnf-name","requestID":"84c2474c-32e9-4ebc-bf3f-3ffc9ce3e5df","from":"DCAE"}
[2019-07-02T18:39:58.731+00:00|qtp214187874-58456]10.42.215.118 - - [02/Jul/2019:18:39:58 +0000] "GET /healthcheck HTTP/1.1" 200 278
[2019-07-02T18:40:13.789+00:00|qtp214187874-58946]10.42.215.118 - - [02/Jul/2019:18:40:13 +0000] "GET /healthcheck HTTP/1.1" 200 278
[2019-07-02T18:40:29.376+00:00|qtp214187874-59188]10.42.215.118 - - [02/Jul/2019:18:40:29 +0000] "GET /healthcheck HTTP/1.1" 200 278
[2019-07-02T18:40:38.088+00:00|DMAAP-source-unauthenticated.DCAE_CL_OUTPUT][IN|DMAAP|unauthenticated.DCAE_CL_OUTPUT]
{"closedLoopEventClient":"DCAE_INSTANCE_ID.dcae-tca","policyVersion":"v0.0.1","policyName":"DCAE.Config_tca-hi-lo","policyScope":"DCAE","target_type":"VNF","AAI":{"generic-vnf.vnf-name":"demofwl01fwl"},"closedLoopAlarmStart":1562092728049928,"closedLoopEventStatus":"ONSET","closedLoopControlName":"ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a","version":"1.0.2","target":"generic-vnf.vnf-name","requestID":"8b1d05d2-08f4-489e-84c7-198928ea6afb","from":"DCAE"}
[2019-07-02T18:40:38.088+00:00|DMAAP-source-unauthenticated.DCAE_CL_OUTPUT][IN|DMAAP|unauthenticated.DCAE_CL_OUTPUT]
{"closedLoopEventClient":"DCAE_INSTANCE_ID.dcae-tca","policyVersion":"v0.0.1","policyName":"DCAE.Config_tca-hi-lo","policyScope":"DCAE","target_type":"VNF","AAI":{"generic-vnf.vnf-name":"demofwl01fwl"},"closedLoopAlarmStart":1562092738293506,"closedLoopEventStatus":"ONSET","closedLoopControlName":"ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a","version":"1.0.2","target":"generic-vnf.vnf-name","requestID":"8158afc3-e8ca-43ad-8f33-56a31f3fda2c","from":"DCAE"}
[2019-07-02T18:40:45.253+00:00|qtp214187874-59252]10.42.215.118 - - [02/Jul/2019:18:40:45 +0000] "GET /healthcheck HTTP/1.1" 200 278
[2019-07-02T18:40:58.069+00:00|DMAAP-source-unauthenticated.DCAE_CL_OUTPUT][IN|DMAAP|unauthenticated.DCAE_CL_OUTPUT]
{"closedLoopEventClient":"DCAE_INSTANCE_ID.dcae-tca","policyVersion":"v0.0.1","policyName":"DCAE.Config_tca-hi-lo","policyScope":"DCAE","target_type":"VNF","AAI":{"generic-vnf.vnf-name":"demofwl01fwl"},"closedLoopAlarmStart":1562092748512500,"closedLoopEventStatus":"ONSET","closedLoopControlName":"ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a","version":"1.0.2","target":"generic-vnf.vnf-name","requestID":"a3e199ee-4da2-4763-9f7f-0ae508597f13","from":"DCAE"}
[2019-07-02T18:40:58.070+00:00|DMAAP-source-unauthenticated.DCAE_CL_OUTPUT][IN|DMAAP|unauthenticated.DCAE_CL_OUTPUT]
{"closedLoopEventClient":"DCAE_INSTANCE_ID.dcae-tca","policyVersion":"v0.0.1","policyName":"DCAE.Config_tca-hi-lo","policyScope":"DCAE","target_type":"VNF","AAI":{"generic-vnf.vnf-name":"demofwl01fwl"},"closedLoopAlarmStart":1562092758760470,"closedLoopEventStatus":"ONSET","closedLoopControlName":"ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a","version":"1.0.2","target":"generic-vnf.vnf-name","requestID":"db3d4ce4-b359-4c99-99b5-ac60c81dac0f","from":"DCAE"}
[2019-07-02T18:40:58.070+00:00|DMAAP-source-unauthenticated.DCAE_CL_OUTPUT][IN|DMAAP|unauthenticated.DCAE_CL_OUTPUT]
