1 # Service Management and Orchestration (SMO) for OAM
3 This project focus on a docker-compose deployment solution for SMO/OAM Components.
7 With respect to Operation and Maintenance (OAM) the SMO implements the O1-interface and OpenFronthaul Management-Plane consumers.
8 According to the O-RAN OAM Architecture and the O-RAN OAM Interface Specification, the SMO implements a NETCONF Client for configuration
9 and a HTTP/REST/VES server for receiving all kind of events in VES format.
11 The O-RAN-SC OAM deployment contains an OpenDaylight based NETCONF client and an ONAP VES Collector. Kafka is used as massage router for communication between the components. The Keycloak implementation offers and Identity service, while traefik acts as reverse proxy to terminate all incoming https traffic. For storing data in a persistence way the implementation of the mariaDB project is used.
13 Before you start please think about a nice full qualified domain name of your environment. Your DNS or /etc/hosts settings needs to be updated.
14 Here an inspiration: smo.dev.o-ran-sc.<your-organization>.com
18 This docker-compose file starts a pre-configured, self-contained SDN-R solution
19 with the following components.
22 ... representing an KeyCloak based identity service for centralized user
23 management. Please note that the implementation does not support IPv6.
24 Therefore, its own network is required called 'DMZ'.
26 * **Controller** single node instance
28 ... representing the NETCONF consumer on the Service Management and
29 Orchestration framework (SMO) for O-RAN O1 interface and/or O-RAN OpenFronthaul Management Plane and/or other NETCONF/YANG schemas implemented by the OpenDaylight project.
33 ... representing the VES (REST) provider at SMO for all kind of events.
36 ... representing SMO MessageRouter component, includes message-router
39 ... representing a revers proxy terminating TLS traffic (https, NETCONF)
45 The solution was tested on a VM with
51 ### Operating (HOST) System
54 $ cat /etc/os-release | grep PRETTY_NAME
55 PRETTY_NAME="Ubuntu 24.04.1 LTS"
62 Docker version 27.5.1, build 9f9e405
64 Please follow the required docker daemon configuration as documented in the following README.md:
65 - [./smo/common/docker/README.md](./smo/common/docker/README.md)
70 $ docker compose version
71 Docker Compose version v2.32.4
74 In case your environment acts behind a proxy, please see related docker documentations:
76 https://docs.docker.com/engine/daemon/proxy/
89 $ sudo apt install gcc
102 $ sudo apt install python3-dev
105 A python parser package is required.
108 source .oam/bin/activate
109 pip3 install -r requirements.txt
112 ### ETC Host (DNS function)
114 Your local IP and your used interface is required. Please use the following
115 script to modify all .env and other configuration files accordingly.
116 The script will find automatically the interface and its ip-address
118 You can check its usage with option "-h":
121 python3 ./adopt_to_environment.py -h
124 Please run the script with your preferred fully qualified domain name,
125 you like to use in your browser address bar.
128 python3 ./adopt_to_environment.py -d <your-smo-fqdn>
131 you can revert the settings in the modified .env and configuration files
132 using the option "-r".
135 python3 ./adopt_to_environment.py -d <your-smo-fqdn> -r
139 It is beneficial (but not mandatory) adding the following line add the
140 end of your ~/.bashrc file. I will suppress warnings when python script
141 do not verify self signed certificates for HTTPS communication.
144 export PYTHONWARNINGS="ignore:Unverified HTTPS request"
147 Please modify the /etc/hosts of your system or modify the DNS of your
150 * \<your-system>: is the hostname of the system, where the browser is started
152 * \<deployment-system-ipv4>: is the IP address of the system where the solution will be deployed
