contrail cloud affirmed design and deployment guide · 2018-03-12 ·...

18
Contrail Cloud Affirmed Design and Deployment Guide Release 10.0.1 Modified: 2018-03-12 Copyright © 2018, Juniper Networks, Inc.

Upload: others

Post on 09-Jan-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Contrail Cloud Affirmed Design and Deployment Guide · 2018-03-12 · •openstackstackcreatevmme-data-1-evmme040-data-1.env-t data-2ns-tmpl.yaml • openstackstackcreatevmme-lb-1-evmme040-lb-1.env-tlb-2ns-tmpl.yaml

Contrail Cloud Affirmed Design and DeploymentGuide

Release

10.0.1

Modified: 2018-03-12

Copyright © 2018, Juniper Networks, Inc.

Page 2: Contrail Cloud Affirmed Design and Deployment Guide · 2018-03-12 · •openstackstackcreatevmme-data-1-evmme040-data-1.env-t data-2ns-tmpl.yaml • openstackstackcreatevmme-lb-1-evmme040-lb-1.env-tlb-2ns-tmpl.yaml

Juniper Networks, Inc.1133 InnovationWaySunnyvale, California 94089USA408-745-2000www.juniper.net

Juniper Networks, the Juniper Networks logo, Juniper, and Junos are registered trademarks of Juniper Networks, Inc. and/or its affiliates inthe United States and other countries. All other trademarks may be property of their respective owners.

Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify,transfer, or otherwise revise this publication without notice.

Contrail Cloud Affirmed Design and Deployment GuideRelease 10.0.1Copyright © 2018 Juniper Networks, Inc. All rights reserved.

The information in this document is current as of the date on the title page.

YEAR 2000 NOTICE

Juniper Networks hardware and software products are Year 2000 compliant. Junos OS has no known time-related limitations through theyear 2038. However, the NTP application is known to have some difficulty in the year 2036.

ENDUSER LICENSE AGREEMENT

The Juniper Networks product that is the subject of this technical documentation consists of (or is intended for use with) Juniper Networkssoftware. Use of such software is subject to the terms and conditions of the End User License Agreement (“EULA”) posted athttps://www.juniper.net/support/eula/. By downloading, installing or using such software, you agree to the terms and conditions of thatEULA.

Copyright © 2018, Juniper Networks, Inc.ii

Page 3: Contrail Cloud Affirmed Design and Deployment Guide · 2018-03-12 · •openstackstackcreatevmme-data-1-evmme040-data-1.env-t data-2ns-tmpl.yaml • openstackstackcreatevmme-lb-1-evmme040-lb-1.env-tlb-2ns-tmpl.yaml

Table of Contents

Chapter 1 Contrail Cloud Affirmed Design and Deployment . . . . . . . . . . . . . . . . . . . . . . . 5

Contrail - Affirmed Overview and Joint Solution . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

ETSI Design, Solution Components, and Dimensioning . . . . . . . . . . . . . . . . . . . . . . 7

vEPC Detailed Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

vEPC Deployment Steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

Deploy MME . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

Deploy MCC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

Configure EMS, MME and MCC Network Elements . . . . . . . . . . . . . . . . . . . . . 15

Adding vSRX for Service Chaining in GI-LAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

iiiCopyright © 2018, Juniper Networks, Inc.

Page 4: Contrail Cloud Affirmed Design and Deployment Guide · 2018-03-12 · •openstackstackcreatevmme-data-1-evmme040-data-1.env-t data-2ns-tmpl.yaml • openstackstackcreatevmme-lb-1-evmme040-lb-1.env-tlb-2ns-tmpl.yaml

Copyright © 2018, Juniper Networks, Inc.iv

Contrail Cloud Affirmed Design and Deployment Guide

Page 5: Contrail Cloud Affirmed Design and Deployment Guide · 2018-03-12 · •openstackstackcreatevmme-data-1-evmme040-data-1.env-t data-2ns-tmpl.yaml • openstackstackcreatevmme-lb-1-evmme040-lb-1.env-tlb-2ns-tmpl.yaml

CHAPTER 1

Contrail Cloud Affirmed Design andDeployment

• Contrail - Affirmed Overview and Joint Solution on page 6

• ETSI Design, Solution Components, and Dimensioning on page 7

• vEPC Detailed Design on page 10

• vEPC Deployment Steps on page 11

• Adding vSRX for Service Chaining in GI-LAN on page 18

5Copyright © 2018, Juniper Networks, Inc.

