[spp] [PATCH 14/30] doc: update user account

x-fn-spp at sl.ntt-tx.co.jp x-fn-spp at sl.ntt-tx.co.jp
Tue Jan 16 06:16:25 CET 2018


From: Hiroyuki Nakamura <nakamura.hioryuki at po.ntt-tx.co.jp>

User account 'ntt' is not appropriate for example of spp's usacase.
Change to 'sppuser'.

Signed-off-by: Naoki Takada <takada.naoki at lab.ntt.co.jp>
---
 docs/spp_vf/sample_usage.md | 41 ++++++++++++++---------------------------
 1 file changed, 14 insertions(+), 27 deletions(-)

diff --git a/docs/spp_vf/sample_usage.md b/docs/spp_vf/sample_usage.md
index bb4d540..00e1631 100644
--- a/docs/spp_vf/sample_usage.md
+++ b/docs/spp_vf/sample_usage.md
@@ -74,7 +74,7 @@ To not ask for unknown keys while login VMs,
 set `-oStrictHostKeyChecking=no` option for ssh.
 
   ```sh
-  $ ssh -oStrictHostKeyChecking=no ntt at 192.168.122.31
+  $ ssh -oStrictHostKeyChecking=no sppuser at 192.168.122.31
   ```
 
 Up interfaces for vhost and register them to arp table inside spp-vm1.
@@ -83,12 +83,12 @@ after configuration is done.
 
   ```sh
   # up interfaces
-  $ sudo ifconfig ens4 inet 192.168.240.21 netmask 255.255.255.0 up
-  $ sudo ifconfig ens5 inet 192.168.250.22 netmask 255.255.255.0 up
+  $ sudo ifconfig ens4 inet 192.168.140.21 netmask 255.255.255.0 up
+  $ sudo ifconfig ens5 inet 192.168.150.22 netmask 255.255.255.0 up
 
   # register to arp table
-  $ sudo arp -s 192.168.240.11 a0:36:9f:78:86:78 -i ens4
-  $ sudo arp -s 192.168.250.13 a0:36:9f:6c:ed:bc -i ens5
+  $ sudo arp -s 192.168.140.11 a0:36:9f:78:86:78 -i ens4
+  $ sudo arp -s 192.168.150.13 a0:36:9f:6c:ed:bc -i ens5
 
   # diable TCP offload
   $ sudo ethtool -K ens4 tx off
@@ -98,15 +98,15 @@ after configuration is done.
 Configurations for spp-vm2 is same as spp-vm1.
 
   ```sh
-  $ ssh -oStrictHostKeyChecking=no ntt at 192.168.122.32
+  $ ssh -oStrictHostKeyChecking=no sppuser at 192.168.122.32
 
   # up interfaces
-  $ sudo ifconfig ens4 inet 192.168.240.31 netmask 255.255.255.0 up
-  $ sudo ifconfig ens5 inet 192.168.250.32 netmask 255.255.255.0 up
+  $ sudo ifconfig ens4 inet 192.168.140.31 netmask 255.255.255.0 up
+  $ sudo ifconfig ens5 inet 192.168.150.32 netmask 255.255.255.0 up
 
   # register to arp table
-  $ sudo arp -s 192.168.240.11 a0:36:9f:78:86:78 -i ens4
-  $ sudo arp -s 192.168.250.13 a0:36:9f:6c:ed:bc -i ens5
+  $ sudo arp -s 192.168.140.11 a0:36:9f:78:86:78 -i ens4
+  $ sudo arp -s 192.168.150.13 a0:36:9f:6c:ed:bc -i ens5
 
   # diable TCP offload
   $ sudo ethtool -K ens4 tx off
@@ -124,19 +124,6 @@ TODO(yasufum) json-based steps are deprecated.
 
 ### Register MAC address to Classifier
 
-Send a request for getting each of process IDs with nc command.
-TODO(yasufum) for what?
-
-  ```sh
-  {
-    "commands": [
-      {
-        "command": "process"
-      }
-    ]
-  }
-  ```
-
 Register MAC addresses to classifier.
 
   ```sh
@@ -183,16 +170,16 @@ Now, you can login VMs.
 
   ```sh
   # spp-vm1 via NIC0
-  $ ssh ntt at 192.168.240.21
+  $ ssh sppuser at 192.168.140.21
 
   # spp-vm1 via NIC1
-  $ ssh ntt at 192.168.250.22
+  $ ssh sppuser at 192.168.150.22
 
   # spp-vm2 via NIC0
-  $ ssh ntt at 192.168.240.31
+  $ ssh sppuser at 192.168.140.31
 
   # spp-vm2 via NIC1
-  $ ssh ntt at 192.168.250.32
+  $ ssh sppuser at 192.168.150.32
   ```
 
 If you unregister the addresses, send request as following.
-- 
1.9.1



More information about the spp mailing list