This WIP page will attempt to detail the financial and operations impact of varying ONAP deployments.
NOTE: this is not finished - as I need to do a detailed incoming/outgoing port analysis and some more prototyping - it is a draft for now - mostly as a page to point to when asked questions about cost and security during deployments.
The audience is approving I.T. and Finance personnel.
Public Cloud Deployment
Executive Summary
ONAP as of 20180131 (Beijing master - pre M2) will deploy (minus DCAEGEN2) and run on a single 64G VM provisioned with a minimal 120G HD and at least 8 vCores. The monthly cost of this deployment will run....
$246 or 64 US per month (reserved/spot) on AWS EC2
$365 or 212 US per month (on-demand/reserved) on Microsoft Azure
The security profile for deployment requires outbound access to nexus3.onap.org:10001/10003 as well as ssh/http/https access to git.onap.org to do leftover chef pulls and curls in-container for some components (being fixed). The VNF deployment profile currently requires an additional Openstack/Rackspace infrastructure including keystone and CLI/HEAT outbound access for VNF orchestration (in the future cloud-native VNF deployment will be supported).
Marketplace/services Utilization - no use of marketplace services is required in either AWS or Azure. The ONAP deployment brings its own open source software stack to a bare Ubuntu VM. At this time Kubernetes as a Service is also not required and all resiliency/scaling/replication/load-balancing/federation behaviour for HA and Geo-Redundancy is handled natively by the Kubernetes framework.
Deployment Use Cases
There are several deployment scenarios that include VMs and containers both for ONAP itself and the VNFs that are managed. Container deployments are further segregated by managed kubernetes and Kubernetes as a Service types. We assume that all ONAP components run as Docker containers whether they are managed per VM (HEAT) or managed in a Kubernetes cluster namespace (KaaS or managed).
Type | ONAP(VMs or Containers) | VNF (VMs or Containers) | |
---|---|---|---|
Kubernetes containers on VMs | VM Rackspace/Openstack | ||
Deployment Example: Full Kubernetes on a VM cluster
This is the RI (Reference implementation) of ONAP Beijing release - it consists of all the ONAP containers 90+ deployed to a particular (dev/stg/prod) namespace ecosystem running on Kubernetes. The Kubernetes implementation is running under any management layer - here Rancher and not on a KaaS. The Kubernetes cluster undercloud can run on 1 or more VMs - in this example we colocate the server and single host on a single VM which currently fits in 55G.
Note: DCAEGEN2 is currently being fully containerized and should arrive as a native Kubernetes set of containers by Beijing R2 release. Currently DCAE runs in a 64G VM specifically on a configured Openstack system. There is a reverse proxy mechanism that joins DCAE to the rest of ONAP running in Kubernetes already. DCAE is required for VNF closed loop operations - but not for VNF orchestration. When DCAE is fully refactored for Kubernetes then the memory requirement will jump over the 64G baseline and push it to 96 to 128G depending on the size of the CDAP Hadoop cluster running which is 3-7 containers.
Security Profile
ONAP will require certain ports open by CIDR to several static domain names in order to deploy defined in a security group. At runtime the list is reduced.
ONAP Port Profile
ONAP on deployment will require the following incoming and outgoing ports. Note: within ONAP rest calls between components will be handled inside the Kubernetes namespace by the DNS server running as part of K8S.
port | protocol | incoming/outgoing | application | source | destination |
---|---|---|---|---|---|
22 | ssh | ssh | developer vm | host | |
443 | tiller | client | host | ||
8880 | http | rancher | client | host | |
9090 | http | kubernetes | host | ||
10001 | https | nexus3 | nexus3.onap.org | ||
10003 | https | nexus3 | nexus3.onap.org | ||
https | nexus | nexus.onap.org | |||
https ssh | git | git.onap.org | |||
30200-30399 | http/https | REST api | developer vm | host | |
5005 | tcp | java debug port | developer vm | host | |
Azure
AWS
Software Profile
Rancher 1.6.14
Helm 2.8.0
Kubernetes 1.8.6
Docker 17.03.2
Ubuntu 16.04
The rest of the software versions are specific to the 90+ docker containers running for example MariaDB, Jetty... etc. All of the software is open source and encapsulated in the containers themselves. The containers implement a REST based microservices architecture.
