1 .. This work is licensed under a Creative Commons Attribution 4.0 International
3 .. http://creativecommons.org/licenses/by/4.0
4 .. (c) OPNFV, Yin Kanglin and others.
5 .. 14_ykl@tongji.edu.cn
7 *************************************
8 Yardstick Test Case Description TC050
9 *************************************
11 +-----------------------------------------------------------------------------+
12 |OpenStack Controller Node Network High Availability |
14 +--------------+--------------------------------------------------------------+
15 |test case id | OPNFV_YARDSTICK_TC050: OpenStack Controller Node Network |
16 | | High Availability |
17 +--------------+--------------------------------------------------------------+
18 |test purpose | This test case will verify the high availability of control |
19 | | node. When one of the controller failed to connect the |
20 | | network, which breaks down the Openstack services on this |
21 | | node. These Openstack service should able to be accessed by |
22 | | other controller nodes, and the services on failed |
23 | | controller node should be isolated. |
24 +--------------+--------------------------------------------------------------+
25 |test method | This test case turns off the network interfaces of a |
26 | | specified control node, then checks whether all services |
27 | | provided by the control node are OK with some monitor tools. |
28 +--------------+--------------------------------------------------------------+
29 |attackers | In this test case, an attacker called "close-interface" is |
30 | | needed. This attacker includes three parameters: |
31 | | 1) fault_type: which is used for finding the attacker's |
32 | | scripts. It should be always set to "close-interface" in |
34 | | 2) host: which is the name of a control node being attacked. |
35 | | 3) interface: the network interface to be turned off. |
37 | | The interface to be closed by the attacker can be set by the |
38 | | variable of "{{ interface_name }}":: |
42 | | fault_type: "general-attacker" |
43 | | host: {{ attack_host }} |
44 | | key: "close-br-public" |
45 | | attack_key: "close-interface" |
46 | | action_parameter: |
47 | | interface: {{ interface_name }} |
48 | | rollback_parameter: |
49 | | interface: {{ interface_name }} |
51 +--------------+--------------------------------------------------------------+
52 |monitors | In this test case, the monitor named "openstack-cmd" is |
53 | | needed. The monitor needs needs two parameters: |
54 | | 1) monitor_type: which is used for finding the monitor class |
55 | | and related scritps. It should be always set to |
56 | | "openstack-cmd" for this monitor. |
57 | | 2) command_name: which is the command name used for request |
59 | | There are four instance of the "openstack-cmd" monitor:: |
62 | | - monitor_type: "openstack-cmd" |
63 | | - command_name: "nova image-list" |
65 | | - monitor_type: "openstack-cmd" |
66 | | - command_name: "neutron router-list" |
68 | | - monitor_type: "openstack-cmd" |
69 | | - command_name: "heat stack-list" |
71 | | - monitor_type: "openstack-cmd" |
72 | | - command_name: "cinder list" |
73 +--------------+--------------------------------------------------------------+
74 |metrics | In this test case, there is one metric: |
75 | | 1)service_outage_time: which indicates the maximum outage |
76 | | time (seconds) of the specified Openstack command request. |
77 +--------------+--------------------------------------------------------------+
78 |test tool | Developed by the project. Please see folder: |
79 | | "yardstick/benchmark/scenarios/availability/ha_tools" |
81 +--------------+--------------------------------------------------------------+
82 |references | ETSI NFV REL001 |
84 +--------------+--------------------------------------------------------------+
85 |configuration | This test case needs two configuration files: |
86 | | 1) test case file: opnfv_yardstick_tc050.yaml |
87 | | -Attackers: see above "attackers" discription |
88 | | -waiting_time: which is the time (seconds) from the process |
89 | | being killed to stoping monitors the monitors |
90 | | -Monitors: see above "monitors" discription |
91 | | -SLA: see above "metrics" discription |
93 | | 2)POD file: pod.yaml |
94 | | The POD configuration should record on pod.yaml first. |
95 | | the "host" item in this test case will use the node name in |
98 +--------------+--------------------------------------------------------------+
99 |test sequence | description and expected result |
101 +--------------+--------------------------------------------------------------+
102 |step 1 | start monitors: |
103 | | each monitor will run with independently process |
105 | | Result: The monitor info will be collected. |
107 +--------------+--------------------------------------------------------------+
108 |step 2 | do attacker: connect the host through SSH, and then execute |
109 | | the turnoff network interface script with param value |
110 | | specified by "{{ interface_name }}". |
112 | | Result: The specified network interface will be down. |
114 +--------------+--------------------------------------------------------------+
115 |step 3 | stop monitors after a period of time specified by |
118 | | Result: The monitor info will be aggregated. |
120 +--------------+--------------------------------------------------------------+
121 |step 4 | verify the SLA |
123 | | Result: The test case is passed or not. |
125 +--------------+--------------------------------------------------------------+
126 |post-action | It is the action when the test cases exist. It turns up the |
127 | | network interface of the control node if it is not turned |
129 +--------------+--------------------------------------------------------------+
130 |test verdict | Fails only if SLA is not passed, or if there is a test case |
131 | | execution problem. |
133 +--------------+--------------------------------------------------------------+