5.6 Post Installation Procedure
Kafka VM
Note:
- By default, Kafka exposes the XSI IP on port 9094 to connect with DSR.
- This procedure is only recommended if there is any issue connecting with XSI IP.
Perform the following procedure to update Kafka VM:
- Log in to the Kafka VM.
- Navigate to the Kafka configuration
directory:
cd /opt/kafka/config
- Edit the
broker.properties
file:vi broker.properties
- Locate the
advertised.listeners
property:advertised.listeners=EXTERNAL://<IP>:9094
- Replace <IP> with the new IP (Kafka xmi, or imi if it is reachable from DSR).
- Save the file and exit.
- Perform the following command to restart the Kafka service
status:
systemctl restart kafka
- Perform the following command to verify the Kafka service
status:
systemctl status kafka
Expected result: The status should show active.
Service VM
This procedure is only applicable in the following cases:
- Case 1: User has not provides the DSR SOAM VIP during IDIH creation through VNFM in Swagger JSON.
- Case 2: User prefers to change the existing DSR SOAM VIP provided
during creation.
Perform the following procedure to update DSR SOAM VIP:
- Log in to the Service VM.
- Navigate to the
cd /opt/
directory: - Edit the configuration
file:
vi cnidih_VM.yaml
- Inside the
nfconfig-manager
container section:- Locate the
property:
NFCONFIG_PLUGIN_DSR_HOST
- Provide or replace the existing IP with the new one.
- Locate the
property:
- Inside the
protraceprocessor
container section, ensure to set the following propertyNFCONFIG_CLIENT_ENABLED
to True.Note:
Verify it is set to true, not false. - Save the file and exit.
- Perform the following command to restart the
service:
docker-compose -f /opt/cnidih_VM.yaml up -d
- If the SOAM VIP is reachable and appropriate, the
nfconfig
service andprotraceprocessor
services will operate as expected.
SSL Certificate Creation for IDIH
Note:
Create your own certificates in case of expiration of provided certificate.Kafka VM
- Certificates are required in KeyStore and TrustStore format (PKCS or JKS).
- Private key which is part of KeyStore must be encrypted.
- One KeyStore and TrustStore file is required.
DSR (it acts as client for Kafka)
- Certificates are required in pem format here.
- Required files are: certificate, privatekey, CA file.
Privatekey should be encrypted with password.
- To upload the above files on DSR SOAM: from the Main Menu, go
to Diameter, and Troubleshooting with
IDIH, and then Configuration.
Note:
Same CA file must be used for Kafka and DSR Certificates.
Service VM
- Certificates are required in KeyStore and TrustStore format (PKCS).
- One KeyStore file and TrustStore file is required.
- Same CA file can be used which is used while creating certificates for Kafka or different CA file also can be used.
- Private key which is part of KeyStore must not be encrypted.
- Certificate should contain the following fqdn's as SAN's (Subject
Alternative Names):
- idih.tekelec.com
- tekelec.com
- cnidih-portal
- usermanagement
- protraceprocessor
- ttrdecoder
- alarmmanagement