CPS Temporal Documentation
CPS Temporal Overview
CPS Temporal is a service component belonging to CPS overall system.
This service is responsible to provide a time oriented perspective for operational network data. It provides features to store and retrieve sequences of configurations or states along with the associated times when they occurred or have been observed.
CPS Temporal Architecture
CPS Temporal is a dedicated service, distinct and decoupled from CPS Core. CPS Temporal service is an independently deployable unit.
Integration between Core and Temporal is event notification based, asynchronous, send and forget. By doing this, we are avoiding the dependency from CPS Core on CPS Temporal and its API. It reverses the dependency, which makes more sense from a conceptual point of view.
For each data modification handled by CPS Core,
CPS Core is publishing, to a dedicated topic, an event representing the data configuration or state.
CPS Temporal is listening to the same topic for the event and is responsible to keep track of all data over time.
In the future, some other services can be created to listen to the same topic to implement additional functionalities or storage forms.
The event messaging system for this integration is Kafka, whose running instance is deployed independently from CPS. It could be either:
the ONAP Kafka instance from ONAP DMaaP component,
or any specific Kafka instance deployed independently from ONAP
The following diagram is the C4 Model representing CPS System Containers:

CPS Temporal Design
Exposed APIs
CPS Temporal is providing a REST HTTP API to query historical CPS data. Its OPEN API Specification can be found either:
In
openapi.yml
fileAt
https://<cps-temporal-host>:<cps-temporal-port>/swagger/openapi.yml
endpoint available on CPS Temporal running instance
Swagger UI is also available at:
https://<cps-temporal-host>:<cps-temporal-port>/swagger-ui.html
And following Postman collection can be used to send requests to any running instance:
Event Integration
CPS Core and CPS Temporal are integrated with an event driven architecture. Integration between these two components is event notification based.
For each data modification handled by CPS Core,
CPS Core is publishing, to a dedicated Kafka topic, an event representing the data configuration or state.
CPS Temporal is listening to the same topic for the event and is responsible to keep track of all data over time.
Refer to CPS Temporal Modeling for more details on the event structure.
CPS Temporal Modeling
Event Structure
Data manipulated by both CPS Core and CPS Temporal to represent a Data Updated Event is a JSON structure that is defined by following Json Schema:
And following is an example of an event compliant with this schema:
{
"schema": "urn:cps:org.onap.cps:data-updated-event-schema:v1",
"id": "38aa6cc6-264d-4ede-b534-18f5c1f403ea",
"source": "urn:cps:org.onap.cps",
"type": "org.onap.cps.data-updated-event",
"content": {
"observedTimestamp": "2021-06-09T13:00:00.123-0400",
"dataspaceName": "my-dataspace",
"schemaSetName": "my-schema-set",
"anchorName": "my-anchor",
"data": {
"interface": {
"name": "itf-1",
"status": "up"
}
}
}
}
CPS Temporal Deployment
Deployment
Refer to CPS-Deployment page for deployment documentation related to CPS Temporal and all CPS components.
Once CPS Temporal is successfully deployed and running 2 pods are started, one for running the service and another one for running the database instance:
NAME READY STATUS RESTARTS AGE
cps-temporal-d4cf495b9-bbn7b 1/1 Running 0 8h
cps-temporal-db-0 1/1 Running 0 8h
Configuration
Application Properties
The following table lists some properties that can be specified as Helm chart values to configure the application to be deployed. This list is not exhaustive.
Property |
Description |
Default Value |
---|---|---|
config.appUserName |
User name used by CPS Temporal service to configure the authentication for REST API it exposes. This is the user name to be used by CPS Temporal REST clients to authenticate themselves. |
|
config.appUserPassword |
Password used by CPS Temporal service to configure the authentication for REST API it exposes. This is the password to be used by CPS Temporal REST clients to authenticate themselves. If not defined, the password is generated when deploying the application. See also CPS Credentials Retrieval |
Not defined |
timescaledb.config.pgUserName |
Internal user name used bt CPS Temporal to connect to its own database. |
|
timescaledb.config.pgUserPassword |
Internal password used bt CPS Temporal to connect to its own database. If not defined, the password is generated when deploying the application. See also Credentials section. |
Not defined |
config.eventConsumption. spring.kafka.bootstrap-servers |
Kafka hostname and port |
|
config.eventConsumption. spring.kafka.consumer.group-id |
Kafka consumer group id |
|
config.eventConsumption. app.listener.data-updated.topic |
Kafka topic to listen to |
|
config.eventConsumption. spring.kafka.security.protocol |
Kafka security protocol. Some possible values are:
|
|
config.eventConsumption. spring.kafka.properties. sasl.mechanism |
Kafka security SASL mechanism. Required for SASL_PLAINTEXT and SASL_SSL protocols. Some possible values are:
|
Not defined |
config.eventConsumption. spring.kafka.properties. sasl.jaas.config |
Kafka security SASL JAAS configuration. Required for SASL_PLAINTEXT and SASL_SSL protocols. Some possible values are:
|
Not defined |
config.eventConsumption. spring.kafka.ssl.trust-store-type |
Kafka security SASL SSL store type. Required for SASL_SSL protocol. Some possible values are:
|
Not defined |
config.eventConsumption. spring.kafka.ssl.trust-store-location |
Kafka security SASL SSL store file location. Required for SASL_SSL protocol. |
Not defined |
config.eventConsumption. spring.kafka.ssl.trust-store-password |
Kafka security SASL SSL store password. Required for SASL_SSL protocol. |
Not defined |
config.eventConsumption. spring.kafka.properties. ssl.endpoint.identification.algorithm |
Kafka security SASL SSL broker hostname identification verification. Required for SASL_SSL protocol. Possible value is:
|
Not defined |
config.additional. app.query.response.max-page-size |
Maximum number of elements that can be retrieved by a single REST API query request using pagination feature. |
|
config.additional. spring.datasource.hikari. maximumPoolSize |
Maximum number of database connections in the connection pool. |
|
Credentials
- Once the deployment is completed, refer to CPS Credentials Retrieval
for more information related to credentials retrieval.
Running With Docker
For development purposes, CPS Temporal can be ran on any environment using Docker. Refer to README.md and docker-compose.yml files for more details.
CPS Temporal Admin Guide
Configuration
Refer to CPS Temporal Deployment for application properties available to configure the application.
Logging
Refer to CPS Logging for documentation related to CPS Temporal and all CPS components logging information.
Monitoring
Refer to CPS Monitoring page for documentation related to CPS Temporal and all CPS components monitoring information.
CPS Temporal Release Notes
Version: 1.0.1
Release Date: 2021-01-06 (Istanbul)
Artifacts released
Repository |
Docker Image |
onap/cps-temporal |
onap/cps-temporal:1.0.1 |
Features
None
Bug Fixes
CPS-841 Update log4j version to 2.17.1 due to security vulnerability
Version: 1.0.0
Release Date: 2021-09-14 (Istanbul)
Artifacts released
Repository |
Docker Image |
onap/cps-temporal |
onap/cps-temporal:1.0.0 |
New features
Known Limitations, Issues and Workarounds
None
Security Notes
Known Security Issues:
CPS-488 - Authentication and authorization for REST API is limited to one generic user.
Fixed Security Issues:
None