Oracle Communications Cloud Native Core Policy User's Guide
Oracle Communications Cloud Native Core Policy User's Guide
Release 1.7.1
F33159-02
July 2020
Oracle Communications Cloud Native Core Policy User's Guide, Release 1.7.1
F33159-02
This software and related documentation are provided under a license agreement containing restrictions on
use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your
license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license,
transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse
engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is
prohibited.
The information contained herein is subject to change without notice and is not warranted to be error-free. If
you find any errors, please report them to us in writing.
If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on
behalf of the U.S. Government, then the following notice is applicable:
U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software,
any programs embedded, installed or activated on delivered hardware, and modifications of such programs)
and Oracle computer documentation or other Oracle data delivered to or accessed by U.S. Government
end users are "commercial computer software" or “commercial computer software documentation” pursuant
to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such,
the use, reproduction, duplication, release, display, disclosure, modification, preparation of derivative works,
and/or adaptation of i) Oracle programs (including any operating system, integrated software, any programs
embedded, installed or activated on delivered hardware, and modifications of such programs), ii) Oracle
computer documentation and/or iii) other Oracle data, is subject to the rights and limitations specified in the
license contained in the applicable contract. The terms governing the U.S. Government’s use of Oracle cloud
services are defined by the applicable contract for such services. No other rights are granted to the U.S.
Government.
This software or hardware is developed for general use in a variety of information management applications.
It is not developed or intended for use in any inherently dangerous applications, including applications that
may create a risk of personal injury. If you use this software or hardware in dangerous applications, then you
shall be responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure its
safe use. Oracle Corporation and its affiliates disclaim any liability for any damages caused by use of this
software or hardware in dangerous applications.
Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of
their respective owners.
Intel and Intel Inside are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are
used under license and are trademarks or registered trademarks of SPARC International, Inc. AMD, Epyc,
and the AMD logo are trademarks or registered trademarks of Advanced Micro Devices. UNIX is a registered
trademark of The Open Group.
This software or hardware and documentation may provide access to or information about content, products,
and services from third parties. Oracle Corporation and its affiliates are not responsible for and expressly
disclaim all warranties of any kind with respect to third-party content, products, and services unless otherwise
set forth in an applicable agreement between you and Oracle. Oracle Corporation and its affiliates will not
be responsible for any loss, costs, or damages incurred due to your access to or use of third-party content,
products, or services, except as set forth in an applicable agreement between you and Oracle.
Contents
1 Introduction
Overview 1-1
Acronyms and Terminology 1-2
References 1-2
iii
Configuring PCF UE Policy Service 6-12
Configuring PCF User Connector Service 6-13
Configuring PCRF Core Settings 6-14
Policy Engine 6-14
Configuring Audit Service 6-15
Policy Data Configurations 6-17
Common 6-17
Managing Policy Tables 6-17
PCF Presence Reporting Area 6-21
Configuring Policy Counter Id 6-27
Configuring Match Lists 6-28
Managing Subscriber Logging 6-29
Custom Attributes 6-31
PCF Session Management 6-39
Configuring Session Rule 6-39
Configuring Session Rule Profile 6-41
Configuring QoS Information 6-42
Configuring PCC Rule 6-44
Configuring PCC Rule Profile 6-48
Configuring QoS Data 6-52
Configuring Charging Data 6-55
Configuring Usage Monitoring Data 6-57
Configuring Traffic Control Data 6-59
Configuring Condition Data 6-61
PCF Access and Mobility 6-62
Configuring Service Area Restriction 6-63
PCF UE Policy 6-64
Configuring URSP Rule 6-65
Configuring UPSI 6-66
PCRF Core 6-68
Charging Server 6-68
Media Profile 6-69
Policy Management 6-71
Policy Projects 6-71
Diameter Configurations 6-74
Settings 6-74
Peer Nodes 6-75
Configuring Diameter Routing Table 6-75
Data Source Configurations 6-76
Data Sources 6-77
Administration 6-79
iv
Bulk Export 6-79
Bulk Import 6-82
Appendix 6-84
7 Policy Alerts
Policy Control Function Alerts 7-1
PCF Alert Configuration 7-3
Cloud Native Policy and Charging Rule Function Alerts 7-5
PCRF Alert Configuration 7-8
v
My Oracle Support
My Oracle Support (https://support.oracle.com) is your initial point of contact for all
product support and training needs. A representative at Customer Access Support can
assist you with My Oracle Support registration.
Call the Customer Access Support main number at 1-800-223-1711 (toll-free in the
US), or call the Oracle Support hotline for your local country from the list at http://
www.oracle.com/us/support/contact/index.html. When calling, make the selections in
the sequence shown below on the Support telephone menu:
• For Technical issues such as creating a new Service Request (SR), select 1.
• For Non-technical issues such as registration or assistance with My Oracle
Support, select 2.
• For Hardware, Networking and Solaris Operating System Support, select 3.
You are connected to a live agent who can assist you with My Oracle Support
registration and opening a support ticket.
My Oracle Support is available 24 hours a day, 7 days a week, 365 days a year.
6
What's New in This Guide
Oracle Communications Cloud Native Core Policy (CNC Policy) User's Guide is a new
guide in this release. In Release 1.7.1, with the new converged policy solution, the
information on how to configure different services and manageable objects in PCF and
CNPCRF has been consolidated in this guide.
7
1
Introduction
This document provides information on how to configure the Cloud Native Core Policy
services and managed objects using REST API.
Overview
Oracle Communications Cloud Native Core Policy (CNC Policy) solution provides
a standard policy design experience and ultimately consistent end-user experience.
The Converged policy solution supports both 4G and 5G networks. In addition, the
overlap in functionality between PCF and PCRF (e.g., need for a policy engine, policy
design, Rx, similarity between Sy and Nchf_SpendingLimitControl, etc.), enables us to
build micro-services that can be used to provide PCRF and PCF functionality. Even
though it is a unified policy solution, you can still deploy the PCF and PCRF entirely
independently.
The CNC Policy is a functional element for policy control decision and flows based
charging control functionalities. The CNC Policy provides the following functions:
• Policy rules for application and service data flow detection, gating, QoS, and flow
based charging to the Session Management Function (SMF)
• Access and Mobility Management related policies to the Access and Mobility
Management Function (AMF)
• Provide UE Route Selection Policies (URSP) rules to UE via AMF
• Accesses subscription information relevant for policy decisions in a Unified Data
Repository (UDR)
• Provides network control regarding the service data flow detection, gating, QoS
and flow based charging towards the Policy and Charging Enforcement Function
(PCEF).
• Receives session and media related information from the AF and informs AF of
traffic plane events.
• Provisions PCC Rules to the PCEF via the Gx reference point.
The CNC Policy supports the above functions through the following services:
• Session Management Service
• Access and Mobility Service
• Policy Authorization Service
• User Equipment (UE) Policy Service
• PCRF Core Service
1-1
Chapter 1
Acronyms and Terminology
Acronym Definition
AMF Access and Mobility Management Function
BSF Binding Support Function
CHF Charging Function
CM Configuration Management
CUSTOMER_REPO Docker registry address including the port number, if the
docker registry has an associated port.
IMAGE_TAG Image tag from release tar file. You can use any tag
number.
However, make sure that you use that specific tag number
while pushing docker image to the docker registry.
MCC Mobile Country code
METALLB_ADDRESS_POOL Address pool which configured on metallb to provide
external IPs .
MNC Mobile Network code
NRF Network Repository Function
PCF Policy Control Function
CNPCRF Cloud Native Policy and Charging Rules Function
SAN Storage Area Network
SMF Session Management Function
UDR Unified Data Repository
References
You can refer to the following documents for information.
• Oracle Communications Cloud Native Policy Control Function Installation Guide
• https://developers.google.com/blockly
• 3GPP Technical Specification 29.512 v15.3.0, Session Management Policy
Control Service, Stage 3, Release 15
• 3GPP Technical Specification 29.514 v15.3.0, Policy Authorization Service, Stage
3, Release 15
• 3GPP Technical Specification 29.507 v15.3.0, Access and Mobility Policy Control
Service, Stage 3, Release 15
• 3GPP Technical Specification 29.525 v15.5.1, UE Policy Control Service, Stage 3,
Release 15
• 3GPP Technical Specification 29.518 v15.5.1, Access and Mobility Management
Services, Stage 3, Release 15
1-2
2
Cloud Native Core Policy Architecture
The Oracle Communications Cloud Native Core Policy is built as a cloud-native
application composed of a collection of microservices running in a cloud-native
environment. It separates processing/business logic and state concerns following the
corresponding logical grouping of microservices/components:
• Connectivity: Components interfacing with external entities. This is where an API
gateway is utilized to interface with external traffic to the PCF. These are stateless
sets of components.
• Business logic: Application layer running the PCRF/PCF business logic, policy
engine and various services that can be enabled based on deployment needs.
These are stateless sets of components.
• Data Management: Data layer responsible for storing various types of persistent
data. The PCF is built to be able to plug in different types of backend data layers
that could be internal or external.
2-1
Chapter 2
cases. The Converged policy solution supports both 4G and 5G networks, thereby
helping operators to manage their heterogeneous network in an intuitive and
consistent manner while enabling seamless interworking and migration between 4G
and 5G. Below is the Cloud Native Core Policy architecture diagram:
2-2
Chapter 2
2-3
3
About Cloud Native Core Policy Services
3-1
Chapter 3
About Access and Mobility Management Service
3-2
Chapter 3
About Policy Authorization Service
3-3
Chapter 3
About UE Management Service
3-4
Chapter 3
About PCRF Core Service
3-5
Chapter 3
About PCRF Core Service
3-6
4
Integrating Cloud Native Core Policy with
Different Network Functions
You can integrate the Cloud Native Core Policy with NRF, UDR, and CHF Network
Functions.
