JOID installation instruction

Bare Metal Installations:

Requirements as per Pharos:


Minimum 2 networks

1. First for Admin network with gateway to access external network
2. Second for public network to consume by tenants for floating ips

NOTE: JOID support multiple isolated networks for data as well as storage. Based on your network options for Openstack.

Minimum 6 physical servers

  1. Jump host server:
   Minimum H/W Spec needed
  CPU cores: 16
  Memory: 32 GB
  Hard Disk: 1(250 GB)
  NIC: eth0(Admin, Management), eth1 (external network)
  1. Node servers (minimum 5):
  Minimum H/W Spec
  CPU cores: 16
  Memory: 32 GB
  Hard Disk: 1(1 TB) this includes the space for ceph as well
  NIC: eth0(Admin, Management), eth1 (external network)

NOTE: Above configuration is minimum and for better performance and usage of the Openstack please consider higher spec for each nodes.

Make sure all servers are connected to top of rack switch and configured accordingly. No DHCP server should be up and configured. Only gateway at eth0 and eth1 network should be configure to access the network outside your lab.

Jump node configuration:

1. Install Ubuntu 14.04 LTS server version of OS on the nodes. 2. Install the git and bridge-utils packages on the server and configure minimum two bridges on jump host:

brAdm and brPublic cat /etc/network/interfaces

   # The loopback network interface
   auto lo
   iface lo inet loopback
   iface eth0 inet manual
   auto brAdm 
   iface brAdm inet static
       # dns-* options are implemented by the resolvconf package, if installed
       bridge_ports eth0
   auto brPublic
   iface brPublic inet static
Seperate yaml fi        netmask
       bridge_ports eth2

NOTE: If you choose to use the separate network for management, data and storage then you need to create bridge for each interface. In case of VLAN tags use the appropriate network on jump-host depend upon VLAN ID on the interface.

Configure JOID for your lab

Get the joid code from gerritt

git clone

Enable MAAS (labconfig.yaml is must and base for MAAS installation and scenario deployment)

If you have already enabled maas for your environment and installed it then there is no need to enabled it again or install it. If you have patches from previous MAAS enablement then you can apply it here.

NOTE: If MAAS is pre installed without then please do the following and skip rest of the step to enable MAAS.

  1. Copy MAAS API key and paste in ~/.juju/environments.yaml at appropriate place.
  2. Run command cp ~/.juju/environments.yaml ./joid/ci/
  3. Generate labconfig.yaml for your lab and copy it to joid. a. cp joid/labconfig/<company name>/<pod number>/labconfig.yaml joid/ci/ or b. cp <newly generated labconfig.yaml> joid/ci
  4. cd joid/ci
  5. python -l labconfig.yaml > deployment.yaml
  6. python -l labconfig.yaml > deployconfig.yaml
  7. cp ./environments.yaml ~/.juju/
  8. cp ./deployment.yaml ~/.juju/
  9. cp ./labconfig.yaml ~/.juju/
  10. cp ./deployconfig.yaml ~/.juju/

If enabling first time then follow it further. - Create a directory in joid/labconfig/<company name>/<pod number>/ for example

mkdir joid/labconfig/intel/pod7/

  • copy labconfig.yaml from pod6 to pod7

cp joid/labconfig/intel/pod5/* joid/labconfig/intel/pod7/

labconfig.yaml file


1. Make sure Jump host node has been configured with bridges on each interface, so that appropriate MAAS and JUJU bootstrap VM can be created. For example if you have three network admin, data and public then I would suggest to give names like brAdm, brData and brPublic. 2. You have information about the node MAC address and power management details (IPMI IP, username, password) of the nodes used for control and compute node.

modify labconfig.yaml

This file has been used to configure your maas and bootstrap node in a VM. Comments in the file are self explanatory and we expect fill up the information according to match lab infrastructure information. Sample labconfig.yaml can be found at;a=blob;f=labconfig/intel/pod6/labconfig.yaml


location: intel racks: - rack: pod5

nodes: - name: rack-5-m1

architecture: x86_64 roles: [network,control] nics: - ifname: eth1

spaces: [public] mac: [“xx:xx:xx:xx:xx:xx”]
type: ipmi address: xx.xx.xx.xx user: xxxx pass: xxxx
  • name: rack-5-m1 architecture: x86_64 roles: [network,control] nics: - ifname: eth1

    spaces: [public] mac: [“xx:xx:xx:xx:xx:xx”]


