<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://osm.etsi.org/wikipub/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Sam1973</id>
	<title>OSM Public Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://osm.etsi.org/wikipub/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Sam1973"/>
	<link rel="alternate" type="text/html" href="https://osm.etsi.org/wikipub/index.php/Special:Contributions/Sam1973"/>
	<updated>2026-05-10T21:55:45Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.39.1</generator>
	<entry>
		<id>https://osm.etsi.org/wikipub/index.php?title=How_to_install_OSM_in_Amazon_EC2&amp;diff=4061</id>
		<title>How to install OSM in Amazon EC2</title>
		<link rel="alternate" type="text/html" href="https://osm.etsi.org/wikipub/index.php?title=How_to_install_OSM_in_Amazon_EC2&amp;diff=4061"/>
		<updated>2019-01-07T10:07:51Z</updated>

		<summary type="html">&lt;p&gt;Sam1973: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= Requirements =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Resources:&#039;&#039;&#039;&lt;br /&gt;
*	MINIMUM: 2 CPUs, 4 GB RAM, 20GB disk and a single interface with Internet access&lt;br /&gt;
*	RECOMMENDED: 2 CPUs, 8 GB RAM, 40GB disk and a single interface with Internet access&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Instance Type/AMI:&#039;&#039;&#039;&lt;br /&gt;
*	Recommended Instance Type: m5.xlarge (https://aws.amazon.com/ec2/instance-types/)&lt;br /&gt;
*	Ubuntu 16.04 (64-bit variant required) as base AMI (http://releases.ubuntu.com/16.04/)&lt;br /&gt;
*	Ubuntu AMI’s: https://cloud-images.ubuntu.com/locator/ec2/&lt;br /&gt;
*	Launching an EC2 instance: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EC2_GetStarted.html#ec2-launch-instance&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&#039;&#039;The following installation steps assume that you already have an EC2 instance launched which meets the minimum requirements mentioned above.&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= OSM Installation =&lt;br /&gt;
&lt;br /&gt;
1.	Install OSM and save installation logs to a file for troubleshooting if needed:&lt;br /&gt;
&lt;br /&gt;
 wget https://osm-download.etsi.org/ftp/osm-5.0-five/install_osm.sh&lt;br /&gt;
 chmod +x install_osm.sh&lt;br /&gt;
 ./install_osm.sh 2&amp;gt;&amp;amp;1 | tee osm_install_log.txt&lt;br /&gt;
&lt;br /&gt;
2.	Answer the following dialog box questions accordingly:&lt;br /&gt;
&lt;br /&gt;
*	The installation will configure LXD, install juju, install docker CE and init a docker swarm, as pre-requirements. Do you want to proceed (Y/n)? Y&lt;br /&gt;
*	Do you want to configure the LXD bridge? Yes&lt;br /&gt;
*	Do you want to setup an IPv4 subnet? Yes&lt;br /&gt;
*	&#039;&#039;&amp;lt;&amp;lt; &#039;&#039;&#039;Default values&#039;&#039;&#039; apply for next questions &amp;gt;&amp;gt;&#039;&#039;&lt;br /&gt;
*	Do you want to setup an IPv6 subnet? No&lt;br /&gt;
&lt;br /&gt;
3.	Add the following environment variables to the end of your ‘.bashrc’ file and then source it with ‘source .bashrc’:&lt;br /&gt;
 export OSM_HOSTNAME=127.0.0.1&lt;br /&gt;
 export OSM_SOL005=True&lt;br /&gt;
&lt;br /&gt;
4.	You will notice 10 Docker Containers created on the EC2 instance. Check the status of the containers and Docker service:&lt;br /&gt;
 docker stack ps osm |grep -i running&lt;br /&gt;
 docker service ls&lt;br /&gt;
&lt;br /&gt;
5.	Create the AWS VIM Account (AWS Site)&lt;br /&gt;
&lt;br /&gt;
NOTE: Make sure to select the region in which your EC2 instance resides.&lt;br /&gt;
&lt;br /&gt;