Page 6: Contrail Cloud Affirmed Design and Deployment Guide · 2018-03-12 · •openstackstackcreatevmme-data-1-evmme040-data-1.env-t data-2ns-tmpl.yaml • openstackstackcreatevmme-lb-1-evmme040-lb-1.env-tlb-2ns-tmpl.yaml

Contrail - Affirmed Overview and Joint Solution

Juniper Networks Contrail is an open, standards-based software solution that delivers

network virtualization and service automation for federated cloud networks. Contrail

provides self-service provisioning, improves network troubleshooting and diagnostics,

and enables service chaining for dynamic application environments across enterprise

virtual private cloud (VPC), managed Infrastructure as a Service (IaaS), and Telco cloud

use cases. Contrail simplifies the creationandmanagementof virtual networks to enable

policy-based automation, greatly reducing the need for physical and operational

infrastructure typically required to support network management. In addition, it uses

mature technologies to address key challenges of large-scale managed environments,

including multi-tenancy, network segmentation, network access control, and IP service

enablement. These challenges are particularly difficult in evolving dynamic application

environments such as theWeb, gaming, big data, Enterprise and Telco cloud, and so on.

Contrail allowsa tenantor acloudserviceprovider toabstract virtual networksatahigher

layer to eliminate device-level configuration and easily control andmanage policies for

tenant virtual networks. A browser-based user interface enables users to define virtual

network and network service policies, then configure and interconnect networks simply

by attaching policies. Contrail also extends native IP capabilities to the hosts (compute

nodes) in the data center to address the scale, resiliency, and service enablement

challenges of traditional orchestration platforms. Using Contrail, a tenant can define,

manage, andcontrol theconnectivity, services, andsecurity policiesof the virtual network.

The tenant or other users can use the self-service graphical user interface to easily create

virtual network nodes, addand remove IP services (suchas firewall, loadbalancing, DNS,

and the like) to their virtual networks, then connect the networks using traffic policies

that are simple to create andapply. Once created, policies canbeapplied acrossmultiple

network nodes, changed, added, and deleted, all froma simple browser-based interface.

Contrail can be used with open cloud orchestration systems such as OpenStack or

CloudStack. It canalso interactwithother systemsandapplicationsbasedonOperations

Support System (OSS) and Business Support Systems (BSS), using northbound APIs.

Contrail allows you to build elastic architectures that leverage the benefits of cloud

computing like agility, self-service, efficiency, and flexibility while providing an

interoperable, scale-out control plane for network services within and across network

domains.

AffirmedNetworksprovidesvirtualizedEnhancedPacketCore (vEPC) formobilenetworks

in 3GPPs System Architecture Evolution (SAE). The EPC consists of the Mobile

Management Entity as well as the Serving Gateway (SGW) and Packet Data Network

Gateway (PGW). Affirmed Networks has over 51 live commercial Affirmed vEPC

deployments. It provides a virtual-only SAE Gateway architecture.

There are over 800mobile operators today trying to grapple with today’s demands of

smartphoneusage.The JuniperNetworksandAffirmedNetworks joint solutioncombines

Juniper Network’s SDN, IP networking, security and automation with Affirmed Network’s

NFV formobile networks to change the economics of networking. The partnership’s joint

solution for virtualizedandautomatedmobilenetworkinghelpswirelessprovidersbecome

more agile to deploy newservices fasterwith significantly lower capital expense (CapEx)

Copyright © 2018, Juniper Networks, Inc.6

Contrail Cloud Affirmed Design and Deployment Guide

Page 7: Contrail Cloud Affirmed Design and Deployment Guide · 2018-03-12 · •openstackstackcreatevmme-data-1-evmme040-data-1.env-t data-2ns-tmpl.yaml • openstackstackcreatevmme-lb-1-evmme040-lb-1.env-tlb-2ns-tmpl.yaml

and operating expense (OpEx). Based on an open technology framework to accelerate

network transformationandmitigate risk, cloud-nativearchitectureenablesperformance,

high-availability and automation at scale.

ETSI Design, Solution Components, and Dimensioning

The European Telecommunications Standards Institute (ETSI) standards for Network

Functions Virtualization (NFV)management and orchestration (MANO) reference

architecture and solution components are shown in Figure 1 on page 7.

