+++ /dev/null
-.. This work is licensed under a Creative Commons Attribution 4.0 International License.
-.. http://creativecommons.org/licenses/by/4.0
-.. Copyright 2018 Amdocs, Bell Canada
-
-.. Links
-.. _Helm: https://docs.helm.sh/
-.. _Helm Charts: https://github.com/kubernetes/charts
-.. _Kubernetes: https://Kubernetes.io/
-.. _Docker: https://www.docker.com/
-.. _Nexus: https://nexus.onap.org/#welcome
-.. _AWS Elastic Block Store: https://aws.amazon.com/ebs/
-.. _Azure File: https://docs.microsoft.com/en-us/azure/storage/files/storage-files-introduction
-.. _GCE Persistent Disk: https://cloud.google.com/compute/docs/disks/
-.. _Gluster FS: https://www.gluster.org/
-.. _Kubernetes Storage Class: https://Kubernetes.io/docs/concepts/storage/storage-classes/
-.. _Assigning Pods to Nodes: https://Kubernetes.io/docs/concepts/configuration/assign-pod-node/
-
-
-.. _developer-guide-label:
-
-OOM Developer Guide
-###################
-
-.. figure:: oomLogoV2-medium.png
- :align: right
-
-ONAP consists of a large number of components, each of which are substantial
-projects within themselves, which results in a high degree of complexity in
-deployment and management. To cope with this complexity the ONAP Operations
-Manager (OOM) uses a Helm_ model of ONAP - Helm being the primary management
-system for Kubernetes_ container systems - to drive all user driven life-cycle
-management operations. The Helm model of ONAP is composed of a set of
-hierarchical Helm charts that define the structure of the ONAP components and
-the configuration of these components. These charts are fully parameterized
-such that a single environment file defines all of the parameters needed to
-deploy ONAP. A user of ONAP may maintain several such environment files to
-control the deployment of ONAP in multiple environments such as development,
-pre-production, and production.
-
-The following sections describe how the ONAP Helm charts are constructed.
-
-.. contents::
- :depth: 3
- :local:
-..
-
-Container Background
-====================
-Linux containers allow for an application and all of its operating system
-dependencies to be packaged and deployed as a single unit without including a
-guest operating system as done with virtual machines. The most popular
-container solution is Docker_ which provides tools for container management
-like the Docker Host (dockerd) which can create, run, stop, move, or delete a
-container. Docker has a very popular registry of containers images that can be
-used by any Docker system; however, in the ONAP context, Docker images are
-built by the standard CI/CD flow and stored in Nexus_ repositories. OOM uses
-the "standard" ONAP docker containers and three new ones specifically created
-for OOM.
-
-Containers are isolated from each other primarily via name spaces within the
-Linux kernel without the need for multiple guest operating systems. As such,
-multiple containers can be deployed with little overhead such as all of ONAP
-can be deployed on a single host. With some optimization of the ONAP components
-(e.g. elimination of redundant database instances) it may be possible to deploy
-ONAP on a single laptop computer.
-
-Helm Charts
-===========
-A Helm chart is a collection of files that describe a related set of Kubernetes
-resources. A simple chart might be used to deploy something simple, like a
-memcached pod, while a complex chart might contain many micro-service arranged
-in a hierarchy as found in the `aai` ONAP component.
-
-Charts are created as files laid out in a particular directory tree, then they
-can be packaged into versioned archives to be deployed. There is a public
-archive of `Helm Charts`_ on GitHub that includes many technologies applicable
-to ONAP. Some of these charts have been used in ONAP and all of the ONAP charts
-have been created following the guidelines provided.
