All members are encouraged to contribute directly into this working draft. See also the OVP 2.0 Technical Ideas page
Table of Contents | ||
---|---|---|
|
Charter
The LFN OPNFV Verification Program Phase 2 (OVP 2.0) is an open source, community-led compliance and verification program to promote, enable, and evolve a thriving ecosystem of cloud-native telecoms where Cloud Native Network Functions (CNFs) from different vendors can inter-operate and run on the same immutable infrastructure. It includes CNF compliance and verification testing based on requirements and best practices put forth by both the CNCF and CNTT. These requirements feed tool-sets and testing scripts developed within OPNFV, ONAP and CNCF communities.
E2E CNF Conformance Cycle
(Below is from Jim's mail to OVP members (3/4/2020). Will be discussed on next meeting (3/9/2020).
In the below diagram the “?” indicate processes that need definition and refinement for the differing execution environment of OVP Phase 2.
Test Categories
- Cloud Infrastructure Validation Testing
- Cloud Native ready post-install
- Security patches
- Functional
- Manifest validation
- Performance
- CNF Compliance Testing
- Packaging: (Helm v3.0, TOSCA, HEAT)
- Cloud Native.
- On-Boarding and Lifecycle Management.
- CNF Validation Testing:
- API/Interfaces Testing
- Major subsytem connectivity
- Functional Testing
- Performance Testing
- Interoperability (?)
Evolving architecture from VNFs to CNFs
(Olivier - Add short description and I would like to gain clarity around CNF orchestration. Specifically, we should clarify that CNFs are to be orchestrated by Kubernetes and that MANO is utilized specifically for VNFs. If this is not the case, document why? Add clarity to the CNF Architecutre below.
Compliance & Verification Program
OVP2.0 E2E Compliance and Verification Program adds additional collaboration with the CNCF in the testing and verification of Cloud Native Network Functions.
Catherine - comments and questions regarding the E2E Compliance & Verification Slide (below):
#1 CNF Conformance has been removed from the CNF boxes in alignment with the CNF Conformance definition - https://github.com/cncf/cnf-conformance
#2 VIM (Openstack) and VIM (K8S) are part of CNTT NFVI boxes in alignment with https://github.com/cntt-n/CNTT/tree/master/doc/ref_arch
#3 NFVi, PFNi → NFVI, PFNI – spelling aligned with ETSI
#4 Remove "for CNFs and" from "Hybrid (PNF/VNF & CNF) Compliance and Verification with OVP Ph2 in partnership with CNCF Conformance tests for CNFs and for K8s in CNCF'
Additional changes to be made:
#5 Picture under "Today" should include PNF, not only VNF
Questions:
#6 Reduce Testing Intervals by 50% - How "50%" have been determined?
#7 MANO++ - is it to confirm that ONAP is Mano++ meaning that ONAP is providing additional capabilities than Mano functions i.e. Control Loops, etc.?
Verification and Certification Process
OPV 2.0 will provide an open source test suite which enables both open and closed source CNFs to demonstrate conformance and implementation of cloud-native practices. Compliance to the verification process will result in a LFN Cloud Native CNF badge(s). The LFN CNF badges should provide value for both operators and commercial vendors.
(We should outline the types of testing as well as clarify where these tests belong. Workload testing, Platform testing, etc.)
Cloud Native Network Function (CNF) Best Practices Criteria
Propose that the below should be aligned, agreed, and later decomposed into testable items. We should sort with mandatory first and optional (but still verifiable) criteria at the end. Organize into levels of Gold, Silver, Bronze if this makes sense. What will the value of a Bronze be for operators and vendors?
...
CNF Best Practice Criteria
...
1
...
CNFs are decomposed into loosely coupled collection of services (e.g. use micro-services design).
...
2
...
Micro-services should, where possible, be independent of the host operating system.
...
3
...
Micro-services should utilize well defined declarative APIs
...
4
...
Micro-services should be designed with a clean separation between stateful and stateless services (have separation of state storage and business logic)
...
5
...
Clear separation should exist between micro-services (e.g. use of containers)
...
6
...
