1 Introduction
This document is part of the installation flow for the Cloud Execution Environment (CEE) single server deployment and describes how to install CEE software in a CEE region. Complete this procedure when directed here from CEE Installation:
- Start the procedure in CEE Installation.
- Continue with this document when directed here from CEE Installation.
- Return to CEE Installation and carry out the remaining steps.
For the complete installation flow, refer to section Installation Flow in CEE Installation.
This instruction assumes that a kickstart server is used. For the installation and testing of the kickstart server, refer to Preparation of Kickstart Server.
1.1 Prerequisites
This section describes the prerequisites that must be fulfilled before CEE software can be installed.
1.1.1 Documents
Activities in the following documents must be performed before the steps in this instruction are performed:
- Relevant sections of CEE Installation
- Preparation of Kickstart Server
- Configuration File Guide
- Limitations in Limitations and Workarounds for Cloud Execution Environment (CEE), Reference [1], must be known and considered
1.1.2 Hardware and Software Required
Before starting this procedure, make sure that the following software and hardware is available:
- CEE software release tarball is available, for more
information refer to the Configuration File Guide.
The required software can be downloaded from the SW Gateway. If you have problems with the download procedure, contact the next level of support.
- In case of using an unmanaged ScaleIO storage solution:
- ScaleIO server must be already installed and connected to the Data Center (DC).
- Check that the ScaleIO Data Client (SDC) kernel module
version is compatible with the software versions of the Meta Data
Manager (MDM) cluster and the ScaleIO Data Servers (SDSs). For issues
with software compatibility, contact the next level of support.
For more information about the configuration of unmanaged ScaleIO in CEE, refer to the Configuration File Guide.
The recommended installation method described in this document is using a kickstart server with Linux OS. For more information, refer to Preparation of Kickstart Server.
1.1.3 Tools
The following hardware tools are required:
- Kickstart server, refer to Preparation of Kickstart Server
- One RJ45-RJ45 cat6 Ethernet cable to connect the kickstart server to the system to be installed.
1.1.4 Installation Data
The following data is needed:
|
Data Type |
Description |
|---|---|
|
Passwords |
Initial vFuel server root user password is r00tme (used for installation only) |
|
Certificates |
Certificates for the vCIC and Atlas Northbound Interfaces (NBIs), see Section 11 Obtain certificates for the NBIs from an authorized Certification Authority (CA) before starting the installation process, because after installation it is not possible to replace certificates with ones issued on a different domain name. |
|
yaml files |
Site-specific config.yaml in /mnt/cee_config, refer to Preparation of Kickstart Server and Configuration File Guide |
|
Host networking configuration file (CEE_RELEASE/host_net_templates/host_nw_dell-single_server.yaml) | |
|
Neutron configuration file (CEE_RELEASE/neutron/neutron_ericsson_user_spec.yaml) | |
|
IP addresses |
The local version of IP and VLAN Plan updated with customer and site-specific values |
|
IP address for the kickstart server | |
|
IP addresses for vFuel in networks fuel_ctrl_sp and subrack_ctrl_sp, refer to the site-specific IP and VLAN Plan |
1.2 Time Required
The expected execution time for the installation procedure is around three hours, in case all prerequisites are available.
2 Pre-Installation Steps
There are no pre-installation procedures in the current release for single server deployment.
3 Temporary pre-Installation Steps
This section describes temporary pre-installation workarounds that are needed for this release. Carry out these workarounds before starting the installation.
3.1 Audit Log Contains Several Unfiltered CM-HA Related Events
- Note:
- This prerequisite is applicable for HPE, Dell, BSP, single server, and HDS hardware platforms.
Excessive audit logging is triggered when CM-HA logs to the infrastructure nodes, because all program executions during shell initialization are logged, not only the session start / end events. The information in these logs is not useful, and therefore not intended for the audit trail.
Associated trouble report: HW74686.
Workaround: Do the following:
Before CEE deployment, adjust the audit configuration template /var/www/nailgun/plugins/ericsson_logging-1.0/deployment_scripts/puppet/modules/ericsson_audit_logging/templates/auditd/audit.rules.erb on vFuel:
- Insert the below lines before the line that begins with # Monitoring for all :
-a exit,never -F auid=1100 -F arch=b64 -S execve
-a exit,never -F auid=1100 -F arch=b32 -S execve
This will exclude auditing program executions for the CM-HA user having UID of 1100 on all CEE systems.
4 Install CEE Software in Server System
This section describes how to install CEE in the server system.
- Log on to the kickstart server.
- Check that vFuel is running in the kickstart server:
virsh list --all
Examples:
root@fuelhost:~# virsh list --all
Id Name State
----------------------------------------------------
2 fuel_master running
root@fuelhost:~# virsh list --all
Id Name State
----------------------------------------------------
- fuel_master shut offIn case vFuel is in shut off state, start vFuel and wait until booting is complete:
virsh start fuel_master
- Log on to vFuel using SSH:
ssh root@<vfuel-ip-address-in-network-fuel_ctrl_sp>
- Verify that the correct time zone, time and date have
been set by using the below command:
date
- Change the working directory to /opt/ecs-fuel-utils with following command:
cd /opt/ecs-fuel-utils
- Set up a screen session to ensure that the installation
process is not interrupted:
# screen -S installcee -L
If the connection to vFuel is lost, log on to vFuel again and reattach the screen session with the below command:
# screen -r installcee
- Note:
- The nohup option can cause installation failure and must not be used.
- Execute the following:
./installcee.sh
The time required for command execution is approximately two hours.