NRF Integration
NRF Management (Client) service enables policy solution to integrate with NRF server
for service registration, discovery, and service status/ load related information
Management Service support includes
• Register Service
• Deregister Service
• PCF heartbeat to NRF that includes load, priority and capacity information
• Knowledge to NRF of scaling change
• Subscribe/Un-subscribe
Discovery Service
• Used to discover UDR, BSF and CHF services
• Compliant with 29.510
4-1
Chapter 4
A Kubernetes Configuration Map is provided to save the NRF address and the NF
Profile information. You can edit the Kubernetes Configuration Map to register Policy
Control Function (PCF) with the NRF.
To edit the Kubernetes Configuration Map:
Open a console to the master node of the Kubernetes deployment and edit the config
map named "pcf-name-application-config" where pcf-name is the HELM chart release
name used at the time of installation, see Oracle Communications Cloud Native Core
Policy Installation Guide.
1. Get a list of all the config maps in the PCF deployment namespace by entering
this command:
4-2
Chapter 4
4-3
5
Configuring Cloud Native Core Policy
This section provides the information for configuring Oracle Communications Cloud
Native Core Policy (CNC Policy) for various services.
CNC Policy offers the following interfaces to configure the CNC Policy solution:
• A web-browser based Graphical User Interface
• A REST API based Machine-to-Machine interface
• Kubernetes Configuration Maps (This configuration map is used to register PCF
with NRF. For more information, see Integrating Cloud Native Core Policy with
Different Network Functions
For more information on configurations using GUI, see Configuring Cloud Native Core
Policy Using Cloud Native Core Console.
For REST API information, please refer Oracle Communications Cloud Native Core
Policy REST Specification Document.
nodes:
- name: 'pcrf-core'
type: 'pcrf'
responseOnly: true
host: "ocpcrf-pcrf-core"
port: 3868
realm: ''
identity: ''
5-1
Chapter 5
Configuring PCRF-Core Host in Config Map
ocpcrf-pcrf-core-service NodePort
10.233.39.230 <none> 3868:31787/TCP,9080:31463/
TCP,5809:30513/TCP,9000:32401/TCP 65m
5-2
6
Configuring Cloud Native Core Policy
Using Cloud Native Core Console
This chapter describes how to configure different services in Oracle Communications
CNC Policy and how to create policies and manageable objects in CNC Policy using
Oracle Communications Cloud Native Core Console.
You are logged in. All the Policy related configurations are available in the left
navigation menu under Policy.
Session Viewer
The Session Viewer displays detailed session information for a specific subscriber.
Within the session viewer, you can enter query parameters to render session data for
a specific subscriber. This section provides information about viewing the sessions.
To view the sessions:
1. From the navigation menu, under Policy, click Session Viewer. The Session
Viewer page appears.
6-1
Chapter 6
Session Viewer
2. From the Session Type drop-down menu, select the service whose sessions you
want to view. Possible values are:
• SM Policy Association
• AM Policy Association
• PA Policy Association
• PCRF-Core Session
• Binding Session
3. a. From the Identifier Type drop-down menu, select the identifier type for the
selected session type. Possible values for SM Policy Association, AM Policy
Association, PA Policy Association, andBinding Session are:
• SUPI
• GPSI
• IPV4
• IPV6
• POLICY_ASSOC_ID
• MAC
Note:
AM Policy Association and PA Policy Association fetches session
data using POLICY_ASSOC_ID (Session ID) only.
b. From the Identifier Type drop-down menu, select the identifier type for the
selected session type. Possible values for PCRF-Core Session are:
• DIAMETER_SESSION_ID
• IMSI
• MSISDN
• IPV4
• IPV6
4. Enter the value in the Identifier Value field for the selected identifier type.
5. Click Query. Information about the subscriber session(s) is displayed.
6-2
Chapter 6
General Configurations
If session data is not available, the error is displayed along with No session found.
General Configurations
You can manage and view the General Configurations from this page.
To edit the General Configurations:
1. From the navigation menu, under Policy, click General Configurations.
The General Configurations screen appears.
2. Click Edit to edit the general configurations.
3. Enter the following information:
• Enable Tracing- Specifies whether to enable tracing. The default value is true.
• Enable Metrics- Specifies whether to enable system metrics. The default
value is true.
• API Gateway Host- The name of the API gateway host. This field is not used.
• API Gateway Port- The port number of the API gateway (if a port other than
the default is being used). The default value is 80. This field is not used.
• Enable TLS- Specifies whether to enable TLS. The default value is false.
• Enable Subscriber Activity Logging- Specifies whether to enable subscriber
activity logging. The dafault value is false.
4. Click Save.
Service Configurations
You can tailor the Policy services as per network operator's requirements using
the Service configuration pages. The configurations include setting up end point
addresses, setting up log levels and other debug information like tracing etc. and
customizing and/or optimizing NF interactions for example with UDR etc.
6-3
Chapter 6
Service Configurations
Note:
• The NAS Message Maximum Packet Size field is not supported in this
release of PCF and will not take effect.
• The Validate User and Query User fields must always be set to false in
this release of PCF.
6-4
Chapter 6
Service Configurations
6-5
Chapter 6
Service Configurations
Note:
The PCF User Service caches
the subscriber profile when
“Subscribe To Notify” option is
enabled, in that case, the PCF
may not always reach the UDR
when the subscriber profile is
found in the local cache.
Note:
The PCF User Service caches
the subscriber profile when
“Subscribe To Notify” option is
enabled, in that case, the PCF
may not always reach the UDR
when the subscriber profile is
found in the local cache.
6-6
Chapter 6
Service Configurations
Note:
The PCF User Service caches
the subscriber profile when
“Subscribe To Notify” option is
enabled, in that case, the PCF
may not always reach the UDR
when the subscriber profile is
found in the local cache.
Note:
The PCF User Service caches
the subscriber profile when
“Subscribe To Notify” option is
enabled, in that case, the PCF
may not always reach the UDR
when the subscriber profile is
found in the local cache.
6-7
Chapter 6
Service Configurations
6-8
Chapter 6
Service Configurations
6-9
Chapter 6
Service Configurations
6-10
Chapter 6
Service Configurations
4. Click Save.
4. Click Save.
6-11
Chapter 6
Service Configurations
4. Click Save.
6-12
Chapter 6
Service Configurations
5. Click Save.
6-13
Chapter 6
Service Configurations
5. Click Save.
Policy Engine
You can manage and view the Policy Engine service from this page.
To edit Policy Engine:
1. From the navigation menu, click Policy, and then Service Configurations, and
then Policy Engine.
The Policy Engine screen appears. On this page, you can see the list of all the
supported services in CNC Policy. Below is a screen capture of Policy Engine
6-14
Chapter 6
Service Configurations
page.
Note:
Use Edit or Delete buttons available in the next column to update or delete
the existing Policy services.
6-15
Chapter 6
Service Configurations
by other consumer NFs. Additionally in certain cases, releasing a session when found
to be stale in a NF may require to release associated sessions in the same and/or
other NFs. For Example, deleting a stale SM association may require to delete the
associated PA sessions.
You can configure the audit service from this page.
To configure the Audit Service:
1. From the navigation menu, under Policy, then under Service Configurations,
click Audit.
The Audit screen appears.
2. Click Edit to edit the session management service configurations.
3. Check the default configuration for the fields available and edit as necessary.
The following table describes the input fields displayed under System group:
4. Click Save.
Logging in Audit Service
At the end of each audit pass, an audit log is published on the Grafana dashboard with
the following details of the pass:
• Database and Table audited
• Number of records found to be stale
• Number of records removed (for DELETE action)
• Number of notifications sent (for NOTIFY action)
• Time taken to complete the audit pass
• Any exceptions occurred
Sample of Audit Report
Audit Report {
"database" : "pcf_smservice_161",
"table" : "SmPolicyAssociation",
"staleRecords" : 18869,
"recordsDeleted" : 0,
"timeToCompletePass" : 20,
"recordsEnqueuedForNotification" : 18869,
"exceptions" : [ ]
}
6-16
Chapter 6
Policy Data Configurations
Common
You can configure the common services from this page. To configure the common
service, click Policy, and then Policy Data Configurations, and then Common.
The Common configuration includes:
• Policy Table
• Dropdown Blocks
• PCF Presence Reporting Area
• Policy Counter ID
• Match List
• Subscriber Logging
• Custom Attributes
Note:
Policy Table is only supported for the Session Managment service.
Policy tables resemble database tables and contain the following elements:
• Table name
• Table description
• Column definitions
6-17
Chapter 6
Policy Data Configurations
Every column has a definition that contains a name, data type, and indication if the
column is a key column. Every entry in the column will be of the same data type as
the column. Every table must have atleast one key column.
• Data
The contents of the table cells. (Blank cells are not allowed in a policy table.)
Each row in a policy table can be thought of as a scenario. Substitutions in policy
condition and action parameters can include the values in a specified policy table.
Note:
You can create maximum 20 tables per service type.
Note:
You must define at least one key column. You can define maximum five
key columns in a policy table.
6-18
Chapter 6
Policy Data Configurations
Note:
Column Name must be unique.
Note:
The first column is always the Key cloumn by default and you will not
be able to change it.
• Click Save.
The column is created.
Note:
You can create maximum 10 columns in a policy table. Add/Modify/
Delete operations on the columns are not allowed while the policy table
contain row(s).
Note:
You can create maximum 100 rows in a policy table.
Note:
Make sure that the key column does not hold a combination of duplicate
entries, that is, combination of two or more columns in a policy table can
be used to uniquely identify each row.
6. Click Save.
The policy table is created and is displayed on the Policy Tables page.
Policy table is updated with columns and rows. You can now use the table in a policy.
6-19
Chapter 6
Policy Data Configurations
4. Under Public section, click Policy Table. Following blocks are displayed in the
work area to create policy rule:
5. In the first block, select the policy table from the Policy Table drop-down and
the corresponding key columns are displayed in the key(s). The following screen
capture shows an example in which Policy Table T1 has been selected and the
OperationType and RatType are the corresponding key columns in the table T1.
6. Select the operator from the operator drop-down and associate the value or policy
condition with the key column. You can select the value or policy condition from
Public and PCF-SM topics. The following screen capture shows an example of
associating policy conditions with the key columns, OperationType and RatType.