-
-The top level of the ONAP charts is shown below:
-
-.. graphviz::
-
- digraph onap_top_chart {
- rankdir="LR";
- {
- node [shape=folder]
- oValues [label="values.yaml"]
- oChart [label="Chart.yaml"]
- dev [label="dev.yaml"]
- prod [label="prod.yaml"]
- crb [label="clusterrolebindings.yaml"]
- secrets [label="secrets.yaml"]
- }
- {
- node [style=dashed]
- vCom [label="component"]
- }
-
- onap -> oValues
- onap -> oChart
- onap -> templates
- onap -> resources
- oValues -> vCom
- resources -> environments
- environments -> dev
- environments -> prod
- templates -> crb
- templates -> secrets
- }
-
-Within the `values.yaml` file at the `onap` level, one will find a set of
-boolean values that control which of the ONAP components get deployed as shown
-below:
-
-.. code-block:: yaml
-
- aaf: # Application Authorization Framework
- enabled: false
- <...>
- so: # Service Orchestrator
- enabled: true
-
-By setting these flags a custom deployment can be created and used during
-deployment by using the `-f` Helm option as follows::
-
- > helm install local/onap -name development -f dev.yaml
-
-Note that there are one or more example deployment files in the
-`onap/resources/environments/` directory. It is best practice to create a
-unique deployment file for each environment used to ensure consistent
-behaviour.
-
-To aid in the long term supportability of ONAP, a set of common charts have
-been created (and will be expanded in subsequent releases of ONAP) that can be
-used by any of the ONAP components by including the common component in its
-`requirements.yaml` file. The common components are arranged as follows:
-
-.. graphviz::
-
- digraph onap_common_chart {
- rankdir="LR";
- {
- node [shape=folder]
- mValues [label="values.yaml"]
- ccValues [label="values.yaml"]
- comValues [label="values.yaml"]
- comChart [label="Chart.yaml"]
- ccChart [label="Chart.yaml"]
- mChart [label="Chart.yaml"]
-
- mReq [label="requirements.yaml"]
- mService [label="service.yaml"]
- mMap [label="configmap.yaml"]
- ccName [label="_name.tpl"]
- ccNS [label="_namespace.tpl"]
- }
- {
- cCom [label="common"]
- mTemp [label="templates"]
- ccTemp [label="templates"]
- }
- {
- more [label="...",style=dashed]
- }
-
- common -> comValues
- common -> comChart
- common -> cCom
- common -> mysql
- common -> more
-
- cCom -> ccChart
- cCom -> ccValues
- cCom -> ccTemp
- ccTemp -> ccName
- ccTemp -> ccNS
-
- mysql -> mValues
- mysql -> mChart
- mysql -> mReq
- mysql -> mTemp
- mTemp -> mService
- mTemp -> mMap
- }
-
-The common section of charts consists of a set of templates that assist with
-parameter substitution (`_name.tpl` and `_namespace.tpl`) and a set of charts
-for components used throughout ONAP. Initially `mysql` is in the common area
-but this will expand to include other databases like `mariadb-galera`,
-`postgres`, and `cassandra`. Other candidates for common components include
-`redis` and`kafka`. When the common components are used by other charts they
-are instantiated each time. In subsequent ONAP releases some of the common
-components could be a setup as services that are used by multiple ONAP
-components thus minimizing the deployment and operational costs.
-
-All of the ONAP components have charts that follow the pattern shown below:
-
-.. graphviz::
-
- digraph onap_component_chart {
- rankdir="LR";
- {
- node [shape=folder]
- cValues [label="values.yaml"]
- cChart [label="Chart.yaml"]
- cService [label="service.yaml"]
- cMap [label="configmap.yaml"]
- cFiles [label="config file(s)"]
- }
- {
- cCharts [label="charts"]
- cTemp [label="templates"]
- cRes [label="resources"]
-
- }
- {
- sCom [label="component",style=dashed]
- }
-
- component -> cValues
- component -> cChart
- component -> cCharts
- component -> cTemp
- component -> cRes
- cTemp -> cService
- cTemp -> cMap
- cRes -> config
- config -> cFiles
- cCharts -> sCom
- }
-
-Note that the component charts may include a hierarchy of components and in
-themselves can be quite complex.
-
-Configuration of the components varies somewhat from component to component but
-generally follows the pattern of one or more `configmap.yaml` files which can
-directly provide configuration to the containers in addition to processing
-configuration files stored in the `config` directory. It is the responsibility
-of each ONAP component team to update these configuration files when changes
-are made to the project containers that impact configuration.
