1、 ETSI GR NFV-TST 005 V3.1.1 (2017-03) Network Functions Virtualisation (NFV); Continuous Development and Integration; Report on use cases and recommendations for VNF Snapshot Disclaimer The present document has been produced and approved by the Network Functions Virtualisation (NFV) ETSI Industry Sp
2、ecification Group (ISG) and represents the views of those members who participated in this ISG. It does not necessarily represent the views of the entire ETSI membership. GROUP REPORT ETSI ETSI GR NFV-TST 005 V3.1.1 (2017-03) 2 Reference DGR/NFV-TST005 Keywords management, NFV, testing ETSI 650 Rout
3、e des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice The present document can be downloaded from: http:/www.etsi.
4、org/standards-search The present document may be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference i
5、n contents between such versions and/or in print, the only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of
6、status. Information on the current status of this and other ETSI documents is available at https:/portal.etsi.org/TB/ETSIDeliverableStatus.aspx If you find errors in the present document, please send your comment to one of the following services: https:/portal.etsi.org/People/CommiteeSupportStaff.as
7、px Copyright Notification No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI. The content of the PDF version shall not be modified without the written authorization of ET
8、SI. The copyright and the foregoing restriction extend to reproduction in all media. European Telecommunications Standards Institute 2017. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTMand the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM and LTE are Trade Mar
9、ks of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. GSM and the GSM logo are Trade Marks registered and owned by the GSM Association. ETSI ETSI GR NFV-TST 005 V3.1.1 (2017-03) 3 Contents Intellectual Property Rights 5g3Foreword . 5g31 Scope 6g32 References 6
10、g32.1 Normative references . 6g32.2 Informative references 6g33 Definitions and abbreviations . 7g33.1 Definitions 7g33.2 Abbreviations . 7g34 Use cases 7g34.1 Use cases related to testing . 7g34.1.1 VNF Snapshot during online testing . 7g34.1.1.1 Introduction . 7g34.1.1.2 Actors 8g34.1.1.3 Pre-cond
11、itions . 8g34.1.1.4 Description 8g34.1.1.5 Post-conditions 9g34.2 Use cases related to troubleshooting 9g34.2.1 VNF Snapshot for root cause analysis 9g34.2.1.1 Introduction . 9g34.2.1.2 Actors 10g34.2.1.3 Pre-conditions . 10g34.2.1.4 Description 10g34.2.1.5 Post-conditions 10g34.3 Use cases related
12、to agile lifecycle management of VNF 10g34.3.1 VNF Snapshot during VNF lifecycle procedure . 10g34.3.1.1 Introduction . 10g34.3.1.2 Actors 10g34.3.1.3 Pre-conditions . 11g34.3.1.4 Description 11g34.3.1.5 Post-conditions 11g34.3.2 VNF Snapshot for quick VNF recovery . 11g34.3.2.1 Introduction . 11g34
13、.3.2.2 Actors 11g34.3.2.3 Pre-conditions . 11g34.3.2.4 Description 11g34.3.2.5 Post-conditions 12g35 Gap analysis . 12g35.1 Current supporting solutions 12g35.1.1 Overview 12g35.1.2 Snapshot techniques 13g35.1.3 Snapshot capabilities. 13g35.1.3.1 Introduction . 13g35.1.3.2 Create instance snapshot .
