4 Configuring Service Communication Proxy using the CNC Console

This chapter provides information about how to configure and modify different services in Service Communication Proxy (SCP) using the Oracle Communications Cloud Native Configuration Console (CNC Console).

The REST API configurations can also be performed using the CNC Console.

4.1 Support for Multicluster Deployment

The CNC Console supports both single and multiple cluster deployments.

In a single cluster deployment, the CNC Console can manage NFs and Oracle Communications Cloud Native Environment (OCCNE) common services deployed in the local Kubernetes clusters.

In a multicluster deployment, the CNC Console can manage NFs and OCCNE common services deployed in the remote Kubernetes clusters. For more information about single and multiple cluster deployments, see Oracle Communications Cloud Native Configuration Console Installation, Upgrade, and Fault Recovery Guide .

With the support of multicluster deployment, a single instance of the CNC Console can configure two or multiple instances of SCP deployments if both CNC Console and SCP instances are deployed in the same Kubernetes cluster with different namespaces.

The following image represents a Kubernetes cluster with one instance of CNC Console and two instances of SCP. The single instance of the CNC Console is configuring two instances of SCP with different namespaces.

Figure 4-1 Support for Multicluster Deployment


Support for Multicluster Deployment

4.2 CNC Console Interface

This section provides an overview of the CNC Console to configure SCP features.

You can use SCP integrated with the CNC Console after logging in to CNC Console. To log in to the CNC Console, you must make the following updates to the hosts file at the C:\Windows\System32\drivers\etc location.
  1. In the Windows system, open the hosts file in the notepad as an Administrator and append the following set of lines at the end:
    <CNCC Node IP> cncc-iam-ingress-gateway.cncc.svc.cluster.local
    <CNCC Node IP> cncc-core-ingress-gateway.cncc.svc.cluster.local
    
    Example:
    10.75.212.88 cncc-iam-ingress-gateway.cncc.svc.cluster.local
    10.75.212.88 cncc-core-ingress-gateway.cncc.svc.cluster.local
    

    Note:

    The IP Address in the above lines may change when deployment cluster changes.
  2. Save and close the hosts file.

    Before logging in to the CNC Console, create a CNC user and password. Log in to the CNC Console using the same credentials. For information about creating a CNC Console user and password, see Oracle Communications Cloud Native Configuration Console Installation, Upgrade, and Fault Recovery Guide .

Logging in to the CNC Console and Selecting an SCP Instance

Perform the following procedure to log in to the CNC Console and select the required SCP instance to configure SCP features.

  1. Open any web browser.
  2. Enter the URL: http://<host name>:<port number>.

    Where, <host name> is cncc-iam-ingress-ip and <port number> is cncc-iam-ingressport.

  3. Enter the login credentials.
  4. Click Log in.

    The CNC Console Home page appears.

    Figure 4-2 CNC Console Welcome Screen


    CNC Console Welcome Screen

  5. In the upper pane, from the Please Select Instance drop-down list, select the required SCP instance.

    The SCP tab appears in the left navigation pane.

    Figure 4-3 Select NF Instance


    Select NF Instance

    The Please Select Instance drop-down list provides NF instances to configure corresponding NF features. You must select an appropriate SCP instance to configure SCP features. Alternatively, you can click one of the following interface elements on the Welcome screen:
    • About: This element provides the CNC Console product name and version.
    • Sign Out: This element exits the CNC Console.

4.2.1 Configuring SCP Features

This section provides information about enabling the following features of SCP:

Note:

You must log in to the CNC Console while performing the procedures described in the subsequent subsections.
  • Configuring Enhanced NF Status Processing
  • Configuring Global Egress Rate Limiting
  • Configuring Support for 5G SBI Roaming
  • Configuring Mediation
  • Configuring Model D Indirect 5G SBI Communication
  • Configuring SCP User Agent Info
  • Configuring Message Feed
  • Configuring Load Control Information (LCI)
  • Configuring Host Preference for Egress Message Requests
  • Configuring CCA Header Validation
  • Configuring Location Header Update for Host Mismatch
  • Configuring Support for OAuth2.0
  • Configuring SCP Health Check API
  • NRF Configuration using DNS SRV Resolution
  • Configuring Overload Control Based on the Overload Control Information Header
  • Configuring Enhanced NFProfile Processing
4.2.1.1 Configuring Enhanced NF Status Processing

Perform the following procedure to enable the support for creating or retaining SCP routing rules for NF Profiles with NF Status as SUSPENDED.

Note:

The Enhanced NF Status Processing feature is applicable only when nnrf-nfm (NRF Management) service is used as an audit service for SCP.
  1. In the left navigation pane, click the SCP tab, and then click the SCP Features tab.
  2. From the SCP Features list, click Enhanced Nf Status Processing.
  3. In the Enhanced NF Status section, click Edit.

    Figure 4-4 Editing Enhanced Nf Status Processing


    Editing Enhanced Nf Status Processing

  4. Set Enabled to true.

    By default, this option is set to false.

  5. In the Feature Specific Config section, configure the following fields as required:
    • Enhanced Suspended State Routing: Enter the list of valid NF types for Mode 3 routing.
    • Suspended State Routing: Enter the list of valid NF types for Mode 2 routing.
  6. Click Save.
4.2.1.2 Configuring Global Egress Rate Limiting
Perform the following procedure to configure global egress rate limiting.
  1. In the left navigation pane, click the Global Egress Rate Limiting tab.
  2. In the Global Egress Rate Limit section, click Edit.

    The Edit Global Egress Rate Limit screen appears.

    Figure 4-5 Enabling the Global Egress Rate Limiting


    Enabling the Global Egress Rate Limiting

  3. Set Enabled to true.

    By default, this option is set to false.

  4. In the Feature Specific Config section, configure the following fields:
    • Remote ScpOne Enabled: Set this field to true if you want to enable egress rate aggregation with the SCP instance as defined in the coherence.federation.remoteScpOne parameter of the ocscp-custom-values.yaml file. By default, this value is set to false.
    • Remote ScpTwo Enabled: Set this field to true if you want to enable egress rate aggregation with the SCP instance as defined in the coherence.federation.remoteScpTwo parameter of the ocscp-custom-values.yaml file. By default, this value is set to false.
  5. Click Save.
4.2.1.3 Configuring Support for 5G SBI Roaming
Perform the following procedure to configure support for 5G SBI roaming.

Note:

Ensure that one local and one remote PLMNs are configured before enabling this feature. To configure a remote PLMN, see Configuring SEPP Inter PLMN Routing. A local PLMN is configured at the time of SCP deployment or by editing the CUSTOM_ORACLE_SCP NF type as described in Configuring NF Rule Profile.
  1. In the left navigation pane, click the Interplmn Routing tab.
  2. In the Interplmn Routing section, click Edit.

    The Edit Interplmn Routing screen appears.

    Figure 4-6 Inter PLMN Routing

    Inter PLMN Routing
  3. Set Enabled to true.

    By default, this option is set to false.

  4. Click Save.
4.2.1.4 Configuring Mediation
Perform the following to configure mediation.
  1. In the left navigation pane, click the Mediation tab.
  2. In the Mediation section, click Edit.

    The Edit Mediation screen appears.

    Figure 4-7 Enable Mediation


    Enable Mediation

  3. Set Enabled to true.

    By default, this option is set to false.

  4. Click Save.
4.2.1.5 Configuring Model D Indirect 5G SBI Communication feature

Perform the following to configure Model D indirect 5G SBI communication feature.

  1. In the left navigation pane, click the Modeld Routing tab.
  2. In the Modeld Routing section, click Edit.

    Figure 4-8 Enabling ModelD Routing


    Enabling ModelD Routing

    The Edit Modeld Routing screen appears.

  3. Set Enabled to true.

    By default, this option is set to false.

  4. Set Caching to true or false to enable or disable caching to store discovery responses. By default, this option is set to true.
  5. Set enforceReqSpecificSvcDiscovery to true or false to to enable or disable NF Service specific Discovery Requests when possible. By default, this option is set to true.
  6. Click Save.
4.2.1.6 Configuring SCP User Agent Info

Perform the following to configure SCP User Agent Info.

  1. In the left navigation pane, click the SCP User Agent Info tab.
  2. In the SCP User Agent Info section, click Edit.
    The SCP User Agent Info screen appears.

    Figure 4-9 SCP User Agent Info


    SCP User Agent Info

  3. Set Enabled to true.

    By default, this option is set to false.

  4. Expand the Feature Specific Config option, in the User Agent Header Format field, select the required format to set the "User-Agent" header format.

    For more information about the "User-Agent" header formats, see "Configuring SCP Features" in Oracle Communications Cloud Native Core, Service Communication Proxy REST Specification Guide.

  5. Click Save.
4.2.1.7 Configuring Message Feed

Perform the following to configure message feed.

  1. In the left navigation pane, click the Traffic Feed tab.
  2. In the Traffic Feed section, click Edit.
    The Traffic Feed screen appears.

    Figure 4-10 Message Feed


    Message Feed

  3. Set Enabled to true.

    By default, this option is set to false.

  4. Click Save.
4.2.1.8 Configuring Load Control Information (LCI)

Perform the following procedure to enable configuring load control information (LCI).

  1. In the left navigation pane, click the LCI tab.
  2. In the LCI section, click Edit.

    Figure 4-11 Editing LCI


    Editing LCI

  3. Set Enabled to true.

    By default, this option is set to false.

  4. In the Feature Specific Config section, complete the following configurations:

    Note:

    All the parameters are mandatory to configure the LCI feature.
    • SCP LCI Conveyance Enable: Set to true to enable SCP to add its LCI in request and response.
    • Relay Peer Lci: Set to true to allow SCP to forward the received LCI header from producer NF.
    • SCP LCI Conveyance Interval: Enter a value from 100 milliseconds to 3600000 milliseconds to report the SCP LCI update interval.
    • SCP LCI Minimum Load Change: Enter a value from 0 to 25 to report the minimum delta value when reporting LCI based on load change.
    • SCP LCI Conveyance Minimum Load Threshold: Enter a value from 0 to 60 to set a minimum load change threshold to trigger the generation of an LCI header and its reporting to peers if allowed.

      Note:

      If the SCP load value is less than the configured SCP LCI Conveyance Minimum Load Threshold value, SCP sends its load value as 0%.
    • SCP LCI Conveyance to Unknown peer: Set to true to allow SCP to send its LCI to an unknown peer NF, a peer NF that is not registered with SCP.

      Note:

      • SCP sends its LCI in all the messages that go to peer NFs that are not registered with SCP.
      • If the SCP load value is less than the configured SCP LCI Conveyance Minimum Load Threshold value, SCP sends its load value as 0%.
    • Peer LCI Processing Minimum Load Change: Enter a value from 0 to 25 to define a minimum load change threshold in peer NF's load as indicated in LCI, which can trigger a re-evaluation of routing rules.
    • Unknown peer LCI Expiry time: Enter a value between 30 seconds to 900 second to set the minimum number of seconds required to remove an unknown peer's LCI from cache.
  5. Click Save.
4.2.1.9 Configuring Host Preference for Egress Message Requests

Perform the following procedure to configure host preference for egress message requests.

  1. In the left navigation pane, click the Egress Host Preference tab.
  2. In the Egress Host Preference section, click Edit.

    Figure 4-12 Editing Egress Host Preference


    Editing Egress Host Preference

  3. Set Enabled to true.

    By default, this option is set to false.

  4. In the Feature Specific Config section, to configure the host preference, set the following fields as described in the following table:

    Table 4-1 Host Preference

    Field Name Description
    Api Root Header Present This parameter indicates the host preference (":authority" header) for egress message requests if the 3gpp-Sbi-Target-apiRoot header is present in the ingress message request.

    You can set this field to PASSTHROUGH to use the same type of host in egress message requests as received through ingress message requests.