Figure 1: ETSI MANOArchitecture and Components

Se-Ma

Ve-Vnfm

Nf-Vi

Os-Ma

g200

221

JuniperNetworks Affirmed 3rd Party

• ETSI/MANO compliant,multi-vendor interoperablearchitecture

• Full MANO orchestratorwith multi-VIM support(e.g. Red Hat OpenStack)

• Affirmed vEPC­­ – 5G-readyETSO compliant architectureand VNFs

• Modular Cloud Services platformfor 3rd party integration

JSD EMS 3

Virtualization Layer

NFVI

Solution Components

Service, VNF, andInfrastructure Description

ServiceMonitoring

(AppFormix,vProbe)

AutomatedMonitoring

System

NFV Management and OrchestrationMANO

ACUITAS

OSS / BSS Multi-ServiceOrchestration Monitoring

ComputingHardware

JuniperQFX SeriesMX Series

StorageHardware

VirtualComputing

ContrailvRouter

VirtualStorage

VNF 3vSRX vEPC

Network ServiceOrchestration

Network ServiceController

Contrail ServiceOrchestration /

ASAP

VIMInfrastructureOrchestrator

Contrail SDNController

VIMMonitoring

Contrail

Contrail’s and Affirmed’s joint value proposition is an SDN solution that works with your

existing physical network devices and help address the networking challenges for

self-service, automated, and vertically integrated cloud architecture and improves

scalability and capital expense (CapEx) inefficiencies through an overlay. All of the

networking features such as switching, routing, security, and load balancing are moved

from the physical hardware infrastructure to software running in the hypervisor that is

managed from a central orchestration system. This allows the system to scale while

keeping the costs of the physical switching infrastructure under control, as the switching

hardwarehasnostateof thevirtualmachinesor tenantorapplicationand isonly involved

in routing traffic from one server to another.

Figure 2 on page 8 showsmobile network virtualized functions available from Affirmed

Networks and Juniper Networks:

7Copyright © 2018, Juniper Networks, Inc.

Chapter 1: Contrail Cloud Affirmed Design and Deployment

Page 8: Contrail Cloud Affirmed Design and Deployment Guide · 2018-03-12 · •openstackstackcreatevmme-data-1-evmme040-data-1.env-t data-2ns-tmpl.yaml • openstackstackcreatevmme-lb-1-evmme040-lb-1.env-tlb-2ns-tmpl.yaml

Figure 2: Affirmed Networks and Juniper Networks Supported NFV

g200

222

Hypervisor (VMware, KVM)

Hardware – COTS x86 Server

Flexible SP / Mobile Provider Cloud Orchestration, VNF and Infrastructure Management

MME /SGSN

PCRF /PCEF

FirewallNAT

LTE-SECGWY

vProbe

MCCControlPlane

Data Plane

vMX vBNG

ValueAdd GI

LanServices

DNSOther

NetworkElements

PGW /SGW /GGSN

SPI, DPI

HTTPProxy

Web/VideoCaching

WAG /TWAG /Trusted

AAA /HSS /SPR

Web DBsPhishingMalware

IWF

SecureTunnelingIPSec /

GRE

NetworkAnalytics

OCS /OFCS

AAA /HSS /SPR

PCRF eNodeBCustomer

CareePDG

Untrusted

VideoAdaptationand MOS

ContentFiltering

Policy andCharging

Packet Core - MCC Media and Content Juniper Security vSRX Juniper, Affirmed and 3rd Party Network FunctionsAnalytics

Juniper Networks Supported

Affirmed Networks Supported

Affirmed Networks andJuniper Networks Supported

Affirmed vEPCMobile Content Cloud

Juniper NetworksContrail Cloud

Internet

Contrail Cloud 10.0 is sized for Small, Medium, and Large call models as shown below

in table Table 1 on page 8:

Table 1: Contrail Call Model Specifications

Call Model 3Large

Call Model 2Medium

Call Model 1Small

Call Model

5,000,0001,000,000100,000Total number of subscribers

100202Total throughput (Gbps)

Contrail Cloud 10.0makes the following assumptions:

Assumptions

1Number of clusters (per site)

