Welcome to O-RAN SC smo/ves Documentation

smo/ves Overview

This project supports the O1/VES interface in SMO. It consists of several components

  • A VES collector that is a collector of events posted by different Network Functions (NF) of the RAN

  • Kafka Bus which acts as the message bus in SMO

  • A connector to connect the Kafka Bus to InfluxdB to persist all the data posted on the Kafka Bus

  • A connector that provides an adapter for applications that want to read the Kafka events as DMaaP events.

  • Grafana dashbaord which pull records from InfluxDB and display movements of matrix.

Release-Notes

This document provides the release notes for F-RELEASE of semo-ves.

Version history

Date

Ver.

Author

Comment

2022-07-15

5.0.1

First version

Summary

The O1/VES interface received a number of features and capabilities in this edition. Adding functional test cases, integrating with the Jenkins server, saving container images in the Nexus repository, enhancing the quality of the code, implementing CLM and Sonar Jobs, etc.

Release Data

Project

SMO VES

Repo

Repo: smo/ves

Release designation

f-release

Release date

2022-07-15

Purpose of the delivery

Feature Additions

JIRA BACK-LOG:

JIRA REFERENCE

SLOGAN

SMO-57

Add Jenkins jobs for the smo repo

SMO-55

Add dmaap and influx-db adapter plugins to the release process

SMO-53

Remove redundant code in smo collector

SMO-68

Create CLM job for smo-ves project

SMO-58

Add unit test cases in smo/ves

SMO-64

Add smo-post-config image to the release process

Bug Corrections

JIRA TICKETS:

JIRA REFERENCE

SLOGAN

SMO-63

Modify configuration of Influxdb container

Deliverables

Software Deliverables

Complied container images are available at Nexus repository https://nexus3.o-ran-sc.org/. Search with keyword ‘smo’.

Documentation Deliverables

Documentation is available at https://docs.o-ran-sc.org/projects/o-ran-sc-smo-ves/en/latest/release-notes.html

Known Limitations, Issues and Workarounds

System Limitations

Not identified

Known Issues

JIRA TICKETS:

JIRA REFERENCE

SLOGAN

SMO-74

Failure of Sonar job

Workarounds

Working with the support team of the Linux Foundation to fix the problem.

Installation Guide

Abstract

This document describes how to install smo-ves, it’s dependencies and required system resources.

Version history

Date

Ver.

Author

Comment

2022-Aug-10

0.1.0

Santanu De

First draft

Introduction

This document describes the supported software and hardware configurations for the reference component as well as providing guidelines on how to install and configure such reference system.

The audience of this document is assumed to have good knowledge in RAN network, Ubuntu 20.04 LTS Desktop Edition system and Docker Compose.

Preface

Before starting the installation of smo-ves, make sure docker-compose, git are installed on the system

Hardware Requirements

Following minimum hardware requirements must be met for installation of smo-ves:

HW Aspect

Requirement

# of servers

1

CPU

4 core

RAM

8 GB minimum, 16 GB recommended

Disk

100 GB minimum, 500 GB recommended

NICs

1

Software Installation and Deployment

This section describes the installation of the smo-ves installation on the reference hardware.

Build

To build the solution, you need to do the following in the current folder:

% docker-compose build

Run

To run the solution, you need to invoke the following command:

% docker-compose up -d

To stop the solution the following command should be invoked:

% docker-compose down

Following steps are required to install a certificate.

Self-Signed Certificates

Following steps are required for self-signed certificate. 1. Create ves-certificate directory on the host system using command “mkdir ~/ves-certificate”. 2. Go to ves-certificate directory and use below commands to create self-signed certificate files:

openssl genrsa -out vescertificate.key 2048
openssl req -new -key vescertificate.key -out vescertificate.csr
openssl x509 -req -days 365 -in vescertificate.csr -signkey vescertificate.key -out vescertificate.crt
Third Party Certificates

Third party certificates can be installed by overwriting the file vescertificate.csr, vescertificate.key, and vescertficate.crt in ~/ves-certificate directory of the host system.

Following steps are required to add an entry in the host file

Add following entry in host file on the computer from which user want to access Grafana dashboard. <IP Address of VM/Machine on which docker containers are running> smo-influxdb

For Example- Docker container running on the guest VM or different/remote machine having IP Address 192.168.56.110 then host file entry is as follows:

192.168.56.110 smo-influxdb

User Guide

This is the user guide for OSC smo/ves

Check Containers

Run the below command to status of the containers. All contaiers should be is “Up” state except “smo-post-config”:

% docker-compose ps

Check SMO-Collector API

Launch a browser and navigate to [IP Address of VM/Machine on which docker containers are running]:9999/v7/events/. SMO-Collector runs on https

Check DMAAP API

Launch a browser and navigate to [IP Address of VM/Machine on which docker containers are running]:5000/dmaapapi/v1/topics

Check Grafana Dashborad

Open [IP Address of VM/Machine on which docker containers are running]:3000/ in a browser. admin/admin is default username/password. No need to reset password. After login, visit Dashborads > Manage section. “Events Demo” Dashbaord is ready to use.