-
-The following section describes how the hierarchical ONAP configuration system
-is key to management of such a large system.
-
-Configuration Management
-========================
-
-ONAP is a large system composed of many components - each of which are complex
-systems in themselves - that needs to be deployed in a number of different
-ways. For example, within a single operator's network there may be R&D
-deployments under active development, pre-production versions undergoing system
-testing and production systems that are operating live networks. Each of these
-deployments will differ in significant ways, such as the version of the
-software images deployed. In addition, there may be a number of application
-specific configuration differences, such as operating system environment
-variables. The following describes how the Helm configuration management
-system is used within the OOM project to manage both ONAP infrastructure
-configuration as well as ONAP components configuration.
-
-One of the artifacts that OOM/Kubernetes uses to deploy ONAP components is the
-deployment specification, yet another yaml file. Within these deployment specs
-are a number of parameters as shown in the following mariadb example:
-
-.. code-block:: yaml
-
- apiVersion: extensions/v1beta1
- kind: Deployment
- metadata:
- name: mariadb
- spec:
- <...>
- template:
- <...>
- spec:
- hostname: mariadb
- containers:
- - args:
- image: nexus3.onap.org:10001/mariadb:10.1.11
- name: "mariadb"
- env:
- - name: MYSQL_ROOT_PASSWORD
- value: password
- - name: MARIADB_MAJOR
- value: "10.1"
- <...>
- imagePullSecrets:
- - name: onap-docker-registry-key
-
-Note that within the deployment specification, one of the container arguments
-is the key/value pair image: nexus3.onap.org:10001/mariadb:10.1.11 which
-specifies the version of the mariadb software to deploy. Although the
-deployment specifications greatly simplify deployment, maintenance of the
-deployment specifications themselves become problematic as software versions
-change over time or as different versions are required for different
-deployments. For example, if the R&D team needs to deploy a newer version of
-mariadb than what is currently used in the production environment, they would
-need to clone the deployment specification and change this value. Fortunately,
-this problem has been solved with the templating capabilities of Helm.
-
-The following example shows how the deployment specifications are modified to
-incorporate Helm templates such that key/value pairs can be defined outside of
-the deployment specifications and passed during instantiation of the component.
-
-.. code-block:: yaml
-
- apiVersion: extensions/v1beta1
- kind: Deployment
- metadata:
- name: mariadb
- namespace: "{{ .Values.nsPrefix }}-mso"
- spec:
- <...>
- template:
- <...>
- spec:
- hostname: mariadb
- containers:
- - args:
- image: {{ .Values.image.mariadb }}
- imagePullPolicy: {{ .Values.pullPolicy }}
- name: "mariadb"
- env:
- - name: MYSQL_ROOT_PASSWORD
- value: password
- - name: MARIADB_MAJOR
- value: "10.1"
- <...>
- imagePullSecrets:
- - name: "{{ .Values.nsPrefix }}-docker-registry-key"apiVersion: extensions/v1beta1
- kind: Deployment
- metadata:
- name: mariadb
- namespace: "{{ .Values.nsPrefix }}-mso"
- spec:
- <...>
- template:
- <...>
- spec:
- hostname: mariadb
- containers:
- - args:
- image: {{ .Values.image.mariadb }}
- imagePullPolicy: {{ .Values.pullPolicy }}
- name: "mariadb"
- env:
- - name: MYSQL_ROOT_PASSWORD
- value: password
- - name: MARIADB_MAJOR
- value: "10.1"
- <...>
- imagePullSecrets:
- - name: "{{ .Values.nsPrefix }}-docker-registry-key"
-
-This version of the deployment specification has gone through the process of
-templating values that are likely to change between deployments. Note that the
-image is now specified as: image: {{ .Values.image.mariadb }} instead of a
-string used previously. During the deployment phase, Helm (actually the Helm
-sub-component Tiller) substitutes the {{ .. }} entries with a variable defined
-in a values.yaml file. The content of this file is as follows:
-
-.. code-block:: yaml
-
- nsPrefix: onap
- pullPolicy: IfNotPresent
- image:
- readiness: oomk8s/readiness-check:2.0.0
- mso: nexus3.onap.org:10001/openecomp/mso:1.0-STAGING-latest
- mariadb: nexus3.onap.org:10001/mariadb:10.1.11
-
-Within the values.yaml file there is an image section with the key/value pair
-mariadb: nexus3.onap.org:10001/mariadb:10.1.11 which is the same value used in
-the non-templated version. Once all of the substitutions are complete, the
-resulting deployment specification ready to be used by Kubernetes.