Broadwell 2 CPUs, 14 cores per CPU, 2 vCPUs per coreCPU Class

4x10GE using SRIOVNIC and Switching Technology

Compact (Small), VAS (Medium,Large)VM Personality

25%%of 2G subscribers

25%%of 3G subscribers

Copyright © 2018, Juniper Networks, Inc.8

Contrail Cloud Affirmed Design and Deployment Guide

Page 9: Contrail Cloud Affirmed Design and Deployment Guide · 2018-03-12 · •openstackstackcreatevmme-data-1-evmme040-data-1.env-t data-2ns-tmpl.yaml • openstackstackcreatevmme-lb-1-evmme040-lb-1.env-tlb-2ns-tmpl.yaml

50%%of 4G subscribers

20 kbpsAverage traffic per subscriber (provided themixof 2/3/4Gabove)

0% in call model 1, 50% in call models 2 and 3VoLTE penetration ratio

Proxy services: No (ASM not used)Services

Mirroring: No

vProbe enabled

DPI enabled for 100% of traffic

Header enrichment enabled

NAT : No

9Copyright © 2018, Juniper Networks, Inc.

Chapter 1: Contrail Cloud Affirmed Design and Deployment

Page 10: Contrail Cloud Affirmed Design and Deployment Guide · 2018-03-12 · •openstackstackcreatevmme-data-1-evmme040-data-1.env-t data-2ns-tmpl.yaml • openstackstackcreatevmme-lb-1-evmme040-lb-1.env-tlb-2ns-tmpl.yaml

vEPC Detailed Design

Figure 3 on page 10 is an example of a VM and networking design of the vEPC that is

small sized and of compact mode and includes both the mobility management entity

(MME) and Service Provider Gatewaymobile content core (MCC).

Figure 3: vEPC VM and Networking

g200

224

data-1 lb-1callp-0/1 rm-0/1

vmme040-base

MME

MCC

epc-vnf-oam

epc-vnf-ns-core192.0.2.2/24

gtp/core/Gi: 203.0.113.20Gn/s1: 203.0.113.3

pgw_loop: 203.0.113.18s1u_sgw_lb_v4: 203.0.113.8

s5s8_lb_v4: 203.0.113.16sgw_loop: 203.0.113.2

NS1-VN (RAN)198.51.100.1/24

NS2-VN (Gi)198.51.100.0/24

vmme040-mgmt

vmme040-data

data-0 lb-0mgmt-0/1 sig-0/1

SSM17-1MCM17-7

EMS

CSM17-1

Base-VN, 192.0.2.0/16

.50

AN-MGMT: 203.0.113.0/20

EW-VN: 203.0.113.0/24

SSM17-2MCM17-8 CSM17-2

INTERNET

Network Policy

epc-vnf-ns-access192.0.2.0/24

This illustration describes a set of VMs and networks for the vEPC. This deployment

comprises multiple networks. These networks include not just virtual networks but

loopback addresses that represent the various Gi and Gn network contexts. In addition

to this, there are various health checks created as described in Health Check Object on

the ports that are advertising these loopback addresses. This ensures that if the port

goes down, the health check fails and the routes are withdrawn from that port. This

guarantees that there is no black holing of traffic. Another feature used in the topology

is network policy. Because each virtual network, by default, cannot talk to each other,

youmust allow networks to talk to each other through a network policy. Network Policy

is described in Creating a Network Policy with Juniper Networks Contrail.

Copyright © 2018, Juniper Networks, Inc.10

Contrail Cloud Affirmed Design and Deployment Guide

Page 11: Contrail Cloud Affirmed Design and Deployment Guide · 2018-03-12 · •openstackstackcreatevmme-data-1-evmme040-data-1.env-t data-2ns-tmpl.yaml • openstackstackcreatevmme-lb-1-evmme040-lb-1.env-tlb-2ns-tmpl.yaml

Juniper Professional Services will be provided access to the heat templates to deploy

Affirmed and vSRXworkloads on Contrail Cloud 10.0. These are the tenant workloads

that comprise the end-to-endmobility solution. Review the heat templates for each

respective network and VMs to understandwhat andwhere theOpenStack and Contrail

components are in this solution.

vEPC Deployment Steps

Thestepsmentioned in this topicassumes that youhaveaccess to theAffirmedNetworks

FTP site to download the correct software as recommendedbyAffirmedNetworks. Also,

thebasedeploymentofmobilitymanagemententity (MME),mobile content core (MCC),

and element management system (EMS) are meant to have Juniper Networks and

Affirmed Networks Professional Services further configure these systems based on

customer environments and sizing requirements. Also, ensure that the heat templates

mentioned in these steps are included in the deployment. These will be made available

to Juniper Professional Services on request.