    Default value: PASSTHROUGH

    Range: IP, FQDN, or PASSTHROUGH

    Api Root Header Not Present This parameter indicates the host preference (":authority" header) for egress message requests if the 3gpp-Sbi-Target-apiRoot header is absent in ingress message requests.

    Default value: IP

    Range: IP or FQDN

    SCP Generated NRF Message This parameter indicates the host preference (":authority" header) for SCP generated NRF messages.

    Default value: IP

    Range: IP or FQDN

    Fqdn This parameter indicates the resolution preference of egress message requests host FQDN if present.

    Default value: NFPROFILE

    Range: DNS or NFPROFILE

    InterPlmn Fqdn This parameter indicates the resolution preference of egress message requests inter-plmn FQDN if present.

    Default value: DNS

    Range: DNS or NFPROFILE

  5. Click Save.
4.2.1.10 Configuring CCA Header Validation

Perform the following option to configure CCA Header validation.

  1. In the left navigation pane, click the CCA Header Validation tab.
  2. In the CCA Header Validation section, click Edit.

    Figure 4-13 Edit CCA Header Validation


    Edit CCA Header Validation

  3. Set Enabled to true.

    By default, this option is set to false.

  4. In the Feature Specific Config section, to configure the validations, set the following fields as described in the following table:

    Table 4-2 Validations

    Field Name Description
    Type Type of validation:
    • headerPresence: SCP checks the presence of the 3gpp-Sbi-Client-Credentials header in the ingress request.
      • Validation will pass if the header is present.
      • Validation will fail if the header is not present.
    • subject: SCP checks the NF instance ID from the "sub" parameter in the 3gpp-Sbi-Client-Credentials header with the NF instance ID from the list of SANs in the client's TLS certificate. SANs directly have the NF Instance Id or the client's other identity, like the FQDN or IP address, which will be used to get the NF Instance Id. If the 3gpp-Sbi-Client-Credentials header is not present, then this validation will not be performed.
      • Validation will pass if the NF instance ID from the "sub" parameter matches the NF instance ID from the SAN.
      • Validation will fail if the NF instance ID from the "sub" parameter doesn't match the NF instance ID from the SAN.
    Error Profile Name The error profile name is used to generate an error response if the corresponding validation fails. Error profiles can be configured using the REST API: /ocscp/scpc-configuration/{version}/errorProfileConfig.
    Product NF Type Default Value: Null
    preferred_validation_order An order format-wise from which the SCP picks SAN from the client's TLS certificate for verification of the "subject" type of validation.

    Note: Applicable only when validation type "subject" is selected.

    max_entries_to_process Maximum number of SANs from the client's TLS certificate that SCP picks for validation.

    Note: Applicable only when validation type "subject" is selected.

  5. Click Add to add validations:

    Figure 4-14 Add Validations


    Add Validations

  6. Click Save.
4.2.1.11 Configuring Location Header Update for Host Mismatch

Perform the following the procedure to configure location header update for host mismatch.

  1. In the left navigation pane, click the Location Header Update For Host Mismatch tab.
  2. In the Location Header Update For Host Mismatch section, click Edit.

    Figure 4-15 Edit Location Header Update For Host Mismatch


    Edit Location Header Update For Host Mismatch

  3. Set Enabled to true.

    By default, this option is set to false.

  4. Click Save.
4.2.1.12 Configuring Support for OAuth2.0

Perform the following the procedure to configure support for OAuth2.0.

  1. In the left navigation pane, click the OAuth2 Support tab.
  2. In the OAuth2 Support section, click Edit.

    Figure 4-16 OAuth2 Support


    OAuth2 Support

  3. Set Enabled to true.

    By default, this option is set to false.

  4. In the Feature Specific Config section, complete the following configurations:

    Table 4-3 Configure Access Token

    Field Name Description
    SCP Access Token Capability This field indicates Access token support for the listed indirect communication modes at SCP. (ENUM).
    Possible values: [INDIRECT_COM_WITH_DELEG_DISC, INDIRECT_COM_WITHOUT_DELEG_DISC]
    • INDIRECT_COM_WITH_DELEG_DISC: SCP initiates access token request toward NRF in delegated discovery service request.
    • INDIRECT_COM_WITHOUT_DELEG_DISC: SCP is expected to forward the service request with or without access token as per configuration at SCP. SCP is not expected to initiate access token request toward NRF.
    Access Token Conveyance
    This field conveys acquired access token in the "3gpp-Sbi-Access-Token" header in service response to consumer NFs.
    • Default value: true
    • Range: true or false
    OAuth2 Access Token Validation This field enables or disables validation of OAuth2 access token from consumer NFs.
    • Default value: Disabled
    • Range: Disabled or Enabled
    Access Token Validation Types This field configures the list of required validation types in the network.
    • Default value: empty as default
    • Range: Disabled or Enabled
    Access Token Refresh Guard Time This field initiates proactive refresh of cached access token when the configured time expires. The proactive refresh occurs if the relevant SBI messages are in exchange.
    • Default value: 60000ms
    • Range: 100ms - 300000ms
    Access Token Validity Guard Time This field indicates the time before the access token expiry when SCP considers not to use the existing access token and obtains new access token in the service request forwarded to producer NFs.
    • Default value: 30000ms
    • Range: 100ms - 300000ms
    Access Token Clean Up Post Expiry This field indicates the duration to purge the token from cache.
    • Default value: 900000ms
    • Range: 0ms - 3600000ms
    Access Token History Size This field indicates the number of access tokens signature history to identify whether the access token initiated by SCP or not.
    • Default value: 10 records
    • Range: 0 - 20 records
    Access Token Cache Size This field indicates the number of access tokens that can be cached in SCP.
    • Default value: 50000 records
    • Range: 5000 - 100000 records
    Requester Info This field indicates access token requester (consumer NF) Info to generate the access token request.
    • Prioritized list of default values:
      1. DISCOVERY-HEADERS
      2. CCA-HEADER
      3. USER-AGENT-HEADER
    Cache Enabled This option enables or disables caching of access tokens.
    • Default value: true
    • Range: true or false
  5. Click Save.
4.2.1.13 Configuring SCP Health Check API

Perform the following the procedure to configure SCP health check API.

  1. In the left navigation pane, click the Health Check tab.
  2. In the Health Check section, click Edit.

    Figure 4-17 Health Check


    Health Check

  3. Ensure that Enabled is set to true.

    This is the default configuration.

  4. In the Feature Specific Config section, you can modify the following configurations:

    Table 4-4 Configure Health Check API

    Field Name Description
    Success Response Type This field indicates successful responses for a healthy SCP.
    • Default value: 200StatusCodeAndEmptyPayload
    • Range: 200WithPayLoad, 200WithEmptyPayload, and 204WithNoContent
    Average SCP Load Threshold Value This field provides the overall average SCP load threshold value.
    • Default value: 75%
    • Range: 75% - 90%
    Overload Response Profile This field indicates the error profile configuration for the health query response in the exception conditions.
    • Default value: healthCheckErrorProfile. For more information about this option, see "Configuring Error Profiles" in Oracle Communications Cloud Native Core, Service Communication Proxy REST Specification Guide.
    SCP Health Check Service Enabled This option enables or disables the SCP health check API feature in inter-scp scenarios.
    • Default value: false
    • Range: true or false
    Request Timeout This field indicates the timer to monitor the waiting time for health check response in inter-scp scenarios.
    • Default value: 1000ms
    • Range: 300ms -60000ms
    Polling Interval This field indicates the duration to control the periodicity of health check requests in inter-scp scenarios.
    • Default value: 1000ms
    • Range: 300ms -60000ms
    Consecutive Error Response This field indicates the total number of consecutive failure responses that leads to failover in inter-scp scenarios.
    • Default value: 3
    • Range: 1 - 20
    Consecutive Success Response This field indicates the total number of consecutive successful responses that leads to fallback in inter-scp scenarios.
    • Default value: 3
    • Range: 1 - 20
  5. Click Save.
4.2.1.14 NRF Configuration using DNS SRV Resolution

Perform the following procedure to NRF configuration using DNS SRV resolution.

  1. In the left navigation pane, click the NRF Bootstrap Info tab.
  2. In the NRF Bootstrap Info section, click Edit.

    Figure 4-18 Edit NRF Bootstrap Info


    Edit NRF Bootstrap Info

  3. Set Enabled to true.

    By default, this option is set to false.

  4. In the Feature Specific Config section, enter the following input for the following configurations:

    Table 4-5 Configure NRF Source Configuration

    Field Name Description
    Source This field is used to select whether the NRF Configuration Using DNS SRV Resolution feature should be enabled or disabled. SCP will enable the feature if the source is DNS_SRV.

    The default value is DNS_SRV.

    deRegisterScpDuringMigration
    In the migration from static to DNS SRV task, if static and DNS SRV NRF configurations are the same, then this parameter will be used to deregister SCP with the old or static NRFset.
    • Default value: false
    • Range: true or false
  5. Click Save.
4.2.1.15 Configuring Overload Control Based on the Overload Control Information Header

Perform the following procedure to configure overload control based on the overload control information header.

  1. From the SCP Features list, click the OCI tab.
  2. On the OCI page, click the Edit icon.

    Figure 4-19 Edit OCI


    Edit OCI

  3. In the Edit OCI section, set Enabled to true.

    By default, this option is set to false.

    Figure 4-20 Enabling OCI


    Enabling OCI

  4. To configure OCI, in the Feature Specific Config section, set the following fields:

    Table 4-6 Configure OCI

    Field Name Description
    olcHSupportInd This option indicates that SCP supports the Overload Control Information (OCI) feature based on the 3gpp-Sbi-Oci header.

    By default, this option is enabled.

    SCP OCI Conveyance Interval This field indicates the interval for reporting SCP OCI to peer NFs. For every interval until the validity period, the last sent OCI is reported to peer NF irrespective of any change to SCP OCI. Sending SCP OCI periodically ensures that the peer NF has not missed an earlier reported SCP OCI. The same OCI header as sent on the last OCI threshold change or validity period expiry is sent.
    • Default value: 2000 milliseconds
    • Range: 2000 to 3600000 milliseconds

    Note: OCI is sent to peer NFs only if there is a message for that NF.

    SCP OCI Recovery Validity Period This field indicates the validity period to send OCI headers to peers when SCP recovers from an overloaded state. SCP sends OCI to peers with reduction metric as 0.
    • Default value: 3600 seconds
    • Range: 5 to 3600 seconds
    Next Hop SCP OCI Enabled This option enables or disables the OCI feature between SCP instances and SCP scope OCI.

    By default, this option is enabled.

    Next Hop SCP OCI Rule Name If the Next Hop SCP OCI Enabled option is enabled, the OCI feature enforcement is done based on the ociConfigRule REST API configuration with the name provided as the value for this option.

    By default, this value is NextHopScpOciRuleName.

    Next Hop SEPP OCI Enabled This option enables or disables OCI enforcement between SCP and SEPP interfaces and SEPP scope OCI.

    By default, this option is enabled.

    Next Hop SEPP OCI Rule Name If the Next Hop SEPP OCI Rule Name option is enabled, the OCI feature enforcement is done based on the ociConfigRule REST API configuration with the name provided as the value for this option.

    By default, this value is NextHopSeppOciRuleName.

    scpOciConveyance If this option is set to true, SCP starts conveying the 3gpp-Sbi-Oci header based on self-overload information.

    By default, this option is enabled.

    unknownPeer

    • request
    If this field is set to true, SCP starts conveying the 3gpp-Sbi-Oci header based on self-overload information to requests to unknown peers. For unknown peers, identification of peer NFs is done based on the message request's FQDN.

    By default, this option is enabled.

    unknownPeer

    • response
    If this option is set to true, SCP starts conveying the 3gpp-Sbi-Oci header based on self-overload information to responses to unknown peers. If this parameter is set to true, SCP adds self-OCI header in every response message.

