summaryrefslogtreecommitdiffstats
path: root/docs
diff options
context:
space:
mode:
authorGeorg Kunz <georg.kunz@ericsson.com>2018-08-27 22:22:09 +0200
committerDan Xu <xudan16@huawei.com>2018-08-31 01:47:42 +0000
commit5cf7a06c5bed1139821ac5e0a95e5db5caa761f3 (patch)
treef9455ad21eca1cb571cea549d5e15bdaa75d5773 /docs
parent3c1848c52e7483219e99f5fe2bf5953c38f9a474 (diff)
Updating OVP addendum doc for 2018.09 release
Updating the OVP addendum document for the next release. JIRA: DOVETAIL-733 Change-Id: I7b7679f96bff4837f69769bb71256bc30602dced Signed-off-by: Georg Kunz <georg.kunz@ericsson.com> (cherry picked from commit af5b4a7be1f23c70e78f2854c5a0b67f09bb5be0)
Diffstat (limited to 'docs')
-rw-r--r--docs/testing/user/ovpaddendum/index.rst402
1 files changed, 200 insertions, 202 deletions
diff --git a/docs/testing/user/ovpaddendum/index.rst b/docs/testing/user/ovpaddendum/index.rst
index 054a3f11..ae5de8fd 100644
--- a/docs/testing/user/ovpaddendum/index.rst
+++ b/docs/testing/user/ovpaddendum/index.rst
@@ -3,9 +3,9 @@
.. http://creativecommons.org/licenses/by/4.0
.. (c) Intel and others
-====================================================================
-OPNFV Verified Program - 2018.01 Guidelines Addendum for Danube
-====================================================================
+=======================================
+Guidelines Addendum for 2018.08 release
+=======================================
.. toctree::
:maxdepth: 2
@@ -15,15 +15,15 @@ Introduction
============
This addendum provides a high-level description of the testing scope and
-pass/fail criteria used in the OPNFV Verified Program (OVP) for the
-OPNFV Danube release. This information is intended as an overview for OVP
-testers and for the Dovetail Project to help guide test-tool and test-case
-development for the OPNFV Danube release. The Dovetail project is responsible for documenting
-test-case specifications as well as implementing the OVP tool-chain through collaboration
-with the OPNFV testing community. OVP testing focuses on establishing the
-ability of the System Under Test (SUT) to perform NFVI and VIM operations and support
-Service Provider oriented features that ensure manageable, resilient and secure
-networks.
+pass/fail criteria used in the OPNFV Verified Program (OVP) for the 2018.08
+release. This information is intended as an overview for OVP testers and for
+the Dovetail Project to help guide test-tool and test-case development for the
+OVP 2018.08 release. The Dovetail project is responsible for documenting
+test-case specifications as well as implementing the OVP tool-chain through
+collaboration with the OPNFV testing community. OVP testing focuses on
+establishing the ability of the System Under Test (SUT) to perform NFVI and VIM
+operations and support Service Provider oriented features that ensure
+manageable, resilient and secure networks.
Meaning of Compliance
@@ -31,17 +31,17 @@ Meaning of Compliance
OPNFV Compliance indicates adherence of an NFV platform to behaviors defined
through specific platform capabilities, allowing to prepare, instantiate,
-operate and remove VNFs running on the NFVI. Danube compliance evaluates the
-ability of a platform to support Service Provider network capabilities and
+operate and remove VNFs running on the NFVI. OVP 2018.08 compliance evaluates
+the ability of a platform to support Service Provider network capabilities and
workloads that are supported in the OPNFV platform as of this release.
Compliance test cases are designated as compulsory or optional based on the
maturity of OPNFV capabilities as well as industry expectations. Compulsory
test cases may for example include NFVI management capabilities whereas tests
for certain high-availability features may be deemed as optional.
-Test coverage and pass/fail criteria are
-designed to ensure an acceptable level of compliance but not be so restrictive
-as to disqualify variations in platform implementations, capabilities and features.
+Test coverage and pass/fail criteria are designed to ensure an acceptable level
+of compliance but not be so restrictive as to disqualify variations in platform
+implementations, capabilities and features.
SUT Assumptions
@@ -59,8 +59,8 @@ Assumptions about the System Under Test (SUT) include ...