-
-Also note that in this example, the namespace key/value pair is specified in
-the values.yaml file. This key/value pair will be global across the entire
-ONAP deployment and is therefore a prime example of where configuration
-hierarchy can be very useful.
-
-When creating a deployment template consider the use of default values if
-appropriate. Helm templating has built in support for DEFAULT values, here is
-an example:
-
-.. code-block:: yaml
-
- imagePullSecrets:
- - name: "{{ .Values.nsPrefix | default "onap" }}-docker-registry-key"
-
-The pipeline operator ("|") used here hints at that power of Helm templates in
-that much like an operating system command line the pipeline operator allow
-over 60 Helm functions to be embedded directly into the template (note that the
-Helm template language is a superset of the Go template language). These
-functions include simple string operations like upper and more complex flow
-control operations like if/else.
-
-
-ONAP Application Configuration
-------------------------------
-
-Dependency Management
----------------------
-These Helm charts describe the desired state
-of an ONAP deployment and instruct the Kubernetes container manager as to how
-to maintain the deployment in this state. These dependencies dictate the order
-in-which the containers are started for the first time such that such
-dependencies are always met without arbitrary sleep times between container
-startups. For example, the SDC back-end container requires the Elastic-Search,
-Cassandra and Kibana containers within SDC to be ready and is also dependent on
-DMaaP (or the message-router) to be ready - where ready implies the built-in
-"readiness" probes succeeded - before becoming fully operational. When an
-initial deployment of ONAP is requested the current state of the system is NULL
-so ONAP is deployed by the Kubernetes manager as a set of Docker containers on
-one or more predetermined hosts. The hosts could be physical machines or
-virtual machines. When deploying on virtual machines the resulting system will
-be very similar to "Heat" based deployments, i.e. Docker containers running
-within a set of VMs, the primary difference being that the allocation of
-containers to VMs is done dynamically with OOM and statically with "Heat".
-Example SO deployment descriptor file shows SO's dependency on its mariadb
-data-base component:
-
-SO deployment specification excerpt:
-
-.. code-block:: yaml
-
- apiVersion: extensions/v1beta1
- kind: Deployment
- metadata:
- name: {{ include "common.name" . }}
- namespace: {{ include "common.namespace" . }}
- labels:
- app: {{ include "common.name" . }}
- chart: {{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }}
- release: {{ .Release.Name }}
- heritage: {{ .Release.Service }}
- spec:
- replicas: {{ .Values.replicaCount }}
- template:
- metadata:
- labels:
- app: {{ include "common.name" . }}
- release: {{ .Release.Name }}
- spec:
- initContainers:
- - command:
- - /root/ready.py
- args:
- - --container-name
- - so-mariadb
- env:
- ...
-
-Kubernetes Container Orchestration
-==================================
-The ONAP components are managed by the Kubernetes_ container management system
-which maintains the desired state of the container system as described by one
-or more deployment descriptors - similar in concept to OpenStack HEAT
-Orchestration Templates. The following sections describe the fundamental
-objects managed by Kubernetes, the network these components use to communicate
-with each other and other entities outside of ONAP and the templates that
-describe the configuration and desired state of the ONAP components.
-
-Name Spaces
------------
-Within the namespaces are Kubernetes services that provide external
-connectivity to pods that host Docker containers.
-
-ONAP Components to Kubernetes Object Relationships
---------------------------------------------------
-Kubernetes deployments consist of multiple objects:
-
-- **nodes** - a worker machine - either physical or virtual - that hosts
- multiple containers managed by Kubernetes.
-- **services** - an abstraction of a logical set of pods that provide a
- micro-service.
-- **pods** - one or more (but typically one) container(s) that provide specific
- application functionality.
-- **persistent volumes** - One or more permanent volumes need to be established
- to hold non-ephemeral configuration and state data.
-
-The relationship between these objects is shown in the following figure:
-
-.. .. uml::
-..
-.. @startuml
-.. node PH {
-.. component Service {
-.. component Pod0
-.. component Pod1
-.. }
-.. }
-..
-.. database PV
-.. @enduml
-
-.. figure:: kubernetes_objects.png
-
-OOM uses these Kubernetes objects as described in the following sections.
-
-Nodes
-~~~~~
-OOM works with both physical and virtual worker machines.
-
-* Virtual Machine Deployments - If ONAP is to be deployed onto a set of virtual
- machines, the creation of the VMs is outside of the scope of OOM and could be
- done in many ways, such as
-
- * manually, for example by a user using the OpenStack Horizon dashboard or
- AWS EC2, or
- * automatically, for example with the use of a OpenStack Heat Orchestration
- Template which builds an ONAP stack, Azure ARM template, AWS CloudFormation
- Template, or
- * orchestrated, for example with Cloudify creating the VMs from a TOSCA
- template and controlling their life cycle for the life of the ONAP
- deployment.
-
-* Physical Machine Deployments - If ONAP is to be deployed onto physical
- machines there are several options but the recommendation is to use Rancher
- along with Helm to associate hosts with a Kubernetes cluster.
-
-Pods
-~~~~
-A group of containers with shared storage and networking can be grouped
-together into a Kubernetes pod. All of the containers within a pod are
-co-located and co-scheduled so they operate as a single unit. Within ONAP
-Amsterdam release, pods are mapped one-to-one to docker containers although
-this may change in the future. As explained in the Services section below the
-use of Pods within each ONAP component is abstracted from other ONAP
-components.
-
-Services
-~~~~~~~~
-OOM uses the Kubernetes service abstraction to provide a consistent access
-point for each of the ONAP components independent of the pod or container
-architecture of that component. For example, the SDNC component may introduce
-OpenDaylight clustering as some point and change the number of pods in this
-component to three or more but this change will be isolated from the other ONAP
-components by the service abstraction. A service can include a load balancer
-on its ingress to distribute traffic between the pods and even react to dynamic
-changes in the number of pods if they are part of a replica set.
-
-Persistent Volumes
-~~~~~~~~~~~~~~~~~~
-To enable ONAP to be deployed into a wide variety of cloud infrastructures a
-flexible persistent storage architecture, built on Kubernetes persistent
-volumes, provides the ability to define the physical storage in a central
-location and have all ONAP components securely store their data.
-
-When deploying ONAP into a public cloud, available storage services such as
-`AWS Elastic Block Store`_, `Azure File`_, or `GCE Persistent Disk`_ are
-options. Alternatively, when deploying into a private cloud the storage
-architecture might consist of Fiber Channel, `Gluster FS`_, or iSCSI. Many
-other storage options existing, refer to the `Kubernetes Storage Class`_
-documentation for a full list of the options. The storage architecture may vary
-from deployment to deployment but in all cases a reliable, redundant storage
-system must be provided to ONAP with which the state information of all ONAP
-components will be securely stored. The Storage Class for a given deployment is
-a single parameter listed in the ONAP values.yaml file and therefore is easily
-customized. Operation of this storage system is outside the scope of the OOM.
-
-.. code-block:: yaml
-
- Insert values.yaml code block with storage block here
-
-Once the storage class is selected and the physical storage is provided, the
-ONAP deployment step creates a pool of persistent volumes within the given
-physical storage that is used by all of the ONAP components. ONAP components
-simply make a claim on these persistent volumes (PV), with a persistent volume
-claim (PVC), to gain access to their storage.
-
-The following figure illustrates the relationships between the persistent
-volume claims, the persistent volumes, the storage class, and the physical
-storage.