6-20
Chapter 6
Policy Data Configurations
If all the values associated with the key columns match its column data from policy
table based on the operator used ("="), then it will return the complete row data.
7. In the second block, select the policy table from the Policy Table Column drop-
down and the corresponding non-key columns are displayed in the no itemdrop-
down. The following screen capture shows an example in which policy table T1 is
selected and the non-key column, pccRule is displayed in the drop-down.
This block returns the value of the non-key column selected by taking row data as
input from the first block.
8. Click Save.
The selected policy tables are associated with this policy rule.
6-21
Chapter 6
Policy Data Configurations
Note:
Only administrators can create presence reporting area.
Note:
Click Export to download the available reports to your system.
2. Click Add.
The Create PCF Presence Reporting Area screen appears.
3. Enter values for the input fields common to all the groups available on the
screen. .
The following table describes the fields:
6-22
Chapter 6
Policy Data Configurations
Note:
Click Cancel to cancel the changes.
c. Click Save.
The value gets listed in the Tracking Area List.
Note:
Use Edit or Delete buttons available in the next column to update or
delete the listing.
6-23
Chapter 6
Policy Data Configurations
Note:
Click Cancel to cancel the changes.
c. Click Save.
The value gets listed in the Ecgi List.
Note:
Use Edit or Delete buttons available in the next column to update or
delete the listing.
6-24
Chapter 6
Policy Data Configurations
Note:
Click Cancel to cancel the changes.
c. Click Save.
The value gets listed in the Ncgi List.
Note:
Use Edit or Delete buttons available in the next column to update or
delete the listing.
6-25
Chapter 6
Policy Data Configurations
Note:
Click Cancel to cancel the changes.
c. Click Save.
The value gets listed under Global Ran NodeId List.
Note:
Use Edit or Delete buttons available in the next column to update or
delete the listing.
8. Click Save.
The Pra details are listed on the PCF Presence Reporting Area screen.
Note:
Click Cancel to cancel the configuration.
6-26
Chapter 6
Policy Data Configurations
2. Upload the files in required format by clicking Drop Files here or click to upload
button.
Note:
Only administrators can create Policy Counter Ids.
Note:
Click the Export button to download the available listings to your system.
2. Click Add.
The Create Policy Counter Id screen appears.
3. On the Create Policy Counter Id screen, enter values for the input fields common
to all the groups available on the screen.
The following table describes the fields:
Note:
Click Cancel to cancel the configuration.
4. Click Save.
The value gets listed on the Policy Counter Id screen.
6-27
Chapter 6
Policy Data Configurations
Note:
Use Edit or Delete buttons available in the next column to update or
delete the listing.
6-28
Chapter 6
Policy Data Configurations
The match list is defined in the database and can now be used in a policy.
6-29
Chapter 6
Policy Data Configurations
Note:
This functionality is only supported by Session Management (SM)
Associations in this release.
You can configure the list of subscribers using the Subscriber Logging screen.
Note:
The maximum number of subscribers that can be configured is 100.
Note:
You can not modified subscriber information once it is entered. If you need to
modify the subscriber information, delete the subscriber information and add
it again .
Note:
Click Export to download the available listing on your syatem.
6-30
Chapter 6
Policy Data Configurations
Note:
Use pencil icon or trash can icon available in the next column to update or
delete the subscriber listing.
When the subscriber logging has been enabled, the trace log (displayed in the kibana
dashboard) for that specified subscriber IDs has the following information:
• Subscriber Identification including associated IP Address information
• Message, Container name, Level
• Policy related information (applied for the subscriber session)
• Date and Timestamps for all messages logged
Below screen capture is a log sample (kibana dashboard) with filter
"marker.name:SUBSCRIBER" and fields: message, level, kubernetes.container_name,
and marker.name.
Custom Attributes
Custom attributes lets you to accept the vendor's data that is in custom format, not in
the standard format. This data can then be used to construct conditions and actions .
Note:
Custom schema yaml file should follow Open API standards.
6-31
Chapter 6
Policy Data Configurations
openapi: 3.0.0
info:
description: Customer
version: "0.0.1"
title: Customer
paths:
/:
get:
operationId: get
summary: get
tags:
- get
responses:
'200':
description: OK
content:
application/json:
schema:
$ref: '#/components/schemas/Customer'
components:
schemas:
Customer:
type: object
properties:
phones:
type: array
items:
type: string
name:
type: string
address:
$ref: '#/components/schemas/Address'
Address:
type: object
properties:
house:
type: string
street:
type: string
city:
type: string
Note:
Click Export to downlaod the available listing on your system.
6-32
Chapter 6
Policy Data Configurations
Custom AVP
About Custom AVP
An attribute-value pair (AVP) is used to encapsulate protocol-specific information
with usage monitoring supported by the MPE device. Diameter messages such as
RAA, CCA, CCR, and RAR are supported by third-party AVP policy conditions. The
supported outgoing Diameter messages set or remove third-party AVPs.
Note:
The Diameter messages listed are examples only. There are many
messages associated with Diameter.
You can create policy conditions to evaluate the presence of both standard (base)
and third-party AVPs in Diameter messages or group AVPs during policy execution.
A policy condition can check for the presence of both standard and third-party
AVPs in incoming Diameter messages and evaluate their values. A policy action
can use standard and third-party AVPs for routing, authentication, authorization, and
accounting.
Standard AVPs can be included in third-party AVP conditions and actions. To include a
standard (base) AVP in a nonstandard application message, or to use a pre-standard
AVP as a standard AVP, define it as a custom AVP.
When defined, custom AVPs are located at the end of a parent Diameter message
or group AVP. If the parent AVP is null, the custom AVP is inserted at the root level
of the message. For example, a custom AVP definition appears at the end of this
Charging-Rule-Install message:
A Set or Get SPR user attribute value can be set to the defined third-party AVP in
Diameter messages. You can also set or remove defined third-party AVPs during the
execution point.
6-33
Chapter 6
Policy Data Configurations
name:vendorId
For example:
Condition
where the request AVP NEW_AVP3:555 value is numerically equal to 2012
Parameters
The AVP name and vendor ID. In the example, the vendor ID is 555.
Description
A well-defined AVP custom name is referred to if the vendor ID is not specified.
When entering and sending a new third-party AVP definition to an MPE or MRA
device, the definition must include the AVP name, code, vendor ID, data type, and an
optional AVP flag.
Validation of the AVP code, Name, and vendor ID prohibits a user from overwriting the
existing base AVPs.
These AVP actions include the ability to perform the following:
• Routing
• Authentication
• Authorization
• Accounting
Note:
Click Export to download the available listings to your system.
2. Click Add.
The Create Custom AVP page opens.
3. Enter information as appropriate:
a. AVP Name (required) — The name you assign to the AVP.
The name can only contain the characters A–Z, a–z, 0–9, period (.), hyphen
(-), and underline (_). The maximum length is 255 characters.
b. Description — Free-form text that identifies the AVP. Enter up to 250
characters.
c. AVP Code (required) — A unique numeric value assigned to the new AVP.
d. Vendor — Select a vendor from the vendor list. To add a vendor to the list,
see Custom Vendor.
6-34
Chapter 6
Policy Data Configurations
Note:
This box is checked automatically if the value of the vendor ID is not
0.
i. AVP Type (required) — Select the data type from the list:
• address
• enumerated
• float32
• float64
• grouped
• id
• int32
• int64
• ipFilterRule
• octetString
• time
• uint32
• uint64
• uri
• utf8String
j. Parent AVP — If the AVP is a member of a grouped AVP, then the parent AVP
must be specified. Select one of the following from the list:
• ADC-Rule-Definition:10415
• ADC-Rule-Install:10415
• ADC-Rule-Remove:10415
• ADC-Rule-Report:10415
• AF-Correlation-Information:10415
• Acceptable-Service-Info:10415
• Access-Network-Charging-Identifier-Gx:10415
• Access-Network-Charging-Identifier:10415
• Access-Network-Physical-Access-ID:10415
• Allocation-Retention-Priority:10415
6-35
Chapter 6
Policy Data Configurations
• Application-Detection-Information:10415
• CC-Money
• Charging-Information:10415
• Charging-Rule-Definition-3GPP2:5535
• Charging-Rule-Definition:10415
• Charging-Rule-Event-Cisco:9
• Charging-Rule-Event-Trigger-Cisco:9
• Charging-Rule-Install-3GPP2:5535
• Charging-Rule-Install:10415
• Charging-Rule-Remove:10415
• Charging-Rule-Report-3GPP2:5535
• Charging-Rule-Report:10415
• Codec-Data-Tmp:10415
• Codec-Data:10415
• Cost-Information
• Default-EPS-Bearer-Qos:10415
• E2E-Sequence
• Envelope:10415
• Event-Report-Indication:10415
• Explicit-Route-Record:21274
• Explicit-Route:21274
• Failed-AVP
• Final-Unit-Indication
• Flow-Description-Info:5535
• Flow-Description:10415
• Flow-Grouping:10415
• Flow-Info:5535
• Flow-Information:10415
• Flow:10415
• G-S-U-Pool-Reference
• Granted-Qos:5535
• Granted-Service-Unit
• Juniper-Discovery-Descriptor:2636
• Juniper-Provisioning-Descriptor:2636
• LI-Indicator-Gx:12951
• LI-TargetMFAddr:12951
• Media-Component-Description:10415
6-36
Chapter 6
Policy Data Configurations
• Media-Sub-Component:10415
• Multiple-Services-Credit-Control
• Offline-Charging:10415
• PCEF-Forwarding-Info:971
• PCEF-Info:971
• PS-Furnish-Charging-Information:10415
• PS-information:10415
• Packet-Filter-Information:10415
• Qos-Information-3GPP2:5535
• Qos-Information:10415
• Qos-Rule-Install:10415
• Qos-Rule-Definition:10415
• Qos-Rule-Remove:10415
• Qos-Rule-Report:10415
• Reachable-Peer:21274
• Redirect-Information:10415
• Redirect-Server
• Requested-Qos:5535
• Requested-Service-Unit
• Service-Information:10415
• Service-Parameter-Info
• Siemens-DL-SDP-Data:4329
• Siemens-UL-SDP-Data:4329
• Subscription Id
• Subscription-Id-3GPP:10415
• Supported-Features:10415
• TDF-Information:10415
• TFT-Packet-Filter-Information:10415
• TMO-Redirect-Server-29168
• Time-Quota-Mechanism:10415
• Trigger:10415
• Tunnel-Header-Filter:10415
• Unit-Value
• Usage-Monitoring-Control:21274
• Usage-Monitoring-Information:10415
• Used-Service-Unit
• User-CSG-Information:10415
6-37
Chapter 6
Policy Data Configurations
• User-Equipment-Info
• User-Location-Info-3GPP:10415
• VZW-Access-Network-Physical-Access-ID:12951
• Vendor-Specific-Application-Id
• Vzw-Trigger:12951
4. Click Save.
5. If the AVP name matches the name of a standard AVP, a confirmation message
displays. Click OK to overwrite the existing AVP.