Scope of Testing
================
-The `OVP Governance Guidelines`_, as approved by the Board of Directors, outlines
-the key objectives of the OVP as follows:
+The `OVP Governance Guidelines`_, as approved by the Board of Directors,
+outlines the key objectives of the OVP as follows:
- Help build the market for
@@ -78,67 +78,66 @@ the key objectives of the OVP as follows:
The guidelines further directs the scope to be constrained to "features,
capabilities, components, and interfaces included in an OPNFV release that are
generally available in the industry (e.g., through adoption by an upstream
-community)", and that compliance verification is evaluated using "functional tests
-that focus on defined interfaces and/or behaviors without regard to the
-the implementation of the underlying system under test".
+community)", and that compliance verification is evaluated using "functional
+tests that focus on defined interfaces and/or behaviors without regard to the
+implementation of the underlying system under test".
-OPNFV provides a broad range of capabilities, including the reference platform itself
-as well as tools-chains and methodologies for building infrastructures, and
-deploying and testing the platform.
-Not all these aspects are in scope for OVP and not all functions and
-components are tested in the initial version of OVP. For example, the deployment tools
-for the SUT and CI/CD toolchain are currently out of scope.
-Similarly, performance benchmarking related testing is also out of scope or
-for further study. Newer functional areas such as MANO (outside of APIs in the NFVI and
-VIM) are still developing and are for future considerations.
+OPNFV provides a broad range of capabilities, including the reference platform
+itself as well as tools-chains and methodologies for building infrastructures,
+and deploying and testing the platform. Not all these aspects are in scope for
+OVP and not all functions and components are tested in the initial versions of
+OVP. For example, the deployment tools for the SUT and CI/CD toolchain are
+currently out of scope. Similarly, performance benchmarking related testing is
+also out of scope or for further study. Newer functional areas such as MANO
+(outside of APIs in the NFVI and VIM) are still developing and are for future
+considerations.
General Approach
----------------
-In order to meet the above objectives for OVP, we aim to follow a general approach
-by first identifying the overall requirements for all stake-holders,
-then analyzing what OPNFV and the upstream communities can effectively test and verify
-presently to derive an initial working scope for OVP, and to recommend what the
-community should strive to achieve in future releases.
+In order to meet the above objectives for OVP, we aim to follow a general
+approach by first identifying the overall requirements for all stake-holders,
+then analyzing what OPNFV and the upstream communities can effectively test and
+verify presently to derive an initial working scope for OVP, and to recommend
+what the community should strive to achieve in future releases.
The overall requirements for OVP can be categorized by the basic cloud
-capabilities representing common operations needed by basic VNFs, and additional
-requirements for VNFs that go beyond the common cloud capabilities including
-functional extensions, operational capabilities and additional carrier grade
-requirements.
+capabilities representing common operations needed by basic VNFs, and
+additional requirements for VNFs that go beyond the common cloud capabilities
+including functional extensions, operational capabilities and additional
+carrier grade requirements.
For the basic NFV requirements, we will analyze the required test cases,
-leverage or improve upon existing test cases in OPNFV projects
-and upstream projects whenever we can, and bridge the gaps when we must, to meet
-these basic requirements.
+leverage or improve upon existing test cases in OPNFV projects and upstream
+projects whenever we can, and bridge the gaps when we must, to meet these basic
+requirements.
We are not yet ready to include compliance requirements for capabilities such
as hardware portability, carrier grade performance, fault management and other
-operational features, security, MANO and VNF verification. These areas are
+operational features, security, MANO and VNF verification. These areas are
being studied for consideration in future OVP releases.
-In some areas, we will start with a limited level of verification
-initially, constrained by what community resources are able to support at this
-time, but still serve a basic need that is not being fulfilled elsewhere.
-In these areas, we bring significant value to the community we
-serve by starting a new area of verification, breaking new ground and
-expanding it in the future.
+In some areas, we will start with a limited level of verification initially,
+constrained by what community resources are able to support at this time, but
+still serve a basic need that is not being fulfilled elsewhere. In these
+areas, we bring significant value to the community we serve by starting a new
+area of verification, breaking new ground and expanding it in the future.
-In other areas, the functions being verified have yet to reach
-wide adoption but are seen as important requirements in NFV,
-or features are only needed for specific NFV use cases but
-an industry consensus about the APIs and behaviors is still deemed beneficial. In such
-cases, we plan to incorporate the test areas as optional. An optional test
-area will not have to be run or passed in order to achieve compliance.