Before You Begin:

Before you deploy AffirmedNetworks and Juniper Networksworkloads onContrail Cloud

10.0, review the following checklist:

• Review the DPDK Guide to ensure that all configuration and tunables are configured

properly on all computes.

• Determine the hosts and the following credentials needed to deploy the mobility

workloads:

• jumphost or OSPD jumphost IP, username, and password

• Horizon administrator password

• Contrail administrator password which is usually the same as Horizon

• Ensure the quotas on the system align to the resources available on the cluster. For

example, take the total RAM on all the computes. Then take 75% of that number and

allocate as the quota for the resources. Repeat the process for the cores in all the

computes. Note the values of the quota might vary depending on the size of the

deploymentandasyousignificantlyaddmorecomputes toacluster.Here isanexample

of quotas set in OpenStack based on the above assumptions:

• openstack quota set --ram 512000 admin

• openstack quota set --instances 40 admin

• openstack quota set --cores 310 admin

• Deploy MME on page 11

• Deploy MCC on page 14

• Configure EMS, MME and MCC Network Elements on page 15

DeployMME

To deploy MME:

11Copyright © 2018, Juniper Networks, Inc.

Chapter 1: Contrail Cloud Affirmed Design and Deployment

Page 12: Contrail Cloud Affirmed Design and Deployment Guide · 2018-03-12 · •openstackstackcreatevmme-data-1-evmme040-data-1.env-t data-2ns-tmpl.yaml • openstackstackcreatevmme-lb-1-evmme040-lb-1.env-tlb-2ns-tmpl.yaml

1. Use the gunzip utility to extract the files.

sudo gzip -d epc-11.1.15.0.img.gz

2. Upload the image into OpenStack Glance:

glance image-create --name epc-11.1.15.0 --disk-format raw --container-formatbare --min-disk 2 --min-ram 4096 --visibility public --propertyhw-vif-multiqueue-enabled=true --file /var/tmp/epc-11.1.15.0.img --progress

3. Deploy the flavors:

• nova flavor-create --ephemeral 20 --swap 0 vmme-mgmt auto 8192 2 4

• nova flavor-create --ephemeral 20 --swap 0 vmme-rm auto 8192 2 4

• nova flavor-create --ephemeral 20 --swap 0 vmme-callp auto 8192 2 4

• nova flavor-create --ephemeral 20 --swap 0 vmme-sig auto 8192 2 4

• nova flavor-create --ephemeral 20 --swap 0 vmme-data auto 8192 2 4

• nova flavor-create --ephemeral 20 –-swap 0 vmme-lb auto 8192 2 4

4. Set all MME flavors for huge pages:

• openstack flavor set --property hw:mem_page_size=large vmme-mgmt

• openstack flavor set --property hw:mem_page_size=large vmme-rm

• openstack flavor set --property hw:mem_page_size=large vmme-callp

• openstack flavor set --property hw:mem_page_size=large vmme-sig

• openstack flavor set --property hw:mem_page_size=large vmme-data

• openstack flavor set --property hw:mem_page_size=large vmme-lb

5. Set all MME flavors for cpu policy and MQ:

• openstack flavor set --property hw:cpu_policy=dedicated --property

hw:vif_multiqueue_enabled=true vmme-mgmt

• openstack flavor set --property hw:cpu_policy=dedicated --property

hw:vif_multiqueue_enabled=true vmme-rm

• openstack flavor set --property hw:cpu_policy=dedicated --property

hw:vif_multiqueue_enabled=true vmme-callp

• openstack flavor set --property hw:cpu_policy=dedicated --property

hw:vif_multiqueue_enabled=true vmme-sig

• openstack flavor set --property hw:cpu_policy=dedicated --property

hw:vif_multiqueue_enabled=true vmme-lb

• openstack flavor set --property hw:cpu_policy=dedicated --property

hw:vif_multiqueue_enabled=true vmme-data

6. Deploy the Heat templates for MME base, data, andmanagement networks:

Copyright © 2018, Juniper Networks, Inc.12

Contrail Cloud Affirmed Design and Deployment Guide

Page 13: Contrail Cloud Affirmed Design and Deployment Guide · 2018-03-12 · •openstackstackcreatevmme-data-1-evmme040-data-1.env-t data-2ns-tmpl.yaml • openstackstackcreatevmme-lb-1-evmme040-lb-1.env-tlb-2ns-tmpl.yaml