 osm vim-create --name aws-site --user &amp;lt;aws-access-key&amp;gt; --password &amp;lt;aws-secret-key&amp;gt; --auth_url  https://aws.amazon.com --tenant admin --account_type aws --config &#039;{region_name: us-west-2, flavor_info: “{t2.nano: {cpus: 1, disk: 100, ram: 512}, t2.micro: {cpus: 1, disk: 100, ram: 1024}, t2.small: {cpus: 1, disk: 100, ram: 2048}, m1.small: {cpus: 1, disk: 160, ram: 1741}}”}&#039;&lt;br /&gt;
  	        &lt;br /&gt;
6.	Access the OSM Console via the EC2 Instance’s Private IP from another EC2 Instance in the same subnet:&lt;br /&gt;
&lt;br /&gt;
NOTE: You can use a Windows instance to easily access the OSM Console. &lt;br /&gt;
Launching an EC2 Windows Instance:&lt;br /&gt;
https://docs.aws.amazon.com/AWSEC2/latest/WindowsGuide/EC2_GetStarted.html#ec2-launch-instance&lt;br /&gt;
&lt;br /&gt;
 http://1.2.3.4&lt;br /&gt;
 username: admin&lt;br /&gt;
 password: admin&lt;br /&gt;
&lt;br /&gt;
7.	Deploy/Test a network service by using any of the available VNF and NS packagers from ‘https://osm-download.etsi.org/ftp/osm-4.0-four/3rd-hackfest/packages/’:&lt;br /&gt;
 wget https://osm-download.etsi.org/ftp/osm-4.0-four/3rd-hackfest/packages/hackfest_1alt_nsd.tar.gz&lt;br /&gt;
 wget https://osm-download.etsi.org/ftp/osm-4.0-four/3rd-hackfest/packages/hackfest_1alt_vnfd.tar.gz&lt;br /&gt;
 &lt;br /&gt;
 osm vnfd-create hackfest_1alt_vnfd.tar.gz&lt;br /&gt;
 osm nsd-create hackfest_1alt_nsd.tar.gz&lt;br /&gt;
 osm ns-create --ns_name hackfest1alt --nsd_name hackfest1alt-ns --vim_account aws-site --ssh_keys &amp;lt;PUBKEY_FILE&amp;gt; --config &#039;{vld: [ {name: mgmtnet, vim-network-name: subnet-xxxxxxx} ] }&#039;&lt;br /&gt;
 osm ns-list&lt;br /&gt;
 osm ns-show hackfest1alt&lt;/div&gt;</summary>
		<author><name>Sam1973</name></author>
	</entry>
	<entry>
		<id>https://osm.etsi.org/wikipub/index.php?title=5th_OSM_Hackfest&amp;diff=4049</id>
		<title>5th OSM Hackfest</title>
		<link rel="alternate" type="text/html" href="https://osm.etsi.org/wikipub/index.php?title=5th_OSM_Hackfest&amp;diff=4049"/>
		<updated>2018-12-20T08:52:01Z</updated>

		<summary type="html">&lt;p&gt;Sam1973: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:bcn.jpg|750px|center|top]] &lt;br /&gt;
&lt;br /&gt;
= Overview =&lt;br /&gt;
[[File:5hackdate.png|350px|right|top|link=https://portal.etsi.org/webapp/MeetingCalendar/MeetingDetails.asp?m_id=35467]] &lt;br /&gt;
&lt;br /&gt;
ETSI&#039;s Centre for Testing and Interoperability and the OSM community are organizing the 5th OSM Hackfest on 4-8 February 2019. &lt;br /&gt;
&lt;br /&gt;
The event will be hosted by &#039;&#039;&#039;[http://www.cttc.es/about-cttc/location-and-contact/ CTTC]&#039;&#039;&#039; in Castelldefels (Barcelona), co-located with the &#039;&#039;&#039;[http://portal.etsi.org/webapp/MeetingCalendar/MeetingDetails.asp?m_id=34951 OSM Mid-Release SIX]&#039;&#039;&#039; meeting and a [https://5gtango.eu/news/55-joint-sonata-and-osm-hackfest-barcelona-4-8-february-2019.html &#039;&#039;&#039;SonataNFV&#039;&#039;&#039; Hackfest], offering a great opportunity to share and learn with OSM developers and module leaders, and explore further opportunities for synergy and collaboration with 5G research activities. &lt;br /&gt;
&lt;br /&gt;
Participation to OSM Hackfests is free and open to all upon &#039;&#039;&#039;[https://portal.etsi.org/webapp/MeetingCalendar/MeetingDetails.asp?m_id=35467 registration]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Venue ==&lt;br /&gt;
&#039;&#039;&#039;Centre Tecnològic de Telecomunicacions de Catalunya - [http://www.cttc.es/about-cttc/location-and-contact/ CTTC]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Parc Mediterrani de la Tecnologia (PMT) - Building B4&lt;br /&gt;