    type: ipmi address: xx.xx.xx.xx user: xxxx pass: xxxx

  • name: rack-5-m1 architecture: x86_64 roles: [network,control] nics: - ifname: eth1

    spaces: [public] mac: [“xx:xx:xx:xx:xx:xx”]


    type: ipmi address: xx.xx.xx.xx user: xxxx pass: xxxx

  • name: rack-5-m1 architecture: x86_64 roles: [network,control] nics: - ifname: eth1

    spaces: [public] mac: [“xx:xx:xx:xx:xx:xx”]


    type: ipmi address: xx.xx.xx.xx user: xxxx pass: xxxx

  • name: rack-5-m1 architecture: x86_64 roles: [network,control] nics: - ifname: eth1

    spaces: [public] mac: [“xx:xx:xx:xx:xx:xx”]


    type: ipmi address: xx.xx.xx.xx user: xxxx pass: xxxx

floating-ip-range:,,, ext-port: “eth1” dns:


release: c distro: trusty type: nonha openstack: liberty sdncontroller: - type: nosdn storage: - type: ceph

disk: /srv

feature: odl_l2 spaces: - type: public

bridge: brPublic cidr: gateway: vlan:
  • type: external bridge: brExt cidr: gateway: ipaddress: vlan:*

NOTE: If you are using VLAN tagged network then make sure you modify the case $1 section under Enable vlan interface with maas appropriately.

*‘intelpod7’ )
maas refresh enableautomodebyname eth2 AUTO “” compute || true enableautomodebyname eth2 AUTO “” control || true ;;*

Deployment of OPNFV using JOID:

Once you have done the change in above section then run the following commands to do the automatic deployments.

MAAS Install

After integrating the changes as mentioned above run the MAAS install. then run the below commands to start the MAAS deployment.

``   ./ custom <absolute path of config>/labconfig.yaml `` or ``   ./ custom http://<web site location>/labconfig.yaml ``

OPNFV Install

   ./ -o mitaka -s odl -t ha -l custom -f none -d xenial

./ -o mitaka -s odl -t ha -l custom -f none -d xenial

NOTE: Possible options are as follows:

choose which sdn controller to use.
[-s <nosdn|odl|opencontrail|onos>] nosdn: openvswitch only and no other SDN. odl: OpenDayLight Lithium version. opencontrail: OpenContrail SDN can be installed with Juno Openstack today. onos: ONOS framework as SDN.
Mode of Openstack deployed.
[-t <nonha|ha|tip>] nonha: NO HA mode of Openstack ha: HA mode of openstack.
Wihch version of Openstack deployed.
[-o <liberty|Mitaka>] liberty: Liberty version of openstack. Mitaka: Mitaka version of openstack.
Where to deploy
[-l <custom | default | intelpod5 >] etc... custom: For bare metal deployment where labconfig.yaml provided externally and not part of JOID. default: For virtual deployment where installation will be done on KVM created using ./ intelpod5: Install on bare metal OPNFV pod5 of Intel lab. intelpod6 orangepod2 custom
what feature to deploy. Comma seperated list
[-f <lxd|dvr|sfc|dpdk|ipv6|none>] none: no special feature will be enabled. ipv6: ipv6 will be enabled for tenant in openstack. lxd: With this feature hypervisor will be LXD rather than KVM. dvr: Will enable distributed virtual routing. dpdk: Will enable DPDK feature. sfc: Will enable sfc feature only supported with onos deployment.
which Ubuntu distro to use.
[ -d <trusty|xenial> ]

OPNFV Scenarios in JOID Following OPNFV scenarios can be deployed using JOID. Seperate yaml bundle will be created to deploy the individual scenario.

Scenario Owner Known Issues os-nosdn-nofeature-ha Joid os-nosdn-nofeature-noha Joid os-odl_l2-nofeature-ha Joid os-nosdn-lxd-ha Joid Yardstick team is working to support. os-nosdn-lxd-noha Joid Yardstick team is working to support. os-onos-nofeature-ha ONOSFW os-onos-sfc-ha ONOSFW


By default debug is enabled in script and error messages will be printed on ssh terminal where you are running the scripts.

To Access of any control or compute nodes. juju ssh <service name> for example to login into openstack-dashboard container.

juju ssh openstack-dashboard/0 juju ssh nova-compute/0 juju ssh neutron-gateway/0

By default juju will add the Ubuntu user keys for authentication into the deployed server and only ssh access will be available.