{"closedLoopEventClient":"DCAE_INSTANCE_ID.dcae-tca","policyVersion":"v0.0.1","policyName":"DCAE.Config_tca-hi-lo","policyScope":"DCAE","target_type":"VNF","AAI":{"generic-vnf.vnf-name":"demofwl01fwl"},"closedLoopAlarmStart":1562092769004475,"closedLoopEventStatus":"ONSET","closedLoopControlName":"ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a","version":"1.0.2","target":"generic-vnf.vnf-name","requestID":"3a54647f-69e4-442b-b6dc-7b9be9a54e31","from":"DCAE"}
[2019-07-02T18:41:00.862+00:00|qtp214187874-59085]10.42.215.118 - - [02/Jul/2019:18:41:00 +0000] "GET /healthcheck HTTP/1.1" 200 278
[2019-07-02T18:41:15.923+00:00|qtp214187874-59071]10.42.215.118 - - [02/Jul/2019:18:41:15 +0000] "GET /healthcheck HTTP/1.1" 200 278
[2019-07-02T18:41:31.016+00:00|qtp214187874-59215]10.42.215.118 - - [02/Jul/2019:18:41:30 +0000] "GET /healthcheck HTTP/1.1" 200 278
[2019-07-02T18:41:37.520+00:00|DMAAP-source-unauthenticated.DCAE_CL_OUTPUT][IN|DMAAP|unauthenticated.DCAE_CL_OUTPUT]
{"closedLoopEventClient":"DCAE_INSTANCE_ID.dcae-tca","policyVersion":"v0.0.1","policyName":"DCAE.Config_tca-hi-lo","policyScope":"DCAE","target_type":"VNF","AAI":{"generic-vnf.vnf-name":"demofwl01fwl"},"closedLoopAlarmStart":1562092779239545,"closedLoopEventStatus":"ONSET","closedLoopControlName":"ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a","version":"1.0.2","target":"generic-vnf.vnf-name","requestID":"edd1b164-616b-4cf0-acf8-49d63c4825d9","from":"DCAE"}
[2019-07-02T18:41:38.028+00:00|DMAAP-source-unauthenticated.DCAE_CL_OUTPUT][IN|DMAAP|unauthenticated.DCAE_CL_OUTPUT]
{"closedLoopEventClient":"DCAE_INSTANCE_ID.dcae-tca","policyVersion":"v0.0.1","policyName":"DCAE.Config_tca-hi-lo","policyScope":"DCAE","target_type":"VNF","AAI":{"generic-vnf.vnf-name":"demofwl01fwl"},"closedLoopAlarmStart":1562092789453768,"closedLoopEventStatus":"ONSET","closedLoopControlName":"ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a","version":"1.0.2","target":"generic-vnf.vnf-name","requestID":"dde758b0-8244-49ad-8933-08ea35099d8f","from":"DCAE"}
[2019-07-02T18:41:38.028+00:00|DMAAP-source-unauthenticated.DCAE_CL_OUTPUT][IN|DMAAP|unauthenticated.DCAE_CL_OUTPUT]
{"closedLoopEventClient":"DCAE_INSTANCE_ID.dcae-tca","policyVersion":"v0.0.1","policyName":"DCAE.Config_tca-hi-lo","policyScope":"DCAE","target_type":"VNF","AAI":{"generic-vnf.vnf-name":"demofwl01fwl"},"closedLoopAlarmStart":1562092799679458,"closedLoopEventStatus":"ONSET","closedLoopControlName":"ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a","version":"1.0.2","target":"generic-vnf.vnf-name","requestID":"6547a296-0c59-4b2d-8886-97d18b9bf9db","from":"DCAE"}
[2019-07-02T18:41:46.064+00:00|qtp214187874-59085]10.42.215.118 - - [02/Jul/2019:18:41:46 +0000] "GET /healthcheck HTTP/1.1" 200 278
[2019-07-02T18:41:58.042+00:00|DMAAP-source-unauthenticated.DCAE_CL_OUTPUT][IN|DMAAP|unauthenticated.DCAE_CL_OUTPUT]
{"closedLoopEventClient":"DCAE_INSTANCE_ID.dcae-tca","policyVersion":"v0.0.1","policyName":"DCAE.Config_tca-hi-lo","policyScope":"DCAE","target_type":"VNF","AAI":{"generic-vnf.vnf-name":"demofwl01fwl"},"closedLoopAlarmStart":1562092809893261,"closedLoopEventStatus":"ONSET","closedLoopControlName":"ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a","version":"1.0.2","target":"generic-vnf.vnf-name","requestID":"e856842c-4377-4487-8a84-3d6c5d1af52d","from":"DCAE"}
