Login | PowerShell |
---|---|
az loginlogin >> use which account?? | |
subscribtion | az vm image Link |
Accept subscription terms | az vm image terms accept --urn 128technology:128t_networking_platform:128t_networking_platform:latest |
| |
update the variable | terraform.tfvars |
terraform.tfvars |
|
# Azure Subscription Id # run the in powershell "az login" or "az account show" | |
security rules | ssh ingress rules for the management and public interfaces |
create an RSA key | key generation: public ( .pub ) and private key (.ppk) |
using PuttyGen | |
"~/.ssh/azure_key.pub | |
windows | "azure_key.pub |
SSH client | use the private key |
Deploy | |
terraform validate | |
terraform apply | |
>>> type: "yes" | |
Public IP address | |
SSH | into the Conductor |
SSH | into the SSR |
Config | Conductor or SSR |
certificate | To access yum.128t and download ISO or update Skip Username and copy the key (something like: 128T-0000321.pem ) Copy EVERYTHING |
create a GUI password | account: admin |
Conductor IP@ | only for SSR |
Conductor GUI | on the Conductor | |||||||
---|---|---|---|---|---|---|---|---|
1- add Conductor IP ( under Authority) 2- add "Assocated Asset ID" under Conductor Node | ||||||||
SSH to SSR | get the Vmbus id | Link | ||||||
get vmbus | dpdk-devbind.py --status
management interface External interface Internal interface | |||||||
Add a router | On the conductor | 0- add Conductor iP@ in the Authority|||||||
1- Create a router ( inter-node security= internal ), coordinate , Conductor IP@ 2- Create a node Role= combo 3- Add Device interface: mgmt Vmbus Uuid 4- Add Network interface: DHCP, Security= internal, Conductor=true, source NAT=true, Mgmt Enabled= true ( 5- neighborhoods ) | ||||||||
OTP process | ||||||||
OTP on-boarding process | Download the quick-start file, copy the password and copy to the SSR router | |||||||
DC SSR config | show config running flat show config running
|
...