14、 14g35.1.3.3 Revert instance to Snapshot 14g35.1.3.4 Update instance Snapshot . 15g35.1.3.5 List instance snapshots 15g35.1.3.6 Show instance Snapshot details . 16g35.1.3.7 Delete instance snapshot . 16g35.1.3.8 Export instance snapshot . 16g35.1.3.9 Import instance snapshot . 16g35.2 Analysis of us
15、e cases and conditions on VNF/VNFC Snapshots . 17g35.2.1 VNF Snapshot lifecycle 17g35.2.2 Create a VNF Snapshot . 17g3ETSI ETSI GR NFV-TST 005 V3.1.1 (2017-03) 4 5.2.3 Revert a VNF Snapshot 18g35.2.4 Create a VNF Snapshot Package 18g35.2.5 Extract a VNF Snapshot Package . 18g35.2.6 Export a VNF Snap
16、shot Package 19g35.2.7 Import a VNF Snapshot Package 19g35.2.8 Query VNF Snapshot Package Information 19g35.2.9 Delete a VNF Snapshot Package 20g35.3 Identification of gaps 20g36 Framework, procedures and solutions analysis 23g36.1 Introduction/Concept 23g36.1.1 What is a snapshot?. 23g36.1.2 Operat
17、ions and commands on a VNF Snapshot 24g36.2 Overview 24g36.3 Framework . 25g36.4 VNFC Snapshot Procedures . 26g36.4.1 Create VNFC Snapshot Procedure in direct resource management mode 26g36.4.2 Create VNFC Snapshot Procedure in indirect resource management mode . 29g36.4.3 Revert to VNFC Snapshot Pr
18、ocedure in direct resource management mode 31g36.4.4 Revert to VNFC Snapshot Procedure in indirect resource management mode . 33g36.5 VNF Snapshot Procedures 35g36.5.1 Create VNF Snapshot Procedure 35g36.5.2 Revert to VNF Snapshot Procedure 36g36.6 VNFC Snapshot Package Procedures . 38g36.6.1 Create
19、 VNFC Snapshot Package Procedure in direct resource management mode 38g36.6.2 Create VNFC Snapshot Package Procedure in indirect resource management mode . 38g36.6.3 Extract VNFC Snapshot Package Procedure in direct resource management mode . 39g36.6.4 Extract VNFC Snapshot Package Procedure in indi
20、rect resource management mode 40g36.7 VNF Snapshot Package Procedures . 41g36.7.1 Create VNF Snapshot Package Procedure 41g36.7.2 Extract VNF Snapshot Package Procedure . 42g36.7.3 Export VNF Snapshot Package Procedure 43g36.7.4 Import VNF Snapshot Package Procedure 44g36.7.5 Query VNF Snapshot Pack
21、age Information Procedure 45g36.7.6 Delete VNF Snapshot Package Procedure 46g37 Recommendations 47g37.1 Overview 47g37.2 Recommendations for the NFV-MANO 47g37.2.1 Recommendations for the NFVO . 47g37.2.2 Recommendations for the VNFM . 47g37.2.3 Recommendations for the VIM 48g37.3 Recommendations fo
22、r VNF Snapshot Descriptor(s) 49g37.4 Recommendations for the NFVI 49g37.5 Recommendations for the reference points and interfaces . 50g37.5.1 Recommendations for the Vi-Vnfm reference point . 50g37.5.2 Recommendations for the Or-Vi reference point 51g37.5.3 Recommendations for the Or-Vnfm reference
23、point. 51g37.5.4 Recommendations for a VNF Snapshot Package Management interface . 52g37.5.5 Recommendations for the Ve-Vnfm-vnf reference point . 52g37.5.6 Recommendations for a VNF Snapshot Notification interface . 52g37.5.7 Recommendations for the Ve-Vnfm-em reference point 53g37.5.8 Recommendati
24、ons for the Os-Ma-Nfvo reference point . 53g3Annex A: Solutions analysed in clause 5 Gap analysis . 54g3Annex B: Authors Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI We
25、b server (https:/ipr.etsi.org/). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may
26、 become, essential to the present document. Foreword This Group Report (GR) has been produced by ETSI Industry Specification Group (ISG) Network Functions Virtualisation (NFV). Modal verbs terminology In the present document “should“, “should not“, “may“, “need not“, “will“, “will not“, “can“ and “c
27、annot“ are to be interpreted as described in clause 3.2 of the ETSI Drafting Rules (Verbal forms for the expression of provisions). “must“ and “must not“ are NOT allowed in ETSI deliverables except when used in direct citation. ETSI ETSI GR NFV-TST 005 V3.1.1 (2017-03) 6 1 Scope The present document
28、 reports on use cases, recommendations and potential solutions for VNF snapshotting, with the following objectives: a) Describing use cases that would benefit from VNF Snapshot functionality. b) Identifying gaps by studying the conditions for capturing VNF/VNFC Snapshots and VNF data. c) Describing
29、end-to-end orchestration procedures and overall framework supporting the capture of VNF data and VNF/VNFC Snapshots. d) Analysing recommendations for the support of VNF/VNFC Snapshots. The present document considers analysing and leveraging available related techniques from Open Source and others. 2
30、 References 2.1 Normative references Normative references are not applicable in the present document. 2.2 Informative references References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version
31、 applies. For non-specific references, the latest version of the referenced document (including any amendments) applies. NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their long term validity. The following referenced documents are no
32、t necessary for the application of the present document but they assist the user with regard to a particular subject area. i.1 ETSI GS NFV 003: “Network Functions Virtualisation (NFV); Terminology for Main Concepts in NFV“. i.2 ETSI GS NFV-IFA 005: “Network Functions Virtualisation (NFV); Management
