Piotr Jaszczyk | 19736a9 | 2018-09-24 11:27:58 +0200 | [diff] [blame] | 1 | .. This work is licensed under a Creative Commons Attribution 4.0 International License. |
| 2 | .. http://creativecommons.org/licenses/by/4.0 |
| 3 | |
| 4 | ======================== |
| 5 | HV-VES (High Volume VES) |
| 6 | ======================== |
| 7 | |
Piotr Jaszczyk | 2df4b8c | 2018-10-05 10:56:38 +0200 | [diff] [blame] | 8 | :Date: 2018-10-05 |
Piotr Jaszczyk | 19736a9 | 2018-09-24 11:27:58 +0200 | [diff] [blame] | 9 | |
| 10 | .. contents:: |
kjaniak | 53ba170 | 2018-10-25 14:25:13 +0200 | [diff] [blame] | 11 | :depth: 4 |
Jakub Dudycz | e6b4289 | 2018-11-05 16:32:19 +0100 | [diff] [blame^] | 12 | |
Piotr Jaszczyk | 19736a9 | 2018-09-24 11:27:58 +0200 | [diff] [blame] | 13 | .. |
| 14 | |
| 15 | Overview |
| 16 | ======== |
| 17 | |
Filip Krzywka | cbd2ded | 2018-09-25 14:43:18 +0200 | [diff] [blame] | 18 | Component description can be found under `HV-VES Collector`_. |
| 19 | |
Piotr Jaszczyk | 2df4b8c | 2018-10-05 10:56:38 +0200 | [diff] [blame] | 20 | .. _HV-VES Collector: ../../services/ves-hv/index.html |
Filip Krzywka | cbd2ded | 2018-09-25 14:43:18 +0200 | [diff] [blame] | 21 | |
kjaniak | 53ba170 | 2018-10-25 14:25:13 +0200 | [diff] [blame] | 22 | .. _tcp_endpoint: |
Filip Krzywka | cbd2ded | 2018-09-25 14:43:18 +0200 | [diff] [blame] | 23 | |
| 24 | TCP Endpoint |
| 25 | ============ |
| 26 | |
| 27 | HV-VES is exposed as NodePort service on Kubernetes cluster on port 30222/tcp. |
kjaniak | 53ba170 | 2018-10-25 14:25:13 +0200 | [diff] [blame] | 28 | It uses plain, insecure TCP connection without socket data encryption. In Casablanca release, there is an experimental option to enable SSL/TLS (see :ref:`authorization`). |
Filip Krzywka | cbd2ded | 2018-09-25 14:43:18 +0200 | [diff] [blame] | 29 | Without TLS client authentication/authorization is not possible. |
kjaniak | 53ba170 | 2018-10-25 14:25:13 +0200 | [diff] [blame] | 30 | Connections are stream-based (as opposed to request-based) and long-running. |
Filip Krzywka | cbd2ded | 2018-09-25 14:43:18 +0200 | [diff] [blame] | 31 | |
Piotr Jaszczyk | 2df4b8c | 2018-10-05 10:56:38 +0200 | [diff] [blame] | 32 | Communication is wrapped with thin Wire Transfer Protocol, which mainly provides delimitation. |
| 33 | |
| 34 | .. literalinclude:: WTP.asn |
| 35 | :language: asn |
| 36 | |
kjaniak | 53ba170 | 2018-10-25 14:25:13 +0200 | [diff] [blame] | 37 | Payload is binary-encoded, using Google Protocol Buffers (GPB) representation of the VES Event. |
Filip Krzywka | cbd2ded | 2018-09-25 14:43:18 +0200 | [diff] [blame] | 38 | |
| 39 | .. literalinclude:: VesEvent.proto |
| 40 | :language: protobuf |
| 41 | |
kjaniak | 53ba170 | 2018-10-25 14:25:13 +0200 | [diff] [blame] | 42 | HV-VES makes routing decisions based mostly on the content of the **Domain** parameter in the VES Common Event Header. |
Filip Krzywka | cbd2ded | 2018-09-25 14:43:18 +0200 | [diff] [blame] | 43 | |
kjaniak | 53ba170 | 2018-10-25 14:25:13 +0200 | [diff] [blame] | 44 | The PROTO file, which contains the VES CommonEventHeader, comes with a binary-type Payload (eventFields) parameter, where domain-specific |
| 45 | data should be placed. Domain-specific data are encoded as well with GPB. A domain-specific PROTO file is required to decode the data. |
| 46 | |
kjaniak | 53ba170 | 2018-10-25 14:25:13 +0200 | [diff] [blame] | 47 | API towards DMaaP |
| 48 | ================= |
Filip Krzywka | cbd2ded | 2018-09-25 14:43:18 +0200 | [diff] [blame] | 49 | |
kjaniak | 53ba170 | 2018-10-25 14:25:13 +0200 | [diff] [blame] | 50 | HV-VES Collector forwards incoming messages to a particular DMaaP Kafka topic based on the domain and configuration. Every Kafka record is comprised of a key and a value. In case of HV-VES: |
Filip Krzywka | cbd2ded | 2018-09-25 14:43:18 +0200 | [diff] [blame] | 51 | |
kjaniak | 53ba170 | 2018-10-25 14:25:13 +0200 | [diff] [blame] | 52 | - **Kafka record key** is a GPB-encoded `CommonEventHeader`. |