Micro-services should provide a mechanism to verify container content. Containers should not require root level permissions. It should be possible to secure API access to a micro-service using common methods.
...
7
...
Micro-services should be resilient (self-healing and distributed)
- A strategy for self-healing accompanies the micro-service
- Is compatible with declarative configuration and container orchestration
...
8
...
Micro-services should be elastic (vertical and horizontal scaling in response to load)
- A strategy for auto-scaling accompanies the micro-service
- Is compatible with a declarative configuration and container orchestration
...
9
...
Micro-services should be dynamic - where possible, have a small footprint and fast startup time enabling efficient use of resources and rapid scaling.
...
10
...
Micro-services may utilize a service mesh for service-to-service communication over a network
...
11
...
Micro-service/Container life-cycle is managed by an orchestrator (e.g. K8s)
...
12
...
Micro-services utilize immutable infrastructure:
...
A
...
- Infra is easily produced and repeatable (automated)
...
B
...
- Infra is consistent (infrastructure elements are identical each time they are implemented)
...
C
...
- Infra is disposable (create, destroy, replace, resize, etc.)
...
D
...
- Configuration of infra is protected from changes after deployment
...
E
...
- Deployment process of infra is versioned, automated, and all dependencies packaged together with the application during build phase and then used in deployment
...
F
...
- Observable (infrastructure elements externalize their internal states to allow metrics, tracing, and logging)
...
Vision
An end to end set of compliance/conformance tests and testing toolchain for independently verified Cloud Native Functions for use in Telco environments.
Who are participating?
Linux Foundation Networking
- Open NFVI project (OPNFV)
- Open Networking Automation Project (ONAP)
- Compliance and Verification Committee (CVC)
Common NFVI Telco Taskforce (CNTT)
Cloud Native Computing Foundation (CNCF)
- Telecom User Group (TUG)
- CNF Conformance
5G Cloud Native Network Demo (Brandon Wick)
How to engage
- Join the mailing list: https://lists.opnfv.org/g/OVP-p2
- Subscribe to the calendar for the meetings: https://lists.opnfv.org/g/OVP-p2/ics/7337234/1823902251/feed.ics
- Engage in the discussions at the weekly meetings
- Share your ideas on these wiki pages and comment sections at the bottom of every page
What is the Minimum Viable Program
The end state vision is spelled out above and since it is likely a multi-year endeavor, what can we do this year to chart the direction and set in motion the program that achieves the vision?
First, the envisioned process is diagrammed below:
E2E CNF Conformance Cycle
In the below diagram the “?” indicate processes that need definition and refinement for the differing execution environment of OVP Phase 2.
Categories of Conformance:
- A. Cloud Platform Conformance
- A1. Functional (i.e. CNTT RA-2 Compliance)
- B. CNF Conformance
- B1. Cloud Native (i.e. CNF Conformance)
- B2. Functional (i.e. CNTT RA-2 Compatibility)
- B3. ONAP
- B4. Performance
- C. Cloud Platform Benchmarking
MVP proposal
Not every thing can be tackled in the MVP, here are two elements that can be tackled for MVP.
- A1: Cloud Platform Conformance (may be partial)
- B1 & B2: CNF Compliance
What needs to happen/Decided on:
- Decide on Tooling:
- Cloud installation tools into a given lab.
- Basic Testing Tools.
- what open source project is responsible of this.
- Decide on Lab:
- Community development resource access
- Platform details - specific HW details, login info,etc.
- what open source project is responsible of this.
- Decide on Badging Process:
- Test results review process
- Portal and badging process
- Decide on OpenSource Testing Projects
- What project will deliver what test category (A, B, and C)
- A: ?
- B: ?
- C: ?
