Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 7 Next »

Working draft: to be finalized when use cases have been finalized.

The section provides information for hardware and network configuration. ONAP Open Labs are collections of dedicated hardware, generally partitioned into pods with servers. Pods can be used for different testings like development, CI/CD, ONAP platform testing, or E2E testing.  The minimal requirements for each pod are defined in the following.

Hardware Summery

A lab compliant pod provides:

  • 2-8 controller / compute nodes depends on the use case (please refer to Server Pod session)
  • A configured network topology allowing for IPMI, Admin(PXE), Public, Private, and Storage Networks
  • Remote access through VPN
  • Security through a firewall

Server Pod

In the following table, we define 3 types of pod based on the resource usage assumption. Please note in lab and real deployment scenarios, resource can be over subscribed depending on workload. Also we assume that ONAP platform will be deployed in a separate pod from VNFs.

Type of Pod

Use Case

Compute NodeNumber of Control Nodes


Total Memory(GB)

Total VCPU

Number of Compute Nodes

Total Storage

Large

VoLTE

900GB

180

>=24T

3

Medium

ONAP Platform or vCPE

200GB

100

>=22T

3

Small

Development or vFW/vDNS demo apps

40GB

24

>=21T

1

Networking

Network Hardware

    • 48 Port TOR Switch
    • NICs - Combination of 1GE and 10GE based on network topology options
    • Connectivity for each data/control network is through a separate NIC port or a shared port. Separate port simplifies switch management however requires more NICs on the server and also more switch ports
    • BMC (Baseboard Management Controller) for lights-out management network using IPMI (Intelligent Platform Management Interface)

Remote Management

    • Developers to access deploy/test environments at aggregate 100Mbps upload and download speed

Basic requirements:

    • SSH sessions can be established (initially on the jump server)
    • Packages can be installed on a system by pulling from an external repo.

Firewall rules accommodate:

    • SSH sessions


  • No labels