CPS Temporal Documentation

CPS Temporal Overview

CPS Temporal is a service component belonging to CPS overall system.

This service is responsible to provide a time oriented perspective for operational network data. It provides features to store and retrieve sequences of configurations or states along with the associated times when they occurred or have been observed.

CPS Temporal Architecture

CPS Temporal is a dedicated service, distinct and decoupled from CPS Core. CPS Temporal service is an independently deployable unit.

Integration between Core and Temporal is event notification based, asynchronous, send and forget. By doing this, we are avoiding the dependency from CPS Core on CPS Temporal and its API. It reverses the dependency, which makes more sense from a conceptual point of view.

For each data modification handled by CPS Core,

  • CPS Core is publishing, to a dedicated topic, an event representing the data configuration or state.

  • CPS Temporal is listening to the same topic for the event and is responsible to keep track of all data over time.

In the future, some other services can be created to listen to the same topic to implement additional functionalities or storage forms.

The event messaging system for this integration is Kafka, whose running instance is deployed independently from CPS. It could be either:

  • the ONAP Kafka instance from ONAP DMaaP component,

  • or any specific Kafka instance deployed independently from ONAP

The following diagram is the C4 Model representing CPS System Containers:

C4 Model Diagram: Containers for CPS Software system

CPS Temporal Design

Exposed APIs

CPS Temporal is providing a REST HTTP API to query historical CPS data. Its OPEN API Specification can be found either:

  • In openapi.yml file

  • At https://<cps-temporal-host>:<cps-temporal-port>/swagger/openapi.yml endpoint available on CPS Temporal running instance

Swagger UI is also available at:

  • https://<cps-temporal-host>:<cps-temporal-port>/swagger-ui.html

And following Postman collection can be used to send requests to any running instance:

Event Integration

CPS Core and CPS Temporal are integrated with an event driven architecture. Integration between these two components is event notification based.

For each data modification handled by CPS Core,

  • CPS Core is publishing, to a dedicated Kafka topic, an event representing the data configuration or state.

  • CPS Temporal is listening to the same topic for the event and is responsible to keep track of all data over time.

Refer to CPS Temporal Modeling for more details on the event structure.

CPS Temporal Modeling

Event Structure

Data manipulated by both CPS Core and CPS Temporal to represent a Data Updated Event is a JSON structure that is defined by following Json Schema:

And following is an example of an event compliant with this schema:

{
    "schema": "urn:cps:org.onap.cps:data-updated-event-schema:v1",
    "id": "38aa6cc6-264d-4ede-b534-18f5c1f403ea",
    "source": "urn:cps:org.onap.cps",
    "type": "org.onap.cps.data-updated-event",
    "content": {
        "observedTimestamp": "2021-06-09T13:00:00.123-0400",
        "dataspaceName": "my-dataspace",
        "schemaSetName": "my-schema-set",
        "anchorName": "my-anchor",
        "data": {
            "interface": {
                "name": "itf-1",
                "status": "up"
            }
        }
    }
}

CPS Temporal Deployment

Deployment

Refer to CPS-Deployment page for deployment documentation related to CPS Temporal and all CPS components.

Once CPS Temporal is successfully deployed and running 2 pods are started, one for running the service and another one for running the database instance:

NAME                                            READY   STATUS             RESTARTS   AGE
cps-temporal-d4cf495b9-bbn7b                    1/1     Running            0          8h
cps-temporal-db-0                               1/1     Running            0          8h

Configuration

Application Properties

The following table lists some properties that can be specified as Helm chart values to configure the application to be deployed. This list is not exhaustive.

Property

Description

Default Value

config.appUserName

User name used by CPS Temporal service to configure the authentication for REST API it exposes.

This is the user name to be used by CPS Temporal REST clients to authenticate themselves.

cpstemporaluser

config.appUserPassword

Password used by CPS Temporal service to configure the authentication for REST API it exposes. This is the password to be used by CPS Temporal REST clients to authenticate themselves. If not defined, the password is generated when deploying the application. See also CPS Credentials Retrieval

Not defined

timescaledb.config.pgUserName

Internal user name used bt CPS Temporal to connect to its own database.

cpstemporal

timescaledb.config.pgUserPassword

Internal password used bt CPS Temporal to connect to its own database.