33、 and Orchestration; Or-Vi reference point - Interface and Information Model Specification“. i.3 ETSI GS NFV-IFA 006: “Network Functions Virtualisation (NFV); Management and Orchestration; Vi-Vnfm reference point - Interface and Information Model Specification“. i.4 ETSI GS NFV-IFA 007: “Network Func
34、tions Virtualisation (NFV); Management and Orchestration; Or-Vnfm reference point - Interface and Information Model Specification“. i.5 ETSI GS NFV-IFA 008: “Network Functions Virtualisation (NFV); Management and Orchestration; Ve-Vnfm reference point - Interface and Information Model Specification“
35、. i.6 ETSI GS NFV-IFA 011: “Network Functions Virtualisation (NFV); Management and Orchestration; VNF Packaging Specification“. ETSI ETSI GR NFV-TST 005 V3.1.1 (2017-03) 7 3 Definitions and abbreviations 3.1 Definitions For the purposes of the present document, the terms and definitions given in ETS
36、I GS NFV 003 i.1 and the following apply. A term defined in the present document takes precedence over the definition of the same term, if any, in ETSI GS NFV 003 i.1. service consumer: person, device or company consuming a service provided by a Service Provider VNF provider: person or company provi
37、ding the VNF NOTE: This includes, but is not limited to vendor, integrator or in-house developer. VNF Snapshot: replication of a VNF instance at a specific point in time, containing a consistent set of VNFC Snapshots of all VNFC instances associated to the VNF instance, the VNF Descriptor and the Vn
38、fInfo (including state and settings of Virtual Links and Connection Points associated to this VNF) VNF Snapshot Package: collection of files representing a VNF Snapshot which can be physically stored and transferred NOTE: A more detailed description of VNF/VNFC Snapshots and their packages is provid
39、ed in clause 6.1. VNFC Snapshot: replication of a VNFC instance at a specific point in time, capturing its full or partial state (such as state and content of the disks, memory and devices attached to the VNFC instance plus the infrastructure configuration of the VNFC instance) VNFC Snapshot Package
40、: collection of files representing a VNFC Snapshot which can be physically stored and transferred 3.2 Abbreviations For the purposes of the present document, the abbreviations given in ETSI GS NFV 003 i.1 apply. 4 Use cases 4.1 Use cases related to testing 4.1.1 VNF Snapshot during online testing 4.
41、1.1.1 Introduction Service Providers which use NFV technology verify their virtualised network system (i.e. network service) that they developed by testing from various viewpoints, and once all the system behaviours that will happen during operation in the production environment are thoroughly teste
42、d in the testing environment, the Service Providers begin to provide the service using the network system on the production environment. However, the virtualised network systems have been getting complicated due to multi-vendor environment, adoption of variety of open source software, etc., hence it
43、 has been getting difficult to verify all the system behaviours thoroughly in the testing environment. If a service is provided under such a situation, it is considered that the possibility of service outage would increase because of the underlying bugs in the production system. ETSI ETSI GR NFV-TST
44、 005 V3.1.1 (2017-03) 8 Therefore, it is necessary to reveal and remove the underlying bugs from the network system by continually verifying the network system which is already providing the service on the production environment. This clause calls this kind of testing online testing. If the Service
45、Providers verify the systems which are in operation by online testing, they can conduct various tests under the real complex system states which are created by real users. It is expected that the systems are tested under more realistic conditions and that the underlying bugs in the system will be ea
46、sier to be found and removed compared with the testing environment. The online testing includes fault injection testing (e.g. by stop a VM at random), load injection testing (e.g. by adding large amount of traffic), etc. to verify reliability/availability of the system. By practicing this kind of te
47、sts continually “in a controlled manner“, the service provider can discover and fix potential bugs which could not be found in the testing environment, build up more robust system, and prevent the system from major service outages. The online testing should be done in a controlled manner, as this te
48、sting may affect the running system especially when the test fails, which means an underlying bug is revealed by the test. To conduct online tests in a controlled manner, one thing is to reinforce monitoring around tested area and then the Service Provider can react a test failure immediately if it
49、happens. Another is to capture data of the VNF instances which are potentially affected by the test prior to the test. This can be done by taking VNF Snapshots. In case the test fails and the VNF instance cannot recover after restart, the capture data/VNF Snapshots will be used to recover the (failed) VNF instances to a previous normal running status without consuming time to inject any configuration data (If those VNF instances are deleted and re-instantiated without using snapshots, it will take time to make the VNF instances be ready to start the services
copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1