-Optional tests provide an opportunity for vendors to demonstrate compliance with specific OPNFV
-features beyond the mandatory test scope.
+In other areas, the functions being verified have yet to reach wide adoption
+but are seen as important requirements in NFV, or features are only needed for
+specific NFV use cases but an industry consensus about the APIs and behaviors
+is still deemed beneficial. In such cases, we plan to incorporate the test
+areas as optional. An optional test area will not have to be run or passed in
+order to achieve compliance. Optional tests provide an opportunity for vendors
+to demonstrate compliance with specific OPNFV features beyond the mandatory
+test scope.
Analysis of Scope
-----------------
-In order to define the scope of the Danube-release of the compliance and
+In order to define the scope of the 2018.08 release of the compliance and
verification program, this section analyzes NFV-focused platform capabilities
with respect to the high-level objectives and the general approach outlined in
the previous section. The analysis determines which capabilities are suitable
@@ -148,20 +147,20 @@ addressed in future releases.
1. Basic Cloud Capabilities
The intent of these tests is to verify that the SUT has the required
-capabilities that a basic VNF needs, and these capabilities are implemented
-in a way that enables this basic VNF to run on any OPNFV compliant
-deployment.
-
-A basic VNF can be thought of as a single virtual machine that is networked
-and can perform the simplest network functions, for example, a simple forwarding
-gateway, or a set of such virtual machines connected only by simple virtual network
-services. Running such basic VNF leads to a set of common requirements, including:
-
-- image management (Refstack testing Glance API)
-- identity management (Refstack testing Keystone Identity API)
-- virtual compute (Refstack testing Nova Compute API)
-- virtual storage (Refstack testing Cinder API)
-- virtual networks (Refstack testing Neutron Network API)
+capabilities that a basic VNF needs, and these capabilities are implemented in
+a way that enables this basic VNF to run on any OPNFV compliant deployment.
+
+A basic VNF can be thought of as a single virtual machine that is networked and
+can perform the simplest network functions, for example, a simple forwarding
+gateway, or a set of such virtual machines connected only by simple virtual
+network services. Running such basic VNF leads to a set of common requirements,
+including:
+
+- image management (testing Glance API)
+- identity management (testing Keystone Identity API)
+- virtual compute (testing Nova Compute API)
+- virtual storage (testing Cinder API)
+- virtual networks (testing Neutron Network API)
- forwarding packets through virtual networks in data path
- filtering packets based on security rules and port security in data path
- dynamic network runtime operations through the life of a VNF (e.g. attach/detach,
@@ -170,49 +169,45 @@ services. Running such basic VNF leads to a set of common requirements, includin
suspend/resume, reboot, migrate)
- simple virtual machine resource scheduling on multiple nodes
-OPNFV mainly supports OpenStack as the VIM up to the Danube release. The
-VNFs used in the OVP program, and features in scope for the program which are
+OPNFV mainly supports OpenStack as the VIM up to the 2018.08 release. The VNFs
+used in the OVP program, and features in scope for the program which are
considered to be basic to all VNFs, require commercial OpenStack distributions
-to support a common basic level of cloud capabilities, and to be compliant
-to a common specification for these capabilities. This requirement significantly
-overlaps with OpenStack community's Interop working group's goals, but they are not
-identical. The OVP runs the OpenStack Refstack-Compute test cases to verify
-compliance to the basic common API requirements of cloud
-management functions and VNF (as a VM) management for OPNFV.
-Additional NFV specific requirements are added in network data path validation,
-packet filtering by security group rules and port security, life cycle runtime events of
-virtual networks, multiple networks in a topology, validation
-of VNF's functional state after common life-cycle events including reboot, pause,
-suspense, stop/start and cold migration. In addition, the
-basic requirement also verifies that the SUT can allocate VNF resources based
-on simple anti-affinity rules.