• openstack stack create sg-permit-all -e contrail-security-group.env -t

contrail-security-group.yaml

• openstack stack create vmme-base-vn -e vmme040-base-network.env -t

vn_tmpl.yaml

• openstack stack create vmme-data-vn -e vmme040-data-network.env -t

vn_tmpl.yaml

• openstack stack create vmme-mgmt-vn -e vmme040-mgmt-network.env -t

vn_tmpl-rt.yaml

• openstack stack create vmme-oam-vn -e vmme040-oam-network.env -t

vn_tmpl-rt.yaml

7. Deploy the Heat templates for MME VMs:

• openstack stack create vmme-mgmt -e vmme040-mgmt-0.env -t

mgmt-0ns_tmpl.yaml

• openstack stack create vmme-rm -e vmme040-rm-0.env -t

nonmgmt-0ns_tmpl-nhc.yaml

• openstack stack create vmme-sig -e vmme040-sig-0.env -t

nonmgmt-0ns_tmpl-nhc.yaml

• openstack stack create vmme-callp -e vmme040-callp-0.env -t

nonmgmt-0ns_tmpl-nhc.yaml

• openstack stack create vmme-mgmt-1 -e vmme040-mgmt-1.env -t

mgmt-0ns_tmpl.yaml

• openstack stack create vmme-rm-1 -e vmme040-rm-1.env -t

nonmgmt-0ns_tmpl-nhc.yaml

• openstack stack create vmme-sig-1 -e vmme040-sig-1.env -t

nonmgmt-0ns_tmpl-nhc.yaml

• openstack stack create vmme-callp-1 -e vmme040-callp-1.env -t

8. Deploy the Heat templates for MME North and South and Loopback networks:

• openstack stack create vmme-ns1-vn -e vmme040-ns1-network.env -t

vn_tmpl-rt.yaml

• openstack stack create vmme-ns2-vn -e vmme040-ns2-network.env -t

vn_tmpl-rt.yaml

• openstack stack create vmme-ns-loop-vn -e vmme040-ns-loop-network.env -t

vn_tmpl-rt.yaml

9. Deploy the Heat templates for MME data and LB VMs:

• openstackstackcreatevmme-data-evmme040-data-0.env-tdata-2ns-tmpl.yaml

• openstack stack create vmme-lb -e vmme040-lb-0.env -t lb-2ns-tmpl.yaml

13Copyright © 2018, Juniper Networks, Inc.

Chapter 1: Contrail Cloud Affirmed Design and Deployment

Page 14: Contrail Cloud Affirmed Design and Deployment Guide · 2018-03-12 · •openstackstackcreatevmme-data-1-evmme040-data-1.env-t data-2ns-tmpl.yaml • openstackstackcreatevmme-lb-1-evmme040-lb-1.env-tlb-2ns-tmpl.yaml

• openstack stack create vmme-data-1 -e vmme040-data-1.env -t

data-2ns-tmpl.yaml

• openstack stack create vmme-lb-1 -e vmme040-lb-1.env -t lb-2ns-tmpl.yaml

DeployMCC

To deploy MCC:

1. Use the tar utility to extract the files:

tar –xzvf an-7.2.6.3-16.REL.kvm

2. Upload the image into OpenStack Glance:

• glance image-create --name an-7.2.6.3-16.REL-payload --disk-format qcow2

--container-format bare --visibility public --property hw_disk_bus=ide --property

hw_cdrom_bus=ide --file an-7.2.6.3-16.REL.payload.qcow2 --progress

• glance image-create --name an-7.2.6.3-16.REL-controller --disk-format qcow2

--container-format bare --visibility public --property hw_disk_bus=ide --property