    By default, this option is disabled.

  5. Click Save.
4.2.1.16 Configuring Enhanced NFProfile Processing
Perform the following procedure to enable the NFProfile Processing enhancements supported by SCP using Cloud Native Configuration Console (CNC Console).
  1. In the left navigation pane, click the Ignore Unknown Nf Service tab.
    The Ignore Unknown Nf Service page appears.

    Figure 4-21 Ignore Unknown Nf Service


    Ignore Unknown Nf Service

  2. On the Ignore Unknown Nf Service page, click the Edit icon.
  3. In the Edit Ignore Unknown Nf Service section, set Enabled to true.

    By default, this option is set to false.

4.2.2 Configuring OCI

Perform the following procedure to retrieve, modify, and remove OCI configuration data.
  1. From the left navigation pane, click the SCP tab, and then click the OCI tab.
  2. From the left navigation pane, click the OCI Config tab.
  3. In the OCI Config section, click Get to retrieve OCI configuration data based on the query parameters.

    Figure 4-22 OCI Config


    OCI Config

  4. To add a new request, click Add and enter the request body information in the Request field.
  5. Click Submit.
    The request body message appears in the Response field.

    To edit, export, delete, or clear the data, click the required buttons as described in the following table:

    Table 4-7 Button and Field Descriptions of OCI

    Button and Field Names Description
    Query Parameters Allows to enter parameters to retrieve, add, and update OCI configuration data based on the query parameters.
    Get Retrieves OCI configuration data. You can modify this data using the Edit button.
    Add Adds new message requests in the Request field.
    Edit Modifies any existing data by updating mandatory query parameters in the Query Parameters field.
    Delete Removes any message request.
    Export Exports existing records in the JSON format.
    Clear Refreshes the existing screen by removing the data.

4.2.3 Configuring OCI Threshold Levels

Perform the following procedure to retrieve, modify, and remove OCI threshold configuration data.
  1. From the left navigation pane, click the SCP tab, and then click the OCI tab.
  2. From the left navigation pane, click the OCI Threshold Config tab.
  3. In the OCI Threshold Config section, click Get to retrieve OCI threshold configuration data based on the query parameters.

    Figure 4-23 OCI Threshold Config


    OCI Threshold Config

  4. To add a new request, click Add and enter the request body information in the Request field.
  5. Click Submit.
    The request body message appears in the Response field.
    To edit, export, delete, or clear the data, click the required buttons as described in the following table:

    Table 4-8 Button and Field Descriptions of OCI Threshold Configuration

    Button and Field Names Description
    Query Parameters Allows to enter parameters to retrieve, add, and update OCI threshold configuration data based on the query parameters.
    Get Retrieves OCI threshold configuration data. You can modify this data using the Edit button.
    Add Adds new message requests in the Request field.
    Edit Modifies any existing data by updating mandatory query parameters in the Query Parameters field.
    Delete Removes any message request.
    Export Exports existing records in the JSON format.
    Clear Refreshes the existing screen by removing the data.

4.2.4 Viewing cnDBTier APIs in CNC Console

Perform the following procedure to view the cnDBTier version, status of cnDBTier clusters, and georeplication status on the CNC Console.

Note:

The following cnDBTier APIs are read only.
  1. From the left navigation pane, click the SCP tab, and then click the cnDBTier tab.
  2. Click the Backup List to view the list of completed backups along with Backup ID, Backup size, and Creation Timestamp.

    The Backup List screen is displayed.

    Table 4-9 Backup List

    Fields Description
    Backup Details This field displays information such as backup Id, backup size, and backup creation timestamp.
    Site Name This field displays the name of the current site to which SCP is connected.
    Backup Id This field displays the ID of the stored backup.
    Backup Size (bytes) This field displays the size of the stored backup.
    Creation TimeStamp This field displays the time recorded when the backup was stored.
  3. Click the cnDBTier Version to view the version.

    Table 4-10 cnDBTier Version Attributes

    Fields Description
    cnDBTier Version This field displays the cnDBTier version.
    NDB Version This field displays the network database (NDB) version.
  4. Click the Database Statistics Report to view the available database.

    Table 4-11 Database Statistics Report

    Fields Description
    Database Count This field displays the number of available database.
    Database Tables Count This field displays the available database names and their table count.
    Database Name This field displays the database name.
    Table Count This field displays the table count for each database.
    Database Table Rows Count This field displays the table rows present in each table.
    Click on View icon available next to the database name to view the View Database Table Rows Count screen.

    Table 4-12 View Database Table Rows Count

    Fields Description
    Database Name This field displays the database name.
    Tables This field displays the table names and the corresponding rows in each table.
    Table Name This field displays the table name.
    Row Count This field displays the table rows present in each table.
  5. Click the Geo Replication Status to view the local site and remote site name to which SCP is connected.

    Table 4-13 GeoReplication Status

    Fields Description
    Local Site Name This field displays the local site name to which SCP is connected.
    Remote Site Name This field displays the remote site name.
    Replication Status This field displays the replication status with corresponding sites.
    Seconds Behind Remote Site This field displays the number of seconds that the last record read by the local site is behind the latest record written by the remote site for all the replication groups.
    1. Click the View icon in the Actions menu to view the View Geo Replication Status screen.

      Table 4-14 Geo Replication Status

      Fields Description
      Replication Group Delay This field displays the number of seconds that the last record read by the local site is behind the latest record written by the remote site for individual replication groups.
      Replication Channel Group Id This field displays the ID of the replication channel group.
    2. Click the View icon to view the Replication Group Delay attributes.

      Table 4-15 View Replication Group Delay

      Fields Description
      Channel Details This field displays the channel details such as Remote Replication IP and Role.
      Remote Replication IP This field displays the IP of the remote replication channel.
      Role This field displays the role of the replication channel IP.
  6. Click the HeartBeat Status to view the connectivity between local site and remote site name to which SCP is connected.

    Table 4-16 HeartBeat Status Details

    Fields Description
    Site Name This field displays the name of the current site to which SCP is connected.
    HeartBeat Details This field displays information such as the remote site name, heartbeat status, heartbeat lag, and replication channel group id.
    Remote Site Name This field displays the remote site name.
    Heartbeat Status This field displays the connectivity status with corresponding sites.
    Heartbeat Lag This field displays the lag or latency in seconds it took to syncronize between sites.
    Replication Channel Group Id This field displays the ID of the replication channel group.
  7. Click the Local Cluster Status to view the local cluster status for the current site:

    Table 4-17 Local Cluster Status

    Fields Description
    Site Name This field displays the name of the current site to which SCP is connected.
    Cluster Status This field displays the local cluster status for the current site.
  8. Click the On Demand Backup to create a new backup and view the status of initiated on-demand backups.

    Table 4-18 On Demand Backup Details

    Fields Description
    Site Name This field displays the name of the current site to which SCP is connected.
    DR Status This field displays the status of DR.
    Backup Id This field displays the ID of the stored backup.
    Backup Status This field displays the status of backup.
    Remote Transfer Status The field displays the status of remote transfer.
    Initiate Backup The field displays whether the backup is initiated or not.
    1. Click the Edit icon.
      The Edit On Demand Backup screen appears.

      Note:

      The Edit mode is available only for Initiate Backup.
    2. Enable the Initiate Backup option click Save.

      A confirmation message "Save successfully" appears.

    3. Click theCancel to navigate back to the On Demand Backup screen.
    4. Click the Refresh to reload the On Demand Backup screen.

4.2.5 Configuring NRF SRV

Perform the following procedure to configure NRF using DNS SRV Resolution.
  1. From the left navigation pane, navigate to SCP and click the NRF SRV Configuration tab.
  2. In the NRF SRV FQDN section, click the Add button to create the new NRF SRV configuration for the given NRF SRV FQDN.

    You can configure the NRF configurations at run time, and this NRF SRV FQDN shall be mapped to target NRF FQDNs. SCP uses this NRF SRV FQDN to query the DNS SRV server to get the actual target NRF FQDNs. NRF SRV FQDN

    Figure 4-24 Add NRF SRV Configuration


    Add NRF SRV Configuration

  3. To configure the NRF SRV, enter the input for the following fields:

    Table 4-19 NRF SRV Configuration

    Field Name Description
    NF SetId List This is the SetId list for this NRF SRV configuration.

    You can configure multiple nfSetIds, but the NRF profile and rule creation will only take into account the nfSetId from the 0th index.

    This setId must be unique for each NRF SRV configuration; that is, this setId must not be present in any other NRF SRV configuration.

    Perform Subscription This field allows to decide whether NRF from this NRF SRV should be used for a subscription or not.

    The possible values are true or false.

    Perform Audit This field allows to decide whether NRF from this NRF SRV should be used for a audit or not.

    The possible values are true or false.

    Register SCP This field allows to decide whether to register SCP with the NRF from the NRF Set.

    The possible values are true or false.

    Scheme This field is used for the URI Scheme. The supported value is http/https.
    PLMN List This field indicates the list of NRFs serving Public Land Mobile Network (PLMN).

    A PLMN has a unique PLMN code, which consists of a MCC (Mobile Country Code) and an MNC (Mobile Network Code).

    Click the Add button to add MCC and MNC, respectively.

    Versions This field lists the NFServiceVersion.

    Configuring multiple API versions is permissible, but at least one entry in the version list must have its apiVersionInUri set to "v1." This is because SCP currently utilizes "v1" for its self-generated requests towards NRF.

    • Click the Add button to add NFServiceVersion.
    • The supported value of apiVersionInUri is v1/v2.
    • The apiFullVersion should be in format x.y.z., for example, 1.0.0.
    apiPrefix This field is used in the URI while communicating with NRF.
    serviceNames

    Indicates the service name of the NRF SRV configuration.

    The nnrf-nfm and nnrf-disc are mandatory for NRF SRV configurations.

    The supported value is nnrf-nfm/nnrf-disc/nnrf-oauth2.
    isInterPlmnFqdn This field allows you to choose whether or not to map the NRF from this NRF SRV resolution to the InterPlmn Fqdn.
  4. In the NRF SRV FQDN section, click the Edit icon to update the existing NRF SRV configuration.
  5. Click Save.
4.2.5.1 Mapping NFInstanceId and ServiceInstanceId
Perform the following procedure to map the NRF FQDN InstanceId.
  1. In the left navigation pane, click the SCP tab, and then click the SCP Features tab.
  2. From the SCP Features list, click NFInstanceId And ServiceInstanceId Mapping.
  3. In the NFInstanceId And ServiceInstanceId Mapping section, click Get to retrieve the NRF FQDN and corresponding instanceId mapping details.

    Figure 4-25 NFInstanceId And ServiceInstanceId Mapping


    NFInstanceId And ServiceInstanceId Mapping

  4. To retrieve, export, or clear the data, click the required buttons as described in the following table:

    Table 4-20 Buttons and Descriptions of Mapping NRF FQDN InstanceId

    Button and Field Names Description
    Query Parameters Allows to enter parameters to retrieve and update data required for mapping NRF FQDN InstanceId.
    Get Retrieves the NRF FQDN and corresponding instanceId mapping details. You can modify this data using the Edit button.
    Export Exports existing records in the JSON format.
    Clear Refreshes the existing screen by removing the data.

4.2.6 Configuring NRF

Perform the following procedure to configure NRF preferred by SCP for access token requests.
  1. From the left navigation pane, click the SCP tab, and then click the NRF Configuration tab.
  2. In the NRF CONFIGURATION section, click Get to retrieve NRF configuration information.