| 53 | - **Kafka record value** is a GPB-encoded `VesEvent` (`CommonEventHeader` and domain-specific `eventFields`). |
| 54 | |
| 55 | In both cases raw bytes might be extracted using ``org.apache.kafka.common.serialization.ByteArrayDeserializer``. The resulting bytes might be further passed to ``parseFrom`` methods included in classes generated from GPB definitions. WTP is not used here - it is only used in communication between PNF/VNF and the collector. |
Filip Krzywka | cbd2ded | 2018-09-25 14:43:18 +0200 | [diff] [blame] | 56 | |
Jakub Dudycz | e6b4289 | 2018-11-05 16:32:19 +0100 | [diff] [blame^] | 57 | By default, **HV-VES** will use routing defined in **k8s-hv-ves.yaml-template** in **dcaegen2/platform/blueprints project**. Currently defined domain->topic mapping looks as follows: |
| 58 | |
| 59 | - perf3gpp -> HV_VES_PERF3GPP |
| 60 | |
| 61 | Supported domains |
| 62 | ================= |
| 63 | |
| 64 | Domains supported by **HV-VES**: |
| 65 | |
| 66 | - perf3gpp |
| 67 | |
| 68 | For domains descriptions, see :ref:`supported_domains` |
Filip Krzywka | cbd2ded | 2018-09-25 14:43:18 +0200 | [diff] [blame] | 69 | |
kjaniak | 53ba170 | 2018-10-25 14:25:13 +0200 | [diff] [blame] | 70 | .. _hv_ves_behaviors: |
Filip Krzywka | cbd2ded | 2018-09-25 14:43:18 +0200 | [diff] [blame] | 71 | |
kjaniak | 53ba170 | 2018-10-25 14:25:13 +0200 | [diff] [blame] | 72 | HV-VES behaviors |
| 73 | ================ |
Filip Krzywka | cbd2ded | 2018-09-25 14:43:18 +0200 | [diff] [blame] | 74 | |
kjaniak | 53ba170 | 2018-10-25 14:25:13 +0200 | [diff] [blame] | 75 | Connections with HV-VES are stream-based (as opposed to request-based) and long-running. In case of interrupted or closed connection, the collector logs such event but does not try to reconnect to client. |
| 76 | Communication is wrapped with thin Wire Transfer Protocol, which mainly provides delimitation. Wire Transfer Protocol Frame: |
Piotr Jaszczyk | 19736a9 | 2018-09-24 11:27:58 +0200 | [diff] [blame] | 77 | |
kjaniak | 53ba170 | 2018-10-25 14:25:13 +0200 | [diff] [blame] | 78 | - is dropped after decoding and validating and only GPB is used in further processing. |
| 79 | - has to start with **MARKER_BYTE**, as defined in protocol specification (see :ref:`tcp_endpoint`). If **MARKER_BYTE** is invalid, HV-VES disconnects from client. |
| 80 | |
| 81 | HV-VES decodes only CommonEventHeader from GPB message received. Collector does not decode or validate the rest of the GPB message and publishes it to Kafka topic intact. |
| 82 | Kafka topic for publishing events with specific domain can be configured through Consul service as described in :ref:`run_time_configuration`. |
| 83 | In case of Kafka service unavailability, the collector drops currently handled messages and disconnects the client. |
| 84 | |
| 85 | Messages handling: |
| 86 | |
| 87 | - HV-VES Collector skips messages with unknown/invalid GPB CommonEventHeader format. |
| 88 | - HV-VES Collector skips messages with unsupported domain. Domain is unsupported if there is no route for it in configuration (see :ref:`run_time_configuration`). |
| 89 | - HV-VES Collector skips messages with invalid Wire Frame format, unsupported WTP version or inconsistencies of data in the frame (other than invalid **MARKER_BYTE**). |
| 90 | - HV-VES Collector interrupts connection when it encounters a message with too big GPB payload. Default maximum size and ways to change it are described in :ref:`deployment`. |
| 91 | |
| 92 | .. note:: xNF (VNF/PNF) can split messages bigger than 1 MiB and set `sequence` field in CommonEventHeader accordingly. It is advised to use smaller than 1 MiB messages for GPBs encoding/decoding efficiency. |
| 93 | |
| 94 | - Skipped messages (for any of the above reasons) might not leave any trace in HV-VES logs. |
Jakub Dudycz | e6b4289 | 2018-11-05 16:32:19 +0100 | [diff] [blame^] | 95 | |