Microsoft Azure
Monthly Cost
Cost $US | Artifact | Details | |
---|---|---|---|
$365/m at $0.65 (CAN)/h reduce by 42% for 1 year reserved instances = $212/month | VM running Ubuntu 16.04 E8s V3 | (64g/8vCores) 128G SSD in CA central DC | |
$0 TBD | no extra volume (only 16G VMs have 30G disks) | ||
IP | |||
$0 | image snapshot | ||
$0 | Cloud Services | ||
Total | |||
$212/m |
on-demand
Reserved
Amazon AWS
VM: Minimum EC2 instance of size 61G (ideally 128G) with a 120+GB EBS volume (ideally 1024GB) and at least 8 vCores (ideally 64 vCores), network 1Gbps (ideally 10Gbps).
We can implement proper public/private VPC peering but for this lab environment security will be on the Kubernetes Admin/client-token only.
Example of 2 or 3 network VPC peering setup http://files.meetup.com/18216364/aws_vpc_beanstalk_20150224_post.pdf
Cost
There is an R4.2xlarge instance type that has been the lowest cost instance that can run all of ONAP (except DCAE) and has been demonstrated since Amsterdam on the CD system. The cost on the spot market is between 72 to 89% off the reserved cost at around $0.14/hour on us-east(N. Virgina DC) and 0.07/hour in us-east(Ohio DC)
Monthly Cost
Cost $US | Artifact | Details | |
---|---|---|---|
$52/m at $0.07/h | EC2 spot VM running Ubuntu 16.04 R4.2xlarge | (64g/8vCores) in the ohio DC | |
$12.0/m at $0.1/m/Gb | EBS volume | 120Gb | |
$2.0/m | Elastic EIP | ||
AMI image snapshot | |||
$0 | Cloud Services | ||
Total | |||
$64/m |
Artifacts
Amazon
Spot template
security group
IAM profile
ssh key
EIP
public VPC
Network Interface
EBS Volume
Auto scaling group
Amazon Cloudformation Template
SPOT only { "IamFleetRole": "arn:aws:iam::453279094200:role/aws-ec2-spot-fleet-tagging-role", "AllocationStrategy": "lowestPrice", "TargetCapacity": 1, "SpotPrice": "0.532", "ValidFrom": "2018-01-31T20:31:16Z", "ValidUntil": "2019-01-31T20:31:16Z", "TerminateInstancesWithExpiration": true, "LaunchSpecifications": [ { "ImageId": "ami-aa2ea6d0", "InstanceType": "r4.2xlarge", "KeyName": "obrien_systems_aws_20141115", "SpotPrice": "0.532", "BlockDeviceMappings": [ { "DeviceName": "/dev/sda1", "Ebs": { "DeleteOnTermination": true, "VolumeType": "gp2", "VolumeSize": 120, "SnapshotId": "snap-0dcc947e7c10bed94" } } ], "SecurityGroups": [ { "GroupId": "sg-de2185a9" } ] } ], "Type": "request" }
Microsoft
Azure Resource Manager Template
VM details
ubuntu@onap:~$ free total used free shared buff/cache available Mem: 65949220 278884 65223112 8812 447224 64947380 Swap: 0 0 0 ubuntu@onap:~$ df Filesystem 1K-blocks Used Available Use% Mounted on udev 32963872 0 32963872 0% /dev tmpfs 6594924 8788 6586136 1% /run /dev/sda1 30428648 1328420 29083844 5% / tmpfs 32974608 0 32974608 0% /dev/shm tmpfs 5120 0 5120 0% /run/lock tmpfs 32974608 0 32974608 0% /sys/fs/cgroup /dev/sdb1 131979684 60988 125191480 1% /mnt tmpfs 6594924 0 6594924 0% /run/user/1000