[2019-07-02T18:41:58.042+00:00|DMAAP-source-unauthenticated.DCAE_CL_OUTPUT][IN|DMAAP|unauthenticated.DCAE_CL_OUTPUT]
{"closedLoopEventClient":"DCAE_INSTANCE_ID.dcae-tca","policyVersion":"v0.0.1","policyName":"DCAE.Config_tca-hi-lo","policyScope":"DCAE","target_type":"VNF","AAI":{"generic-vnf.vnf-name":"demofwl01fwl"},"closedLoopAlarmStart":1562092820119457,"closedLoopEventStatus":"ONSET","closedLoopControlName":"ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a","version":"1.0.2","target":"generic-vnf.vnf-name","requestID":"75737a4d-5a4f-4bf0-b911-b89cf164fbfe","from":"DCAE"}
[2019-07-02T18:41:58.043+00:00|DMAAP-source-unauthenticated.DCAE_CL_OUTPUT][IN|DMAAP|unauthenticated.DCAE_CL_OUTPUT]
{"closedLoopEventClient":"DCAE_INSTANCE_ID.dcae-tca","policyVersion":"v0.0.1","policyName":"DCAE.Config_tca-hi-lo","policyScope":"DCAE","target_type":"VNF","AAI":{"generic-vnf.vnf-name":"demofwl01fwl"},"closedLoopAlarmStart":1562092830348575,"closedLoopEventStatus":"ONSET","closedLoopControlName":"ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a","version":"1.0.2","target":"generic-vnf.vnf-name","requestID":"578caef3-ff65-4e2e-b70b-322a37b0df69","from":"DCAE"}
[2019-07-02T18:42:01.161+00:00|qtp214187874-58878]10.42.215.118 - - [02/Jul/2019:18:42:01 +0000] "GET /healthcheck HTTP/1.1" 200 278
[2019-07-02T18:42:16.204+00:00|qtp214187874-59174]10.42.215.118 - - [02/Jul/2019:18:42:16 +0000] "GET /healthcheck HTTP/1.1" 200 278
[2019-07-02T18:42:32.290+00:00|qtp214187874-59044]10.42.215.118 - - [02/Jul/2019:18:42:31 +0000] "GET /healthcheck HTTP/1.1" 200 278
[2019-07-02T18:42:38.016+00:00|DMAAP-source-unauthenticated.DCAE_CL_OUTPUT][IN|DMAAP|unauthenticated.DCAE_CL_OUTPUT]
{"closedLoopEventClient":"DCAE_INSTANCE_ID.dcae-tca","policyVersion":"v0.0.1","policyName":"DCAE.Config_tca-hi-lo","policyScope":"DCAE","target_type":"VNF","AAI":{"generic-vnf.vnf-name":"demofwl01fwl"},"closedLoopAlarmStart":1562092840571033,"closedLoopEventStatus":"ONSET","closedLoopControlName":"ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a","version":"1.0.2","target":"generic-vnf.vnf-name","requestID":"8699473b-8f07-4eeb-9bcb-2659e7abc0d0","from":"DCAE"}
[2019-07-02T18:42:38.016+00:00|DMAAP-source-unauthenticated.DCAE_CL_OUTPUT][IN|DMAAP|unauthenticated.DCAE_CL_OUTPUT]
{"closedLoopEventClient":"DCAE_INSTANCE_ID.dcae-tca","policyVersion":"v0.0.1","policyName":"DCAE.Config_tca-hi-lo","policyScope":"DCAE","target_type":"VNF","AAI":{"generic-vnf.vnf-name":"demofwl01fwl"},"closedLoopAlarmStart":1562092850792929,"closedLoopEventStatus":"ONSET","closedLoopControlName":"ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a","version":"1.0.2","target":"generic-vnf.vnf-name","requestID":"85d06f49-980b-4ef9-817d-349269b6b77b","from":"DCAE"}
[2019-07-02T18:42:38.016+00:00|DMAAP-source-unauthenticated.DCAE_CL_OUTPUT][IN|DMAAP|unauthenticated.DCAE_CL_OUTPUT]
{"closedLoopEventClient":"DCAE_INSTANCE_ID.dcae-tca","policyVersion":"v0.0.1","policyName":"DCAE.Config_tca-hi-lo","policyScope":"DCAE","target_type":"VNF","AAI":{"generic-vnf.vnf-name":"demofwl01fwl"},"closedLoopAlarmStart":1562092861032778,"closedLoopEventStatus":"ONSET","closedLoopControlName":"ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a","version":"1.0.2","target":"generic-vnf.vnf-name","requestID":"b5d39eea-2063-48f8-b580-58d77362087c","from":"DCAE"}
[2019-07-02T18:42:47.576+00:00|qtp214187874-59009]10.42.215.118 - - [02/Jul/2019:18:42:47 +0000] "GET /healthcheck HTTP/1.1" 200 278
[2019-07-02T18:42:58.230+00:00|DMAAP-source-unauthenticated.DCAE_CL_OUTPUT][IN|DMAAP|unauthenticated.DCAE_CL_OUTPUT]
{"closedLoopEventClient":"DCAE_INSTANCE_ID.dcae-tca","policyVersion":"v0.0.1","policyName":"DCAE.Config_tca-hi-lo","policyScope":"DCAE","target_type":"VNF","AAI":{"generic-vnf.vnf-name":"demofwl01fwl"},"closedLoopAlarmStart":1562092871249439,"closedLoopEventStatus":"ONSET","closedLoopControlName":"ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a","version":"1.0.2","target":"generic-vnf.vnf-name","requestID":"79a32e00-4da3-4d8a-888d-5916ead78d82","from":"DCAE"}
[2019-07-02T18:42:58.230+00:00|DMAAP-source-unauthenticated.DCAE_CL_OUTPUT][IN|DMAAP|unauthenticated.DCAE_CL_OUTPUT]
{"closedLoopEventClient":"DCAE_INSTANCE_ID.dcae-tca","policyVersion":"v0.0.1","policyName":"DCAE.Config_tca-hi-lo","policyScope":"DCAE","target_type":"VNF","AAI":{"generic-vnf.vnf-name":"demofwl01fwl"},"closedLoopAlarmStart":1562092881470831,"closedLoopEventStatus":"ONSET","closedLoopControlName":"ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a","version":"1.0.2","target":"generic-vnf.vnf-name","requestID":"b883a6c3-164a-4844-aabf-968de265a0ea","from":"DCAE"}
[2019-07-02T18:42:58.230+00:00|DMAAP-source-unauthenticated.DCAE_CL_OUTPUT][IN|DMAAP|unauthenticated.DCAE_CL_OUTPUT]
{"closedLoopEventClient":"DCAE_INSTANCE_ID.dcae-tca","policyVersion":"v0.0.1","policyName":"DCAE.Config_tca-hi-lo","policyScope":"DCAE","target_type":"VNF","AAI":{"generic-vnf.vnf-name":"demofwl01fwl"},"closedLoopAlarmStart":1562092891689243,"closedLoopEventStatus":"ONSET","closedLoopControlName":"ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a","version":"1.0.2","target":"generic-vnf.vnf-name","requestID":"a9fa7b1e-6fda-4b5d-ad93-cd57fc2c1609","from":"DCAE"}
[2019-07-02T18:43:02.716+00:00|qtp214187874-59142]10.42.215.118 - - [02/Jul/2019:18:43:02 +0000] "GET /healthcheck HTTP/1.1" 200 278
[2019-07-02T18:43:17.816+00:00|qtp214187874-59044]10.42.215.118 - - [02/Jul/2019:18:43:17 +0000] "GET /healthcheck HTTP/1.1" 200 278
[2019-07-02T18:43:32.904+00:00|qtp214187874-58946]10.42.215.118 - - [02/Jul/2019:18:43:32 +0000] "GET /healthcheck HTTP/1.1" 200 278
[2019-07-02T18:43:37.550+00:00|DMAAP-source-unauthenticated.DCAE_CL_OUTPUT][IN|DMAAP|unauthenticated.DCAE_CL_OUTPUT]
{"closedLoopEventClient":"DCAE_INSTANCE_ID.dcae-tca","policyVersion":"v0.0.1","policyName":"DCAE.Config_tca-hi-lo","policyScope":"DCAE","target_type":"VNF","AAI":{"generic-vnf.vnf-name":"demofwl01fwl"},"closedLoopAlarmStart":1562092901906772,"closedLoopEventStatus":"ONSET","closedLoopControlName":"ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a","version":"1.0.2","target":"generic-vnf.vnf-name","requestID":"a90de6c7-8d3b-4dff-9440-10276f6219c2","from":"DCAE"}
[2019-07-02T18:43:38.058+00:00|DMAAP-source-unauthenticated.DCAE_CL_OUTPUT][IN|DMAAP|unauthenticated.DCAE_CL_OUTPUT]