The AVP is created.
Note:
Use Edit or Delete buttons available in the next column to update or delete
the listing.
Custom Vendor
A custom vendor is used to define a vendor in the CNPCRF system. This dictionary
includes vendor IDs and text descriptions. You can define custom vendors and add
them to the dictionary.
To create a custom vendor:
1. From the navigation menu, click Policy, and then Policy Data Configurations,
and then Common, and then Custom Attributes, and then Custom Vendor.
The Custom Vendor screen appears.
Note:
Click Export to download the available listings to your system.
2. Click Add.
The Create Custom Vendor page opens.
3. Enter information as appropriate:
a. Vendor Name (required) — The name you assign to the vendor.
The name can only contain the characters A–Z, a–z, 0–9, period (.), hyphen
(-), and underline (_).
b. Description — Free-form text that identifies the vendor.
Enter up to 250 characters.
6-38
Chapter 6
Policy Data Configurations
Note:
Use Edit or Delete buttons available in the next column to update or delete
the listing.
Note:
Only administrators can create session rules.
6-39
Chapter 6
Policy Data Configurations
1. From the navigation menu, click Policy, and then Policy Data Configurations,
and then PCF Session Management, and then Session Rule.
The Session Rule screen appears with the listing of all the available rules. You
can create or import new rules details from this page.
Note:
Click the Export button to download the available listings to your system.
2. Click Add.
The Create Session Rule screen appears.
3. On the Create Session Rule screen, enter values for the input fields common to
all the groups available on the screen.
The following table describes the fields:
4. Under the Authorized Session AMBR group, add the AMBR details.
a. Enter the applicable values in the input fields available on the window.
The following table describes the fields:
Note:
Click Remove to cancel the changes.
Note:
The drop down gets its data from the QoS Information created.
Note:
Click Cancel to cancel the configuration.
6-40
Chapter 6
Policy Data Configurations
7. Click Save.
The value gets listed on the Session Rule screen.
Note:
Use Edit or Delete buttons available in the next column to update or
delete the listing.
Note:
Click Export to download the available listings to your system.
2. Click Add.
The Create Session Rule Profile screen appears.
3. On the Create Session Rule Profile screen, enter values for the input fields
common to all the groups available on the screen.
The following table describes the fields:
4. Under the Authorized Session AMBR group, add the AMBR details:
a. Enter the applicable values in the input fields available on the window.
The following table describes the fields:
6-41
Chapter 6
Policy Data Configurations
Note:
Click Remove to cancel the changes.
Note:
Click Cancel to cancel the configuration.
7. Click Save.
The value gets listed on the Session Rule Profile screen.
Note:
Use Edit or Delete buttons available in the next column to update or
delete the listing.
Note:
Only administrators can create QoS Information data.
6-42
Chapter 6
Policy Data Configurations
Note:
Click Export to download the available listings to your system.
2. Click Add.
The Create QoS Information screen appears.
3. On the Create QoS Information screen, enter values for the input fields common
to all the groups available on the screen.
The following table describes the fields:
6-43
Chapter 6
Policy Data Configurations
Note:
Click the Remove button to cancel the changes.
Note:
Click Cancel to cancel the configuration.
5. Click Save.
The value gets listed on the QoS Information screen.
Note:
Use Edit or Delete buttons available in the next column to update or
delete the listing.
Note:
Only administrators can create PCC rules.
Note:
Click Export to download the available listings to your system.
6-44
Chapter 6
Policy Data Configurations
2. Click Add.
The Create PCC Rule screen appears.
3. On the Create PCC Rule screen, enter values for the input fields common to all
the groups available on the screen.
The following table describes the fields:
6-45
Chapter 6
Policy Data Configurations
c. Click Add under the Ethernet Flow Description group name to expand the
group.
The screen displays the available input fields. Enter the applicable values in
the input fields.
The following table describes the fields:
6-46
Chapter 6
Policy Data Configurations
Note:
Click Remove to cancel the changes.
d. Click Save on the Add Flow Infos window, under the Flow Infos group.
The value gets listed on the Create PCC Rule screen.
e. Under the Flow Infos group, enter values for the rest of the input fields:
6-47
Chapter 6
Policy Data Configurations
5. Click Save.
The value gets listed on the PCC Rule screen.
Note:
Use Edit or Delete buttons available in the next column to update or
delete the listing.
Note:
Only administrators can create PCC Rule Profile.
6-48
Chapter 6
Policy Data Configurations
Note:
Click the Export button to download the available listings to your system.
2. Click Add.
The Create PCC Rule Profile screen appears.
3. On the Create PCC Rule Profile screen, enter values for the input fields common
to all the groups available on the screen.
The following table describes the fields:
6-49
Chapter 6
Policy Data Configurations
c. Click Add under the Ethernet Flow Description group name to expand the
group.
The screen displays the available input fields. Enter the applicable values in
the input fields.
The following table describes the fields:
6-50
Chapter 6
Policy Data Configurations
Note:
Click Remove to cancel the changes.
d. Click Save on the Add Flow Infos window, under the Flow Infos group.
The value gets listed on the Create PCC Rule screen
e. Under the Flow Infos group, enter values for the rest of the input fields:
6-51
Chapter 6
Policy Data Configurations
5. Click Save.
The value gets listed on the PCC Rule Profile screen.
Note:
Use Edit or Delete buttons available in the next column to update or
delete the listing.
6-52
Chapter 6
Policy Data Configurations
Note:
Only administrators can create QoS Data.
Note:
Click Export to download the available listings to your system.
2. Click Add.
The Create Qos Data screen appears.
3. On the Create QoS Data screen, enter values for the input fields common to all
the groups available on the screen.
The following table describes the fields:
6-53
Chapter 6
Policy Data Configurations
Note:
Click Cancel to cancel the configuration.
5. Click Save.
The value gets listed on the QoS Data screen.
Note:
Use Edit or Delete buttons available in the next column to update or
delete the listing.
6-54
Chapter 6
Policy Data Configurations
Note:
Only administrators can create Charging data.
Note:
Click Export to download the available listings to your system.
2. Click Create.
The Create Charging Data screen appears.
3. On the Create Charging Data screen, enter values for the input fields common to
all the groups available on the screen.
The following table describes the fields:
6-55
Chapter 6
Policy Data Configurations
6-56
Chapter 6
Policy Data Configurations
Note:
Click Cancel to cancel the configuration.
4. Click Save.
The value gets listed on the Charging Data screen.
Note:
Use Edit or Delete buttons available in the next column to update or
delete the listing.
Note:
Only administrators can create Usage Monitoring Data.
Note:
Click Export to download the available listings to your system.
2. Click Add.
The Create Usage Monitoring Data screen appears.
3. On the Create Usage Monitoring Data screen, enter values for the input fields
common to all the groups available on the screen.
The following table describes the fields:
6-57
Chapter 6
Policy Data Configurations
Note:
Click Cancel to cancel the configuration.
4. Click Save.
The value gets listed on the Usage Monitoring Data screen.
Note:
Use Edit or Delete buttons available in the next column to update or
delete the listing.
6-58
Chapter 6
Policy Data Configurations
Note:
Only administrators can create traffic control data.
Note:
Click Export to download the available listings to your system.
2. Click Add.
The Create Traffic Control Data screen appears.
3. On the Create Traffic Control Data screen, enter values for the input fields
common to all the groups available on the screen.
The following table describes the fields:
4. Enter values of the available input fields under Redirect Information group.
The following table describes the fields:
6-59
Chapter 6
Policy Data Configurations
Note:
Click Cancel to cancel the changes.
c. Click Save.
The value gets listed in the Tracking Area List.
Note:
Use Edit or Delete buttons available in the next column to update or
delete the listing.
6. Enter values of the available input fields the Up Path Chg Event group.
The following table describes the fields:
6-60
Chapter 6
Policy Data Configurations
7. Click Save.
The value gets listed on the Traffic Control Data screen.
Note:
Use Edit or Delete buttons available in the next column to update or
delete the listing.
Note:
Only administrators can create Condition Data.
6-61
Chapter 6
Policy Data Configurations
1. From the navigation menu, click Policy, and then Policy Data Configurations,
and then PCF Session Management, and then Condition Data.
The Condition Data screen appears with the listing of all the available rules. You
can create or import new data from this page.
Note:
Click the Export button to download the available listings to your system.
2. Click Add.
The Create Condition Data screen appears.
3. On the Create Condition Data screen, enter values for the input fields common to
all the groups available on the screen.
The following table describes the fields:
Note:
Click Cancel to cancel the configuration.
4. Click Save.
The value gets listed on the Condition Data screen.
Note:
Use Edit or Delete buttons available in the next column to update or
delete the listing.
6-62
Chapter 6
Policy Data Configurations
The PCF Access and Mobility configuration includes Managing Service Area
Restriction.
Note:
Only administrators can create Service Area Restrictions.
Note:
Click Export to download the available listings to your system.
2. Click Create.
The Create Service Area Restriction screen appears.
3. On the Create Service Area Restriction screen, enter values for the input fields
common to all the groups available on the screen.
The following table describes the fields:
6-63
Chapter 6
Policy Data Configurations
Note:
Use Edit or Delete buttons available in the next column to update or
delete the listing.