hw_cdrom_bus=ide --file an-7.2.6.3-16.REL.qcow2 --progress

• glance image-create --name an-ems-v1.2 --disk-format raw --container-format

bare --min-disk 2 --min-ram 4096 --visibility public --file

an-ems-v1.2-rhel-server-6.8-x86_64-mysql-5.6.31.qcow2 --progress

3. Create the MCC OpenStack flavors:

• nova flavor-create AN-MCM auto 32768 112 8

• nova flavor-create AN-CSM auto 32768 112 8

• nova flavor-create AN-SSM auto 32768 50 16

• nova flavor-create AN-EMS-v1.2 auto 32768 600 16

4. Update the flavors with huge pages:

• openstack flavor set --property hw:mem_page_size=large AN-CSM

• openstack flavor set --property hw:mem_page_size=large AN-MCM

• openstack flavor set --property hw:mem_page_size=large AN-SSM

• openstack flavor set --property hw:mem_page_size=large AN-EMS-v1.2

5. Deploy the Heat templates for MCC:

• openstack stack createmcc-vns -eMCC-VNs-Create.env -tMCC-VNs-Create.yaml

• openstack stack create mcc-csm -e CSM-VM-Create.env -t CSM-VM-Create.yaml

• openstackstackcreatemcc-mcm-eMCM-VM-Create.env -tMCM-VM-Create.yaml

• openstack stack create mcc-ssm -e SSM-VM-Create.env -t SSM-VM-Create.yaml

• openstackstackcreatemcc-csm2-eCSM-VM2-Create.env -tCSM-VM-Create.yaml

• openstack stack create mcc-mcm2 -e MCM-VM2-Create.env -t

MCM-VM-Create.yaml

Copyright © 2018, Juniper Networks, Inc.14

Contrail Cloud Affirmed Design and Deployment Guide

Page 15: Contrail Cloud Affirmed Design and Deployment Guide · 2018-03-12 · •openstackstackcreatevmme-data-1-evmme040-data-1.env-t data-2ns-tmpl.yaml • openstackstackcreatevmme-lb-1-evmme040-lb-1.env-tlb-2ns-tmpl.yaml

• openstackstackcreatemcc-ssm2-eSSM-VM2-Create.env -tSSM-VM-Create.yaml

• openstack stack create ems -e EMS-VM-Create.env -t EMS-VM-Create.yaml

Configure EMS, MME andMCCNetwork Elements

To configure MCC, log in to the MCM either from the compute using the metadata IP

address or assign a FIP to the management IP address:

1. ssh admin@<IPaddress>password: admin

2. Type: “config”

3. (config)# cluster 17 node 1 type v-csm admin-state enabled ; top

4. (config)# cluster 17 node 12 type v-ssm admin-state enabled ; top

5. (config)# cluster 17 node 2 type v-csm admin-state enabled ; top

6. (config)# cluster 17 node 13 type v-ssm admin-state enabled ; top

(config)# commit ; exit

7. The output of the show cluster summary command should look like this:

an3000-mcm-slot7cpu1# show cluster summaryclusterSLOT CPU ADMIN CPUID NUMBER NUMBER TYPE PERSONALITY MODEL STATE HA STATE STATE CPU UPTIMERELEASE------------------------------------------------------------------------------------------------------------------------------------------17 1 1 v-csm CSM vCSM enabled active up D:002 H:00 M:11 S:02 7.2.6.3-16.REL2 1 v-csm CSM vCSM enabled active up D:001 H:23 M:54 S:09 7.2.6.3-16.REL7 1 v-mcm MCM vMCM enabled primary up D:002 H:00 M:51 S:03 7.2.6.3-16.REL8 1 v-mcm MCM vMCM enabled secondary up D:001 H:23 M:54 S:43 7.2.6.3-16.REL12 1 v-ssm SSM vSSM enabled active up D:002 H:00 M:11 S:07 7.2.6.3-16.REL13 1 v-ssm SSM vSSM enabled active up D:001 H:23 M:54 S:17 7.2.6.3-16.REL

To configure MME, log in to the management VM:

1. ssh admin@<IPaddress> password:admin

2. Config

3. epc system rm unit 0 vm-instance vmme040-rm-0

4. exit

5. epc system sig unit 0 vm-instance vmme040-sig-0

15Copyright © 2018, Juniper Networks, Inc.