{"closedLoopEventClient":"DCAE_INSTANCE_ID.dcae-tca","policyVersion":"v0.0.1","policyName":"DCAE.Config_tca-hi-lo","policyScope":"DCAE","target_type":"VNF","AAI":{"generic-vnf.vnf-name":"demofwl01fwl"},"closedLoopAlarmStart":1562092912133876,"closedLoopEventStatus":"ONSET","closedLoopControlName":"ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a","version":"1.0.2","target":"generic-vnf.vnf-name","requestID":"0023a980-f32e-4cb1-9ecb-c8cc4c9c4353","from":"DCAE"}
[2019-07-02T18:43:38.058+00:00|DMAAP-source-unauthenticated.DCAE_CL_OUTPUT][IN|DMAAP|unauthenticated.DCAE_CL_OUTPUT]
{"closedLoopEventClient":"DCAE_INSTANCE_ID.dcae-tca","policyVersion":"v0.0.1","policyName":"DCAE.Config_tca-hi-lo","policyScope":"DCAE","target_type":"VNF","AAI":{"generic-vnf.vnf-name":"demofwl01fwl"},"closedLoopAlarmStart":1562092922366618,"closedLoopEventStatus":"ONSET","closedLoopControlName":"ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a","version":"1.0.2","target":"generic-vnf.vnf-name","requestID":"850bca7b-498c-46f9-8242-20542689806a","from":"DCAE"}
[2019-07-02T18:43:48.023+00:00|qtp214187874-59188]10.42.215.118 - - [02/Jul/2019:18:43:47 +0000] "GET /healthcheck HTTP/1.1" 200 278
[2019-07-02T18:43:58.073+00:00|DMAAP-source-unauthenticated.DCAE_CL_OUTPUT][IN|DMAAP|unauthenticated.DCAE_CL_OUTPUT]
{"closedLoopEventClient":"DCAE_INSTANCE_ID.dcae-tca","policyVersion":"v0.0.1","policyName":"DCAE.Config_tca-hi-lo","policyScope":"DCAE","target_type":"VNF","AAI":{"generic-vnf.vnf-name":"demofwl01fwl"},"closedLoopAlarmStart":1562092932607773,"closedLoopEventStatus":"ONSET","closedLoopControlName":"ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a","version":"1.0.2","target":"generic-vnf.vnf-name","requestID":"4675bdb6-e21f-49a7-bb22-711fea7bf127","from":"DCAE"}
[2019-07-02T18:43:58.073+00:00|DMAAP-source-unauthenticated.DCAE_CL_OUTPUT][IN|DMAAP|unauthenticated.DCAE_CL_OUTPUT]
{"closedLoopEventClient":"DCAE_INSTANCE_ID.dcae-tca","policyVersion":"v0.0.1","policyName":"DCAE.Config_tca-hi-lo","policyScope":"DCAE","target_type":"VNF","AAI":{"generic-vnf.vnf-name":"demofwl01fwl"},"closedLoopAlarmStart":1562092942835562,"closedLoopEventStatus":"ONSET","closedLoopControlName":"ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a","version":"1.0.2","target":"generic-vnf.vnf-name","requestID":"db3686f6-b3dc-4111-8bb4-1a6bea1ae774","from":"DCAE"}
[2019-07-02T18:44:03.136+00:00|qtp214187874-59252]10.42.215.118 - - [02/Jul/2019:18:44:03 +0000] "GET /healthcheck HTTP/1.1" 200 278
[2019-07-02T18:44:18.193+00:00|qtp214187874-58946]10.42.215.118 - - [02/Jul/2019:18:44:18 +0000] "GET /healthcheck HTTP/1.1" 200 278
[2019-07-02T18:44:33.241+00:00|qtp214187874-59071]10.42.215.118 - - [02/Jul/2019:18:44:33 +0000] "GET /healthcheck HTTP/1.1" 200 278
[2019-07-02T18:44:38.812+00:00|DMAAP-source-unauthenticated.DCAE_CL_OUTPUT][IN|DMAAP|unauthenticated.DCAE_CL_OUTPUT]
{"closedLoopEventClient":"DCAE_INSTANCE_ID.dcae-tca","policyVersion":"v0.0.1","policyName":"DCAE.Config_tca-hi-lo","policyScope":"DCAE","target_type":"VNF","AAI":{"generic-vnf.vnf-name":"demofwl01fwl"},"closedLoopAlarmStart":1562092973537038,"closedLoopEventStatus":"ONSET","closedLoopControlName":"ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a","version":"1.0.2","target":"generic-vnf.vnf-name","requestID":"d703530c-cbcc-40e3-a1cd-b88ba8658b5e","from":"DCAE"}
