Working draft: to be finalized when use cases have been finalized.
The section provides information for hardware and network configuration. ONAP Open Labs are collections of dedicated hardware, generally partitioned into pods with servers. Pods can be used for different testings like development, CI/CD, ONAP platform testing, or E2E testing. The minimal requirements for each pod are defined in the following.
Hardware Summery
A lab compliant pod provides:
- 2-8 controller / compute nodes depends on the use case (please refer to Server Pod session)
- A configured network topology allowing for IPMI, Admin(PXE), Public, Private, and Storage Networks
- Remote access through VPN
- Security through a firewall
Server Pod
In the following table, we define 3 types of pod based on the resource usage assumption. Please note in lab and real deployment scenarios, resource can be over subscribed depending on workload. Also we assume that ONAP platform will be deployed in a separate pod from VNFs.
Type of Pod | Use Case | Compute Node | Total Storage for Compute Nodes | Number of Control Nodes | ||
Total Memory(GB) for Compute Nodes | Total VCPU for Compute Nodes | Number of Compute Nodes | ||||
Large | VoLTE | 900GB | 180 | >=2 | 4T | 3 |
Medium | ONAP Platform or vCPE | 200GB | 100 | >=2 | 2T | 3 |
Small | Development or vFW/vDNS demo apps | 40GB | 24 | >=2 | 1T | 1 |
Networking
Network Hardware
- 48 Port TOR Switch
- NICs - Combination of 1GE and 10GE based on network topology options
- Connectivity for each data/control network is through a separate NIC port or a shared port. Separate port simplifies switch management however requires more NICs on the server and also more switch ports
- BMC (Baseboard Management Controller) for lights-out management network using IPMI (Intelligent Platform Management Interface)
Remote Management
- Developers to access deploy/test environments at aggregate 100Mbps upload and download speed
Basic requirements:
- SSH sessions can be established (initially on the jump server)
- Packages can be installed on a system by pulling from an external repo.
Firewall rules accommodate:
- SSH sessions