-
-.. graphviz::
-
- digraph PV {
- label = "Persistance Volume Claim to Physical Storage Mapping"
- {
- node [shape=cylinder]
- D0 [label="Drive0"]
- D1 [label="Drive1"]
- Dx [label="Drivex"]
- }
- {
- node [shape=Mrecord label="StorageClass:ceph"]
- sc
- }
- {
- node [shape=point]
- p0 p1 p2
- p3 p4 p5
- }
- subgraph clusterSDC {
- label="SDC"
- PVC0
- PVC1
- }
- subgraph clusterSDNC {
- label="SDNC"
- PVC2
- }
- subgraph clusterSO {
- label="SO"
- PVCn
- }
- PV0 -> sc
- PV1 -> sc
- PV2 -> sc
- PVn -> sc
-
- sc -> {D0 D1 Dx}
- PVC0 -> PV0
- PVC1 -> PV1
- PVC2 -> PV2
- PVCn -> PVn
-
- # force all of these nodes to the same line in the given order
- subgraph {
- rank = same; PV0;PV1;PV2;PVn;p0;p1;p2
- PV0->PV1->PV2->p0->p1->p2->PVn [style=invis]
- }
-
- subgraph {
- rank = same; D0;D1;Dx;p3;p4;p5
- D0->D1->p3->p4->p5->Dx [style=invis]
- }
-
- }
-
-In-order for an ONAP component to use a persistent volume it must make a claim
-against a specific persistent volume defined in the ONAP common charts. Note
-that there is a one-to-one relationship between a PVC and PV. The following is
-an excerpt from a component chart that defines a PVC:
-
-.. code-block:: yaml
-
- Insert PVC example here
-
-OOM Networking with Kubernetes
-------------------------------
-
-- DNS
-- Ports - Flattening the containers also expose port conflicts between the
- containers which need to be resolved.
-
-Node Ports
-~~~~~~~~~~
-
-Pod Placement Rules
--------------------
-OOM will use the rich set of Kubernetes node and pod affinity /
-anti-affinity rules to minimize the chance of a single failure resulting in a
-loss of ONAP service. Node affinity / anti-affinity is used to guide the
-Kubernetes orchestrator in the placement of pods on nodes (physical or virtual
-machines). For example:
-
-- if a container used Intel DPDK technology the pod may state that it as
- affinity to an Intel processor based node, or
-- geographical based node labels (such as the Kubernetes standard zone or
- region labels) may be used to ensure placement of a DCAE complex close to the
- VNFs generating high volumes of traffic thus minimizing networking cost.
- Specifically, if nodes were pre-assigned labels East and West, the pod
- deployment spec to distribute pods to these nodes would be:
-
-.. code-block:: yaml
-
- nodeSelector:
- failure-domain.beta.Kubernetes.io/region: {{ .Values.location }}
-
-- "location: West" is specified in the `values.yaml` file used to deploy
- one DCAE cluster and "location: East" is specified in a second `values.yaml`
- file (see OOM Configuration Management for more information about
- configuration files like the `values.yaml` file).
-
-Node affinity can also be used to achieve geographic redundancy if pods are
-assigned to multiple failure domains. For more information refer to `Assigning
-Pods to Nodes`_.
-
-.. note::
- One could use Pod to Node assignment to totally constrain Kubernetes when
- doing initial container assignment to replicate the Amsterdam release
- OpenStack Heat based deployment. Should one wish to do this, each VM would
- need a unique node name which would be used to specify a node constaint
- for every component. These assignment could be specified in an environment
- specific values.yaml file. Constraining Kubernetes in this way is not
- recommended.
-
-Kubernetes has a comprehensive system called Taints and Tolerations that can be
-used to force the container orchestrator to repel pods from nodes based on
-static events (an administrator assigning a taint to a node) or dynamic events
-(such as a node becoming unreachable or running out of disk space). There are
-no plans to use taints or tolerations in the ONAP Beijing release. Pod
-affinity / anti-affinity is the concept of creating a spacial relationship
-between pods when the Kubernetes orchestrator does assignment (both initially
-an in operation) to nodes as explained in Inter-pod affinity and anti-affinity.