[2019-07-02T18:44:38.812+00:00|DMAAP-source-unauthenticated.DCAE_CL_OUTPUT][IN|DMAAP|unauthenticated.DCAE_CL_OUTPUT]
{"closedLoopEventClient":"DCAE_INSTANCE_ID.dcae-tca","policyVersion":"v0.0.1","policyName":"DCAE.Config_tca-hi-lo","policyScope":"DCAE","target_type":"VNF","AAI":{"generic-vnf.vnf-name":"demofwl01fwl"},"closedLoopAlarmStart":1562092983755481,"closedLoopEventStatus":"ONSET","closedLoopControlName":"ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a","version":"1.0.2","target":"generic-vnf.vnf-name","requestID":"5896033f-7e79-49d3-b7f4-5c131651e072","from":"DCAE"}
[2019-07-02T18:44:48.292+00:00|qtp214187874-59252]10.42.215.118 - - [02/Jul/2019:18:44:48 +0000] "GET /healthcheck HTTP/1.1" 200 278
I can't see failed request , Can you ?
Thanks
Ok so Policy not sending events to APPC-CL and it is why the topic is not created?
DMaaP unauthenticated topics like APPC-CL are not created till the first publish.
network.log will scroll since there are alot of polling jobs to check topics.
A success will look like this :
[2019-07-02T19:00:46.946+00:00|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:1.4.2:usecases][OUT|DMAAP|APPC-CL]
{
"CommonHeader": {
"TimeStamp": 1562094046945,
"APIver": "1.01",
"RequestID": "a2a2bf75-0fc0-4b4c-8587-bb26b896a515",
"SubRequestID": "1",
"RequestTrack": [],
"Flags": []
},
"Action": "ModifyConfig",
"Payload": {
"streams": {
"active-streams": 5.0
},
"generic-vnf.vnf-id": "0e3e9185-a7d2-4717-9079-7841a34a07b1"
}
}
dont worry about parsing of the response errors. Notice it is"OUT: to the APPC-CL topic.
In debug.log you want to look for these types of lines:
[2019-07-02T19:00:46.945+00:00|INFO|controlloop|Session org.onap.policy.drools-applications.controlloop.common:controller-usecases:1.4.2:usecases] ControlLoop-vFirewall-18b7a0f7-59bb-46ee-8e13-4adeadbf5400: operational.modifyconfig.EVENT.MANAGER.OPERATION.LOCKED.GUARD_PERMITTED: event=org.onap.policy.controlloop.VirtualControlLoopEvent@4da22293 manager=ControlLoopEventManager [closedLoopControlName=ControlLoop-vFirewall-18b7a0f7-59bb-46ee-8e13-4adeadbf5400, requestId=a2a2bf75-0fc0-4b4c-8587-bb26b896a515, processor=org.onap.policy.controlloop.processor.ControlLoopProcessor@3427b3c8, onset=a2a2bf75-0fc0-4b4c-8587-bb26b896a515, numOnsets=1, numAbatements=0, isActivated=true, currentOperation=ControlLoopOperationManager [onset=a2a2bf75-0fc0-4b4c-8587-bb26b896a515, policy=unique-policy-id-1-modifyConfig, attempts=0, policyResult=null, currentOperation=null, operationHistory=[]], targetLock=VnfTargetLock [lockId=02bdbe98-98c7-4a7c-a891-735f7c2ac292, targetType=VNF, target=0e3e9185-a7d2-4717-9079-7841a34a07b1, requestId=a2a2bf75-0fc0-4b4c-8587-bb26b896a515]] operation=ControlLoopOperationManager [onset=a2a2bf75-0fc0-4b4c-8587-bb26b896a515, policy=unique-policy-id-1-modifyConfig, attempts=0, policyResult=null, currentOperation=null, operationHistory=[]] lock=VnfTargetLock [lockId=02bdbe98-98c7-4a7c-a891-735f7c2ac292, targetType=VNF, target=0e3e9185-a7d2-4717-9079-7841a34a07b1, requestId=a2a2bf75-0fc0-4b4c-8587-bb26b896a515]
and similar as policy progresses through the steps of matching on the policy, checking guard timers and locks and then sending the modifyConfig
Hi Brian Freeman,
Do you have an idea why APPC guard config is returning false ?