Note:
Click Cancel to cancel the configuration.
6. Click Save.
The value gets listed on the Service Area Restriction screen.
Note:
Use Edit or Delete buttons available in the next column to update or
delete the listing.
PCF UE Policy
You can configure the PCF UE Policy from this page.
The PCF UE Policy configurations includes:
• URSP Rule
• UPSI Rule
6-64
Chapter 6
Policy Data Configurations
Note:
Only administrators can create URSP Rules.
Note:
Click the Export button to download the available reports to your
system.
2. Click Add.
The Create URSP Rule screen appears.
3. On the Create URSP Rule screen, enter values for the input fields common to all
the groups available on the screen. .
The following table describes the fields:
4. Under the Traffic Descriptor group, all available descriptor types are displayed.
To create new types:
a. Click Add displayed in the window.
The Add Traffic Descriptor window appears on the screen.
b. Select a value from the Type drop down menu. Possible values are:
• MATCH_ALL
• OS_ID_OS_APP_ID
• IPV4_REMOTE_ADDRESS
• IPV6_REMOTE_ADDRESS
• PROTOCOL_IDENTIFIER
• SINGLE_REMOTE_PORT
• REMOTE_PORT_RANGE
c. Click Save.
6-65
Chapter 6
Policy Data Configurations
Note:
Use Edit or Delete buttons available in the next column to update or
delete the listing.
5. The Route Selection Descriptor List group displays the available precedence.
To create new data:
a. Click Add displayed in the window.
The Add Route Selection Descriptor List window appears on the screen.
b. Enter the value in the Precedence field.
c. Click Add to create a new Route Selection Descriptor Components in the
Route Selection Descriptor Components group. .
The Add Route Selection Descriptor Components window appears on the
screen.
d. Select a value from the Type drop down menu.
e. Select a value from the SSC Mode drop down menu.
f. Click Save.
The value gets listed in the Route Selection Descriptor List.
Note:
Use Edit or Delete buttons available in the next column to update or
delete the listing.
6. Click Save.
The Pra details are listed on the Presence Reporting Area screen.
Note:
Click Cancel to cancel the configuration.
Configuring UPSI
You can manage, view, import, export and create UPSI from UPSI screen.
6-66
Chapter 6
Policy Data Configurations
Note:
Only administrators can create UPSI.
To configure UPSI:
1. From the navigation menu, click Policy, and then Policy Data Configurations,
and then PCF UE Policy, and then UPSI.
The UPSI screen appears with the listing of all the available rules. You can create
or import new profile details from this page.
Note:
Click Export to download the available listings to your system.
2. Click Add.
The Create UPSI screen appears.
3. On the Create UPSI screen, enter values for the input fields common to all the
groups available on the screen.
The following table describes the fields:
4. Enter values of the available input fields under the PLMN group.
The following table describes the fields:
5. Click Save.
The value gets listed on the UPSI screen.
Note:
Use Edit or Delete buttons available in the next column to update or
delete the listing.
6-67
Chapter 6
Policy Data Configurations
PCRF Core
This section describes how to use and configure PCRF Core Managed Objects.
Charging Server
This section describes how to define and manage charging servers within the PCRF
Core in Policy GUI. A charging server is an application that calculates billing charges.
To define a charging server:
1. From the navigation pane, click Policy, and then Policy Data Configurations,
and then PCRF Core, and then Charging Server.
The Charging Server screen appears.
Note:
Click Export to download the available listings to your system.
2. Click Add.
The Create Charging Server page opens.
3. (Required) Enter the Name for the charging server.
The name can only contain the characters A through Z, a through z, 0 through 9,
period (.), hyphen (-), and underline (_).
4. Enter the Description/Location.
Free-form text that identifies the charging server within the network. Enter up to
250 characters.
5. (Required) Enter the Host Name.
The FQDN (fully qualified domain name assigned) to the charging server.
6. Enter the Port number on which the charging server is listening for messages.
If left blank, port 3868 is used.
7. Select the Transport protocol used to communicate with the charging server:
Available options include:
• tcp
Transmission Control Protocol (used with TACACS+)
• udp
User Datagram Protocol (used with RADIUS)
6-68
Chapter 6
Policy Data Configurations
Note:
If you configure the Transport protocol as udp, you cannot configure
the AAA Protocol as diameter.
• sctp
Stream Control Transmission Protocol
8. Select the Authentication, Authorization, and Accounting (AAA) Protocol used to
communicate with the charging server.
Available options include:
• diameter
• radius
Note:
If you configure the Transport protocol as udp, you cannot configure the
AAA Protocol as diameter.
Note:
Use pencil icon or trash bin icon available in the next column to edit or
update the created charging server.
Media Profile
This section defines how to manage media profiles under PCRF Core in the CNC
Policy GUI. In a cable network, a media profile describes a CODEC supported for
Rx-to-PCMM translation.
Note:
Media Profiles is a function that is applicable to Cable mode only.
6-69
Chapter 6
Policy Data Configurations
Note:
Click Export to download the available listings to your system.
2. Click Add.
The Create Media Profile page opens.
3. Enter the following information:
a. ID — Unique ID assigned to the media profile.
b. Name — Unique name assigned to the media profile.
c. Description — specifies the description of the media profile.
d. Codec Name — Unique media subtype assigned to the media profile.
This is defined in the IANA MIME registration for the CODEC. Enter a string of
up to 255 characters.
e. Transport Type — Select from the following:
• RTP/AVP (default) — RTP audio-video profile.
• RTP/SAVP — RTP secure audio-video profile.
• RTP/AVPF — RTP extended audio-video profile with feedback.
f. Payload Number — The payload number.
Valid payload numbers range from 0 through 127. Enter -1 to indicate an
unknown payload number.
Note:
You cannot add a CODEC that is predefined with a payload number
in the range of 0 to 96.
6-70
Chapter 6
Policy Management
in milliseconds, the frame size in bytes, and the packetization time. The valid
range is 1 through 1,500 bytes.
j. Packetization Time — The length of time, in milliseconds, represented by the
media in a packet.
The bitrate is calculated using the frame size in milliseconds, the frame size in
bytes, and the packetization time. The valid range is 1 through 100.
k. Always Use Default Ptime — Select to always use the default packetization
time, ignoring the value received in the SDP message.
The default is unchecked.
4. Click Save.
The media profile is created.
Note:
Use pencil icon or trash bin icon available in the next column to edit or
update the created media profile.
Policy Management
CNC Policy offers a Policy Design editor based on Blockly interface. You can create
and manage a policy project for each of the policy services that you may want to
deploy:
• Session Management and Policy Authorization
• Access and Mobility Management
• UE Management
• PCRF Core
• Policy Data Source
For more information on blocks, see Oracle Communications Cloud Native Policy
Design Guide. This guide has been made available on MOS.
Policy Projects
You can create and deploy a policy project using Policy Projects page. There are two
possible states for the policy project, Prod and Dev. By default, Dev state is assigned
to the policy project. Dev Projects will not process any traffic in PRE. Prod projects will
process traffic in PRE.
6-71
Chapter 6
Policy Management
Note:
If the maximum limit for project is reached per service then an error
message is displayed on clicking the Create button. For Example,
Maximum number of projects supported in this release is 10.
Note:
You must assign a unique name to the policy project per service
type. The name is case sensitive.
• Description — Free-form text that identifies the policy project. The maximum
length is 255 characters.
4. Click Save.
The policy project is created.
Note:
If needed, you can unit test the project. For more information on
testing the projects, see Test Policy Projects section int the Oracle
Communications Cloud Native Policy Design Guide.
5. You can change the state of a project. There are two possible states in this
release, Dev and Prod. These states are represented using the buttons on the
page with the Label named as Dev and Prod. A tick mark and light green color
button helps to identify the current state of a project. Available state button will be
in dark green color.
Below screenshot illustrates the different states of a
6-72
Chapter 6
Policy Management
Note:
At any point of time there can be only one project in Prod state for a
given Service. If you change the state of project to Prod and there is
already a project with the Prod state for that service, the Prod state for
the existing project will be automatically moved to Dev state. And, the
project inDev state will be moved to Prod state.
6. You can view the last policy project's state with a timestamp by default. Below
screenshot is an example displaying that the project is currently in Dev state and
the last state was Prod with the Exit timestamp.
Below screenshot is an example displaying that the project is just created and is in
Dev state and hence it does not have any previous state.
Below screenshot is an example displaying that you can view the full state history
by clicking the Previous States link.
7. You can filter the projects based on Name and Active State using the Filter.
6-73
Chapter 6
Diameter Configurations
8. Click icon to clone the existing policy project. Select an existing policy project
and click Clone icon; the Clone Policy Project window opens. You can enter the
required information and click Save.
10. Click trash icon to delete the policy project. When you click on the Delete icon,
a confirmation dialog box appears asking you to confirm the deletion. After clicking
the 'Yes' button, the project and it's associated policies will be deleted.
Note:
The project in Prod state is not editable you can view the policies but
can't modify the project and the policies associated with that project.
See Policy Design Guide for more details on the blocks. This guide has been
made available on MOS.
Diameter Configurations
You can manage and view the Diameter Configurations from this page. These
configurations are a part of PCF mode only for now. For converged and cnPCRF,
you have to configure these configurations through Helm Config Map.
Settings
To edit the Settings:
1. From the navigation menu, click Policy, and then Diameter Configurations, and
then Settings.
The Settings screen appears.
2. Click Edit to edit the settings.
3. Enter the following information:
Timer
• Reconnect Delay (sec)- Enter the time frame to delay before attempting to
reconnect after a connection failure in seconds. The default is 3 seconds.
• Response Timeout (sec)- Enter the response timeout interval in seconds.
The default is 5 seconds.
• Connection Timeout (sec)- Enter the connection timeout interval in seconds.
The default is 3 seconds.
• WatchDog Interval (sec)- Enter the watchdog interval in seconds. The default
is 6 seconds.