-For example, one might choose to co-located all of the ONAP SDC containers on a
-single node as they are not critical runtime components and co-location
-minimizes overhead. On the other hand, one might choose to ensure that all of
-the containers in an ODL cluster (SDNC and APPC) are placed on separate nodes
-such that a node failure has minimal impact to the operation of the cluster.
-An example of how pod affinity / anti-affinity is shown below:
-
-Pod Affinity / Anti-Affinity
-
-.. code-block:: yaml
-
- apiVersion: v1
- kind: Pod
- metadata:
- name: with-pod-affinity
- spec:
- affinity:
- podAffinity:
- requiredDuringSchedulingIgnoredDuringExecution:
- - labelSelector:
- matchExpressions:
- - key: security
- operator: In
- values:
- - S1
- topologyKey: failure-domain.beta.Kubernetes.io/zone
- podAntiAffinity:
- preferredDuringSchedulingIgnoredDuringExecution:
- - weight: 100
- podAffinityTerm:
- labelSelector:
- matchExpressions:
- - key: security
- operator: In
- values:
- - S2
- topologyKey: Kubernetes.io/hostname
- containers:
- - name: with-pod-affinity
- image: gcr.io/google_containers/pause:2.0
-
-This example contains both podAffinity and podAntiAffinity rules, the first
-rule is is a must (requiredDuringSchedulingIgnoredDuringExecution) while the
-second will be met pending other considerations
-(preferredDuringSchedulingIgnoredDuringExecution). Preemption Another feature
-that may assist in achieving a repeatable deployment in the presence of faults
-that may have reduced the capacity of the cloud is assigning priority to the
-containers such that mission critical components have the ability to evict less
-critical components. Kubernetes provides this capability with Pod Priority and
-Preemption. Prior to having more advanced production grade features available,
-the ability to at least be able to re-deploy ONAP (or a subset of) reliably
-provides a level of confidence that should an outage occur the system can be
-brought back on-line predictably.
-
-Health Checks
--------------
-
-Monitoring of ONAP components is configured in the agents within JSON files and
-stored in gerrit under the consul-agent-config, here is an example from the AAI
-model loader (aai-model-loader-health.json):
-
-.. code-block:: json
-
- {
- "service": {
- "name": "A&AI Model Loader",
- "checks": [
- {
- "id": "model-loader-process",
- "name": "Model Loader Presence",
- "script": "/consul/config/scripts/model-loader-script.sh",
- "interval": "15s",
- "timeout": "1s"
- }
- ]
- }
- }
-
-Liveness Probes
----------------
-
-These liveness probes can simply check that a port is available, that a
-built-in health check is reporting good health, or that the Consul health check
-is positive. For example, to monitor the SDNC component has following liveness
-probe can be found in the SDNC DB deployment specification:
-
-.. code-block:: yaml
-
- sdnc db liveness probe
-
- livenessProbe:
- exec:
- command: ["mysqladmin", "ping"]
- initialDelaySeconds: 30 periodSeconds: 10
- timeoutSeconds: 5
-
-The 'initialDelaySeconds' control the period of time between the readiness
-probe succeeding and the liveness probe starting. 'periodSeconds' and
-'timeoutSeconds' control the actual operation of the probe. Note that
-containers are inherently ephemeral so the healing action destroys failed
-containers and any state information within it. To avoid a loss of state, a
-persistent volume should be used to store all data that needs to be persisted
-over the re-creation of a container. Persistent volumes have been created for
-the database components of each of the projects and the same technique can be
-used for all persistent state information.
-
-
-
-Environment Files
-~~~~~~~~~~~~~~~~~
-
-MSB Integration
-===============
-
-The \ `Microservices Bus
-Project <https://wiki.onap.org/pages/viewpage.action?pageId=3246982>`__ provides
-facilities to integrate micro-services into ONAP and therefore needs to
-integrate into OOM - primarily through Consul which is the backend of
-MSB service discovery. The following is a brief description of how this
-integration will be done:
-
-A registrator to push the service endpoint info to MSB service
-discovery.
-
-- The needed service endpoint info is put into the kubernetes yaml file
- as annotation, including service name, Protocol,version, visual
- range,LB method, IP, Port,etc.