    Figure 4-26 NRF Configuration


    NRF Configuration

  3. To edit, export, or clear the data, click the required buttons as described in the following table:

    Table 4-21 Button and Field Descriptions of NRF Configuration

    Button and Field Names Description
    Query Parameters Allows to enter parameters to retrieve, add, and update NRF configuration data.
    Get Retrieves NRF configurations. You can modify this data using the Edit button.
    Edit Modifies any existing data by updating mandatory query parameters in the Query Parameters field.
    Export Exports existing records in the JSON format.
    Clear Refreshes the existing screen by removing the data.

    Note:

    This configuration is only applicable to the OAuth service.

4.2.7 Configuring Upgrade and Rollback Event

Perform the following procedure to fetch upgrade and rollback event information.
  1. From the left navigation pane, click the SCP tab, and then click the Upgrade Status tab.
  2. On the Upgrade Status page, the following columns display upgrade and rollback events:

    Figure 4-27 Upgrade and Rollback Events


    Upgrade and Rollback Events

    Table 4-22 Upgrade and Rollback Events

    Column Name Description
    Service Name Displays the names of the services, such as SCPC-Audit, SCPC-Configuration, SCPC-Notification, and so on.
    Event Displays the names of the upgrade and rollback events, such as Pre_Upgrade_Started, Pre_Upgrade_Completed, Pre_Upgrade_Failed, and so on.
    Source Release Displays the source release version for performing upgrade and rollback.

    The convention to identify a release is as follows:

    • 1.12.0 is identified as 101200
    • 1.14.0 is identified as 101400
    Target Release Displays the target release version for performing upgrade and rollback.

    The convention to identify a release is as follows:

    • 1.15.0 is identified as 101500
    • 22.1.0 is identified as 221000
    Creation Timestamp Displays the time of creation of the event, for example, creationTimestamp": "2021-05-26T01:17:15.000+00:00

4.2.8 OAuth2.0 Configurations

This section provides information about configuring access token granularity and requests for NF types or NF service instances.

You must log in to the CNC Console while performing the procedures described in the subsequent subsections. Using these procedures, you can perform the followings tasks:

  • Configure access token granularity
  • Configure OAuth2.0 Local PLMN
4.2.8.1 Configuring Access Token Granularity
Perform the following procedure to configure access token granularity and access token requests for NFType, specific NF, or NF instance ID.
  1. From the left navigation pane, click the SCP tab, and then click the OAuth Services tab.
  2. From the left navigation pane, click the Access Token Granularity Configurationtab.
  3. In the Access Token Granularity Configuration section, click Get to retrieve access token granularity configurations data based on the query parameters.

    Figure 4-28 Access Token Granularity


    Access Token Granularity

  4. To add a new request, click Add and enter the request body information in the Request field.
  5. Click Submit.
    The request body message appears in the Response field.
  6. To edit, export, delete, or clear the data, click the required buttons as described in the following table:

    Table 4-23 Button and Field Descriptions of Access Token Granularity

    Button and Field Names Description
    Query Parameters Allows to enter parameters to retrieve, add, and update access token granularity configuration data based on the query parameters.
    Get Retrieves access token granularity configuration data. You can modify this data using the Edit button.
    Add Adds new message requests in the Request field.
    Edit Modifies any existing data by updating mandatory query parameters in the Query Parameters field.
    Delete Removes any message request.
    Export Exports existing records in the JSON format.
    Clear Refreshes the existing screen by removing the data.
4.2.8.2 Configuring OAuth2.0 Local PLMN Required
Perform the following procedure to configure local PLMN OAuth2.0.
  1. From the left navigation pane, click the SCP tab, and then click the OAuth Services tab.
  2. From the left navigation pane, click the OAuth2Required Configuration tab.
  3. In the OAuth2Required Configuration section, click Get to retrieve OAuth2Required configurations data based on the query parameters.

    Figure 4-29 OAuth2Required Configuration


    OAuth2Required Configuration

  4. To add a new request, click Add and enter the request body information in the Request field.
  5. Click Submit.
    The request body message appears in the Response field.
  6. To edit, export, delete, or clear the data, click the required buttons as described in the following table:

    Table 4-24 Button and Field Descriptions of OAuth2Required Configuration

    Button and Field Names Description
    Query Parameters Allows to enter parameters to retrieve, add, and update OAuth2Required configuration data based on the query parameters.
    Get Retrieves OAuth2Required configuration data. You can modify this data using the Edit button.
    Add Adds new message requests in the Request field.
    Edit Modifies any existing data by updating mandatory query parameters in the Query Parameters field.
    Delete Removes any message request.
    Export Exports existing records in the JSON format.
    Clear Refreshes the existing screen by removing the data.

4.2.9 Configuring Error Profile

Perform the following procedure to configure different error profiles, which can be used to build "ProblemDetails" sent in the response body to the consumer.

  1. From the left navigation pane, click the SCP tab, and then click the Error Profile tab.

    Figure 4-30 Error Profile


    Edit Profile

  2. Click Edit icon from the Actions column for the error profiles that must be modified. The Edit Error Profile screen appears.

    Figure 4-31 Edit Error Profile


    Edit Error Profile

  3. If the required cause is not available in the Cause drop-down list, select CUSTOM to customize the cause:

    Figure 4-32 Customize the Cause


    Customize the Cause

  4. Make the required modifications for the following parameters:

    Table 4-25 Edit Error Profile

    Field Description
    Status HTTP Status Code
    Cause The list of error causes that are specific to the occurrence of the problem.
    Custom Cause User defined custom cause. This field will be used only if cause field value is set to "CUSTOM".
    Title If this field is null, a standard HTTP status code description is added.
    Detail If present, the same data is used; otherwise, the application can add it optionally.
    Retry After Indicates the number of seconds after client should retry.
    Redirect URL Indicates the AbsoluteURL of the resource to which the message is redirected to.

    For information about configuring error profiles, see "Configuring Error Profile" in Oracle Communications Cloud Native Core, Service Communication Proxy REST Specification Guide.

  5. Click Save.

4.2.10 Configuring Canary Release

Following is the procedure to configure Canary Release parameters:

  1. From the left navigation menu, navigate to SCP and then select Canary Release.
  2. Click Edit from the Actions column for the required service that must be modified. The Edit Canary Release Screen appears.

    Figure 4-33 Canary Release

    Canary Release
  3. Make the required modifications for the following parameters:
    1. Canary Release Flag: Enable/Disable the flag using toggle.
    2. API Release Version: Provide the release version of the API.
    3. Canary Traffic: Set the value for the traffic that should be distributed to Canary Release.

    Figure 4-34 Edit Canary Release

    Edit Canary Release
    For more information about the configuration parameters, see Oracle Communications Cloud Native Core, Service Communication Proxy REST Specification Guide.
  4. Click Save.
  5. Click Refresh to view the updated values on the screen.

4.2.11 Configuring Global Options

Perform the following procedure to configure global options.

Logging Config

  1. From the left navigation menu, navigate to SCP and select Global Options.
  2. Select Logging Config.
  3. Click Edit from the top right side to edit or update Logging Config parameters.

    Figure 4-35 Logging Config


    Logging Config

  4. Select Service Type from the drop-down list to select any one of the following service type:
    • scpc-audit
    • scpc-alternate-resolution
    • scpc-subscription
    • scpc-configuration
    • scpc-notification
    • scp-worker
    • scp-cache
    • scp-nrfproxy
  5. Select the Application Log Level from the drop-down list to set the constraints of the log.
    The description of each logging level is as follows:

    Table 4-26 Logging Level

    Logging Level Description
    DEBUG A log level used for events considered to be useful during software debugging when more granular information is required.
    INFO The standard log level indicating that something happened, the application entered a certain state, and so on.
    WARN Indicates that something unexpected happened in the application, a problem, or a situation that might disturb one of the processes. But that doesn’t mean that the application has failed. The WARN level should be used in situations that are unexpected, but the code can continue the work.
    ERROR The log level that should be used when the application reaches an issue preventing one or more functionalities from properly functioning.
  6. Click Add provided under Package Log Level section to specify the name of the package and its log level.
  7. Click Save.

    Note:

    You can also Edit and Delete the packages under Package Log Level.

System Config

Perform the following procedure to edit the system config parameters.

  1. From the left navigation menu, navigate to SCP and select Global Options.
  2. Select System Config.
  3. Click Edit from the top right side to edit or update System Config parameters.

    Figure 4-36 System Config


    System Config

  4. Update the attributes as described in "Configuring SystemOptions" in Oracle Communications Cloud Native Core, Service Communication Proxy REST Specification Guide.

    Note:

    Ensure that Forward Nf Discovery Headers is set to true to forward discovery headers to Nexthop SCP as part of the Model D Indirect 5G SBI Communication feature.

    The default value is true.

  5. Click Save after performing the modifications.

Tracing Config

Perform the following procedure to edit tracing config options.

  1. From the left navigation menu, navigate to SCP and select Global Options.
  2. Select Tracing Config.
  3. Click Edit from the top right side to edit or update Tracing Config options.

    Figure 4-37 Tracing Config


    Tracing Config

  4. Set the following switches as required:
    • Tracing Enabled
    • Message JSON Body Enabled

    For information about tracing parameters, see "Updating HELM Configurable Parameters with REST APIs" in Oracle Communications Cloud Native Core, Service Communication Proxy REST Specification Guide.

  5. Click Save after performing the modifications.

4.2.12 Configuring Mediation

Perform the following procedure to configure trigger points for defining the filter criteria for a message to decide whether to invoke mediation or not.
  1. From the left navigation pane, click the SCP tab, and then click the Mediation tab.

    Trigger Points and Routing Options tabs appear.

  2. To configure trigger points for defining the filter criteria for a message, in the left navigation pane, click the Trigger Points tab.
  3. In the Trigger Points section, click Add and configure the fields as described in the following table:

    Table 4-27 Trigger Points Field Description

    Field Description
    Group Id Indicates the group ID for which mediation configuration is required.

    The Mediation configuration for a specific group is applicable to the mediation requests or responses received only from the same group. The HTTP Mediation service consumer NFs, which requires the same mediation rules, can be grouped together using this group ID.

    Rule Name Indicates the unique rule name for each mediation configuration that is consdiered as a primary key.
    Service Name Indicates the service of NFType for which mediation configuration is required.
    NF Type Indicates the NFType for which mediation configuration is required.
    Http Methods Indicates the HTTP methods such as GET, POST, PUT, PATCH, DELETE,and OPTION.
    Mediation Trigger Points Indiactes the list of trigger points to be enabled if matches one or more of the following: requestIngress, requestEgress, responseIngress, and responseEgress.
    Match Indicates the list of match blocks to be satisfied for the rule to be activated.

    The list of match blocks have OR semantics.

    Minimum number of blocks = 1

    Maximum number of blocks = 20

    Add Adds HTTP headers and JSON body criteria
  4. In the Match section, click Add.

    The Add Match dialog box appears.

    Figure 4-38 Add Match


    Add Match

  5. In the Header section, click Add to set the header details as follows:
    • Name: Enter a name for the header.
    • Value: Enter a value of the header.
    • Match Type: Select a range type from the Match Type drop-down list.
  6. In the Range section, if the header type has a numeric value, enter the range of that value in Start and End fields.
  7. Click one of the following buttons:
    • Remove: To discard the changes made to the Range section.
    • Save: To save the changes.
  8. In the Body section, click Add Body to set the JSON body details as follows:
    • Name: Enter a name for the body.
    • Value: Enter a value for the header.
    • Match Type: Select a range type from the Match Type drop-down list.
  9. In the Range section, if the header type has a numeric value, enter the range of that value in Start and End fields.
  10. Click one of the following buttons:
    • Remove: To discard the changes made to the Range section.
    • Save: To save the changes.
    • Cancel: To reset all the fields.
4.2.12.1 Configuring Routing Options for Mediation
Perform this procedure to configure routing options with Mediation.
  1. From the left navigation pane, click the SCP tab, and then click the Routing Options tab.
  2. In the Routing Options section, click Edit.
    The Edit Routing Options screen appears.

    Figure 4-39 Edit Routing Options


    Edit Routing Options

  3. In the Routing Options section, set Retry to true to enable retry attempt.
  4. In the Max Retry Attempts field, enter a value to set the number of retry attempts.
  5. In the Response Timeout field, enter a time interval to respond to a message request.
  6. In the Exception Error Responses section, click Add to add exception error responses.
    This option enables you to send an error message to the consumer NF or process the message request to the producer NF when the Mediation service is unavailable. By default, this status code is DEFAULT.
  7. In the Add Exception Error Responses dialog box, configure the fields as described in the following table:

    Table 4-28 Add Exception Error Responses

    Field Description
    Status Code Indicates the list of status codes that matches with the status code received from the application, the required action specified by action field is taken.

    This value can be any HTTP Status Codes, HTTP Status with other defined custom status (RESPONSE_TIMEOUT and CONNECTION_FAILURE)

    Action Indicates the action to be taken when the above mentioned status code is received.

    It can have the following values:

    • senderror: Sends the error code to the consumer NF.
    • errorcontinueprocessing: Continues processing the message in case of errors.
    Error Code Indicates configurable error codes to be sent by SCP to consumer NFs.

    It is a valid HTTP status code or allowed custom code.

    Error Cause Indicates the error cause that is specific to the occurrence of the problem.
    Error Title Indicates the title of the error.
    Error Description Indicates an explanation specific to the occurrence of the problem.
    Retry After Indicates the retry interval.
    Redirect Url Indicates the AbsoluteURL of the resource to which the message is redirected to.
  8. Click Save.
4.2.12.2 Configuring Mediation Rules
Perform this procedure to configure mediation rules.
  1. From the left navigation pane, click the SCP tab, and then click the Mediation Rules Configuration tab.
    The Mediation Rules Configuration screen with a list of rules saved in database appears.

    Figure 4-40 Mediation Rules Configuration


    Mediation Rules Configuration

  2. Click the View icon to view the mediation rules.
  3. Click the Add to create a mediation rule.
    The Add Mediation Rule screen allows you to configure the fields to create new rules as described in the following table:

    Table 4-29 Add Mediation Rules

    Field Description
    Rule Name Indicates the name of the rule.

    This value should be unique.

    Format Indicates the Format in which the rules are defined, such as DRL.
    Status Indicates the status of the rule.

    It can have the following values:

    • DRAFT
    • APPLIED

    The status must always be in DRAFT to create a new rule.

    Mediation Mode
    Indicated whether the rule applies to mediation active or mediation test.
    • Mediation Active allows actual messages to be manipulated according to configured mediation rules.
    • Mediation Test executes the mediation rule on message copy instead of the actual message and verifies the behavior of the mediation rule.
    Code Indicates the configurable drool expression that matches the request/response headers and body sent by SCP.
    State Indicates the state. The value of State must be SAVE to create a new rule.

    Note:

    Special characters are not supported and can lead to an compilation error.

  4. Click the Edit icon to edit the existing rule.
    The Edit Mediation Rule screen allows you to configure the fields as described in the following table:

    Table 4-30 Edit Mediation Rules

    Field Description
    Rule Name Indicates the name of the rule.

    This value should be unique.

    Format Indicates the Format in which the rules are defined, such as DRL.
    Status Indicates the status of the rule.

    It can have the following values:

    • DRAFT
    • APPLIED

    The following fields are allowed to be modified in DRAFT status: Mediation Mode, Code, and State. The valid values for state are SAVE, CLONE, COMPILE, and APPLY.

    The Mediation Mode can only be modified in APPLIED status. The valid values for state are SAVE, CLONE, or DRAFT.

    Mediation Mode
    Indicated whether the rule applies to mediation active or mediation test.
    • Mediation Active allows actual messages to be manipulated according to configured mediation rules.
    • Mediation Test executes the mediation rule on message copy instead of the actual message and verifies the behavior of the mediation rule.
    Code Indicates the configurable drool expression that matches the request/response headers and body sent by SCP.
    State Indicates the action to be applied to the rule.

    The default value is SAVE

    Note: The DRAFT state is an invalid transition that could lead to an error.

    New Rule Name Indicates the new name of the rule.

    This field appears when a CLONE state is selected.

  5. Click the Delete icon to delete the existing rule.
    The status of the rule must always be in DRAFT to delete an existing rule.
  6. Click Save.

4.2.13 Configuring NF Rule Profile

Perform the following procedure to configure NF Rule Profile parameters.
  1. From the left navigation, navigate to SCP, and then click NF Rule Profile.
  2. In the NF Rule Profile section, click Add.

    Figure 4-41 Add NF Rule Profile

    Add NF Rule Profile
  3. Add the following parameters for all the NF Info:
    • Group Id: Identity of the NF info.
    • Routing Indicators: List of Routing Indicator information.
    • Click Add to add the SUPI Ranges.
    • Click Save to save the SUPI Ranges.
    • Click Remove if you want to remove the NF Info.
    • Click Add to add the NF info details.
  4. Click Save to save the NF Rule Info.
  5. Click Refresh to view the updated values on the screen.
  6. To configure a local PLMN, in the PLMN List section, click Add and enter the required Mobile Country Code (MCC) and Mobile Network Code (MNC) values in the displayed fields.
Viewing or Editing the Default Notification Subscriptions
Perform the following procedure to view or edit the default notification subscription which are present under NF service level or NF profile level:
  1. From the left navigation, navigate to SCP, and then click NF Rule Profile Configuration.
  2. In the NF Rule Profile Configuration section, click Edit from Actions. The Edit NF Rule Profile Configuration screen appears.

    Figure 4-42 Edit NF Rule Profile Configuration


    Edit NF Rule Profile Configuration

  3. In the Default Notification Subscription section, click the Edit icon for the required callback URI that must be modified. The Edit Default Notification Subscription screen appears.

    Figure 4-43 Default Notification Subscription


    Default Notification Subscription

  4. Make the required modifications for the following fields:

    Table 4-31 Default Notification Subscriptions

    Attribute name Description
    Callback Uri This attribute contains a default notification endpoint to be used by a NF service producer towards an NF service consumer that has not explicitly registered a callback URI with the NF service producer, for example, as a result of an implicit subscription.
    Notification Type Type of notification for which the corresponding callback URI is provided.
    Versions API versions, for example, v1, are supported for the default notification type.
    N1 Message Class If the notification type is N1_MESSAGES, this IE must be present to identify the class of N1 messages to be notified.
    N2 Information Class If the notification type is N2_INFORMATION, this IE must be present to identify the class of N2 information to be notified.
    Binding When present, this IE contains the value of the binding indication for the default subscription notification, which is the value part of the 3gpp-Sbi-Binding header. See the note for details.

    Note:

    When delivering a notification for a default subscription to a specific NF consumer but the latter is not reachable, a NF service producer uses the binding indication for default subscription to reselect an alternative NF service consumer instance. For example, an AMF notifies corresponding uplink LPP or NRPPa messages through a default subscription to the LMF instance that previously sent downlink LPP or NRPPa messages during a location procedure. If the original LMF instance is not reachable, the AMF selects an alternative LMF instance using the binding indication and delivers the notification to the selected LMF instance.

    Figure 4-44 Edit Default Notification Subscriptions


    Edit Default Notification Subscriptions

  5. In the NF service section, click the Edit icon to edit or add the API full versions.

    Figure 4-45 Edit NF Services


    Edit NF Services

  6. Click Save to save the NF Rule Info.
  7. Click Refresh to view the updated values on the screen.

4.2.14 Configuring Routing Options

Perform the following procedure to configure Routing Options parameters.

  1. From the left navigation menu, navigate to SCP, and then click the Routing Options tab.
  2. In the Routing Options section, click Edit from the Actions column for the required service that must be modified.

    The Edit Routing Options screen appears.

    Figure 4-46 Edit Routing Options


    Edit Routing Options

    Figure 4-47 Load based congestion control enabled


    Load based congestion control enabled

  3. Enter or modify the required values as described in "Configuring Routing Options" in Oracle Communications Cloud Native Core, Service Communication Proxy REST Specification Guide.

    Note:

    Ensure that the following options are set as required to manage the "3gpp-Sbi-Discovery-preferred-locality" header as part of the Model D Indirect 5G SBI Communication feature:
    • Assign Preferred Locality
    • Override Preferred Locality
    • Forward Revised Preferred Locality
  4. In the Reroute Condition List, configure the list of error codes for rerouting:
    • Click Add to add new status code.
    • Click Edit or Delete icon to edit or remove any existing error code from the reroute condition list.
  5. In the Alternate Route section, set the Mode of the specific services as required:
    1. NF_SET: SCP performs alternate routing based on the Model C Indirect 5G SBI Communication format. This is the default mode.
    2. DNS_SRV: SCP performs alternate routing based on the DNS SRV query.
    3. NF_SET_FOLLOWED_BY_DNSSRV: SCP performs alternate routing based on the NF Set, followed by DNS SRV.
    4. STATIC_CONFIG: SCP performs alternate routing based on the static configuration.
    5. NF_SET_FOLLOWED_BY_STATIC_CONFIG: SCP performs alternate routing based on NF Set, and then using static configuration.
  6. Click Save.
  7. Click Refresh to view the updated values on the screen.

4.2.15 Configuring SCP Profile

Following is the procedure to configure SCP Profile parameters:

Editing SCP Profile

  1. From the left navigation menu, navigate to SCP and then select SCP Profile.

    Figure 4-48 SCP Profile

    SCP Profile
  2. Click Edit under NF Services section. The Edit SCP Profile Screen appears. For more information about configuration parameters, see Oracle Communications Cloud Native Core, Service Communication Proxy REST Specification Guide.

    Note:

    To add a new location to Remaining Localities and Serving Localities, type the new location name, and then click Enter.

Note:

Use Edit or Delete buttons available in the next column to update or delete the NF services.

4.2.16 Configuring Service Groups Parameters

Following is the procedure to configure Service Groups parameters:
  1. From the left navigation menu, navigate to SCP and then select SCP Groups.

    Figure 4-49 Service Groups

    Service Groups
  2. Click Edit from Actions to modify the service groups. The Edit Service Groups Screen appears.

    Note:

    You can enter Primary and Secondary Region Localities in the respective field.
  3. Click Save to save the Service Groups.
  4. Click Refresh to view the updated values on the screen.

4.2.17 Configuring Topology Source Info

Following is the procedure to configure Topology Group Info parameters:
  1. From the left navigation menu, navigate to SCP and then select Topology Source Info.

    Figure 4-50 Topology Source Info

    Topology Source Info
  2. Click Edit from the Actions column for the required service that must be modified. The Edit Topology Source Info Screen appears.
  3. Update the Status of the specific NF Type in the Edit Topology Source Info as per your requirement.

    Figure 4-51 Edit Topology Source Info

    Edit Topology Source Info
  4. Click Save to save the Topology Source Info.
  5. Click Refresh to view the updated values on the screen.

4.2.18 Fetching Routing Rules

Following is the procedure to retrieve a collection of routing rules configured at SCP:
  1. From the left navigation menu, navigate to SCP and then select Reports.
  2. Select Routing Rules. The Routing Rules screen is displayed as follows:

    Figure 4-52 Routing Rules

    Routing Rules
  3. Enter the Query Parameters in the field.
  4. Click Get to fetch the response data. The data is displayed in the Response pane.

    Figure 4-53 Response data

    Response data

    Note:

    In case the response data is above the configured display limit, a message is displayed stating "Response data has crossed the configured display limit (5 MB), please click on Export to download it as a file.". Currently, the display limit cannot be modified, it is set to 5 MB.
  5. Click Export to download of the response data file.
  6. Click Clear to clear the response data.

4.2.19 Configuring Ingress Rate Limiting

Following is the procedure to configure ingress rate limiting parameters:
  1. From the left navigation menu, navigate to SCP and then select Rate Limiting.
  2. Select Ingress Rate Limiting. The screen is displayed.

    Figure 4-54 Ingress Rate Limiting

    Ingress Rate Limiting
  3. Enter the Query Parameters in the field.
  4. Click Get to fetch the response data. The data is displayed in the Response pane.

    Note:

    In case the response data is above the configured display limit, a message is displayed stating "Response data has crossed the configured display limit (5 MB), please click on Export to download it as a file.". Currently, the display limit cannot be modified, it is set to 5 MB.
  5. Click Add to add the ingress rate limiting configuration using the Request Body.
  6. Click Edit to edit the Request Body of the ingress rate limiting configuration.
  7. Click Delete to delete the ingress rate limiting configuration based on the query parameters.

4.2.20 Configuring Egress Rate Limiting

Following is the procedure to configure egress rate limiting parameters:
  1. From the left navigation menu, navigate to SCP and then select Rate Limiting.
  2. Select Egress Rate Limiting. The screen is displayed.

    Figure 4-55 Egress Rate Limiting

    Egress Rate Limiting
  3. Enter the Query Parameters in the field.
  4. Click Get to fetch the response data. The data is displayed in the Response pane.

    Note:

    In case the response data is above the configured display limit, a message is displayed stating "Response data has crossed the configured display limit (5 MB), please click on Export to download it as a file.". Currently, the display limit cannot be modified, it is set to 5 MB.
  5. Click Add to add the egress rate limiting configuration using the Request Body.
  6. Click Edit to edit the Request Body of the egress rate limiting configuration.
  7. Click Delete to delete the egress rate limiting configuration based on the query parameters.

4.2.21 Configuring Server Header

Perform the following procedure to configure server header parameters to include server header in the producer NF error responses.
  1. From the left navigation pane, click the SCP tab, and then click the Global Options tab.
  2. Click the Server Header tab.
  3. In the Server Header section, click Edit.
    The Edit Server Header screen appears.

    Figure 4-56 Edit Server Header

    Edit Server Header
  4. To enable the enhanced server header behavior introduced in SCP 1.15.0, set Enable Enhance Server Header Behavior to true.
    By default, this option is disabled. For information about server header configurations, see "Configuring Server Header" in Oracle Communications Cloud Native Core, Service Communication Proxy REST Specification Guide.
  5. In the Side Car Proxy Server Header field, enter the strings to identify server header values if error response is generated by side car proxy.
    A sample value is envoy.
  6. To enable addition of server header in producer NF generated error responses, set Enable Enhance Server Header Behavior to true.
    By default, this option is disabled.
  7. To enable the enhanced server header behavior introduced in SCP 23.1.0, set Enable Enhance Server Header Behavior V2 to true.
  8. Enter status codes in the Side Car Proxy Server Header Status Code field.
  9. Click Save.

4.2.22 Configuring Pod Overload Control Policies

Perform the following procedure to configure pod overload policies to control and discard request messages sent to scp-worker.

For more information about pod overload policies, see Oracle Communications Cloud Native Core, Service Communication Proxy REST Specification Guide.

  1. From the left navigation pane, navigate to SCP and click Pod Overload Control, and then click Worker.
  2. To configure Pod Overload Control Policy, in the left navigation pane, click the Overload Control Policy tab.
    1. In the Overload Control Policy section, click Get to retrieve the scp-worker Pod Overload Control Policy data configured based on the threshold level.

      Figure 4-57 Overload Control Policy


      Overload Control Policy

    2. To add a new request, click Add and enter the request body information in the Request field.
    3. Click Submit.
      The request body message appears in the Response field.
    4. To edit, export, delete, or clear the data, click the required buttons as described in the following table:

      Table 4-32 Buttons and Field Descriptions on Overload Control Policy page

      Button and Field Names Description
      Query Parameters Allows to enter parameters to retrieve, add, and update different pod overload policies data.
      Get Retrieve the scp-worker Pod Overload Policy data configured based on the threshold level. You can modify this data using the Edit button.
      Add Adds new message requests in the Request field.
      Edit Modifies any existing data by updating mandatory query parameters in the Query Parameters field.
      Delete Removes any message request.
      Export Exports existing records in the JSON format.
      Clear Refreshes the existing screen by removing the data.
  3. To configure Pod Overload Action Policy, in the left navigation pane, click the Overload Action Policy tab.
    1. In the Overload Action Policy section, click Get to retrieve the scp-worker Pod Overload Action Policy data configured based on the threshold level.
    2. To add a new request, click Add and enter the request body information in the Request field.
    3. Click Submit.
      The request body message appears in the Response field.
    4. To edit, export, delete, or clear the data, click the required buttons as described in Table 4-32.
  4. To configure Pod Overload Discard Policy, in the left navigation pane, click the Overload Discard Policy tab.
    1. In the Overload Discard Policy section, click Get to retrieve the scp-worker Pod Overload Discard Policy data configured based on the threshold level.
    2. To add a new request, click Add and enter the request body information in the Request field.
    3. Click Submit.
      The request body message appears in the Response field.
    4. To edit, export, delete, or clear the data, click the required buttons as described in Table 4-32.

4.2.23 Configuring SBI Message Priority

Perform the following procedure to configure Service Based Interface (SBI) Message Priority parameters supported by the Pod Overload Control feature. You can retrieve SCP_SBI Message Priority configured in SCP and modify the data. Also, add a new SBI message request.

For more information about SBI Message Priority parameters, see Oracle Communications Cloud Native Core, Service Communication Proxy REST Specification Guide.

  1. From the left navigation pane, navigate to SCP and click the SBI Message Priority tab.
  2. In the SBI Message Priority section, click Get to retrieve the SCP_SBI Message Priority configured in SCP.

    Figure 4-58 SBI Message Priority

    SBI Message Priority
  3. To add a new SBI message request, click Add and enter the request body information in the Request field.
  4. Click Submit.
    The request body message appears in the Response field.
  5. To edit, export, delete, or clear the data, click the required buttons as described in the following table:

    Table 4-33 Buttons and Field Descriptions of SBI Message Priority

    Button and Field Names Description
    Query Parameters Allows to enter parameters to retrieve, add, and update SBI message priority information.
    Get Retrieves the SCP_SBI Message Priority configured in SCP. You can modify this data using the Edit button.
    Add Adds new message requests in the Request field.
    Edit Modifies any existing data by updating mandatory query parameters in the Query Parameters field.
    Delete Removes any message request.
    Export Exports existing records in the JSON format.
    Clear Refreshes the existing screen by removing the data.

4.2.24 Configuring DNS SRV based Alternate Routing

This section provides information to enable different options to use the Alternate Routing based on the DNS SRV Records feature.

You must log in to the CNC Console while performing the procedures described in the subsequent subsections. Using these procedures, you can perform the followings tasks:

  • Set the routing mode.
  • Configure the default Time To Live (TTL) value.
  • Refresh the DNS SRV records in DB.
  • Add and fetch DNS SRV records from DB.
4.2.24.1 Configuring Routing Modes

Perform the following procedure to enable alternate routing and set the routing mode to NF Set, DNS SRV, or both when the forward routing fails.
  1. From the left navigation pane, navigate to SCP and click the Routing Options tab.
    The Routing Options screen appears with the list of services.
  2. To set alternate route modes, in the Actions column, click the Edit icon for the corresponding service name.

    Figure 4-59 Setting Alternate Routing Mode


    Setting Alternate Routing Mode

  3. In the DNS SRV Based Alternate Route section, set the Mode of the selected specific services as required:
    • NF_SET: SCP performs alternate routing based on the Model C Indirect 5G SBI Communication format. This is the default mode.
    • DNS_SRV: SCP performs alternate routing based on the DNS SRV query.
    • NF_SET_FOLLOWED_BY_DNSSRV: SCP performs alternate routing based on NF Set and then with DNS SRV.
  4. Click Save.
4.2.24.2 Configuring the Default TTL Value

Perform the following procedure to configure the default Time To Live (TTL) value.
  1. From the left navigation pane, navigate to SCP and click the Global Options tab.
  2. To configure the TTL value, click the System Config tab.
  3. In the System Config section, click the Edit icon and set the TTL value as required.
    By default, this value is set to 900s. The range is between 30s to 86400s.

    Figure 4-60 Setting TTL Value

    Setting TTL Value
  4. Click Submit.
4.2.24.3 Configuring Alternate NF Group

Perform the following procedure to add and fetch DNS SRV records from DB.
  1. From the left navigation pane, navigate to SCP and click the Alternate NF Group tab.
  2. To configure DNS records using query parameters, click the Configuration tab.
  3. In the Configuration section, click Add to add query parameters in the Request field.

    Figure 4-61 Alternate NF Group Options

    Alternate NF Group Options
  4. Click Submit.
    Query parameters automatically appear in the Response field.
  5. Click Get to view all the records of the query parameter in the Response field.
  6. To export, delete, or clear the data, click the required buttons as described in the following table:

    Table 4-34 Configuration Query Parameters

    Button and Field Names Description
    Query Parameters FQDN of an NF profile.

    Example:

    serviceProtoName=_http._tcp.pcf4svc.scpsvc.svc.cluster.local&apiPrefix=USEast

    Get Fetches DNS SRV records from DB.
    Add Adds DNS SRV records to DB by querying the DNS server with the combination of apiPrefix and Service Proto Name.

    Example:

    {  "apiPrefix": "USEast",  "serviceProtoName": "_http._tcp.pcf2svc.scpsvc.svc.cluster.local" }
    Delete Removes a particular record from DB based on Service Proto Name (SPN).

    Example:

    serviceProtoName=_http._tcp.udm1svc.scpsvc.svc.cluster.local
    Export Exports DNS SRV records in the JSON format.
    Clear Resets all the fields in the Configuration section.
    Response Displays the required DNS SRV records.
    Request Allows you to add a query parameter when you click the Add button.
  7. Click Submit.
4.2.24.4 Configuring Refresh DNS SRV Data

Perform the following procedure to refresh the DNS SRV records in DB.
  1. From the left navigation pane, navigate to SCP and click the Alternate NF Group tab.
  2. To refresh DB records, click the Refresh DNS SRV Data tab in the left navigation pane.
  3. Click Refresh.
  4. In the Request field, enter one of the following parameters:

    Table 4-35 Request Parameters

    Parameter Description
    {  "spnlist": [ ] } This parameter refreshes only specific records that are provided within []. For example:

    {  "spnlist": [    "_http._tcp.pcf4svc.scpsvc.svc.cluster.local",    "_http._tcp.nf1stub.scpsvc.svc"  ] }

    {  "refreshAll": "true" } This parameter refreshes all the records.
  5. Click Submit.

4.2.25 Configuring SBI Message Priority and Error Profiles

Perform the following procedure to configure values for determining the priority of ingress messages and create error profiles.
  1. From the left navigation pane, navigate to SCP and click the Routing Options tab.
  2. In the Routing Options section, select a service name from the Service Name column and click the corresponding edit icon.
  3. In the NFService Load Based Congestion Control section, in the SBI Message Priority Discard From field, enter a value to determine the priority of the ingress message.

    Note:

    • The value of the SBI Message Priority Discard From field is compared with the "3gpp-Sbi-Message-Priority" header to categorize an ingress message request as high or low priority. By default, SCP considers 24 as the priority for the ingress message request if the message does not have the "3gpp-Sbi-Message-Priority" header. If the priority of the ingress message request is less than the value of SBI Message Priority Discard From, then the message is considered as high priority message.
    • SCP discards all the 5G SBI messages whose "3gpp-Sbi-Message-Priority" header value is equal to or greater than this configuration.

    Figure 4-62 Configuring SBI Message Priority and Error Profiles

    Configuring SBI Message Priority and Error Profiles
  4. To configure the error profiles, complete the following fields:

    Table 4-36 Error Profile Configuration

    Field Name Description
    Error Code Indicates configurable error codes to be sent by SCP to consumer NFs when the producer NF is congested or throttled in case of a low priority message.

    The default value is 503, which indicates: Service Unavailable.

    Error Cause Indicates the error cause that is specific to the occurrence of the problem.

    The default value is NF_CONGESTION.

    Error Title Indicates the title of the error type.

    The default value is NF service is overloaded or congested.

    Retry After Indicates the time during which the service is unavailable. It is applicable when the error code is 503.

    When the error code is 3xx, where x indicates any numeric value, it specifies the minimum time that the user must wait before issuing the redirected request.

    The default value is 5. The unit of this value can be HTTP-date or delta-seconds. For example:
    • Fri, 31 Dec 2001 23:59:59 GMT
    • 120

      In the latter example, the delay is 2 minutes.

    Redirect Url Retries the request towards the directed resource referred in the Location header using the same request method.
    Example:
    https://udm1.udmsvc.domain/USEast/nudm-sdm/v1/path2
    Error Description Indicates an explanation specific to the occurrence of the problem.

    The default value is NF service is overloaded or congested.

  5. Click Save.

4.2.26 Configuring the nextHopSCP Routing Option

Perform the following procedure to configure the nextHopSCP routing options.
  1. From the left navigation pane, navigate to SCP and click the Routing Options tab.
    The Routing Options screen appears with the list of services.
  2. To edit the Next Hop SCP section, click the Edit icon for the corresponding service name.
  3. Expand the Next Hop SCP Routing Options option.

    Figure 4-63 NextHopSCP


    NextHopSCP

  4. Configure the following fields as required:

    Table 4-37 Configuring Next Hop SCP Routing Options

    Field Name Description
    Response Timeout

    Indicates the allotted time to respond to a message request. When the response timeout expires, SCP performs alternate rerouting to the available alternate NF or pod.

    If no alternate NFs or pods are available, SCP sends an error message.

    The default value is 4 seconds.

    Total Transaction lifetime

    Indicates the total time allowed to forward a request, including initial and all subsequent routing attempts.

    Note: The total time consumed in processing all retries must not exceed the total transaction lifetime.

    The default value is 7 seconds.

    Max Routing Attempts

    (Service Level)

    Indicates the maximum number of forward routing attempts made at a service level.

    • Maximum number of times SCP is allowed to forward a request message. If the Max Routing attempts value is set to 1 for both service and pod level, the total transaction lifetime field value is not required. If the Max Routing attempts value is set to greater than 1 for both service and pod level, then the total transaction lifetime field value is considered for rerouting processing.
    • Rerouting of request messages is always considered as Max Routing attempts value minus one (-1), that is, Rerouting of request messages = (Max Routing attempts value) -1

    The default routing attempt is 2.

    Max Routing Attempts

    (Service Endpoint Level)

    Indicates the maximum number of forward routing attempts at NF or pod level.

    • Maximum number of times SCP is allowed to forward a request message. If the Max Routing attempts value is set to 1 for both service and pod level, the total transaction lifetime field value is not required. If the Max Routing attempts value is set to greater than 1 for both service and pod level, then the total transaction lifetime field value is considered for rerouting processing.
    • Rerouting of request messages is always considered as Max Routing attempts value minus one (-1), that is, Rerouting of request messages = (Max Routing attempts value) -1

    The default routing attempt is 1.

    Alternate Routing Onset Threshold Percent

    (NFService Load Based Congestion Control Level)

    Indicates the percentage of Alternate Routing Onset Threshold Percent.

    The default value is 80%.

    Alternate Routing Abatement Threshold Percent

    (NFService Load Based Congestion Control Level)

    Indicates the percentage of Alternate Routing Abatement Threshold Percent.

    The default value is 75%.

    Throttle Onset Threshold Percent

    (NFService Load Based Congestion Control Level)

    Indicates the percentage of Throttle Onset Threshold Percent.

    The default value is 90%.

    Throttle Abatement Threshold Percent

    (NFService Load Based Congestion Control Level)

    Indicates the percentage of Throttle Abatement Threshold Percent.

    The default value is 85%.

  5. Click Save.

4.2.27 Configuring SEPP Inter PLMN Routing

Perform the following procedure to add an NF instance ID and configure Public Land Mobile Network (PLMN) IDs supported by Security Edge Protection Proxy (SEPP).
  1. From the left navigation pane, navigate to SCP and click the SEPP Info tab.
  2. To filter or add an NF instance ID in the SEPP Info section, click the required buttons as described in the following table:

    Table 4-38 Filtering and Adding NF Instance IDs

    Button, Column, and Field Names Description
    Type to Filter This field allows you to search for an NF instance ID and displays it in the NF Instance ID column.
    Refresh This button refreshes information in the SEPP Info section.
    Add This button allows you to add a new NF instance ID.
    NF Instance ID This column displays the available NF instance IDs.
    Actions This column allows you to edit an existing NF instance ID using the edit option.
  3. To add a new NF instance ID, click Add.

    Figure 4-64 Adding a New NF Instance ID

    Adding a New NF Instance ID
  4. In the NF Instance ID field, enter an instance ID, for example, 8faf1bbc-6e4a-4454-a507-aef01a101a06.
  5. Expand the SEPP Info option to configure SEPP ports as follows:
    1. In the Http field, enter a value between 0 and 65535.
      This field is applicable for the HTTP connection.
    2. In the Https field, enter a value between 0 and 65535.
      This field is applicable for the HTTPS connection.

      Note:

      If both the fields are configured, then the HTTPS connection is preferred.
  6. To configure PLMN IDs supported by SEPP, in the Remote PLMN List section, click Add.

    Figure 4-65 Supported PLMN by SEPP

    Supported PLMN by SEPP
    1. In the MCC field, enter the required mobile country code.
      Mobile Country Code (MCC) is a three digit number ranging from 0 to 9.
    2. In the MNC field, enter the required mobile network code.
      Mobile Network Code (MNC) can be of two or three digits ranging from 0 to 9.
    3. Click Save.
  7. Click Save.

4.2.28 Configuring Route Groups

Perform the following procedure to configure Route Groups parameters.
  1. From the left navigation pane, click the SCP tab, and then click the Route Groups tab.
    The Route Groups screen appears.

    Figure 4-66 Route Groups


    Route Groups

  2. In the Route Groups section, click Add to add request body in the Request field.
    Query parameters are applicable only for DELETE and GET resource types.
  3. Click Submit.
    Response body automatically appears in the Response field.
  4. Click Get to view all the records of the response body in the Response field.
  5. To export, delete, or clear the data, click the required buttons as described in the following table, and then click Submit.

    Table 4-39 Route Groups Buttons and Field Descriptions

    Button and Field Name Description
    Response Displays the required Route Groups records.
    Request Allows you to add a query parameter when you click the Add button.
    Query Parameters Processes routeGroupId, routeGroupType, or primaryRoute parameters.
    Get Retrieves configured route groups based on the supplied query parameters as filtering criteria.
    Export Exports Route Groups records in the JSON format.
    Delete Removes the configuration of an existing route group.
    Clear Resets all the fields in this screen.
    Add Configures a new route group or replaces an existing route group by providing a route group configuration in the request body.

4.2.29 Configuring Ingress Rate Limiter Consumer Info

Perform the following procedure to configure consumer information for ingress rate limiting.

  1. From the left navigation pane, click the SCP tab, and then click the Ingress Rate Limiter Consumer Info tab.
    The Ingress Rate Limiter Consumer Info screen appears:

    Figure 4-67 Ingress Rate Limiter Consumer Info


    Ingress Rate Limiter Consumer Info

  2. In the Ingress Rate Limiter Consumer Info section, click Edit, and then configure the fields as described in the following table:

    Table 4-40 Configuring Consumer Information

    Field Name Description
    XFCC Certificate Extract Index

    The certificate extract index contains certificate information in the XFCC header.

    This parameter is used to decode "X-Forwarded-Client-Cert" for the FQDN.

    The default value is 0.

    XFCC Extract Field

    This is the name of the field that has to be retrieved from the XFCC header.

    The default value is DNS.

    XFCC Extract Index

    Index where the field configured in 'extractField' is present in the XFCC header for extraction.

    The default value is 0.

    User Agent Format

    The header format to identify the consumer NF according to the ingress rate limiting configurations.

    It supports the following formats:

    • Format1: NFTYPE-NFINSTANCEID FQDN or NFTYPE-NFINSTANCEID-FQDN
    • Format2: NFTYPE-FQDN NFINSTANCEID or NFTYPE-FQDN-NFINSTANCEID
    • Format3: NFTYPE-NFINSTANCEID
    • Format4: NFTYPE-FQDN
    • Format5: NFTYPE

    Where,

    • NFTYPE indicates the type of consumer NF.
    • NFINSTANCEID indicates the instance ID of the consumer NF.
    • FQDN indicates the FQDN of the consumer NF.

    In the aforementioned example, "-" is a separator and NFInstanceID, FQDN, and Hostname are supported IDs.

    Primary Header Name

    The header name to identify the consumer NF according to the ingress rate limiting configurations.

    This is a mandatory parameter. This parameter is given priority over the secondaryHeaderName parameter.

    The default value is "X-Forwarded-Client-Cert".

    It can use the following values:

    • "User-Agent"
    • "X-Forwarded-Client-Cert"
    User Agent Separator

    This is the separator that the User-Agent header uses to separate NFINSTANCEID and FQDN.

    The default value is "SPACE".

    It can use the following values:

    • "SPACE"
    • "HYPHEN"
    Secondary Header Name

    The header name to identify the consumer NF according to the ingress rate limiting configurations.

    This is an optional parameter.

    The default value is "".

    It can use the following values:

    • "User-Agent"
    • "X-Forwarded-Client-Cert"
  3. Click Save.

4.2.30 Configuring SCP Services

Perform the following procedure to view thread watchdog and queue alerts threshold configurations required for SCP microservices.
  1. From the left navigation pane, click the SCP tab, and then click the SCP Service Configuration tab.
  2. In the left navigation pane, click the SCPC-AlternateResolution tab and do the following:
    1. In the SCPC-AlternateResolution Service Configuration section, expand the SCP Service Configuration option.
    2. To view the Thread Watchdog configuration values, expand the Thread Watchdog Configuration option.
    3. To view the Connectivity Watchdog configuration values, expand the Connectivity Watchdog Configuration option.
  3. In the left navigation pane, click the SCPC-Audit tab and do the following:
    1. In the SCPC-Audit Service Configuration section, expand the SCP Service Configuration option.
    2. To view the Thread Watchdog configuration values, expand the Thread Watchdog Configuration option.
    3. To view the Connectivity Watchdog configuration values, expand the Connectivity Watchdog Configuration option.
  4. In the left navigation pane, click the SCPC-Configuration tab and do the following:
    1. In the SCPC-Configuration Service Configuration section, expand the SCP Service Configuration option.
    2. To view the Thread Watchdog configuration values, expand the Thread Watchdog Configuration option.
    3. To view the Connectivity Watchdog configuration values, expand the Connectivity Watchdog Configuration option.
  5. In the left navigation pane, click the SCPC-Configuration tab and do the following:
    1. In the SCPC-Configuration Service Configuration section, expand the SCP Service Configuration option.
    2. To view the Thread Watchdog configuration values, expand the Thread Watchdog Configuration option.
    3. To view the Connectivity Watchdog configuration values, expand the Connectivity Watchdog Configuration option.
  6. In the left navigation pane, click the SCPC-Notification tab and do the following:
    1. In the SCPC-Notification Service Configuration section, expand the SCP Service Configuration option.
    2. To view the threshold values of different queues, expand the Queue Utilization Alert Thresholds option.
      The SCPC-Notification Service Configuration screen displays the queue values for critical, major, and minor threshold.

      Figure 4-68 SCPC-Notification Service Configuration


      SCPC-Notification Service Configuration

      The following table describes the significance of each column to determine the values of critical, major, and minor threshold.

      Note:

      The critical, major, and minor threshold values are automatically populated in the CNC Console and cannot be modified. These values are configured using REST APIs as described in "Configuring SCP Services" in Oracle Communications Cloud Native Core, Service Communication Proxy REST Specification Guide.

      Table 4-41 Queue Utilization Alert Thresholds

      Column Name Description
      Queue Name Indicates the name of the queue for which these configurations are applicable.
      Critical Queue Threshold Indicates the percentage (%) value for queue usage threshold upon reaching which a "critical" alert is raised.
      Major Queue Threshold Indicates the percentage (%) value for queue usage threshold upon reaching which a "major" alert is raised.
      Minor Queue Threshold Indicates the percentage (%) value for queue usage threshold upon reaching which a "minor" alert is raised.
  7. In the left navigation pane, click the SCPC-Subscription tab and do the following:
    1. In the SCPC-Subscription Service Configuration section, expand the SCP Service Configuration option.
    2. To view the Thread Watchdog configuration values, expand the Thread Watchdog Configuration option.
    3. To view the Connectivity Watchdog configuration values, expand the Connectivity Watchdog Configuration option.
  8. In the left navigation pane, click the SCP-NrfProxy tab and do the following:
    1. In the SCP-NrfProxy Service Configuration section, expand the SCP Service Configuration option.
    2. To view the threshold values of different queues, expand the Queue Utilization Alert Thresholds option.
      The SCP-NrfProxy Service Configuration screen displays the queue values for critical, major, and minor threshold.

      Figure 4-69 SCP-NrfProxy Service Configuration


      SCP-NrfProxy Service Configuration

      The queue utilization alerts threshold values are automatically populated in the CNC Console as described in Table 4-41.
    3. Expand the Thread Watchdog Configuration option to view the values of thread watchdog configurations:
      The following table describes the fields required to configure the Thread Watchdog feature:

      Note:

      Thread watchdog field values are automatically populated in the CNC Console and cannot be modified. These values are configured using REST APIs as described in "Configuring SCP Services" in Oracle Communications Cloud Native Core, Service Communication Proxy REST Specification Guide.

      Table 4-42 Thread Watchdog Configuration

      Field Name Description
      Enable Thread Watchdog Specifies whether to enable or disable liveliness failures. If this parameter is set to true, liveliness fails whenever the watchdog reports a stuck or deadlocked thread.
      Watchdog Monitoring Interval Indicates the time interval used by the watchdog to monitor if any threads are stuck.
      Watchdog Interval Indicates the maximum time allowed for threads to be nonresponsive. Watchdog uses this time to determine if a thread is stuck.

      For example, if this value is set to 10 seconds and a thread does not respond for 10 seconds, then the watchdog marks that thread as stuck or nonresponsive.

      Watchdog Failure Count Indicates the maximum number of times thread watchdog attempts to check if a thread is stuck before marking the thread as hung or stuck.

      For example, if this value is set to 3, then the watchdog checks if a thread is stuck 3 times continuously before marking it as stuck or hung.

  9. In the left navigation pane, click the SCP-Worker tab and do the following:
    1. In the SCP-Worker Service Configuration section, expand the SCP Service Configuration option.
    2. To view the threshold values of different queues, expand the Queue Utilization Alert Thresholds option.
      The SCP-Worker Service Configuration screen displays the queue values for critical, major, and minor threshold.

      Figure 4-70 SCP-Worker Service Configuration


      SCP-Worker Service Configuration

      The queue utilization alerts threshold values are automatically populated in the CNC Console as described in Table 4-41.
    3. Expand the Thread Watchdog Configuration option to view the values of thread watchdog configurations that are automatically populated in the CNC Console as described in Table 4-42.

4.2.31 Configuring Outlier Detection

Perform the following procedure to add, edit, or remove any existing rule name for outlier detection.
  1. From the left navigation pane, click the SCP tab, and then click the Outlier Detection tab.
    The Outlier Detection screen appears.

    Figure 4-71 Outlier Detection


    Outlier Detection

  2. If you want to edit or remove any existing rule name from the Rule Name column, click Edit or Delete icon in the Actions column.
  3. To add new rule names, click Add.
  4. In the Add Outlier Detection section, configure the following fields:
    • Rule Name: Enter a unique rule name that is available in the outlier detection table.
    • Consecutive Errors: Enter a value between from 5 to 500 to define the number of consecutive errors after which an endpoint is considered unhealthy.
    • Interval: Enter a value from 30 seconds to 86400 seconds to set the interval after which stale records are removed from the outlier data cache.
    • Base Ejection Time: Enter a value between 1 second and 500 seconds to set the of duration endpoint ejection.
    • Error List: Select the required error name from the available error list to be considered for outlier detection.
  5. Click Save.

4.2.32 Configuring Traffic Feed

Perform the following procedure to configure OCNADD and Trigger Points.
  1. From the left navigation pane, click the SCP tab, and then click the Traffic Feed tab.
  2. To configure OCNADD fields, in the left navigation pane, click the Data Director tab.
  3. In the Traffic Feed Data Director Configuration section, click Edit and configure the fields as described in the "Configuring Traffic Feed Data Director" section of the Oracle Communications Cloud Native Core, Service Communication Proxy REST Specification Guide.
  4. To configure Trigger Points, in the left navigation pane, click the Trigger Points tab.
  5. In the Trigger Points section, click Add and configure the fields as described in the "Configuring Traffic Feed Trigger Point Config" section of the Oracle Communications Cloud Native Core, Service Communication Proxy REST Specification Guide.
  6. Click Save.

4.2.33 Congestion Control Configurations

Perform the following steps to configure congestion control parameters:
  1. From the left navigation menu, navigate to SCP and then select Congestion Control.
  2. Click Edit icon from the Actions column for the required service that must be modified.

    Note:

    The default rule name cannot be deleted. The new rule name can be added, modified, or deleted.
    The Edit Congestion Control screen appears.

    Figure 4-72 Congestion Control


    Congestion Control

  3. Make the required modifications for the following parameters:
    1. Alternate Routing Onset Threshold Percent: Set the threshold percentage for onset alternate routing.
    2. Alternate Routing Abatement Threshold Percent: Set the threshold percentage for alternate routing abatement.
    3. Throttle Onset Threshold Percent: Set the threshold percentage for onset throttling.
    4. Throttle Abatement Threshold Percent: Set the threshold percentage for throttle abatement.
    5. SBI Msg Priority Discard From: Set the priority for message, after which the messages can be discarded. For example, if the value is 30, then messages with priority 0-29 are high priority, and other low-priority messages will be throttled.

      Note:

      All the parameters are mandatory.
    For more information about the configuration parameters, see Oracle Communications Cloud Native Core, Service Communication Proxy REST Specification Guide.
  4. Click Save.
  5. Click Cancel to reset all the fields.
  6. Click Delete from the Actions column to delete the record.

4.2.34 Routing Options Configurations

Perform the following procedure to view or edit Routing Options Configuration parameters.
  1. From the left navigation menu, navigate to SCP, and then click the Routing Options Configuration tab.
  2. In the Routing Options Configuration section, click Edit from the Actions column for the required service that must be modified.

    The Edit Routing Options Configuration screen appears.

    Figure 4-73 Routing Options Configuration


    Routing Options Configuration

  3. In the Routing Options Config Name, configure the following:
    • NF Type: Set the NF type for which routing options are to be configured.
    • Service Name: Set the NF service name for the routing options to be configured.
    • Message Type List: Set the routing options for notification or SBI messages.
    • Routing Options Config SetName: Enter the name of the routing configuration used to retrieve routing options.
  4. Enter or modify the required values as described in "Routing Options Configuration"and "Routing Config Set" in Oracle Communications Cloud Native Core, Service Communication Proxy REST Specification Guide.
  5. Click Save.

4.2.35 Routing Config Set

Perform the following procedure to define custom routing options for notification.
  1. From the left navigation menu, navigate to SCP, and then click the Routing Config Set tab.
  2. In the Routing Config Set section, click Edit from the Actions column for the required service that must be modified.

    The Edit Routing Config Set screen appears.

    Figure 4-74 Edit Routing Config Set


    Edit Routing Config Set

  3. Enter or modify the required values as described in "Routing Config Set" and "Routing Options Configuration" in Oracle Communications Cloud Native Core, Service Communication Proxy REST Specification Guide.
  4. In the Reroute Condition List, configure the list of error codes for rerouting:
    • Click Add to add new status code.
    • Click Edit or Delete icon to edit or remove any existing error code from the reroute condition list.
  5. Click Save.
  6. Click Cancel to reset all the fields.

4.2.36 Circuit Breaking Configurations

Perform the following procedure to configure circuit breaking data.
  1. From the left navigation menu, navigate to SCP, and then click the Circuit Breaking tab.
  2. In the Circuit Breaking section, click Edit icon from the Actions column for the required service that must be modified.
    The Edit Circuit Breaking screen appears.

    Figure 4-75 Edit Circuit Breaking


    Edit Circuit Breaking

  3. In the HTTP2 Max Requests field, set the maximum number of requests SCP routes to a NF service instance, waiting for a response before stopping further routing requests to it. The maximum allowed value is 1000.
  4. Enter or modify the required values as described in "Circuit Breaking Configurations" in Oracle Communications Cloud Native Core, Service Communication Proxy REST Specification Guide.
  5. Click Save.
  6. Click Cancel to reset the field.

4.2.37 Viewing SCP Feature Status

Perform the following procedure to fetch the runtime status of NRF migration task.

  1. From the left navigation pane, click the SCP tab, and then click the SCP Feature Status tab.
  2. On the SCP Feature Status page, the following columns display the SCP feature status.

    Table 4-43 SCP Feature Status

    Column Name Description
    Feature Name Displays the names of the features, such as nrf_bootstrap_info.
    Admin State Displays the admin state of the feature. Possible statuses are mentioned below:
    • ENABLED: This indicates that the user has enabled the feature.
    • DISABLED: This indicates that the user has disabled the feature.
    Runtime Status Displays the current runtime status of the feature. Possible statuses are mentioned below:
    • DISABLED: This indicates that the feature is disabled.

      For example, in the nrf_bootstrap_info feature, this state means SCP is running with a statically configured NRF. If the user has changed the 'Admin State' from ENABLED to DISABLED, this state means the feature is successfully disabled.

    • IN_PROGRESS: This indicates the enabling or disabling of the feature is currently is in progress when the 'Admin State' is set to ENABLED or DISABLED.

      For example, in the nrf_bootstrap_info feature, when the 'Admin State' is ENABLED, the migration from static to DNS SRV based NRF topology is in progress. In the nrf_bootstrap_info feature, when the 'Admin State' is DISABLED, the migration from a DNS SRV based NRF topology to static NRF topology is in progress.

    • FAILED_RETRY: This indicates that the process of enabling or disabling the feature (as indicated by the 'Admin State') has encountered failure and is undergoing retries.

      For example, in the nrf_bootstrap_info feature, this state means either of the migration tasks has failed and going through retries.

    • ENABLED: This indicates the feature is successfully enabled.

      For example, in the nrf_bootstrap_info feature, this state means the migration from static to a DNS SRV based NRF topology is successful.

    Creation Timestamp Displays the time of creation of the event, for example, creationTimestamp": "2021-05-26T01:17:15.000+00:00
    Update Timestamp Displays the time of updation of the event, for example, creationTimestamp": "2021-05-26T06:24:15.000+00:00