+to support a common basic level of cloud capabilities, and to be compliant to a
+common specification for these capabilities. This requirement significantly
+overlaps with OpenStack community's Interop working group's goals, but they are
+not identical. The OVP runs the OpenStack Refstack-Compute test cases to verify
+compliance to the basic common API requirements of cloud management functions
+and VNF (as a VM) management for OPNFV. Additional NFV specific requirements
+are added in network data path validation, packet filtering by security group
+rules and port security, life cycle runtime events of virtual networks,
+multiple networks in a topology, validation of VNF's functional state after
+common life-cycle events including reboot, pause, suspense, stop/start and cold
+migration. In addition, the basic requirement also verifies that the SUT can
+allocate VNF resources based on simple anti-affinity rules.
The combined test cases help to ensure that these basic operations are always
-supported by a compliant platform and they adhere to
-a common standard to enable portability across OPNFV compliant platforms.
+supported by a compliant platform and they adhere to a common standard to
+enable portability across OPNFV compliant platforms.
2. NFV specific functional requirements
-NFV has functional requirements beyond the basic common cloud
-capabilities, esp. in the networking area. Examples like SDNVPN, IPv6, SFC may
-be considered additional NFV requirements beyond general purpose cloud
-computing. These feature requirements expand beyond common OpenStack (or other
-VIM) requirements. OPNFV OVP will incorporate test cases to verify
-compliance in these areas as they become mature. Because these extensions
-may impose new API demands, maturity and industry adoption is a prerequisite for
-making them a mandatory requirement for OPNFV compliance. At the time of Danube,
-we have not identified a new functional area that is mandatory for OVP.
-In the meantime, OVP
-intends to offer tests in some of these areas as an optional extension of the test
-report to be submitted for review, noting that passing these tests will not be
+NFV has functional requirements beyond the basic common cloud capabilities,
+esp. in the networking area. Examples like BGPVPN, IPv6, SFC may be considered
+additional NFV requirements beyond general purpose cloud computing. These
+feature requirements expand beyond common OpenStack (or other VIM)
+requirements. OPNFV OVP will incorporate test cases to verify compliance in
+these areas as they become mature. Because these extensions may impose new API
+demands, maturity and industry adoption is a prerequisite for making them a
+mandatory requirement for OPNFV compliance. At the time of the 2018.08 release,
+we have promoted tests of the OpenStack IPv6 API from optional to mandatory
+while keeping BGPVPN as optional test area. Passing optional tests will not be
required to pass OPNFV compliance verification.
-SDNVPN is relevant due to the wide adoption of MPLS/BGP based VPNs in wide area
-networks, which makes it necessary for data centers hosting VNFs to be able to
-seamlessly interconnect with such networks. IPv6 is a high priority service provider
-requirement to ease IP addressing and operational issues. SFC is also an important
-NFV requirement, however its implementation has not yet been accepted or adopted
-in the upstream at the time of Danube.
+BGPVPNs are relevant due to the wide adoption of MPLS/BGP based VPNs in wide
+area networks, which makes it necessary for data centers hosting VNFs to be
+able to seamlessly interconnect with such networks. SFC is also an important
+NFV requirement, however its implementation has not yet been accepted or
+adopted in the upstream at the time of the 2018.08 release.
3. High availability
@@ -223,81 +218,75 @@ configurations. The current OPNFV high availability verification focuses on
OpenStack control service failures and resource overloads, and verifies service
continuity when the system encounters such failures or resource overloads, and
also verifies the system heals after a failure episode within a reasonable time
-window. These service HA capabilities are commonly adopted in the industry
-and should be a mandatory requirement.
+window. These service HA capabilities are commonly adopted in the industry and
+should be a mandatory requirement.
The current test cases in HA cover the basic area of failure and resource
overload conditions for a cloud platform's service availability, including all
-of the basic cloud capability services, and basic compute and storage loads,
-so it is a meaningful first step for OVP. We expect additional high availability
+of the basic cloud capability services, and basic compute and storage loads, so
+it is a meaningful first step for OVP. We expect additional high availability
scenarios be extended in future releases.
-4. Resiliency
+4. Stress Testing
-Resiliency testing involves stressing the SUT and verifying its ability
-to absorb stress conditions and still provide an acceptable level of service.
+Resiliency testing involves stressing the SUT and verifying its ability to
+absorb stress conditions and still provide an acceptable level of service.
Resiliency is an important requirement for end-users.
-The OPNFV testing projects have started testing
-OPNFV system resiliency in
-the Danube release that can be used to provide limited coverage in this area.