6-74
Chapter 6
Diameter Configurations
Transport
• Protocol - TCP/SCTP
4. Click Save.
Peer Nodes
To edit the Peer Nodes Configurations:
1. From the navigation menu, click Policy, and then Diameter Configurations, and
then Peer Nodes.
The Peer Nodes screen appears.
2. Click Add to create peer node. The Create Peer Node screen appears.
3. Enter the following information:
• Name- Unique Name of the peer node.
• Type- Defines which type of diameter service it should take up. The value can
be Application function (af) or diameter routing agent(dra).
• Reconnect Limit (sec) -
• Initiate Connection- Set it to True to initiate a connection for this peer node.
• Port- Enter the port number. Enter a number from 0 to 65535.
• Host- Enter the host name. Enter a FQDN, ipv4 or ipv6 address available for
establishing diameter transport connections to the peer node .
• Realm- Enter the realm name, that is, FQDNs to all of that computers that
transact diameter traffic.
• Identity- Enter a identity to define a node in a realm.
4. Click Save.
Note:
You can import and export the Peer Node configurations by clicking on
Import and Export on Peer Nodes Configurations screen.
6-75
Chapter 6
Data Source Configurations
• Priority- Defines the order of use when one or more routes have
overlapping criteria. The range is 0-65535.
• Name- Unique name of the diameter routing table.
• Type- The value can be Realm or Host.
• Realms- Realms field is displayed when the Realm is selected in the
Type field.
• Hosts
Hosts field is displayed when the Host is selected in the Type field.
• Application ID
Select Rx (default), Gq, Ty, Gx, Gxx, Sy, Gy, Sh, or All.
• Server Identifier
Enter a free-form text.
Note:
* (asterisk) wildcard character is allowed in Hosts, Realms, and
Server Identifier fields.
Click Save.
b. Enter the value for the Server Identifier field in the Default Route group.
5. Click Save.
The Diameter Routing Table is configured.
6-76
Chapter 6
Data Source Configurations
apiVersion: v1
kind: Secret
metadata:
name: ldapsecret
labels:
type: ocpm.secret.ldap
type: Opaque
stringData:
name: "ldap1"
password: "camiant"
authDn: "uid=PolicyServer,ou=vodafone,c=hu,o=vodafone"
Note:
For different LDAP data sources more entries can be added in above
format only the key of the entry should be the ldap name specified in the
CNC Policy Graphical User Interface (GUI).
where:
yaml_file_name is a name of the yaml file that is created in step 1.
pcf-namespace is the deployment namespace used by the helm command.
Data Sources
To set Policy Data Source as LDAP Data Source using CNC Policy GUI:
1. Add LDAP data source. To add LDAP data source, From the navigation menu,
under Policy, then under Data Source Configurations, click Data Sources. The
Data Sources page opens. Click Add to create a data source. On the Create Data
Source page, select LDAP in the Type drop-down list.
6-77
Chapter 6
Data Source Configurations
In the
above example, pds service type is created.
Note:
The service name should be entered as pds.
3. Create Policy Project with pds Service Type. From the navigation menu, under
Policy Management, click Policy Projects. On Policy Projects page, click Create
to create policy project. While creating a policy project select pds as a service
type.
The following screen capture shows the example of creating policy project with
pds service type in GUI:
6-78
Chapter 6
Administration
In
the above example, s policy project is created with pds service type.
4. Create policy action and condition in previously created policy project. Click Open
for the selected policy project and you can see the project is a file. You can
create the policy action and condition by using the different blocks available under
Conditions and Actions under PDS.
The following screen capture shows the example of creating policy action and
condition in GUI:
In the above example, if request received for configured IMSI ranges between
404050000000001 and 404050000000001, then PCF will forward request to PDS
and PDS will forward the request to LDAP gateway to lookup user information in
LDAP1.
Administration
This section describes how to perform administration tasks such as bulk import and
bulk export of configurable objects into the system.
Bulk Export
This section describes how to perform a bulk export of managed objects (MOs).
6-79
Chapter 6
Administration
Note:
In Release 1.7.1, bulk export using the GUI for Policy Project is not
supported.
Note:
In Release 1.7.1, bulk export for the following objects is not supported:
• Data Model
• Custom Schema
• Dropdown Blocks
In Release 1.6.x, GUI doesn't support export of service configuration but there are
RESTful APIs that supports the same. In the release 1.6.x you need to execute both
the following modes to fetch all the configurations:
• Using GUI to export the policy configuration data
• Using REST APIs to export the Service Configuration data
1. To export policy configuration data using GUI:
a. From the navigation pane, click Policy, and then Administration, and then
Bulk Export.
The Export All option appears on the screen.
b. Click Export All.
A ZIP file, export_configurations.zip, is downloaded to your local computer.
2. To export service configuration data using REST API:
Note:
The below instructions are not needed if you are using the default
configuration and can make the changes manually.
Prerequisite:
In the CNC Console GUI, From the navigation menu, click Policy, then Service
Configurations, and then click PCF Session Management . On the PCF
Session Management screen,
• Verify the format of snssai is x-y. ( for example, if the value of "snssai" is
"0,000000", replace "0,000000" with "0-000000")
• Override Supported Features field should be empty. REST APIs are not
compatible with this attribute in Release 1.7.1 .
Use individual REST APIs to fetch the Service Configuration data and save the file
as <MO name of the topic 1.6>.json. Following table is an example for the different
managed objects:
6-80
Chapter 6
Administration
3. Unzip the export_configurations.zip file (created in step 1) and save all the <MO
name of the topic 1.6>.json files (created in step 2) in the unzip folder.
4. Remove the public.policy.test.json from the folder, as it is not supported in
Release 1.7.1 .
5. Zip the export_configurations.zip file again. This file is used while importing the
data. For importing the data, See Bulk Import.
In Release 1.7.1, the following APIs are used for Bulk Export:
• POST: /oc-cnpolicyconfiguration/v1/administration/export
• GET: /oc-cnpolicy-configuration/v1/administration/export/{exportResourceId}/status
• GET: /oc-cnpolicy-configuration/v1/administration/export/{exportResourceId}/report
• GET: /oc-cnpolicyconfiguration/v1/administration/export/{exportResource Id}/
download
Below are the status displayed by bulk export:
• IN_PROGRESS: If the export is running.
• DONE: If the export is finished. Following are the possible status if the export is in
DONE status:
– SUCCESS : If the export is successful
– FAILED : If the export is failed
– PARTIAL_SUCCESS : If the export is partially successful
For more information on Bulk Export REST APIs, see Oracle Communications Cloud
Native Core Policy REST Specification Document.
6-81
Chapter 6
Administration
Bulk Import
This section describes how to perform a bulk import of managed objects into the
system.
Note:
Bulk Import using the GUI is not supported in Release 1.7.1. Use REST APIs
to bulk import the data that is exported from 1.6.x release stetups. These
REST APIs will do conversion and migration to sort out the incompatibility
between the releases.
Note:
In Release 1.7.1, bulk import for the following objects is not supported:
• Data Model
• Custom Schema
• Dropdown Blocks
6-82
Chapter 6
Administration
6-83
Chapter 6
Administration
6. Access the CNC Console GUI and verify all the records are imported successfully.
For more information on Bulk Import REST APIs, see Oracle Communications Cloud
Native Core Policy REST Specification Document.
Appendix
This appendix describes the Managed Object that supports the Bulk Import/Export
using RESTFul APIs.
Managed Object API Import API Export API Bulk Import API Bulk Export
Session Viewer Not Required
General Y Y Y Y
Configurations
Service Configurations
PCF Session Y Y Y Y
Management
PCF Access and Y Y Y Y
Mobility
PCF Policy Y Y Y Y
Authorization
PCF UE Policy Y Y Y Y
PCF User Y Y Y Y
Connector
6-84
Chapter 6
Administration
Managed Object API Import API Export API Bulk Import API Bulk Export
PCRF Core Y Y N N
Audit N N N N
Policy Engine N N N N
Policy Data Configurations
Common
Policy Table Y Y Y Y
Dropdown Block N N N N
PCF Presence Y Y Y Y
Reporting Area
Policy Counter Id Y Y Y Y
Match List N N N N
Subscriber Y Y Y Y
Logging
Custom Attributes
Custom Schema N N N N
Custom AVP N N N N
Custom Vendor N N N N
PCF Session Management
Session Rule Y Y Y Y
Session Rule Y Y Y Y
Profile
Qos Information Y Y Y Y
PCC Rule Y Y Y Y
PCC Rule Profile Y Y Y Y
QoS Data Y Y Y Y
Charging Data Y Y Y Y
Usage Monitoring Y Y Y Y
Data
Traffic Control Y Y Y Y
Data
Condition Data Y Y Y Y
PCF Access and Mobility
Service Area Y Y Y Y
Restriction
PCF UE Policy
URSP Rule Y Y Y Y
UPSI Y Y Y Y
PCRF Core Y Y N N
Policy Management
Policy Projects Y Y Y Y
Policy Library N N N N
Policy Tests
Test Policy N N N N
Projects
Data Model N N N N
Diameter Configurations
6-85
Chapter 6
Administration
Managed Object API Import API Export API Bulk Import API Bulk Export
Settings Y Y Y Y
Peer Nodes Y Y Y Y
Routing Table N N N N
Data Source Configurations
Data Sources Y Y Y Y
Administration
Import Not Required
Export Not Required
6-86
7
Policy Alerts
This section provides information on policy alerts and their configuration. It includes:
• PCF Alerts
• PCRF Alerts
7-1
Chapter 7
Policy Control Function Alerts
7-2
Chapter 7
Policy Control Function Alerts
Note:
sum(rate(ocpm_ingress_request_total{servicename_3gpp="npc
f-smpolicycontrol"}[2m])) >=9000
– kubernetes_namespace.
For Example,
If PCF is deployed at more than one site, set
kubernetes_namespace in yaml file as follows:
expr: up{kubernetes_namespace=~"pcf|ocpcf"} == 0
expr: up{kubernetes_namespace="pcf"}==0
7-3
Chapter 7
Policy Control Function Alerts
where, <Name> is the prometheus config map name used in helm install
command.