Check that the printout is the following:
Ericsson CEE installed successfully
5 Temporary Installation Steps
There are no temporary installation procedures in the current release.
6 Post-Installation Steps
There are no post-installation procedures in the current release for single server deployment.
7 Temporary post-Installation Steps
There are no temporary post-installation procedures in the current release.
Depending on the CEE release and configuration, workarounds can apply to newly deployed CEE regions. Verify that all relevant workarounds in Limitations and Workarounds for Cloud Execution Environment (CEE), Reference [1] are considered and performed.
8 Post-Installation Activities
Execute the following steps after the installation:
- Verify the version of CEE by executing the command cat /etc/cee_version.txt on the Fuel master node.
The output has the following format:
RELEASE=CEE CXC1737883_4-<build_number> NAME=Mitaka on Ubuntu 14.04 VERSION=R6-<r-state>-<specific_build_number>-9.0
An example of the output is the following:
[root@fuel ~]# cat /etc/cee_version.txt RELEASE=CEE CXC1737883_4-4280 NAME=Mitaka on Ubuntu 14.04 VERSION=R6-R4A02-35547a3-9.0 [root@fuel ~]#
Verify the CEE version by comparing build_number and r-state to the Product Revision Information for Cloud Execution Environment (CEE), Reference [4].
- After installation, there is an active NeLS
Server Communication Problem alarm, because the NeLS
server is not configured and not available.
- To configure the connection to the NeLS server, follow the instructions in the Runtime Configuration Guide.
- If the alarm is not cleared, follow the instructions in the NeLS Server Communication Problem alarm OPI.
- For disaster recovery purposes, after deployment, the installation media must be backed up outside the CEE region. For more information, refer to the document Disaster Recovery.
- Continue with the relevant sections of CEE Installation.
9 Error Handling
In case of any errors during the installation procedure, follow the below steps:
- Check the console for failure messages or reference to any logs that possibly contain failure messages. Refer to the Configuration File Guide for the location of logs.
- Fix possible problems.
- Copy the original network templates to the /mnt/cee_config directory.
- Note:
- If this step is missed, VLANs and interfaces from the previous run will be used, which causes the newer configuration options to be skipped.
On the vFuel node issue the following command:
cp CEE_RELEASE/host_net_templates/host_nw_*.yaml /mnt/cee_config/
- Rerun installcee.sh and collect
logs:
./installcee.sh 2>&1 | tee <file_name>.log
- Note:
- The installcee script does not
automatically delete an existing CEE Region (Fuel environment), so
installation attempts with an existing Fuel environment will fail.
In this case reinstall CEE with the below command:
./installcee.sh --force
- The following scenarios are possible:
- The cause of failure is identified, fixed, or the install
succeeds.
In this case, exit this procedure.
- Or the cause of failure is not identified, fixed, or
the install still fails for presumably the same reason.
In this case, proceed to Step 6.
- The cause of failure is identified, fixed, or the install
succeeds.
- Perform data collection according to the Data Collection Guideline.
- Contact the next level of support.
Appendix
10 Flavor Metadata
In single server deployment of CEE, VNF instantiation requires special flavor metadata settings. For more information on single server flavor settings (flavor metadata extra specs), refer to section Limitations for Single Server Deployment in OpenStack Compute API in CEE.
11 CA and NBI Certificates for Secure HTTPS Access
Certification Authority (CA) and Northbound Interface (NBI) certificates are required for secure HTTPS access to CEE.
Make sure to perform the following tasks before starting the installation process:
- Choose a unique hostname for the vCIC NBI.
- Choose a unique hostname for the Atlas NBI.
- Obtain certificates for the NBIs from an authorized Certification
Authority (CA).
- Note:
- It is not possible to replace the certificates with ones issued on a different domain name after installation.
The following certificate files are needed:
- CA certificate (or chain of certificates) of the organization issuing the Atlas NBI
- CA certificate (or chain of certificates) of the organization issuing the vCIC NBI
- Atlas NBI certificate
- vCIC NBI certificate
The Common Name (CN) and at least one DNS entry in the Subject Alternate Name (SAN) attribute must contain the publicly known hostname chosen for the NBI, so that the certificate refers to this publicly known hostname. The private key belonging to the certificate cannot be encrypted.
- Concatenate the vCIC NBI certificate and private key into
a single PEM format under /mnt/cee_config on vFuel. Perform the same for the Atlas NBI.
ASCII format is preferred for the individual certificates.
- Note:
- The pkcs12 binary format is commonly
used. This output format contains multiple entities in a single binary
file and uses encryption. Issue the below command to convert it to
PEM format:
openssl pkcs12 -in <input_file> -out <output_file> -nodes
-nodes is needed to save the private key in unencrypted format.
In case other binary formats need to be converted, refer to Reference [2] or Reference [3].
- Update the config.yaml file with the necessary information. Refer to the Configuration File Guide for updating the publicly known hostname and other relevant options in the config.yaml file.
- Update the DNS resolver to contain the hostname and IP address pairs for the NBI.
Reference List
| [1] Limitations and Workarounds for Cloud Execution Environment (CEE) 6.6, 5/109 21-AZE 102 01/5-12 |
| [2] SSL Support. https://support.ssl.com/Knowledgebase/Article/View/19/0/der-vs-crt-vs-cer-vs-pem-certificates-and-how-to-convert-them |
| [3] Thawte Licensing. https://search.thawte.com/support/ssl-digital-certificates/index?page=content&id=SO26449 |
| [4] Product Revision Information for Cloud Execution Environment (CEE) 6.6, 109 21-AZE 102 01/5-12 Uen |

Contents