-However, this is a relatively new test methodology in OPNFV, additional study
-and testing experiences are still needed. We defer the resiliency testing to
-future OVP releases.
+The 2018.08 release of OVP includes a load test which spins up a number of VMs
+pairs in parallel to assert that the system under test can process the workload
+spike in a stable and deterministic fashion.
5. Security
Security is among the top priorities as a carrier grade requirement by the
-end-users. Some of the basic common functions, including virtual network isolation,
-security groups, port security and role based access control are already covered as
-part of the basic cloud capabilities that are verified in OVP. These test cases
-however do not yet cover the basic required security capabilities expected of an end-user
-deployment. It is an area that we should address in the near future, to define
-a common set of requirements and develop test cases for verifying those
-requirements.
-
-Another common requirement is security vulnerability scanning.
-While the OPNFV security project integrated tools for security vulnerability
-scanning, this has not been fully analyzed or exercised in Danube release.
-This area needs further work to identify the required level of security for the
-purpose of OPNFV in order to be integrated into the OVP. End-user inputs on
-specific requirements in security is needed.
+end-users. Some of the basic common functions, including virtual network
+isolation, security groups, port security and role based access control are
+already covered as part of the basic cloud capabilities that are verified in
+OVP. These test cases however do not yet cover the basic required security
+capabilities expected of an end-user deployment. It is an area that we should
+address in the near future, to define a common set of requirements and develop
+test cases for verifying those requirements.
+
+The 2018.08 release includes new test cases which verify that the role-based
+access control (RBAC) functionality of the VIM is behaving as expected.
+
+Another common requirement is security vulnerability scanning. While the OPNFV
+security project integrated tools for security vulnerability scanning, this has
+not been fully analyzed or exercised in 2018.08 release. This area needs
+further work to identify the required level of security for the purpose of
+OPNFV in order to be integrated into the OVP. End-user inputs on specific
+requirements in security is needed.
6. Service assurance
-Service assurance (SA) is a broad area of concern for reliability of the NFVI/VIM
-and VNFs, and depends upon multiple subsystems of an NFV platform for essential
-information and control mechanisms. These subsystems include telemetry, fault management
-(e.g. alarms), performance management, audits, and control mechanisms such as security
-and configuration policies.
+Service assurance (SA) is a broad area of concern for reliability of the
+NFVI/VIM and VNFs, and depends upon multiple subsystems of an NFV platform for
+essential information and control mechanisms. These subsystems include
+telemetry, fault management (e.g. alarms), performance management, audits, and
+control mechanisms such as security and configuration policies.
-The current Danube release implements some enabling capabilities in NFVI/VIM
-such as telemetry, policy, and fault management. However, the specification of expected
-system components, behavior and the test cases to verify them have not yet
-been adequately developed. We will therefore not be testing this area at this time
-but defer to future study.
+The current 2018.08 release implements some enabling capabilities in NFVI/VIM
+such as telemetry, policy, and fault management. However, the specification of
+expected system components, behavior and the test cases to verify them have not
+yet been adequately developed. We will therefore not be testing this area at
+this time but defer to future study.
7. Use case testing
Use-case test cases exercise multiple functional capabilities of a platform in
-order to realize a larger end-to-end scenario. Such end-to-end use cases do
+order to realize a larger end-to-end scenario. Such end-to-end use cases do
not necessarily add new API requirements to the SUT per se, but exercise
-aspects of the SUT's functional capabilities in more complex ways. For
+aspects of the SUT's functional capabilities in more complex ways. For
instance, they allow for verifying the complex interactions among multiple VNFs
-and between VNFs and the cloud platform in a more realistic fashion. End-users
+and between VNFs and the cloud platform in a more realistic fashion. End-users
consider use-case-level testing as a significant tool in verifying OPNFV
compliance because it validates design patterns and support for the types of
NFVI features that users care about.
-There are a lot of projects in OPNFV developing use cases and sample VNFs,
-however most are still in early phase and require further enhancements to
-become useful additions to the OVP. Examples such as vIMS, or those which are
-not yet available in Danube release, e.g. vCPE, will be valuable additions to
-the OVP. These use cases need to be widely accepted, and since they are more
-complex, using these VNFs for OVP demands a higher level of community resources
-to implement, analyze and document these VNFs. Hence, use case testing is not
-ready for OVP at the time of Danube, but can be incorporated in Euphrates or as
-a future roadmap area.