"operation": "ModifyConfig",
("message": "Operation denied by Guard")
I set the stream to 5 and leave it running like that for I while. About 30 minutes. The DCAE_CL_OUTPUT was clear. Then restart policy.
[2019-07-03T17:57:58.927+00:00|Session org.onap.policy-engine.drools.amsterdam:policy-amsterdam-rules:1.3.0:closedloop-a msterdam][OUT|DMAAP|POLICY-CL-MGT]
{
"AAI": {
"generic-vnf.resource-version": "1562170772679",
"generic-vnf.nf-role": "",
"generic-vnf.prov-status": "ACTIVE",
"generic-vnf.orchestration-status": "Active",
"generic-vnf.is-closed-loop-disabled": "false",
"generic-vnf.service-id": "578a8b70-078c-4445-86b2-43f02e88ae02",
"generic-vnf.in-maint": "false",
"generic-vnf.nf-type": "",
"generic-vnf.nf-naming-code": "",
"generic-vnf.vnf-name": "Ete_vFWSNK_860ab2e1-11b5-4a1c-8d8a-3da78767cae6",
"generic-vnf.model-version-id": "8a10e0fa-0ec4-4035-95d5-711d967968a6",
"generic-vnf.model-customization-id": "1b915903-f301-49c1-8f66-befded37f07e",
"generic-vnf.nf-function": "",
"generic-vnf.vnf-type": "demoVFWCL/26b05f20-ac00-43dd-90aa 0",
"generic-vnf.model-invariant-id": "341ec759-74fc-4bea-ae5c-1885f2600be7",
"generic-vnf.vnf-id": "595c1a78-4195-45ad-92bb-4ab1c386abd3"
},
"closedLoopAlarmStart": 1562176594912542,
"closedLoopControlName": "ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a",
"version": "1.0.2",
"requestId": "dff1087a-129e-42cc-8819-56c85a05fc9a",
"closedLoopEventClient": "DCAE_INSTANCE_ID.dcae-tca",
"targetType": "VNF",
"target": "generic-vnf.vnf-name",
"from": "policy:amsterdam",
"policyScope": "com",
"policyName": "com.Config_BRMS_Param_BRMSParamvFirewall.EVENT.MANAGER",
"policyVersion": "6",
"notification": "FINAL: FAILURE",
"notificationTime": "2019-07-03 17:57:58.925000+00:00",
"history": [
{
"actor": "APPC",
"operation": "ModifyConfig",
"target": "Target [type=VNF, resourceId=cca61799-c3b9-42a3-8f73-22e99ccb8420]",
"start": 1562176678882,
"end": 1562176678882,
"subRequestId": "1",
"outcome": "Failure_Guard",
"message": "Operation denied by Guard"
}
]
}
This changed alot in Dublin and in Cassablanca but if robot is creating the policy and running push policies then I think policy should be good. you need to make sure the TCA event has the same controlLoopName and then policy should match that ( in cassablanca I think its always the same controlLoopname) and then do a AAI query to look up your vnf data by resource-id/model-invariant-id.
topic not found is usually when a subscriber is looking for data on a topic that has not been created by the publisher yet. The errors I see on LCM and SDNC are normal when those loops have not fired for the first time.
you can use POSTMAN or CURL to do a GET query on these topics:
unauthenticated.VES_MEASUREMENT_OUTPUT (to see the events from your vFW to DCAE TCA)
unauthenticated.DCAE_CL_OUTPUT (to see the events from TCA to Policy
APPC-CL (to see the events from Policy to APPC)
The error I see is that AAI is returning null on the named-query with the model-invarient-id you are using.