If not defined, the password is generated when deploying the application.

See also Credentials section.

Not defined

config.eventConsumption. spring.kafka.bootstrap-servers

Kafka hostname and port

message-router-kafka:9092

config.eventConsumption. spring.kafka.consumer.group-id

Kafka consumer group id

cps-temporal-group

config.eventConsumption. app.listener.data-updated.topic

Kafka topic to listen to

cps.data-updated-events

config.eventConsumption. spring.kafka.security.protocol

Kafka security protocol. Some possible values are:

  • PLAINTEXT

  • SASL_PLAINTEXT, for authentication

  • SASL_SSL, for authentication and encryption

PLAINTEXT

config.eventConsumption. spring.kafka.properties. sasl.mechanism

Kafka security SASL mechanism. Required for SASL_PLAINTEXT and SASL_SSL protocols. Some possible values are:

  • PLAIN, for PLAINTEXT

  • SCRAM-SHA-512, for SSL

Not defined

config.eventConsumption. spring.kafka.properties. sasl.jaas.config

Kafka security SASL JAAS configuration. Required for SASL_PLAINTEXT and SASL_SSL protocols. Some possible values are:

  • org.apache.kafka.common.security.plain.PlainLoginModule required username="..." password="...";, for PLAINTEXT

  • org.apache.kafka.common.security.scram.ScramLoginModule required username="..." password="...";, for SSL

Not defined

config.eventConsumption. spring.kafka.ssl.trust-store-type

Kafka security SASL SSL store type. Required for SASL_SSL protocol. Some possible values are:

  • JKS

Not defined

config.eventConsumption. spring.kafka.ssl.trust-store-location

Kafka security SASL SSL store file location. Required for SASL_SSL protocol.

Not defined

config.eventConsumption. spring.kafka.ssl.trust-store-password

Kafka security SASL SSL store password. Required for SASL_SSL protocol.

Not defined

config.eventConsumption. spring.kafka.properties. ssl.endpoint.identification.algorithm

Kafka security SASL SSL broker hostname identification verification. Required for SASL_SSL protocol. Possible value is:

  • "", empty string to disable

Not defined

config.additional. app.query.response.max-page-size

Maximum number of elements that can be retrieved by a single REST API query request using pagination feature.

20

config.additional. spring.datasource.hikari. maximumPoolSize

Maximum number of database connections in the connection pool.

10

Credentials

Once the deployment is completed, refer to CPS Credentials Retrieval

for more information related to credentials retrieval.

Running With Docker

For development purposes, CPS Temporal can be ran on any environment using Docker. Refer to README.md and docker-compose.yml files for more details.

CPS Temporal Admin Guide

Configuration

Refer to CPS Temporal Deployment for application properties available to configure the application.

Logging

Refer to CPS Logging for documentation related to CPS Temporal and all CPS components logging information.

Monitoring

Refer to CPS Monitoring page for documentation related to CPS Temporal and all CPS components monitoring information.

CPS Temporal Release Notes

Version: 1.0.1

  • Release Date: 2021-01-06 (Istanbul)

Artifacts released

Repository

Docker Image

onap/cps-temporal

onap/cps-temporal:1.0.1

Features

  • None

Bug Fixes

  • CPS-841 Update log4j version to 2.17.1 due to security vulnerability

Version: 1.0.0

  • Release Date: 2021-09-14 (Istanbul)

Artifacts released

Repository

Docker Image

onap/cps-temporal

onap/cps-temporal:1.0.0

New features

  • CPS-369 - Feature to store temporal data corresponding to CPS Core data node updates.

  • CPS-370 - Feature to query temporal data from REST API.

Known Limitations, Issues and Workarounds

  • None

Security Notes

Known Security Issues:

  • CPS-488 - Authentication and authorization for REST API is limited to one generic user.

Fixed Security Issues:

  • None

CPS-NCMP Documentation

DMI-Plugin Documentation