+There are a lot of projects in OPNFV developing use cases and sample VNFs. The
+2018.08 release of OVP features two such use-case tests, spawning and verifying
+a vIMS and a vEPC, correspondingly.
8. Additional capabilities
@@ -318,53 +307,62 @@ OVP.
-Scope of the Danube-release of the OVP
---------------------------------------
-
-Summarizing the results of the analysis above, the scope of the Danube-release
-of the OVP is as follows:
-
-- Test Area: Basic cloud capabilities
-
- - **OpenStack interoperability test cases excluding object storage**\*
- - **OPNFV-Functest/vPing, including both user data and ssh**
- - *Port security and security groups*
- - *VM life-cycle events*
- - *VM networking*
- - *VM resource scheduling*
- - *Forwarding packets in the data path*
+Scope of the 2018.08 release of the OVP
+---------------------------------------
+
+Summarizing the results of the analysis above, the scope of the 2018.08 release
+of OVP is as follows:
+
+- Mandatory test scope:
+
+ - functest.vping.userdata
+ - functest.vping.ssh
+ - functest.tempest.osinterop\*
+ - functest.tempest.compute
+ - functest.tempest.identity_v2
+ - functest.tempest.identity_v3
+ - functest.tempest.image
+ - functest.tempest.network_api
+ - functest.tempest.volume
+ - functest.tempest.neutron_trunk_ports
+ - functest.tempest.ipv6_api
+ - functest.security.patrole
+ - yardstick.ha.nova_api
+ - yardstick.ha.neutron_server
+ - yardstick.ha.keystone
+ - yardstick.ha.glance_api
+ - yardstick.ha.cinder_api
+ - yardstick.ha.cpu_load
+ - yardstick.ha.disk_load
+ - yardstick.ha.haproxy
+ - yardstick.ha.rabbitmq
+ - yardstick.ha.database
+ - bottlenecks.stress.ping
+
+- Optional test scope:
+
+ - functest.tempest.ipv6_scenario
+ - functest.tempest.multi_node_scheduling
+ - functest.tempest.network_security
+ - functest.tempest.vm_lifecycle
+ - functest.tempest.network_scenario
+ - functest.tempest.bgpvpn
+ - functest.bgpvpn.subnet_connectivity
+ - functest.bgpvpn.tenant_separation
+ - functest.bgpvpn.router_association
+ - functest.bgpvpn.router_association_floating_ip
+ - yardstick.ha.neutron_l3_agent
+ - yardstick.ha.controller_restart
+ - functest.vnf.vims
+ - functest.vnf.vepc
+ - functest.snaps.smoke
\* The OPNFV OVP utilizes the same set of test cases as the OpenStack
interoperability program *OpenStack Powered Compute*. Passing the OPNFV OVP
-does **not** imply that the SUT is certified according to the *OpenStack Powered
-Compute* program. *OpenStack Powered Compute* is a trademark of the OpenStack
-foundation and the corresponding certification label can only be awarded by the
-OpenStack foundation.
-
-
-
-- Test Area: SDNVPN
-
- - *OPNFV-SDNVPN*
-
-
-- Test Area: IPv6
-
- - *OPNFV-IPv6
- (Limited to overlay tests, v6Ping)*
-
-
-- Test Area: High Availability
-
- - **OPNFV-Yardstick/HA**
- (Limited to service continuity verification of control services)
-
-[Highlighting: **Mandatory test cases**, *Optional test cases*]
-
-
-These tested areas represent significant advancement in the direction to meet
-the OVP's objectives and end-user expectations, and is a good basis for the
-initial phase of OVP.
+does **not** imply that the SUT is certified according to the *OpenStack
+Powered Compute* program. *OpenStack Powered Compute* is a trademark of the
+OpenStack foundation and the corresponding certification label can only be
+awarded by the OpenStack foundation.
Note: The SUT is limited to NFVI and VIM functions. While testing MANO
component capabilities is out of scope, certain APIs exposed towards MANO are
@@ -377,7 +375,7 @@ Scope considerations for future OVP releases
--------------------------------------------
Based on the previous analysis, the following items are outside the scope of
-the Danube release of the CV but are being considered for inclusion in future
+the 2018.08 release of OVP but are being considered for inclusion in future
releases:
- service assurance