use postman to confirm (replace the vnf-id with your value)
curl -X POST \
https://<k8s-host>:30233/aai/search/named-query \
-H 'accept: application/json' \
-H 'authorization: Basic QUFJOkFBSQ==' \
-H 'cache-control: no-cache' \
-H 'content-type: application/json' \
-H 'postman-token: fe95f2e9-8d5a-fb51-64a1-51b6cb4c8713' \
-H 'real-time: true' \
-H 'x-fromappid: AAI-Temp-Tool' \
-H 'x-transactionid: AAI-Temp-Tool' \
-d '{
"query-parameters": {
"named-query": {
"named-query-uuid": "037eb932-edac-48f5-9782-c19c0aa5a031"
}
},
"instance-filters":{
"instance-filter":[ {
"generic-vnf": {
"vnf-id": "08eb0603-e639-44e5-834d-dc94d2de9263"
}
} ]
}
}'
Hi Brian Freeman,
I still get AAI querry error so I dig into that. I've made a curl request to get all the VNF in AAI
And the is no VFN name with the name demofwl01fwl
[2019-07-02T20:10:03.965+00:00|Session org.onap.policy-engine.drools.amsterdam:policy-amsterdam-rules:1.1.0:closedloop-amsterdam][OUT|AAI|https://aai.onap:8443/aai/v11/network/generic-vnfs/generic-vnf?vnf-name=demofwl01fwl|
The vnf name for the UUID related to the demo is the following
Ete_vFW_3c53cb90-abfb-4041-8d5f-97cd98f3c26b
"inventory-response-item": [
{
"extra-properties": {},
"generic-vnf": {
"in-maint": false,
"is-closed-loop-disabled": false,
"model-customization-id": "38fe9c0f-c4c5-43e0-b125-b30160d4d26b",
"model-invariant-id": "b77f4f92-4f35-4efd-b7fc-9c2cba2407e4",
"model-version-id": "9ef95d49-ba86-4841-9711-cd9d4445e0bd",
"nf-function": "",
"nf-naming-code": "",
"nf-role": "",
"nf-type": "",
"orchestration-status": "Active",
"prov-status": "ACTIVE",
"resource-version": "1562095615475",
"service-id": "0cae8085-4a97-4c6d-a8eb-79e0002485a3",
"vnf-id": "bb1acdea-4bdb-479a-b54a-1053fbea8782",
"vnf-name": "Ete_vFW_3c53cb90-abfb-4041-8d5f-97cd98f3c26b",
"vnf-type": "vFW 2019-07-02 19:18:17/074a0d2f-f40e-4817-9913 0"
What does this means ?
Thanks,
In casablanca did you run heatbridge ?
btw if you re-ran robot it looks like an ete-k8.sh format name in the AAI database Ete_vFW_...
Yes I did run the Heat brigde.
When I run the ./demo-k8s.sh onap instantiateVFW I get the naming covention that you see Ete_vFW_...
Hi,
I use the robot script to initialize the vFW. Now, the stack is deployed and running on my cloud.
The last step is about the cloose loop and the vFW policy. I read in another Wiki that I should update the vFW policy to match the UUID of the vPKG.
According to this wiki about Beijing: https://lists.onap.org/g/onap-discuss/topic/integration_vfw_closed_loop/23245151?p=,,,20,0,0,0::recentpostdate%2Fsticky,,,20,2,0,23245151
I should run the following command:
1 ) Is this the same approach for Cassablanca ?
2) Where is the UUID in this command:
When I look inside the push-policies.sh I see no string that could match the following line ( "s/Eace933104d443b496b8.nodes.heat.vpg/")
UUID: 02c953b7-e626-4e16-9874-6191572949a0 ?
3) Does the UUID displayed in the robot script command promt is the good one I should use?
Instantiate VFW Downloaded:service-Vfw20190629232135-csar.csar
Set VNF ProvStatus: 131e3d78-419e-41bf-bf89-0b6d93dc0c16 to ACTIVE
Customer Name=DemoCust_92ab49d7-e5d8-4164-8cf5-741769dc957a
VNF Module Name=Vfmodule_Ete_vFW_92ab49d7-e5d8-4164-8cf5-741769dc957a
ModelInvariantID=eeb85239-9b91-4dc0-867d-6e39b18d8c77
Create vFWCL Policy
Push vFWCL Policy
Reboot Drools
4) Are the errors "Topic not found" error in the drools's pod log related to the policy config not finding vPKG ?:
Thanks!