158 127.0.1.1 <your-system>
160 # SMO OAM development system
161 <deployment-system-ipv4> smo.o-ran-sc.org
162 <deployment-system-ipv4> gateway.smo.o-ran-sc.org
163 <deployment-system-ipv4> identity.smo.o-ran-sc.org
164 <deployment-system-ipv4> messages.smo.o-ran-sc.org
165 <deployment-system-ipv4> kafka-bridge.smo.o-ran-sc.org
166 <deployment-system-ipv4> kafka-ui.smo.o-ran-sc.org
167 <deployment-system-ipv4> odlux.oam.smo.o-ran-sc.org
168 <deployment-system-ipv4> flows.oam.smo.o-ran-sc.org
169 <deployment-system-ipv4> tests.oam.smo.o-ran-sc.org
170 <deployment-system-ipv4> controller.dcn.smo.o-ran-sc.org
171 <deployment-system-ipv4> ves-collector.dcn.smo.o-ran-sc.org
176 ### Bring Up Solution
180 The following commands should be invoked. More detailed can be found in the
184 source .oam/bin/activate
188 #### Simulated network
189 Before starting the simulated network, you need to locally build the docker images.
190 This is because of copyright issues with the 3GPP YANG models.
192 The build should be pretty straightforward. The repository containing the PyNTS code needs to be cloned and then a command needs to be ran for building the images. Run this from another terminal, in another folder, not in this repo.
195 git clone "https://gerrit.o-ran-sc.org/r/sim/o1-ofhmp-interfaces"
196 cd o1-ofhmp-interfaces
199 After everything is built successfully, you can return to your solution folder here and start the network.
201 docker compose -f network/docker-compose.yaml up -d
202 docker compose -f network/docker-compose.yaml restart pynts-o-du-o1
205 #### Check (adjust if required) environment variables
213 #### Startup solution
215 Please note that it is necessary to configure first the identity service,
216 before starting further docker images.
218 The several docker-compose yaml files must be started in the right order as listed below:
221 docker compose -f infra/docker-compose.yaml up -d
222 docker compose -f smo/common/docker-compose.yaml up -d
223 python smo/common/identity/config.py
226 The python script configure the users within the identity service (keycloak).
227 A system user (%USER) is also created with administration rights.
230 docker compose -f smo/oam/docker-compose.yaml up -d
233 Looking into the ONAP SDN-R logs will give you the startup procedure.
236 docker logs -f controller
239 If you see the login page (https://odlux.oam.smo.o-ran-sc.org) you are good to go and can start the (simulated) network.
242 docker compose -f network/docker-compose.yaml up -d
245 Usually the first ves:event gets lost. Please restart the O-DU docker container(s) to send a second ves:pnfRegistration.
248 docker compose -f network/docker-compose.yaml restart pynts-o-du-o1
251 The simulated O-DU and O-RUs are pre-configured according to O-RAN hybrid architecture.
253 O-RU - NETCONF Call HOME and NETCONF notifications
254 O-DU - ves:pnfRegistration and ves:fault, ves:heartbeat
256 
258 SDN-R reads the fault events from DMaaP and processes them.
259 Finally the fault events are visible in ODLUX.
261 
264 ### Log files and karaf console
269 docker exec -it controller tail -f /opt/opendaylight/data/log/karaf.log
272 #### ves-collector logs
275 docker logs -f ves-collector
278 ### Customizing Solution
280 '.env' file contains customizing parameters
282 ### Verification Solution
284 #### Access to SDN-R ODLUX
286 https://odlux.oam.smo.o-ran-sc.org
290 Password: // see .env file
292 In case of trouble, please update the commands with your customized '.env' file.
294 #### Access to Node Red Flows
296 https://flows.oam.smo.o-ran-sc.org
300 Password: // see .env file
302 In case of trouble, please update the commands with your customized '.env' file.
304 ### Terminate solution
306 To stop all container please respect the following order
309 docker compose -f network/docker-compose.yaml down
310 docker compose -f smo/apps/docker-compose.yaml down
311 docker compose -f smo/oam/docker-compose.yaml down
312 docker compose -f smo/common/docker-compose.yaml down
313 docker compose -f infra/docker-compose.yaml down
323 !!! be careful if other stopped containers are on the same system
325 docker system prune -a -f
329 In most cases the .env setting do not fit to the environment and need to be
332 Please make sure that the network settings to not overlap with other networks.
338 docker rm -f $(docker ps -aq)
342 By default solution comes up with self signed certificates. These certificates are created automatically
347 In case of external certifictes both key-file and certificate should be provided in PEM-format.
348 `setup.sh`copies the files in the right directory and starts the solution
352 ./setup.sh --cert ./cert.pem --key ./key.pem