3. Check if alertspcf is present in the t_mapConfig.yaml file by executing the
following command:
4. If alertspcf is present, delete the alertspcf entry from the t_mapConfig.yaml file,
by executing the following command:
Note:
This command should be executed only once.
5. If alertspcf is not present, add the alertspcf entry in the t_mapConfig.yaml file
by executing the following command:
Note:
This command should be executed only once.
6. Reload the config map with the modifed file by executing the following command:
7-4
Chapter 7
Cloud Native Policy and Charging Rule Function Alerts
7-5
Chapter 7
Cloud Native Policy and Charging Rule Function Alerts
7-6
Chapter 7
Cloud Native Policy and Charging Rule Function Alerts
7-7
Chapter 7
Cloud Native Policy and Charging Rule Function Alerts
Note:
1. The alert manager and prometheus tools should run in the default
namespace.
2. The PCRF Templates.zip file can be downloaded from OHC. Unzip the
package after downloading to get cnpcrfalertrule.yaml and mib files.
1. Find the config map to configure alerts in prometheus server by executing the
following command:
Note:
This command should be executed only once.
4. Add entry alertscnpcrf under rule_files in the prometheus server config map by
executing the following command:
7-8
Chapter 7
Cloud Native Policy and Charging Rule Function Alerts
Note:
This command should be executed only once.
Note:
This step is not required for AlertRules.
7-9
8
Policy Control Function Metrics
This chapter includes information about Metrics for Oracle Communications Cloud
Native Policy Control Function (PCF).
Ingress Metrics
Below are the different metrics and respective tags that are available for Ingress:
8-1
Chapter 8
Egress Metrics
Below are the different metrics and respective tags that are available for Egress:
8-2
Chapter 8
8-3
Chapter 8
8-4
Chapter 8
8-5
Chapter 8
Tag Description
8-6
Chapter 8
SM Service
Examples
1. ocpm_ingress_request_total{application="pcf_smservice",dnn="dnn1",nf_instance
_id="",operation_type="create",sbi_priority="",servicename_3gpp="npcf-
smpolicycontrol",snssai="11-abc123",} 1.0
2. ocpm_ingress_response_total{application="pcf_smservice",dnn="dnn1",nf_instanc
e_id="",operation_type="create",response_code="2xx",sbi_priority="",servicename
_3gpp="npcf-smpolicycontrol",snssai="11-abc123",} 1.0
3. ocpm_ingress_request_total{application="pcf_smservice",dnn="dnn1",nf_instance
_id="",operation_type="update",sbi_priority="",servicename_3gpp="npcf-
smpolicycontrol",snssai="11-abc123",} 1.0
4. ocpm_ingress_response_total{application="pcf_smservice",dnn="dnn1",nf_instanc
e_id="",operation_type="update",response_code="4xx",sbi_priority="",servicenam
e_3gpp="npcf-smpolicycontrol",snssai="11-abc123",} 1.0
5. ocpm_ingress_request_total{application="pcf_smservice",dnn="dnn1",nf_instance
_id="",operation_type="delete",sbi_priority="",servicename_3gpp="npcf-
smpolicycontrol,snssai="11-abc123",} 1.0
6. ocpm_ingress_response_total{application="pcf_smservice",dnn="dnn1",nf_instanc
e_id="",operation_type="delete",response_code="2xx",sbi_priority="",servicename
_3gpp="npcf-smpolicycontrol",snssai="11-abc123",} 1.0
7. ocpm_ingress_request_total{application="pcf_smservice",dnn="dnn1",nf_instance
_id="",operation_type="get",sbi_priority="",servicename_3gpp="npcf-
smpolicycontrol",snssai="11-abc123",} 1.0
8. ocpm_ingress_response_total{application="pcf_smservice",dnn="dnn1",nf_instanc
e_id="",operation_type="get",response_code="2xx",sbi_priority="",servicename_3
gpp="npcf-smpolicycontrol",snssai="11-abc123",} 1.0
9. ocpm_egress_request_total{application="pcf_smservice",dnn="dnn1",nf_instance_
id="",operation_type="update_notify",sbi_priority="",servicename_3gpp="npcf-
smpolicycontrol",snssai="11-abc123",} 1.0
10. ocpm_egress_response_total{application="pcf_smservice",dnn="dnn1",nf_instanc
e_id="",,latency="9",operation_type="update_notify",response_code="2xx",sbi_pri
ority="",servicename_3gpp="npcf-smpolicycontrol",snssai="11-abc123",} 1.0
11. ocpm_egress_request_total{application="pcf_smservice",dnn="dnn1",nf_instance_
id="",operation_type="terminate_notify",sbi_priority="",servicename_3gpp="npcf-
smpolicycontrol",snssai="11-abc123",} 1.0
8-7
Chapter 8
12. ocpm_egress_response_total{application="pcf_smservice",dnn="dnn1",nf_instanc
e_id="",latency="6",operation_type="terminate_notify",response_code="4xx",sbi_p
riority="",servicename_3gpp="npcf-smpolicycontrol",snssai="11-abc123",} 1.0
PA Service
Examples
1. ocpm_ingress_request_total{application="pcf_smservice",dnn="dnn1",nf_instance
_id="",operation_type="create",sbi_priority="",servicename_3gpp="npcf-
policyauthorization",snssai="11-abc123",} 1.0
2. ocpm_ingress_response_total{application="pcf_smservice",dnn="dnn1",nf_instanc
e_id="",operation_type="create",response_code="2xx",sbi_priority="",servicename
_3gpp="npcf-policyauthorization",snssai="11-abc123",} 1.0
3. ocpm_ingress_request_total{application="pcf_smservice",dnn="dnn1",nf_instance
_id="",operation_type="update",sbi_priority="",servicename_3gpp="npcf-
policyauthorization",snssai="11-abc123",} 1.0
4. ocpm_ingress_response_total{application="pcf_smservice",dnn="dnn1",nf_instanc
e_id="",operation_type="update",response_code="2xx",sbi_priority="",servicenam
e_3gpp="npcf-policyauthorization",snssai="11-abc123",} 1.0
5. ocpm_ingress_request_total{application="pcf_smservice",dnn="dnn1",nf_instance
_id="",operation_type="delete",sbi_priority="",servicename_3gpp="npcf-
policyauthorization",snssai="11-abc123",} 1.0
6. ocpm_ingress_response_total{application="pcf_smservice",dnn="dnn1",nf_instanc
e_id="",operation_type="delete",response_code="4xx",sbi_priority="",servicename
_3gpp="npcf-policyauthorization",snssai="11-abc123",} 1.0
7. ocpm_ingress_request_total{application="pcf_smservice",dnn="dnn1",nf_instance
_id="",operation_type="get",sbi_priority="",servicename_3gpp="npcf-
policyauthorization",snssai="11-abc123",} 1.0
8. ocpm_ingress_response_total{application="pcf_smservice",dnn="dnn1",nf_instanc
e_id="",operation_type="get",response_code="2xx",sbi_priority="",servicename_3
gpp="npcf-policyauthorization",snssai="11-abc123",} 1.0
UE Service
Examples
1. ocpm_ingress_request_total{operation_type="get",servicename_3gpp="npcf-ue-
policy-control",} 2.0
2. ocpm_ingress_request_total{operation_type="delete",servicename_3gpp="npcf-
ue-policy-control",} 2.0
3. ocpm_ingress_response_total{operation_type="get",response_code="5xx",service
name_3gpp="npcf-ue-policy-control",} 4.0
4. ocpm_ingress_response_total{operation_type="delete",response_code="4xx",serv
icename_3gpp="npcf-ue-policy-control",} 2.0
5. ocpm_egress_request_total{operation_type="subscribe",servicename_3gpp="npcf
-ue-policy-control",} 1.0
6. ocpm_egress_response_total{operation_type="subscribe",response_code="2xx",s
ervicename_3gpp="npcf-ue-policy-control",} 1.0
8-8
Chapter 8
AM Service
Examples:
1. ocpm_ingress_response_total{nf_instance_id="",operation_type="create",respons
e_code="2xx",sbi_priority=" ",servicename_3gpp="npcf-am-policy-control/v1",} 2.0
2. ocpm_ingress_request_total{nf_instance_id="",operation_type="create",sbi_priorit
y=" ",servicename_3gpp="npcf-am-policy-control/v1",} 2.0
3. ocpm_ingress_response_total{nf_instance_id="",operation_type="get",response_c
ode="2xx",sbi_priority=" ",servicename_3gpp="npcf-am-policy-control/v1",} 1.0
4. ocpm_ingress_request_total{nf_instance_id="",operation_type="get",sbi_priority="
",servicename_3gpp="npcf-am-policy-control/v1",} 1.0
5. ocpm_egress_response_total{latency="0",nf_instance_id="",operation_type="termi
nate_notify",response_code="2xx",sbi_priority=" ",servicename_3gpp="npcf-am-
policy-control/v1",} 1.0
6. ocpm_egress_response_total{latency="0",nf_instance_id="",operation_type="upda
te_notify",response_code="2xx",sbi_priority=" ",servicename_3gpp="npcf-am-
policy-control/v1",} 2.0
7. ocpm_egress_request_total{nf_instance_id="",operation_type="update_notify",sbi
_priority=" ",servicename_3gpp="npcf-am-policy-control/v1",} 2.0
8. ocpm_egress_request_total{nf_instance_id="",operation_type="terminate_notify",s
bi_priority=" ",servicename_3gpp="npcf-am-policy-control/v1",} 1.0
User Service
Examples
1. ocpm_userservice_inbound_count_total{application="pcf_userservice",operation_t
ype="post",service_resource="udr-service",} 0.0
2. ocpm_userservice_inbound_count_total{application="pcf_userservice",operation_t
ype="get",service_resource="chf-service",} 0.0
3. ocpm_userservice_inbound_count_total{application="pcf_userservice",operation_t
ype="get",service_resource="udr-service",} 0.0
4. ocpm_userservice_inbound_count_total{application="pcf_userservice",operation_t
