User guide
Once the SHIELD components are installed and configured, the components are ready to use and/or to access. This guide provides pointers on how to access each component.
The following components are described:
- vNSF Ecosystem
- Trusted Infrastructure
- Big Data Analytics
- Infrastructure
vNSF Ecosystem
vNSF Store
- The component is running at "http://$host_ip:5050" (where "$host_ip" is the IP of the node where the component runs)
- There is no GUI served. REST-enabled clients (e.g., cURL) are the expected way to use
- The list of available REST endpoints is defined in Swagger
vNSF Orchestrator
- The component will typically run at "https://$host_ip:8443" (where "$host_ip" is the IP of the node where the component runs, and where HTTP/HTTPS and the port are configurable).
-
There is no GUI served. REST-enabled clients (e.g., cURL) are the expected way to use.
Swagger documentation is shown directly when accessing the endpoint via a browser - The list of available REST endpoints is defined in Swagger
Trusted Infrastructure
Trust Monitor
- The component runs at "https://$host_ip:443" (where "$host_ip" is the IP of the node where the component runs).
-
There is no GUI served. REST-enabled clients (e.g., cURL) are the expected way to use.
Django REST interface is shown when accessing the endpoint via a browser -
The list of available REST endpoints is defined in Django and below:
- Status information on the application: GET on https://$host_ip:443/status/
-
Registration of a node: https://$host_ip:443/register_node/
-
POST with body: '{"distribution": "
", "hostName": " ", "driver":"OAT/OpenCIT/HPESwitch", "address": "xxx.xxx.xxx.xxx"}' -
DELETE with body: '{"hostName": "
"}'
-
POST with body: '{"distribution": "
-
Attestation of a node: https://$host_ip:443/attest_node/
-
GET to https://$host_ip:443/nfvi_pop_attestation_info?node_id=
or to https://$host_ip:443/nfvi_attestation_info/ -
POST with body: '{"node_list" : [{"node" : "
"}]}'
-
GET to https://$host_ip:443/nfvi_pop_attestation_info?node_id=
Big Data Analytics
Security Dashboard
- The component runs at "http://$host_ip/#/shield/home/dashboard" (where "$host_ip" is the IP of the node where the component runs). Read more on the Dashboard design
- A GUI is served. Browsers are the expected way to use
-
The GUI operates with multiple users. Below you can find a reference:
-
SHIELD Administrator: performs all the Operations & Maintenance (O&M) tasks available for a SHIELD instance, having the highest level of privileges granted to a user. It is the user that can create SecaaS clients and onboard NSs.
username: admin password: adminpass client: default
-
SecaaS Administration: performs all the O&M tasks associated with a specific SecaaS client, having the highest level of privileges granted to a user tasked with managing a SecaaS client. Can select the NSs to use for the client.
username: shield.client.admin password: pass client: shield-uw
-
Developer: can submit vNSFs for onboarding into the platform. It is also the role with the least privileges granted in the entire platform.
username: shield.developer password: pass client: shield-developers
-
SHIELD Administrator: performs all the Operations & Maintenance (O&M) tasks available for a SHIELD instance, having the highest level of privileges granted to a user. It is the user that can create SecaaS clients and onboard NSs.
Infrastructure
Big Data cluster
- The tool runs at "http://$host_ip:7180/cmf/services/10/instances" (where "$host_ip" is the IP of the node where the component runs)
- A GUI is served. Browsers are the expected way to use
VIM for the VNFs
OpenStack Ocata
- The tool will typically run at "https://$host_ip/auth/login/?next=" (where "$host_ip" is the IP of the node where the tool runs, and where HTTP/HTTPS is configurable)
- A GUI is served. Browsers are the expected way to use
vim-emu
- The tool connects Docker with some emulated OpenStack APIs, so it is reachable by the typical Docker commands (e.g., "docker ps -a")
- No GUI is served. CLI is the expected way to use
NFVO
OSM release FIVE
- The tool runs at "http://$host_ip/auth/?next=/" (where "$host_ip" is the IP of the node where the tool runs)
- A GUI is served. Browsers, CLI and REST-enabled clients (e.g., cURL) are the expected way to use
-
The GUI operates with multiple users. The default one is:
username: admin password: admin
SDN controller
- The tool runs at "http://$host_ip:8181/index.html#/login" (where "$host_ip" is the IP of the node where the tool runs)
- A GUI is served. Browsers, CLI (via Karaf) and REST-enabled clients (e.g., cURL) are the expected way to use
-
The list of available REST endpoints is defined in "http://$host_ip:8181/apidoc/explorer/index.html". Some examples below:
-
Get flows from the operational endpoint:
curl -v --user "admin":"admin" -H "Accept:application/json" http://$host_ip:8181/restconf/operational/opendaylight-inventory:nodes/node/openflow:112591078470795328/flow-node-inventory:table/0
-
Get flows from the config endpoint:
curl -v --user "admin":"admin" -H "Accept:application/json" http://$host_ip:8181/restconf/config/opendaylight-inventory:nodes/node/openflow:112591078470795328/table/0
-
Push flows to the config endpoint:
curl -v --user "admin":"admin" -H "Accept:application/xml" -H "Content-type: application/xml" -X PUT -d '
' http://$host_ip:8181/restconf/config/opendaylight-inventory:nodes/node/openflow:112713206571380736/flow-node-inventory:table/0/flow/L2switch-0L2switch-0 0 0 3098476543630901248 0 0 65535 NORMAL 100 0 0 42000000 2064 0
-
Get flows from the operational endpoint:
-
The GUI operates with a default user:
username: admin password: admin