&lt;br /&gt;
Av. Carl Friedrich Gauss 7&lt;br /&gt;
&lt;br /&gt;
08860 - Castelldefels (Barcelona) - Spain&lt;br /&gt;
&lt;br /&gt;
= Scope =&lt;br /&gt;
This OSM Hackfest will allow new users to get familiar with &#039;&#039;&#039;OSM Release FIVE&#039;&#039;&#039; and exercise all the main functionalities, from basic operations (installation, setup, common operations, etc.) to most advanced activities, with a big focus on VNF on-boarding activities covering Day 0/1/2 operations.&lt;br /&gt;
&lt;br /&gt;
In addition, experienced users and developers will have the opportunity to hack into OSM, build complex examples, fine-tune, test and demonstrate experimental features on the OSM Remote Labs network.&lt;br /&gt;
&lt;br /&gt;
[[File:OSM_community_paloalto.jpg|800px|center]]&lt;br /&gt;
&lt;br /&gt;
= Objectives =&lt;br /&gt;
OSM Hackfest participants will learn to &lt;br /&gt;
* Install OSM and run some examples&lt;br /&gt;
* Get familiar with OSM&#039;s GUI and CLI&lt;br /&gt;
* Create  own VNF and NS descriptors and build packages&lt;br /&gt;
* Model and deploy NS/VNF with EPA capabilities&lt;br /&gt;
* Model dynamic Life Cycle Management operations with Day-1 and Day-2 actions&lt;br /&gt;
* Perform basic troubleshooting&lt;br /&gt;
* Configure Fault and Performance management and close-loop operations&lt;br /&gt;
* Modify and experiment with OSM source code&lt;br /&gt;
* Build complex examples and run own experimental testing&lt;br /&gt;
&lt;br /&gt;
= Who should attend =&lt;br /&gt;
* VNF vendors, who want to onboard their VNF in OSM following best practices&lt;br /&gt;
* System Integrators, who want to get used with OSM&lt;br /&gt;
* Service providers, who want to get first hand operational experience with OSM&lt;br /&gt;
* Academia and Universities, who are considering OSM as platform for their research activities in networking&lt;br /&gt;
* Experimented developers and users that want to share and test with the community&lt;br /&gt;
&lt;br /&gt;
[[File:OSM_hack.jpg|800px|center]]&lt;br /&gt;
&lt;br /&gt;
= Prerequisites =&lt;br /&gt;
* Seats are limited, [https://portal.etsi.org/webapp/MeetingCalendar/MeetingDetails.asp?m_id=35467 registration] is mandatory&lt;br /&gt;
* Participants are expected to have user-level knowledge of Linux and be familiar with NFV and SDN concepts&lt;br /&gt;
* Laptop / VM in laptop&lt;br /&gt;
** Linux installed (preferred, Ubuntu 16.04)&lt;br /&gt;
** RECOMMENDED: 2 CPUs, 8 GB RAM, 20GB disk &lt;br /&gt;
* It is highly recommended that you &#039;&#039;&#039;download and install OSM Rel FIVE before the hackfest&#039;&#039;&#039;. &lt;br /&gt;
** See [https://osm.etsi.org/wikipub/index.php/How_to_run_OSM_on_Vagrant how to download and install OSM from Vagrant on your computer].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Agenda =&lt;br /&gt;
&amp;lt;!----&lt;br /&gt;
&amp;lt;googlespreadsheet style=&amp;quot;width:850px; height:400px&amp;quot;&amp;gt;1vXg_DCeXLJ_7NHqfbhTJtJ2DF4_d3MqnH5vkCsNblKY&amp;lt;/googlespreadsheet&amp;gt;&lt;br /&gt;
---&amp;gt;&lt;br /&gt;
* &#039;&#039;&#039;Session 0: Introduction to NFV and OSM&#039;&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;Session 1: OSM Installation and first use&#039;&#039;&#039;&lt;br /&gt;
