Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

The following assumptions are made before following the steps of this wiki:

  • All components are deployed in an OpenStack environment.
  • ONAP (Beijing release) has already been deployed on a Kubernetes cluster with the required components listed below.
  • You can successfully access the Kubernetes cluster where ONAP is deployed at using the kubectl CLI.
  • While Rancher is the Kubernetes-based container management platform of choice for testing the steps below, it is not required and other Kubernetes orchestrators can be used (i.e. Cloudify)

...


Prepare the HEAT Packages

...

Once the values that need to be filled out above, create two zip files containing the two HEAT packages we need to upload to the Portal SDC Widget in later steps.


Accessing the Portal GUI on your local browser (Kubernetes-based approach)


In order to setup your local machine to access the Portal Web GUI and continue with the steps of this documentation, please follow the instructions in Accessing ONAP Portal using OOM and a Kubernetes Cluster.

You should now be able to successfully view the Portal GUI Login page at http:

...

languagebash
themeEclipse
linenumberstrue

...

//portal.api.simpledemo.onap.org:8989/ONAPPORTAL/login.htm.

NOTE: It is recommended to access the Portal GUI through your browser's cookie-disabled window. In chrome, go on Incognito window with Ctrl + Shift + N. In Firefox, go on a Private window with Ctrl + Shift + P.


ONAP Portal Users and their Roles

As part of this demo, we will have to login to a number of different Portal user accounts in order to execute the appropriate flow to ultimately deploy the vFirewall VNFs into your OpenStack environment (NOTE: default password for all user accounts below is demo123456!)


Username

Role

Description
cs0008DESIGNERTakes care of creating all the SDC resources, uploading the HEAT template, distributing the VNFs, etc.)


demoSUPERUSER

This is the Administrator account that has access to actions that require admin rights. This is the user that will trigger the action to ultimately deploy the VF Module (actual VNF HEAT Template execution).

gv0001GOVERNOR
jm0007TESTERTakes care of running the tests for the VNF, and approving that tests were successful.
op0001OPERATOR



Creating the Vendor License Model


In this part, we will create a Vendor License Model that will be tied to the Virtual Service Product (VSP) representing the vFirewall VNF package. 

In a production VNF, every VNF vendor has a license mechanism that authorizes the use of the VNF in an environment. This includes license details and agreements that are between between this VNF vendor and the Service Provider that will ultimately deploy the VNF.

In this demo, we will create a VLM since it is a requirement to successfully onboard the VSP in your environment. The following are some details around the VLM, which will be executed in one way or another in later steps:

  • The vendor details have to always be provided as part of the VLM definitions, and such vendor only needs to be specified once.

  • In order to have a valid and functional VSP, a VLM needs to be mapped to it.

  • A single VLM can have multiple license agreements mapped to it.

  • VLM components that will need to be created are:
    • License Agreements:
    • Entitlement Pools:
    • Feature Groups:
    • License Key Groups: