To integrate a containerized Release 21.12, 22.6, 22.12, 23.6, or 23.12 WS-NOC and the NSP
Purpose
Perform this procedure to add the NSP clusters to a containerized Release 21.12, 22.6, 22.12, 23.6, or 23.12 WS-NOC system, or to add a containerized Release 21.12, 22.6, 22.12, 23.6, or 23.12 WS-NOC system to an existing NSP deployment.
Integrated NSP and WS-NOC systems must be at compatible releases. NSP release compatibility with other systems varies; see the NSP compatibility matrix in the NSP Release Notice for the supported release combinations in shared-mode deployments.
Note: The WS-NOC supports only IPv4, so can be integrated only with an NSP system that uses IPv4 in the client and internal networks.
Note: For a shared-mode deployment, Nokia recommends that you use a common root CA in order to ensure trust among the components.
Note: release-ID in a file path has the following format:
R.r.p-rel.version
where
R.r.p is the NSP release, in the form MAJOR.minor.patch
version is a numeric value
CAUTION Service Disruption |
Performing the procedure requires stopping and starting the WS-NOC, which is service-affecting.
Perform the procedure only during a maintenance period of low network activity.
CAUTION Data loss |
Adding an WS-NOC system to an existing deployment that includes an NSP cluster does not restore the Neo4j or PostgreSQL databases from the WS-NOC system. The WS-NOC system is synchronized with the NSP, after which manual actions are required to recreate the data.
When the integration is complete, you must recreate the WS-NOC system and user settings in the NSP.
Note: You require root and nsp user privileges on each WS-NOC server station and each NSP cluster host station.
Note: The following RHEL CLI prompts in command lines denote the active user, and are not to be included in typed commands:
Note: Ensure that the “IPCalc” package is installed on all VMs that will host any WS-NOC software.
Before you begin
Steps
1 |
Perform one of the following:
|
Integrate WS-NOC Release 22.6, 22.12, 23.6, or 23.12 with the NSP | |
2 |
Ensure that the WS-NOC Release 22.6, 22.12, 23.6, or 23.12 system is running and operational. |
3 |
Log in to the WS-NOC server as the root user. |
4 |
Perform the following steps.
Note: When NSP is set as the authentication server for WS-NOC, a corresponding user with the required permissions must be created on WS-NOC application for each user created on NSP. See the WS-NOC Administration Guide for information about user management on WS-NOC. |
5 |
Perform one of the following:
|
6 |
Delete the nspca.tar file. Execute: # rm -rf /opt/nsp/NSP-CN-DEP-release-ID/NSP-CN-release-ID/tls/ca/nspca.tar |
7 |
Enter the following: # /install_dir/setup/config.sh ↵ The WS-NOC configuration is updated. |
8 |
Perform one of the following:
|
9 |
On the WS-NOC server, enter the following: # /install_dir/setup/generateAndAlignCertificates.sh ↵ The WS-NOC aligns the TLS certificates. |
10 |
If the WS-NOC is being integrated in a shared NSP installation, remove the reference to the nspos container from zookeeper:
|
11 |
If you are integrating a WS-NOC in HA mode, perform the following steps. These steps must be performed on both HA sites, first for the standby site and then for the primary site. Do not perform functional tests before this part of the procedure is completed.
When these steps have been performed on both HA sites, first on standby and then on primary, the HA replica can be restarted. |
12 |
Go to Step 23. |
Configure WS-NOC | |
13 |
If using customer-provided certificates, perform the following:
|
14 |
Perform one of the following:
|
15 |
Delete the nspos.tar file from the NSP. Execute: # rm -rf nspos.tar |
16 |
Open the following file on the WS-NOC server using a plain-text editor such as vi: /nfmt/config/bench/parameters.cfg |
17 |
Set the NSP_OS_CONFIGURED parameter to “true”. |
18 |
Save and close the file. |
19 |
Execute: mkdir /nokia ↵ cp /tmp/nspca.tar /nokia/ ↵ touch /nokia/nspOS.cfg Note: If the NSP was deployed in a 1+1 redundancy configuration, both the primary and standby NSP server IP addresses must be specified, separated by a semicolon. |
20 |
Edit the nspOS.cfg file, adding the NSP_IP parameter. Note: If the NSP system was deployed in a DR configuration, both the active and standby addresses should be added in the following format: NSP_IP1; NSP_IP2. |
21 |
Perform one of the following:
|
22 |
If you are integrating an WS-NOC running Release 21.12, the nspos container on the WS-NOC will display as being down. To address this issue by removing the container reference, run the following commands: # docker exec -it mnc-admin bash ↵ # su otn ↵ # /nfmt/system-monitor/scripts/remove_oldref.sh nspos ↵ # /nfmt/setup/mnc.sh restart containerName=otntomcat ↵ |
Roll back configuration, if required | |
23 |
If required, rollback the integration by performing the following:
|
Enable the Back to Launchpad option on the WS-NOC GUI | |
24 |
Log in to the WS-NOC VM. |
25 |
Connect to the otntomcat container on WS-NOC. Execute the following commands:
|
26 |
Modify the systemProperty.json and the systemProperty.json.VMs files so that the "nspIsConfigured" parameter is set to false. |
27 |
Exit the container and refresh the GUI page. Note: The otntomcat container does not need to be restarted. |
Post-integration steps required when using customer-provided certificates: | |
28 |
If WS-NOC is deployed in HA mode, execute the following on the standby WS-NOC server to align HA status: # sudo rm -rf /install_dir/setup/config/httpscertificates ↵ # su - root scp -r <active alias or IP>:/install_dir/setup/config/httpscertificates /install_dir/setup/config/ ↵ # sudo rm -rf /install_dir/app/common/.ssl ↵ # su -root scp -r active_alias_or_IP:/install_dir/app/common/.ssl install_dir/app/common/ ↵ # sudo docker start nfmt-setup ↵ # sudo mnc.sh restart apps ↵ |
29 |
In the mnc-admin and nrct-tapi containers, execute: chmod 644 /nfmt/instance/certificates/External/keystore.ks ↵ chmod 644 /nfmt/instance/certificates/External/key.pem ↵ mkdir -p /nfmt/config/tempcustom/nfmt/instance/certificates/External/ ↵ cp /nfmt/instance/certificates/External/keystore.ks /nfmt/config/tempcustom/nfmt/instance/certificates/External/ ↵ cp /nfmt/instance/certificates/External/key.pem /nfmt/config/tempcustom/nfmt/instance/certificates/External/ ↵ |
30 |
In the mnc-fm, pm-components, pm-hadoop, pm-kafka, and pm-spark containers, execute: chmod 644 /nfmt/instance/certificates/External/keystore.ks ↵ mkdir -p /nfmt/config/tempcustom/nfmt/instance/certificates/External/ ↵ cp /nfmt/instance/certificates/External/keystore.ks /nfmt/config/tempcustom/nfmt/instance/certificates/External/ ↵ |
31 |
Navigate to System Control within WS-NOC. If any processes are 'down', login to their individual containers and start them by executing: /umc/plat/script/mngApp startup process_name ↵ |
32 |
Close the open console windows. End of steps |