--- /dev/null
+#!/usr/bin/env bash
+#######################################################################################
+# Copyright ETSI Contributors and Others.
+#
+# Licensed under the Apache License, Version 2.0 (the "License");
+# you may not use this file except in compliance with the License.
+# You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
+# implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+#######################################################################################
+
+# Create a new VM for installing OSM and its NSG on Azure. SSH key pair files ~/.ssh/id_rsa
+# and ~/.ssh/id_rsa.pub must exist. The NEW_OSM_IP variable is set with IP address.
+# To do this it reads the following environment variables:
+# - OSM_IMAGE_NAME: name of the new VM
+# - RESOURCE_GROUP: name of the resource-group where the VM will be created
+# - VNET_NAME: name of the virtual network when creating a new one or referencing an existing one
+# - VIM_MGMT_NET: name or ID of the subnet to which the VM will be connected
+# - SOURCE_IMAGE_NAME: name of operating system image used (e.g. "Canonical:0001-com-ubuntu-server-jammy:22_04-lts:latest")
+# - FLAVOR_NAME: the VM size to be created (e.g. "Standard_D4as_v4")
+# - PRIORITY: "Low", "Regular" or Spot"
+function create_azure_vm {
+ # Create the VM in resource-group
+ set -eux
+ az vm create --resource-group "${RESOURCE_GROUP}" --name "${OSM_IMAGE_NAME}" --image "${SOURCE_IMAGE_NAME}" --size "${FLAVOR_NAME}" --vnet-name "${VNET_NAME}" --subnet "${VIM_MGMT_NET}" --public-ip-address "" --admin-username ubuntu --priority "${PRIORITY}" --os-disk-size-gb 64
+ export NEW_OSM_IP=$(az vm show -d -g "${RESOURCE_GROUP}" -n "${OSM_IMAGE_NAME}" --query privateIps | tr -d \")
+
+ # Add a security group rule
+ INTERFACE_ID=$(az vm show --resource-group ${RESOURCE_GROUP} --name ${OSM_IMAGE_NAME} --query networkProfile.networkInterfaces[0].id)
+ INTERFACE_ID=${INTERFACE_ID:1:-1}
+ SECURITY_GROUP_ID=$(az network nic show --id ${INTERFACE_ID} --query networkSecurityGroup.id)
+ SECURITY_GROUP_ID=${SECURITY_GROUP_ID:1:-1}
+ SECURITY_GROUP_NAME=$(az resource show --ids ${SECURITY_GROUP_ID} --query name)
+ SECURITY_GROUP_NAME=${SECURITY_GROUP_NAME:1:-1}
+ az network nsg rule create -n osm --nsg-name ${SECURITY_GROUP_NAME} --priority 2000 -g ${RESOURCE_GROUP} --description "NBI and Prometheus ports" --protocol TCP --destination-port-ranges 9999 9091
+}
+
+if [ -n "${1:-}" ]; then # If there is an argument, it must be the hostname
+ export OSM_IMAGE_NAME=$1
+else
+ export OSM_IMAGE_NAME=osmtest$(date '+%Y%m%d%H%M')
+fi
+
+# Branch by CLOUD_TYPE value ("azure", "gcp")
+if [ "${CLOUD_TYPE}" == "azure" ]; then
+ # Azure VIM
+ create_azure_vm
+elif [ "${CLOUD_TYPE}" == "gcp" ]; then
+ # Google Cloud VIM
+ export OSM_IMAGE_NAME=$(echo $OSM_IMAGE_NAME | sed "s/_/-/g")
+ echo "CLOUD_TYPE '${CLOUD_TYPE}' still not supported"
+ exit
+else
+ echo "Invalid cloud type: ${CLOUD_TYPE}"
+fi
+
+# Log new environment variables
+mkdir -p ${ROBOT_REPORT_FOLDER}
+cat <<EOF > ${ROBOT_REPORT_FOLDER}/osm_environment.rc
+export CLOUD_TYPE="${CLOUD_TYPE}"
+export OSM_HOSTNAME="${NEW_OSM_IP}"
+export OSM_IMAGE_NAME="${OSM_IMAGE_NAME}"
+EOF
+echo File with new environment was created at ${ROBOT_REPORT_FOLDER}/osm_environment.rc