Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 3 Next »

Working draft: to be finalized when use cases have been finalized.

The section provides information for hardware and network configuration. ONAP Open Labs are collections of dedicated hardware, generally partitioned into pods with servers. Pods can be used for different testings like development, CI/CD, ONAP platform testing, or E2E testing.  The minimal requirements for each pod are defined in the following.

Hardware Summery

A lab compliant pod provides:

  • 2-8 controller / compute nodes depends on the use case (please refer to Server Pod session)
  • A configured network topology allowing for IPMI, Admin(PXE), Public, Private, and Storage Networks
  • Remote access through VPN
  • Security through a firewall

Server Pod

In the following table, we define 3 types of pod based on the resource usage assumption. Please note in lab and real deployment scenarios, resource can be over subscribed depending on workload. Also we assume that ONAP platform will be deployed in a separate pod from VNFs.

Type of Pod

Use Case

Total Memory(GB)

for Compute Nodes

Total VCPU

for Compute Nodes

Total Storage

for Compute Nodes

Number of Control Nodes

Number of Compute Nodes

Large

VoLTE

900GB

180

4T

3

>=2

Medium

ONAP Platform or vCPE

200GB

100

2T

3

>=2

Small

Development or vFW/vDNS demo apps

40GB

24

1T

1

>=1

Networking

Network Hardware

    • 48 Port TOR Switch
    • NICs - Combination of 1GE and 10GE based on network topology options
    • Connectivity for each data/control network is through a separate NIC port or a shared port. Separate port simplifies switch management however requires more NICs on the server and also more switch ports
    • BMC (Baseboard Management Controller) for lights-out management network using IPMI (Intelligent Platform Management Interface)

Remote Management

    • Developers to access deploy/test environments at aggregate 100Mbps upload and download speed

Basic requirements:

    • SSH sessions can be established (initially on the jump server)
    • Packages can be installed on a system by pulling from an external repo.

Firewall rules accommodate:

    • SSH sessions


  • No labels