Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Add two NFVI test cases

...

IDTest CaseTest Case GroupDescriptionStatusGerrit References
 vPingsmoke(functest)two vms setup in the same subnet and can ping each other (ssh, userdata, IPv4, IPv6(afraid not support now MatthewLi))  
 vRouter Two VMs in two different subnets, connected by a Neutron virtual router, can ping each other  
 Security rules Verify that a security rule prevents a type of traffic, remove rule, verify that traffic passes, add it back, test that traffic is stopped  
 External routing Verify that a VM can access hosts external to the VIM  
 

yardstick_tc010
measure memory read latency using lmbench

nfvi/compute

measure memory read latency, No SLA, some adapted work is needed

---> CAN Measure measure memory read latency

Comment: There was an agreement not to include any performance related tests to the conformance test suite.

Comment: These tests are not related to platform compliance 

  
 

yardstick_tc012
Measure memory read and write bandwidth using lmbench

nfvi/compute

No SLA

Comment: There was an agreement not to include any performance related tests to the conformance test suite.

Comment: These tests are not related to platform compliance 

  
 

yardstick_tc014
Measure Processing speed using unixbench

nfvi/compute

No SLA

Comment: There was an agreement not to include any performance related tests to the conformance test suite.

Comment: These tests are not related to platform compliance 

  
 yardstick_tc055
number of cores, number of threads, available memory size and cache size
nfvi/compute

No SLA

COmment: This is not relevant to compliance and conformance

  
 network basic operationsNFVI / networkThis smoke test suite assumes that Nova has been configured to boot VM's with Neutron-managed networking, and attempts to verify network connectivitydraft proposed 
 server basic operationsNFVI / compute

This smoke test case follows this basic set of operations:

1.Create a keypair for use in launching an instance

2.Create a security group to control network access in instance

3. Add simple permissive rules to the security group

4. Launch an instance

5. Perform ssh to instance

6. Verify metadata service

7. Verify metadata on config_drive

8. Terminate the instance

draft proposed 
   ...fill out CRUD operations for "network/subnet/router/port" operations  

...