Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: moved DFC and Mapper under option#3 and inline updates related to policy model steps

...

These are MS which can be binded into Service in SDC and requiring dynamic policy configuration management support.  Services involved in control loop flow will generally fall under this classification.

  • DFC  - 5G
  • PM-Mapper (New) – 5G

      

Note: For Dublin, none of DCAE MS will be exercising this option.

Onboarding/Deployment steps

...

  1. Component spec creation 
    1. Every component to be onboarded into DCAE, should prepare a component spec (a.k.a spec) - which is meta data represented in json describing the component configuration model. Details on spec creation can be found here - RTD spec  
  2. Validation of spec and docker image using dcae_cli
    1. The dcae_cli tools enables MS owner to validate the component spec and data_Formats created and also "test" the container deployment of MS itself. This allows components to mimic the configuration returned from ConfigBinding Service as expected on typical cloudify based deployment by DCAE platform (Documentation on spec format and tool usage can be found under RTD dcae_cli). There is vagrant setup available which can be used to dcae_cli test/validation (vagrant vm includes Consul and Configbindingservice).
      Alternatively dcae_cli can be configured to interface with OOM/DCAE Platform - steps for setup and testing is documented here 
  3. Blueprint creation (manual for R4; new tool will be available post R4)
    1. Components developer can hand-craft the cloudify blueprints. For blueprint reference - check existing services k8s blueprint template under  - DCAE Blueprint repository (refer only to blueprint with prefix - "k8s-" for OOM deployment)
    2. Blueprint should include policy_node and taking policy_id as input (refer TCA blueprint) Note: This step is only required for MS involving policy model 
  4. Policy Model creation (using SDC Tosca_lab) Note: This step is only required for MS involving policy model 
    1. Policy model creation require policy schema definition in spec specifying the structure of configuration to be exposed in policy. Follow Tosca Lab Tool Instructions to generate the policy models.
      Note: The policy model created from SDC Tosca_lab version tool is not compatible to new model expected by Policy Team for Dublin;  hence some manual update will be required to be complaint (e.g changing nodetype naming and including policy.nodes.root node; specifics being worked with Policy team - documented Onboarding steps for DCAE MS through SDC/Policy/CLAMP (Dublin))
    2. Verify with policy team if the created policy model conforms to the specification Policy team expects
    Note: Rest of models (schema/template/translate) are not compatible to K8S deployment;  Tosca_lab version in SDC will be updated in Dublin to align/support DCAE k8s model. 
  5. Validation of blueprint/deployment in DCAE environment on K8S
    1. The blueprint should be tested on any DCAE deployment by executing into DCAE bootstrap pod; instruction to deploy/validate via blueprint can be found here - Cloudify Blueprint validation under OOM
  6. SDC/CLAMP Integration
    1. Add the new models/blueprints in service component gerrit repo under following directory structure - dpo/spec, dpo/data-formats, dpo/tosca_models, dpo/blueprints.
      1. Note: Both dpo/tosca_models and dpo/blueprints are temporary place holders for Dublin.
    2. Work with Integration team/usecase owner to upload the artifacts (blueprints & policy model) into SDC and trigger Service creation and distribution from SDC.
    3. Work with CLAMP team to configure the policy and trigger the MS deployment.

...

For services not binded to specific service in SDC, CLAMP instantiation will not apply. For such cases, DCAE CLI or Dashboard can be used to deploy the component on demand. For Dublin - following service will be deployed using cli when required.

  • SON Handler (New) – 5G
  • DFC  - 5G (W/O policy model)
  • PM-Mapper (New) – 5G (W/O policy model)
  • RESTConf (New) - BBS   (W/O policy model)
  • VES-Mapper (New) - BBS  (W/O policy model)
  • bbs-eventprocessor (New) - BBS (W/O policy model)
  • Heartbeat (New) (W/O policy model)
  • TCA-GEN2* (New) (W/O policy model)

...

  1. Component spec creation 
    1. Every component to be onboarded into DCAE, should prepare a component spec (a.k.a spec) - which is meta data represented in json describing the component configuration model. Details on spec creation can be found here - RTD spec  
  2. Validation of spec and docker image using dcae_cli
    1. The dcae_cli tools enables MS owner to validate the component spec and data_Formats created and also "test" the container deployment of MS itself. This allows components to mimic the configuration returned from ConfigBinding Service as expected on typical cloudify based deployment by DCAE platform (Documentation on spec format and tool usage can be found under RTD dcae_cli). There is vagrant setup available which can be used to dcae_cli test/validation (vagrant vm includes Consul and Configbindingservice).
      Alternatively dcae_cli can be configured to interface with OOM/DCAE Platform - steps for setup and testing is documented here
  3. Blueprint creation (manual for R4; new tool will be available post R4)
    1. Components developer can hand-craft the cloudify blueprints. For blueprint reference - check existing services k8s blueprint template under  - DCAE Blueprint repository (refer only to blueprint with prefix - "k8s-" for OOM deployment)
    2. Blueprint should include policy_node and taking policy_id as input (refer TCA policy enabled blueprint) Note: This step is only required for MS involving policy model 
  4. Policy Model creation (using SDC Tosca_lab)     
    Note: This step is only required for MS involving policy model 
    1. Policy model creation require policy schema definition in spec specifying the structure of configuration to be exposed in policy. Follow Tosca Lab Tool Instructions to generate the policy models
      Note: The policy model created from SDC Tosca_lab version tool is not compatible to new model expected by Policy Team for Dublin;  hence some manual update will be required to be complaint (e.g changing nodetype naming and including policy.nodes.root node; specifics being worked with Policy team - documented Onboarding steps for DCAE MS through SDC/Policy/CLAMP (Dublin))
    2. Verify with policy team if the created policy model conforms to the specification Policy team expects
    Note: Rest of models (schema/template/translate) are not compatible to K8S deployment;  Tosca_lab version in SDC will be updated in Dublin to align/support DCAE k8s model. 
  5. For Testing
    1. Step 1- Service owners are required to upload the policy model into Policy and create a configuration policy (policy_id created) before deployment of MS itself Note: This step is only required for MS involving policy model 
    2. Step 2 - Validate the blueprint by deployment in DCAE k8s cluster. The policy_id obtained in step 1 should be specified as input and deployed using cfy command as documented here -   Cloudify Blueprint validation under OOM 
  6. Once the spec, policy model and blueprints are validated, add it under service component gerrit repo under following directory structure - dpo/spec, dpo/data-formats, dpo/tosca_models, dpo/blueprints.
    1. Note: Both dpo/tosca_models and dpo/blueprints are temporary place holders for Dublin
  7. Documentation
    1. As the MS will be deployed on-demand in ONAP, include the instruction for deployment of MS and validation. This info should be submitted as"readme" in gerrit and on ONAP Usecase wiki used by Integration team.

...