** OSM installation (Release FIVE)&lt;br /&gt;
** OSM user experience from the GUI    &lt;br /&gt;
** OSM user experience from the CLI&lt;br /&gt;
* &#039;&#039;&#039;Session 2: Creating a basic VNF and NS&#039;&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;Session 3: Modeling multi-VDU VNF&#039;&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;Session 4: Adding day-0 configuration to your VNF&#039;&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;Session 5: Modeling EPA capabilities in your VNF descriptor&#039;&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;Session 6: Adding day-1/day-2 configuration to your VNF.&#039;&#039;&#039;&lt;br /&gt;
** Creating a charm for your VNF&lt;br /&gt;
** VNF primitives&lt;br /&gt;
* &#039;&#039;&#039;Session 7: OSM Fault &amp;amp; Performance Management&#039;&#039;&#039;&lt;br /&gt;
** Collecting and visualizing metrics from VNFs&lt;br /&gt;
** Collecting, visualizing and reacting to events from VNFs&lt;br /&gt;
* &#039;&#039;&#039;Session 8: 5G Network Slicing with OSM&#039;&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;Session 9: Service Function Chaining&#039;&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;Session 10: Contributing to OSM&#039;&#039;&#039;  &lt;br /&gt;
* &#039;&#039;&#039;Freestyle Experimental Sessions&#039;&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;SonataNFV dedicated Sessions&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!---&lt;br /&gt;
= Instructors =&lt;br /&gt;
* Benjamín Díaz, Whitestack&lt;br /&gt;
* Eduardo Sousa, Whitestack&lt;br /&gt;
* José Miguel Guzmán, Whitestack&lt;br /&gt;
&lt;br /&gt;
= Remote Labs = &lt;br /&gt;
OSM Hackfests rely on exercising OSM with different VIMs and infrastructure in Remote OSM Labs kindly made available by our community members. Special thanks to the ones supporting this hackfest :&lt;br /&gt;
* Intel&lt;br /&gt;
* VMware&lt;br /&gt;
* Whitestack&lt;br /&gt;
* Wind River&lt;br /&gt;
----&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Previous Hackfests material =&lt;br /&gt;
* [[4th OSM Hackfest | 4th OSM Hackfest Wiki]]&lt;br /&gt;
* [[3rd OSM Hackfest | 3rd OSM Hackfest Wiki]]&lt;br /&gt;
* [[2nd OSM Hackfest | 2nd OSM Hackfest Wiki]]&lt;br /&gt;
* [[1st OSM Hackfest | 1st OSM Hackfest Wiki]]&lt;br /&gt;
&lt;br /&gt;
= Get involved =&lt;br /&gt;
* Join the [https://join.slack.com/t/opensourcemano/shared_invite/enQtMzQ3MzYzNTQ0NDIyLWJkMzRjNDM0MjFjODYzMGQ3ODIzMzJlNTg2ZGI5OTdiZjFiNDMyMzYxMjRjNDU4N2FmNjRjNzY5NTE1MjgzOTQ OSM Community Slack Workspace]&lt;br /&gt;
* If your organisation is already an [https://portal.etsi.org/TBSiteMap/OSM/ListofOSMMembers.aspx OSM member], you can also:&lt;br /&gt;
**	[https://webapp.etsi.org/createaccount/ Request an EOL account] (if you don’t have one yet)&lt;br /&gt;
**	Subscribe [https://list.etsi.org/scripts/wa.exe?SUBED1=OSG_OSM&amp;amp;A=1 OSM general] and [https://list.etsi.org/scripts/wa.exe?SUBED1=OSM_TECH&amp;amp;A=1 OSM TECH] mailing lists&lt;br /&gt;
*	If your organisation is not yet an OSM member:&lt;br /&gt;
**	Learn [https://osm.etsi.org/about/how-to-join how to join], it is free and open to all&lt;br /&gt;
* Join the [https://osm.etsi.org/wikipub/index.php/OSM_Ecosystem OSM Ecosystem]&lt;br /&gt;
&lt;br /&gt;
= Contact =&lt;br /&gt;
Please send your technical questions to [mailto:OSM_TECH@list.etsi.org OSM_TECH@list.etsi.org] or join the [https://join.slack.com/t/opensourcemano/shared_invite/enQtMzQ3MzYzNTQ0NDIyLWJkMzRjNDM0MjFjODYzMGQ3ODIzMzJlNTg2ZGI5OTdiZjFiNDMyMzYxMjRjNDU4N2FmNjRjNzY5NTE1MjgzOTQ OSM Community Slack Workspace]&lt;br /&gt;
&lt;br /&gt;
Questions about ETSI, joining OSM, this hackfest and future events can be sent to: [mailto:OSMSupport@etsi.org OSMSupport@etsi.org]&lt;/div&gt;</summary>
		<author><name>Sam1973</name></author>
	</entry>
</feed>