[spp] [PATCH 14/30] doc: update user account
x-fn-spp at sl.ntt-tx.co.jp
x-fn-spp at sl.ntt-tx.co.jp
Tue Jan 16 06:16:25 CET 2018
From: Hiroyuki Nakamura <nakamura.hioryuki at po.ntt-tx.co.jp>
User account 'ntt' is not appropriate for example of spp's usacase.
Change to 'sppuser'.
Signed-off-by: Naoki Takada <takada.naoki at lab.ntt.co.jp>
---
docs/spp_vf/sample_usage.md | 41 ++++++++++++++---------------------------
1 file changed, 14 insertions(+), 27 deletions(-)
diff --git a/docs/spp_vf/sample_usage.md b/docs/spp_vf/sample_usage.md
index bb4d540..00e1631 100644
--- a/docs/spp_vf/sample_usage.md
+++ b/docs/spp_vf/sample_usage.md
@@ -74,7 +74,7 @@ To not ask for unknown keys while login VMs,
set `-oStrictHostKeyChecking=no` option for ssh.
```sh
- $ ssh -oStrictHostKeyChecking=no ntt at 192.168.122.31
+ $ ssh -oStrictHostKeyChecking=no sppuser at 192.168.122.31
```
Up interfaces for vhost and register them to arp table inside spp-vm1.
@@ -83,12 +83,12 @@ after configuration is done.
```sh
# up interfaces
- $ sudo ifconfig ens4 inet 192.168.240.21 netmask 255.255.255.0 up
- $ sudo ifconfig ens5 inet 192.168.250.22 netmask 255.255.255.0 up
+ $ sudo ifconfig ens4 inet 192.168.140.21 netmask 255.255.255.0 up
+ $ sudo ifconfig ens5 inet 192.168.150.22 netmask 255.255.255.0 up
# register to arp table
- $ sudo arp -s 192.168.240.11 a0:36:9f:78:86:78 -i ens4
- $ sudo arp -s 192.168.250.13 a0:36:9f:6c:ed:bc -i ens5
+ $ sudo arp -s 192.168.140.11 a0:36:9f:78:86:78 -i ens4
+ $ sudo arp -s 192.168.150.13 a0:36:9f:6c:ed:bc -i ens5
# diable TCP offload
$ sudo ethtool -K ens4 tx off
@@ -98,15 +98,15 @@ after configuration is done.
Configurations for spp-vm2 is same as spp-vm1.
```sh
- $ ssh -oStrictHostKeyChecking=no ntt at 192.168.122.32
+ $ ssh -oStrictHostKeyChecking=no sppuser at 192.168.122.32
# up interfaces
- $ sudo ifconfig ens4 inet 192.168.240.31 netmask 255.255.255.0 up
- $ sudo ifconfig ens5 inet 192.168.250.32 netmask 255.255.255.0 up
+ $ sudo ifconfig ens4 inet 192.168.140.31 netmask 255.255.255.0 up
+ $ sudo ifconfig ens5 inet 192.168.150.32 netmask 255.255.255.0 up
# register to arp table
- $ sudo arp -s 192.168.240.11 a0:36:9f:78:86:78 -i ens4
- $ sudo arp -s 192.168.250.13 a0:36:9f:6c:ed:bc -i ens5
+ $ sudo arp -s 192.168.140.11 a0:36:9f:78:86:78 -i ens4
+ $ sudo arp -s 192.168.150.13 a0:36:9f:6c:ed:bc -i ens5
# diable TCP offload
$ sudo ethtool -K ens4 tx off
@@ -124,19 +124,6 @@ TODO(yasufum) json-based steps are deprecated.
### Register MAC address to Classifier
-Send a request for getting each of process IDs with nc command.
-TODO(yasufum) for what?
-
- ```sh
- {
- "commands": [
- {
- "command": "process"
- }
- ]
- }
- ```
-
Register MAC addresses to classifier.
```sh
@@ -183,16 +170,16 @@ Now, you can login VMs.
```sh
# spp-vm1 via NIC0
- $ ssh ntt at 192.168.240.21
+ $ ssh sppuser at 192.168.140.21
# spp-vm1 via NIC1
- $ ssh ntt at 192.168.250.22
+ $ ssh sppuser at 192.168.150.22
# spp-vm2 via NIC0
- $ ssh ntt at 192.168.240.31
+ $ ssh sppuser at 192.168.140.31
# spp-vm2 via NIC1
- $ ssh ntt at 192.168.250.32
+ $ ssh sppuser at 192.168.150.32
```
If you unregister the addresses, send request as following.
--
1.9.1
More information about the spp
mailing list