Chapter 1: Contrail Cloud Affirmed Design and Deployment

Page 16: Contrail Cloud Affirmed Design and Deployment Guide · 2018-03-12 · •openstackstackcreatevmme-data-1-evmme040-data-1.env-t data-2ns-tmpl.yaml • openstackstackcreatevmme-lb-1-evmme040-lb-1.env-tlb-2ns-tmpl.yaml

6. exit

7. epc system callp 0 unit 0 vm-instance vmme040-callp-0

8. exit

9. epc system data unit 0 vm-instance vmme040-data-0

10. exit

11. epc system lb unit 0 vm-instance vmme040-lb-0

12. exit

13. epc systemmgmt unit 1 vm-instance vmme040-mgmt-1

14. exit

15. epc system rm unit 1 vm-instance vmme040-rm-1

16. exit

17. epc system sig unit 1 vm-instance vmme040-sig-1

18. exit

19. epc system callp 0 unit 1 vm-instance vmme040-callp-1

20.exit

21. epc system data unit 1 vm-instance vmme040-data-1

22. exit

23. epc system lb unit 1 vm-instance vmme040-lb-1

24.Commit

25. exit

26.The output of the show vm command should look like this:

Copyright © 2018, Juniper Networks, Inc.16

Contrail Cloud Affirmed Design and Deployment Guide

Page 17: Contrail Cloud Affirmed Design and Deployment Guide · 2018-03-12 · •openstackstackcreatevmme-data-1-evmme040-data-1.env-t data-2ns-tmpl.yaml • openstackstackcreatevmme-lb-1-evmme040-lb-1.env-tlb-2ns-tmpl.yaml

vmme040-0# show vmUNITLOCATION SERVICE ID ADMIN OPER STANDBY CPU MEMORY VERSION-----------------------------------------------------------------------------------------vmme040-mgmt-0 mgmt 0 unlocked enabled active 0 3 11.1.15.0vmme040-mgmt-1 mgmt 1 unlocked enabled hot standby 0 3 11.1.15.0vmme040-lb-0 lb 0 unlocked disabled active 0 1 11.1.15.0vmme040-lb-1 lb 1 unlocked disabled active 0 1 11.1.15.0vmme040-rm-0 rm 0 unlocked enabled active 0 9 11.1.15.0vmme040-rm-1 rm 1 unlocked enabled hot standby 0 10 11.1.15.0vmme040-callp-0 callp0 0 unlocked enabled active 3 16 11.1.15.0vmme040-callp-1 callp0 1 unlocked enabled hot standby 2 16 11.1.15.0vmme040-sig-0 sig 0 unlocked disabled active 0 1 11.1.15.0vmme040-sig-1 sig 1 unlocked disabled active 0 1 11.1.15.0vmme040-data-0 data 0 unlocked disabled active 0 1 11.1.15.0vmme040-data-1 data 1 unlocked disabled active 0 1 11.1.15.0

For EMS, the default user account credentials are:

• Username— affirmed

• Password — acuitas

• The root password — affirmedEMS

To configure EMS:

1. Install Red Hat using the ems.redhat custom image 2. 3. 4. 5. 6. 7. 8.

2. Login as root/affirmedEMS

3. Run script: root/vm_setup.sh and assign ip address and dns servers

4. rpm -ivh ems-7.3.7.0-32.rpm

5. cp /tmp/License.dat /opt/Affirmed/NMS/server/ems/conf/

6. Make sure that NTP configuration and timezone have been correctly set. Check

/etc/ntp/ntp.conf and run service ntpd restart after any change.

7. Change directory to /opt/Affirmed/NMS/bin and ./starttems.sh.

8. To check status change directory to /opt/Affirmed/NMS/binand ./emsstatus:

*********** Acuitas Server Status *************Node : emsjuniper - 10.31.7.113EMS Package : AffirmedEms-7.3.7.0-32EMS Process : Running [3573]MySQLDatabase : RunningServer Id : 1***********************************************

17Copyright © 2018, Juniper Networks, Inc.

Chapter 1: Contrail Cloud Affirmed Design and Deployment

Page 18: Contrail Cloud Affirmed Design and Deployment Guide · 2018-03-12 · •openstackstackcreatevmme-data-1-evmme040-data-1.env-t data-2ns-tmpl.yaml • openstackstackcreatevmme-lb-1-evmme040-lb-1.env-tlb-2ns-tmpl.yaml

You can now log in to the GUI (https://ip_address) as an administrator using the

following login credentials:

• Username— admin

• Password — admin123

Adding vSRX for Service Chaining in GI-LAN

To deploy vSRX devices for the GI-LAN services, see vSRX Guide for Contrail.

Copyright © 2018, Juniper Networks, Inc.18

Contrail Cloud Affirmed Design and Deployment Guide