-
-- OOM deploy/start/restart/scale in/scale out/upgrade ONAP components
-
-- Registrator watch the kubernetes event
-
-- When an ONAP component instance has been started/destroyed by OOM,
- Registrator get the notification from kubernetes
-
-- Registrator parse the service endpoint info from annotation and
- register/update/unregister it to MSB service discovery
-
-- MSB API Gateway uses the service endpoint info for service routing
- and load balancing.
-
-Details of the registration service API can be found at \ `Microservice
-Bus API
-Documentation <https://wiki.onap.org/display/DW/Microservice+Bus+API+Documentation>`__.
-
-ONAP Component Registration to MSB
-----------------------------------
-The charts of all ONAP components intending to register against MSB must have
-an annotation in their service(s) template. A `sdc` example follows:
-
-.. code-block:: yaml
-
- apiVersion: v1
- kind: Service
- metadata:
- labels:
- app: sdc-be
- name: sdc-be
- namespace: "{{ .Values.nsPrefix }}"
- annotations:
- msb.onap.org/service-info: '[
- {
- "serviceName": "sdc",
- "version": "v1",
- "url": "/sdc/v1",
- "protocol": "REST",
- "port": "8080",
- "visualRange":"1"
- },
- {
- "serviceName": "sdc-deprecated",
- "version": "v1",
- "url": "/sdc/v1",
- "protocol": "REST",
- "port": "8080",
- "visualRange":"1",
- "path":"/sdc/v1"
- }
- ]'
- ...
-
-
-MSB Integration with OOM
-------------------------
-A preliminary view of the OOM-MSB integration is as follows:
-
-.. figure:: MSB-OOM-Diagram.png
-
-A message sequence chart of the registration process:
-
-.. uml::
-
- participant "OOM" as oom
- participant "ONAP Component" as onap
- participant "Service Discovery" as sd
- participant "External API Gateway" as eagw
- participant "Router (Internal API Gateway)" as iagw
-
- box "MSB" #LightBlue
- participant sd
- participant eagw
- participant iagw
- end box
-
- == Deploy Servcie ==
-
- oom -> onap: Deploy
- oom -> sd: Register service endpoints
- sd -> eagw: Services exposed to external system
- sd -> iagw: Services for internal use
-
- == Component Life-cycle Management ==
-
- oom -> onap: Start/Stop/Scale/Migrate/Upgrade
- oom -> sd: Update service info
- sd -> eagw: Update service info
- sd -> iagw: Update service info
-
- == Service Health Check ==
-
- sd -> onap: Check the health of service
- sd -> eagw: Update service status
- sd -> iagw: Update service status
-
-
-MSB Deployment Instructions
----------------------------
-MSB is helm installable ONAP component which is often automatically deployed.
-To install it individually enter::
-
- > helm install <repo-name>/msb
-
-.. note::
- TBD: Vaidate if the following procedure is still required.
-
-Please note that Kubernetes authentication token must be set at
-*kubernetes/kube2msb/values.yaml* so the kube2msb registrator can get the
-access to watch the kubernetes events and get service annotation by
-Kubernetes APIs. The token can be found in the kubectl configuration file
-*~/.kube/config*
-
-More details can be found here `MSB installation <http://onap.readthedocs.io/en/latest/submodules/msb/apigateway.git/docs/platform/installation.html>`__.
-
-.. MISC
-.. ====
-.. Note that although OOM uses Kubernetes facilities to minimize the effort
-.. required of the ONAP component owners to implement a successful rolling
-.. upgrade strategy there are other considerations that must be taken into
-.. consideration.
-.. For example, external APIs - both internal and external to ONAP - should be
-.. designed to gracefully accept transactions from a peer at a different
-.. software version to avoid deadlock situations. Embedded version codes in
-.. messages may facilitate such capabilities.
-..
-.. Within each of the projects a new configuration repository contains all of
-.. the project specific configuration artifacts. As changes are made within
-.. the project, it's the responsibility of the project team to make appropriate
-.. changes to the configuration data.