blob: df91681cd5d47de6aa544f6d43d347acc3f35148 [file] [log] [blame]
Piotr Jaszczyk19736a92018-09-24 11:27:58 +02001.. This work is licensed under a Creative Commons Attribution 4.0 International License.
2.. http://creativecommons.org/licenses/by/4.0
3
4========================
5HV-VES (High Volume VES)
6========================
7
Piotr Jaszczyk2df4b8c2018-10-05 10:56:38 +02008:Date: 2018-10-05
Piotr Jaszczyk19736a92018-09-24 11:27:58 +02009
10.. contents::
kjaniak53ba1702018-10-25 14:25:13 +020011 :depth: 4
Jakub Dudycze6b42892018-11-05 16:32:19 +010012
Piotr Jaszczyk19736a92018-09-24 11:27:58 +020013..
14
15Overview
16========
17
Filip Krzywkacbd2ded2018-09-25 14:43:18 +020018Component description can be found under `HV-VES Collector`_.
19
Piotr Jaszczyk2df4b8c2018-10-05 10:56:38 +020020.. _HV-VES Collector: ../../services/ves-hv/index.html
Filip Krzywkacbd2ded2018-09-25 14:43:18 +020021
kjaniak53ba1702018-10-25 14:25:13 +020022.. _tcp_endpoint:
Filip Krzywkacbd2ded2018-09-25 14:43:18 +020023
24TCP Endpoint
25============
26
27HV-VES is exposed as NodePort service on Kubernetes cluster on port 30222/tcp.
Jakub Dudycz0c997922019-05-09 13:17:34 +020028It uses plain, insecure TCP connection without socket data encryption. In Dublin release,
29there is an experimental option to enable SSL/TLS (see :ref:`ssl_tls_authorization`).
Filip Krzywkacbd2ded2018-09-25 14:43:18 +020030Without TLS client authentication/authorization is not possible.
kjaniak53ba1702018-10-25 14:25:13 +020031Connections are stream-based (as opposed to request-based) and long-running.
Filip Krzywkacbd2ded2018-09-25 14:43:18 +020032
Piotr Jaszczyk2df4b8c2018-10-05 10:56:38 +020033Communication is wrapped with thin Wire Transfer Protocol, which mainly provides delimitation.
34
35.. literalinclude:: WTP.asn
36 :language: asn
37
kjaniak53ba1702018-10-25 14:25:13 +020038Payload is binary-encoded, using Google Protocol Buffers (GPB) representation of the VES Event.
Filip Krzywkacbd2ded2018-09-25 14:43:18 +020039
40.. literalinclude:: VesEvent.proto
41 :language: protobuf
42
kjaniak53ba1702018-10-25 14:25:13 +020043HV-VES makes routing decisions based mostly on the content of the **Domain** parameter in the VES Common Event Header.
Filip Krzywkacbd2ded2018-09-25 14:43:18 +020044
kjaniak53ba1702018-10-25 14:25:13 +020045The PROTO file, which contains the VES CommonEventHeader, comes with a binary-type Payload (eventFields) parameter, where domain-specific
46data should be placed. Domain-specific data are encoded as well with GPB. A domain-specific PROTO file is required to decode the data.
47
kjaniak53ba1702018-10-25 14:25:13 +020048API towards DMaaP
49=================
Filip Krzywkacbd2ded2018-09-25 14:43:18 +020050
kjaniak53ba1702018-10-25 14:25:13 +020051HV-VES Collector forwards incoming messages to a particular DMaaP Kafka topic based on the domain and configuration. Every Kafka record is comprised of a key and a value. In case of HV-VES:
Filip Krzywkacbd2ded2018-09-25 14:43:18 +020052
kjaniak53ba1702018-10-25 14:25:13 +020053- **Kafka record key** is a GPB-encoded `CommonEventHeader`.
54- **Kafka record value** is a GPB-encoded `VesEvent` (`CommonEventHeader` and domain-specific `eventFields`).
55
56In both cases raw bytes might be extracted using ``org.apache.kafka.common.serialization.ByteArrayDeserializer``. The resulting bytes might be further passed to ``parseFrom`` methods included in classes generated from GPB definitions. WTP is not used here - it is only used in communication between PNF/VNF and the collector.
Filip Krzywkacbd2ded2018-09-25 14:43:18 +020057
Jakub Dudycz0c997922019-05-09 13:17:34 +020058By default, **HV-VES** will use routing defined in **k8s-hv-ves.yaml-template** in **dcaegen2/platform/blueprints project**.
59Currently there is one domain->topic mapping defined: perf3gpp->HV_VES_PERF3GPP
Jakub Dudycze6b42892018-11-05 16:32:19 +010060
Filip Krzywka566342c2019-03-29 11:25:07 +010061
62.. _supported_domains:
63
Jakub Dudycze6b42892018-11-05 16:32:19 +010064Supported domains
65=================
66
Jakub Dudycz0c997922019-05-09 13:17:34 +020067As for now **HV-VES** supports only **perf3gpp** domain
Jakub Dudycze6b42892018-11-05 16:32:19 +010068
Filip Krzywka566342c2019-03-29 11:25:07 +010069For domains descriptions, see :ref:`domains_supported_by_hvves`
Filip Krzywkacbd2ded2018-09-25 14:43:18 +020070
kjaniak53ba1702018-10-25 14:25:13 +020071.. _hv_ves_behaviors:
Filip Krzywkacbd2ded2018-09-25 14:43:18 +020072
kjaniak53ba1702018-10-25 14:25:13 +020073HV-VES behaviors
74================
Filip Krzywkacbd2ded2018-09-25 14:43:18 +020075
kjaniak53ba1702018-10-25 14:25:13 +020076Connections with HV-VES are stream-based (as opposed to request-based) and long-running. In case of interrupted or closed connection, the collector logs such event but does not try to reconnect to client.
77Communication is wrapped with thin Wire Transfer Protocol, which mainly provides delimitation. Wire Transfer Protocol Frame:
Piotr Jaszczyk19736a92018-09-24 11:27:58 +020078
kjaniak53ba1702018-10-25 14:25:13 +020079- is dropped after decoding and validating and only GPB is used in further processing.
80- has to start with **MARKER_BYTE**, as defined in protocol specification (see :ref:`tcp_endpoint`). If **MARKER_BYTE** is invalid, HV-VES disconnects from client.
81
82HV-VES decodes only CommonEventHeader from GPB message received. Collector does not decode or validate the rest of the GPB message and publishes it to Kafka topic intact.
83Kafka topic for publishing events with specific domain can be configured through Consul service as described in :ref:`run_time_configuration`.
84In case of Kafka service unavailability, the collector drops currently handled messages and disconnects the client.
85
86Messages handling:
87
88- HV-VES Collector skips messages with unknown/invalid GPB CommonEventHeader format.
89- HV-VES Collector skips messages with unsupported domain. Domain is unsupported if there is no route for it in configuration (see :ref:`run_time_configuration`).
90- HV-VES Collector skips messages with invalid Wire Frame format, unsupported WTP version or inconsistencies of data in the frame (other than invalid **MARKER_BYTE**).
91- HV-VES Collector interrupts connection when it encounters a message with too big GPB payload. Default maximum size and ways to change it are described in :ref:`deployment`.
92
93.. note:: xNF (VNF/PNF) can split messages bigger than 1 MiB and set `sequence` field in CommonEventHeader accordingly. It is advised to use smaller than 1 MiB messages for GPBs encoding/decoding efficiency.
94
95- Skipped messages (for any of the above reasons) might not leave any trace in HV-VES logs.
Jakub Dudycze6b42892018-11-05 16:32:19 +010096