- What project will deliver what test category (A, B, and C)
Workstreams Proposal (see OVP 2.0 Workstreams)
- WS01: Governance/Structure/Mktg, Badging Process and Framework[Primary Owner: CVC] Rabi Abdel Lincoln Lavoie Heather Kirksey
- WS02: Definition Requirements Activities (CNTT/ONAP/SDOs) [Primary Owner: CNTT] bill.mulligan Trevor Lovett Ryan Hallahan Olivier Smith Fernando Oliveira
- WS03: Lab and tooling [Primary Owner ONAP+OPNFV+CNCF] Frederick F. Kautz IV Kanag Trevor Cooper Ryan Hallahan
- WS04: A. Cloud Platform Conformance [Primary Owner XX] Taylor Carpenter (cloud native)
- WS05: B3. CNF Compliance - ONAP Kanag cl664y@att.com Amar Kapadia Seshu Kumar Mudiganti Ranny Haiby Srinivasa AddepalliFernando Oliveira Byung-Woo Jun
- WS06: B1/B2. CNF Compliance - Cloud Native & Functional [Primary Owner CNCF Taylor Carpenter ] Olivier Smith Trevor Lovett
WS07: ONAP POC and existing development work [Primary Owner ONAP ]Merged with WS05- WS08: B4/C - Performance: Trevor Cooper
MVP Roadmap - NEEDS COMMUNITY REVIEW/UPDATE
- Define MVP - by April 1
- Validate approach with partners (CNTT, CNCF, LFN projects) - during ONES technicall event (April 20)weekly OVP p2 meetings <ADD LINK>
- Implement “HelloWorld” sampleCNF test - Hackfest at June Developer and Testing Forum
- Implement MVP - by Q1/Q2 2021
MVP:
- Tooling:Cloud installation tools.
- Testing Tools.
- Cloud Infrastructure Validation Testing
- Cloud Native ready post-install
- Security patches
- Functional
- Manifest validation
- Performance
- CNF Compliance Testing
- Packaging: (Helm v3.0, TOSCA, HEAT)
- Cloud Native.
- On-Boarding and Lifecycle Management.
- CNF Validation Testing:
- API/Interfaces Testing
- Major subsytem connectivity
- Functional Testing
- Performance Testing
- Interoperability (?)
- Badging:
- Portal and process
...
Immediate tasks and AIs:
- Identify cloud infrastructure installation tools.
- Identify Labs for testing .and human resources who will manage the labs (in addition to the testers)
- Identify projects to develop test scripts and tools to perform Cloud infrastructure functional testing and agree on scope.
- Agree on scope of CNF Onboarding testing.
- Identify projects to develop test scripts and tools to perform CNF testing and agree on scope.
- Agree on CVC portal.
OLD: Workstreams Proposal
Development/Lab environment [Primary Owner OPNFV+CNTT] - What are the lab resources for hosting configurations for developing the NVFI and running on-going CI/CD verification tests? How can a “Lab as a Service” (LaaS) be instantiated for CNF/NFVI testing, development, and validation efforts? Does the CNCF TestBed meet the needs?
Test Tooling/Test Suite Development Based on Above Categories [Primary Owner: OPNFV]: Understand dependencies and what can be parallel processed. Also, what is the overall program test framework (e.g., Dovetail or something similar) that can plug in tests from projects and communities….
- On-boarding/Lifecycle Management testing - What are the preferred tools/methodologies for repeatably creating an NFVI environment supporting containers? Can CNFs be deployed and respond to basic lifecycle events?
- Platform test - What is the source for the tests and toolchains for developing and verifying the NFVI platform for container based CNFs? Are there existing CNCF infrastructure tests/standards that should be co-opted? What level of micro-services should be integrated into the standard platform? How do we validate each of the micro-services against a specific version of the platform?
- CNF test - What is the source for the tests and toolchains for developing and verifying the CNFs as the SUT atop a verified NFVI? How does the CNCF test bed integrate into the OVPp2 workflow and test process? With many micro-services as “helper functions”, how do we validate each of the micro-services against a specific version of the CNF?
- Performance testing - Both the infrastructure and CNF performance characterization would be useful - this is very difficult to cooperatively define/execute (DEFER)
CVC portal [Primary Owner: CVC] - Define the UI for consumers of the CVC and on-ramp for producers of NFVIs and CNFs to publish their successful validation process results? How to the CNF compliance tests (CNCF) figure into the telco focused OVPp2 process?
Governance/Structure/Mktg Framework [Primary Owner: CVC] - Includes 3rd party labs, white papers, slide decks. With input from MAC