ype="notify",service_resource="chf-service",} 0.0
5. ocpm_userservice_inbound_count_total{application="pcf_userservice",operation_t
ype="delete",service_resource="user-service",} 0.0
6. ocpm_userservice_inbound_count_total{application="pcf_userservice",operation_t
ype="get",service_resource="user-service",} 0.0
7. ocpm_userservice_inbound_count_total{application="pcf_userservice",operation_t
ype="notify",service_resource="udr-service",} 0.0
8. ocpm_userservice_inbound_count_total{application="pcf_userservice",operation_t
ype="delete",service_resource="udr-service",} 0.0
9. ocpm_userservice_inbound_count_total{application="pcf_userservice",operation_t
ype="terminate",service_resource="chf-service",} 0.0
10. ocpm_userservice_inbound_count_total{application="pcf_userservice",operation_t
ype="delete",service_resource="chf-service",} 0.0
8-9
Chapter 8
11. ocpm_userservice_inbound_count_total{application="pcf_userservice",operation_t
ype="patch",service_resource="udr-service",} 0.0
12. ocpm_userservice_inbound_count_total{application="pcf_userservice",operation_t
ype="put",service_resource="udr-service",} 0.0
UDR
1. ocpm_udr_tracking_request_total{HostName="",application="pcf_userservice",nf_i
nstance_id="fe7d992b-0541-4c7d-ab84-
c6d70b1babc1",operation_type="get",service_resource="policy-
data",service_subresource="ue-policy-
set",service_version="v1",servicename_3gpp="nudr-dr",} 0.0
2. ocpm_udr_tracking_request_total{HostName="",application="pcf_userservice",nf_i
nstance_id="fe7d992b-0541-4c7d-ab84-
c6d70b1babc1",operation_type="unsubscribe",service_resource="policy-
data",service_subresource="subs-to-
notify",service_version="v1",servicename_3gpp="nudr-dr",} 0.0
3. ocpm_udr_tracking_request_total{HostName="",application="pcf_userservice",nf_i
nstance_id="fe7d992b-0541-4c7d-ab84-
c6d70b1babc1",operation_type="unsubscribe",service_resource="policy-
data",service_subresource="sm-
data",service_version="v1",servicename_3gpp="nudr-dr",} 0.0
4. ocpm_udr_tracking_request_total{HostName="",application="pcf_userservice",nf_i
nstance_id="fe7d992b-0541-4c7d-ab84-
c6d70b1babc1",operation_type="subscribe",service_resource="policy-
data",service_subresource="subs-to-
notify",service_version="v1",servicename_3gpp="nudr-dr",} 1.0
5. ocpm_udr_tracking_response_total{HostName="",application="pcf_userservice",nf
_instance_id="fe7d992b-0541-4c7d-ab84-
c6d70b1babc1",operation_type="subscribe",response_code="2xx",service_resour
ce="policy-
data",service_subresource="",service_version="v1",servicename_3gpp="nudr-dr",}
0.0
6. ocpm_udr_tracking_response_total{HostName="",application="pcf_userservice",nf
_instance_id="fe7d992b-0541-4c7d-ab84-
c6d70b1babc1",operation_type="unsubscribe",response_code="5xx",service_reso
urce="policy-data",service_subresource="am-
data",service_version="v1",servicename_3gpp="nudr-dr",} 0.0
7. ocpm_udr_tracking_response_total{HostName="",application="pcf_userservice",nf
_instance_id="fe7d992b-0541-4c7d-ab84-
c6d70b1babc1",operation_type="unsubscribe",response_code="1xx",service_reso
urce="policy-data",service_subresource="subs-to-
notify",service_version="v1",servicename_3gpp="nudr-dr",} 1.0
8. ocpm_udr_tracking_response_total{HostName="",application="pcf_userservice",nf
_instance_id="fe7d992b-0541-4c7d-ab84-
c6d70b1babc1",operation_type="put",response_code="1xx",service_resource="po
licy-data",service_subresource="sm-
data",service_version="v1",servicename_3gpp="nudr-dr",} 0.0
9. ocpm_udr_tracking_response_total{HostName="",application="pcf_userservice",nf
_instance_id="fe7d992b-0541-4c7d-ab84-
c6d70b1babc1",operation_type="subscribe",response_code="3xx",service_resour
8-10
Chapter 8
ce="policy-data",service_subresource="subs-to-
notify",service_version="v1",servicename_3gpp="nudr-dr",} 1.0
10. ocpm_udr_tracking_response_total{HostName="",application="pcf_userservice",nf
_instance_id="fe7d992b-0541-4c7d-ab84-
c6d70b1babc1",operation_type="get",response_code="2xx",service_resource="po
licy-data",service_subresource="",service_version="v1",servicename_3gpp="nudr-
dr",} 0.0
11. ocpm_udr_tracking_response_total{HostName="",application="pcf_userservice",nf
_instance_id="fe7d992b-0541-4c7d-ab84-
c6d70b1babc1",operation_type="patch",response_code="2xx",service_resource="
policy-data",service_subresource="am-
data",service_version="v1",servicename_3gpp="nudr-dr",} 1.0
CHF
1. ocpm_chf_tracking_request_total{HostName="",application="pcf_userservice",nf_i
nstance_id="fe7d992b-0541-4c7d-
ab84-666666666667",operation_type="unsubscribe",service_resource="subscripti
ons",service_version="v1",servicename_3gpp="nchf-spendinglimitcontrol",} 0.0
2. ocpm_chf_tracking_request_total{HostName="",application="pcf_userservice",nf_i
nstance_id="fe7d992b-0541-4c7d-
ab84-666666666667",operation_type="put",service_resource="subscriptions",servi
ce_version="v1",servicename_3gpp="nchf-spendinglimitcontrol",} 0.0
3. ocpm_chf_tracking_request_total{HostName="",application="pcf_userservice",nf_i
nstance_id="fe7d992b-0541-4c7d-
ab84-666666666667",operation_type="subscribe",service_resource="subscription
s",service_version="v1",servicename_3gpp="nchf-spendinglimitcontrol",} 1.0
4. ocpm_chf_tracking_response_total{HostName="",application="pcf_userservice",nf
_instance_id="fe7d992b-0541-4c7d-
ab84-666666666667",operation_type="subscribe",response_code="5xx",service_r
esource="subscriptions",service_version="v1",servicename_3gpp="nchf-
spendinglimitcontrol",} 0.0
5. ocpm_chf_tracking_response_total{HostName="",application="pcf_userservice",nf
_instance_id="fe7d992b-0541-4c7d-
ab84-666666666667",operation_type="put",response_code="4xx",service_resourc
e="subscriptions",service_version="v1",servicename_3gpp="nchf-
spendinglimitcontrol",} 0.0
6. ocpm_chf_tracking_response_total{HostName="",application="pcf_userservice",nf
_instance_id="fe7d992b-0541-4c7d-
ab84-666666666667",operation_type="put",response_code="1xx",service_resourc
e="subscriptions",service_version="v1",servicename_3gpp="nchf-
spendinglimitcontrol",} 0.0
7. ocpm_chf_tracking_response_total{HostName="",application="pcf_userservice",nf
_instance_id="fe7d992b-0541-4c7d-
ab84-666666666667",operation_type="unsubscribe",response_code="4xx",service
_resource="subscriptions",service_version="v1",servicename_3gpp="nchf-
spendinglimitcontrol",} 0.0
8. ocpm_chf_tracking_response_total{HostName="",application="pcf_userservice",nf
_instance_id="fe7d992b-0541-4c7d-
ab84-666666666667",operation_type="unsubscribe",response_code="2xx",service
8-11
Chapter 8
_resource="subscriptions",service_version="v1",servicename_3gpp="nchf-
spendinglimitcontrol",} 0.0
Diam Connector
1. ocpm_egress_response_total{latency="3",nf_instance_id="AF.oracle.com",operati
on_type="update_notify",response_code="2xxx",servicename_3gpp="rx",} 1.0
2. ocpm_egress_request_total{nf_instance_id="AF.oracle.com",operation_type="upd
ate_notify",servicename_3gpp="rx",} 1.0
3. ocpm_ingress_request_total{apn="",nf_instance_id="AF.oracle.com",operation_typ
e="create",servicename_3gpp="rx",} 5.0
4. ocpm_ingress_response_total{apn="",nf_instance_id="ocpcf",operation_type="cre
ate",response_code="2xxx",servicename_3gpp="rx",} 2.0
Policy DS
1. client_request_total{application="policyds",operation="SEARCH",workflow="LDAP
",} 1.0
2. client_response_total{application="policyds",operation="SEARCH",response="200
",workflow="LDAP",} 1.0
3. server_request_total{application="policyds",operation="SEARCH",task="USER_S
ERVICE",} 1.0
4. server_request_total{application="policyds",operation="GET",task="LDAP",} 1.0
5. server_request_total{application="policyds",operation="INSERT",task="PRE",} 1.0
6. server_response_total{application="policyds",operation="POST",response="200",}
1.0
LDAP Gateway
• ldap_request_total{ReqType="GET",application="ldapgateway"} 13.0
• ldap_response_total{Code="4xx",ReqType="GET",application="ldapgateway"} 0.0
• ldap_response_total{Code="2xx",ReqType="GET",application="ldapgateway"}
13.0
• ldap_response_total{Code="5xx",ReqType="GET",application="ldapgateway"} 0.0
Audit Service
• audit_recs_stale{ServiceName="sm-service",TableName="SmPolicyAssociation"}
55.0
• audit_recs_notif{ServiceName="sm-service"} 50.0
• audit_recs_remv{ServiceName="sm-service",TableName="SmPolicyAssociation"}
5.0
• audit_recs_remv_ex{ServiceName="sm-
service",TableName="SmPolicyAssociation"} 0.0
• audit_recs_notif_ex{ServiceName="sm-service"} 0.0
• audit_recs_notif_err{ServiceName="sm-service"} 13.0
• audit_recs_deque_for_notif{ServiceName="sm-service"} 50.0
• audit_recs_enque_for_notif{ServiceName="sm-service"} 50.0
8-12
Chapter 8
• audit_recs_enque_err{ServiceName="sm-service"} 0.0
8-13