Welcome to O-RAN SC smo/ves Documentation
smo/ves Overview
This project supports the O1/VES interface in SMO. It consists of several components
A VES collector that is a collector of events posted by different Network Functions (NF) of the RAN
Kafka Bus which acts as the message bus in SMO
A connector to connect the Kafka Bus to InfluxdB to persist all the data posted on the Kafka Bus
A connector that provides an adapter for applications that want to read the Kafka events as DMaaP events.
Grafana dashbaord which pull records from InfluxDB and display movements of matrix.
Release-Notes
This document provides the release notes for G-RELEASE of semo-ves.
Version history
Date |
Ver. |
Author |
Comment |
2022-12-15 |
6.0.3 |
G-Release |
|
2022-07-15 |
5.0.1 |
F-Release |
|
Summary
The O1/VES interface received a number of features and capabilities in this edition. Adding functional test cases, integrating with the Jenkins server, saving container images in the Nexus repository, enhancing the quality of the code, implementing CLM and Sonar Jobs, etc.
Release Data
Project |
SMO VES |
Repo |
Repo: smo/ves |
Release designation |
g-release |
Release date |
2022-12-15 |
Purpose of the delivery |
Feature Additions
JIRA TICKETS:
JIRA REFERENCE |
SLOGAN |
SMO-76 |
Implement Standard Defined Validator |
SMO-86 |
Modify docker images release plan |
SMO-89 |
Introduce requirements.txt file in project |
SMO-90 |
Add suffix “ves” in job name. |
SMO-94 |
Fix Major bugs, Vulnerabilities, Security issues as per Sonar job report |
SMO-96 |
Introduce more test cases to improve code coverage |
SMO-99 |
Write test cases for Standard Defined Validator |
SMO-113 |
Add dependencies in tox file for CLM job |
Bug Corrections
JIRA TICKETS:
JIRA REFERENCE |
SLOGAN |
SMO-106 |
Fix failure of test case |
SMO-111 |
Unbale to run tox -e coverage |
SMO-100 |
Sonar job is broken |
Deliverables
Software Deliverables
Complied container images are available at Nexus repository https://nexus3.o-ran-sc.org/. Search with keyword ‘smo’.
Documentation Deliverables
Documentation is available at https://docs.o-ran-sc.org/projects/o-ran-sc-smo-ves/en/latest/release-notes.html
Known Limitations, Issues and Workarounds
System Limitations
Not identified
Known Issues
LFN TICKETS:
LFN REFERENCE |
SLOGAN |
IT-24601 |
Percentage of code coverage is incorrect |
IT-24305 |
CLM job report is empty |
Workarounds
Working with the support team of the Linux Foundation to fix above mentioned tickets.
Installation Guide
Abstract
This document describes how to install smo-ves, it’s dependencies and required system resources.
Version history
Date |
Ver. |
Author |
Comment |
2022-Aug-10 |
0.1.0 |
Santanu De |
First draft |
Introduction
This document describes the supported software and hardware configurations for the reference component as well as providing guidelines on how to install and configure such reference system.
The audience of this document is assumed to have good knowledge in RAN network, Ubuntu 20.04 LTS Desktop Edition system and Docker Compose.
Preface
Before starting the installation of smo-ves, make sure docker-compose, git are installed on the system
Hardware Requirements
Following minimum hardware requirements must be met for installation of smo-ves:
HW Aspect |
Requirement |
# of servers |
1 |
CPU |
4 core |
RAM |
8 GB minimum, 16 GB recommended |
Disk |
100 GB minimum, 500 GB recommended |
NICs |
1 |
Software Installation and Deployment
This section describes the installation of the smo-ves installation on the reference hardware.
Build
To build the solution, you need to do the following in the current folder:
% docker-compose build
Run
To run the solution, you need to invoke the following command:
% docker-compose up -d
To stop the solution the following command should be invoked:
% docker-compose down
Following steps are required to install a certificate.
Self-Signed Certificates
Following steps are required for self-signed certificate. 1. Create ves-certificate directory on the host system using command “mkdir ~/ves-certificate”. 2. Go to ves-certificate directory and use below commands to create self-signed certificate files:
openssl genrsa -out vescertificate.key 2048
openssl req -new -key vescertificate.key -out vescertificate.csr
openssl x509 -req -days 365 -in vescertificate.csr -signkey vescertificate.key -out vescertificate.crt
Third Party Certificates
Third party certificates can be installed by overwriting the file vescertificate.csr, vescertificate.key, and vescertficate.crt in ~/ves-certificate directory of the host system.
Following steps are required to add an entry in the host file
Add following entry in host file on the computer from which user want to access Grafana dashboard. <IP Address of VM/Machine on which docker containers are running> smo-influxdb
For Example- Docker container running on the guest VM or different/remote machine having IP Address 192.168.56.110 then host file entry is as follows:
192.168.56.110 smo-influxdb
User Guide
This is the user guide for OSC smo/ves
Check Containers
Run the below command to status of the containers. All contaiers should be is “Up” state except “smo-post-config”:
% docker-compose ps
Check SMO-Collector API
Launch a browser and navigate to [IP Address of VM/Machine on which docker containers are running]:9999/v7/events/. SMO-Collector runs on https
Check DMAAP API
Launch a browser and navigate to [IP Address of VM/Machine on which docker containers are running]:5000/dmaapapi/v1/topics
Check Grafana Dashborad
Open [IP Address of VM/Machine on which docker containers are running]:3000/ in a browser. admin/admin is default username/password. No need to reset password. After login, visit Dashborads > Manage section. “Events Demo” Dashbaord is ready to use.