Merge "Remove Neutron core static example configuration files"
This commit is contained in:
commit
a8a0c619de
@ -1,94 +0,0 @@
|
||||
[DEFAULT]
|
||||
# Show debugging output in log (sets DEBUG log level output)
|
||||
# debug = False
|
||||
|
||||
# The DHCP agent will resync its state with Neutron to recover from any
|
||||
# transient notification or rpc errors. The interval is number of
|
||||
# seconds between attempts.
|
||||
# resync_interval = 5
|
||||
|
||||
# The DHCP agent requires an interface driver be set. Choose the one that best
|
||||
# matches your plugin.
|
||||
# interface_driver =
|
||||
|
||||
# Example of interface_driver option for OVS based plugins(OVS, Ryu, NEC, NVP,
|
||||
# BigSwitch/Floodlight)
|
||||
# interface_driver = openvswitch
|
||||
|
||||
# Name of Open vSwitch bridge to use
|
||||
# ovs_integration_bridge = br-int
|
||||
|
||||
# Use veth for an OVS interface or not.
|
||||
# Support kernels with limited namespace support
|
||||
# (e.g. RHEL 6.5) so long as ovs_use_veth is set to True.
|
||||
# ovs_use_veth = False
|
||||
|
||||
# Example of interface_driver option for LinuxBridge
|
||||
# interface_driver = linuxbridge
|
||||
|
||||
# The agent can use other DHCP drivers. Dnsmasq is the simplest and requires
|
||||
# no additional setup of the DHCP server.
|
||||
# dhcp_driver = neutron.agent.linux.dhcp.Dnsmasq
|
||||
|
||||
# In some cases the neutron router is not present to provide the metadata
|
||||
# IP but the DHCP server can be used to provide this info. Setting this
|
||||
# value will force the DHCP server to append specific host routes to the
|
||||
# DHCP request. If this option is set, then the metadata service will be
|
||||
# activated for all the networks.
|
||||
# force_metadata = False
|
||||
|
||||
# The DHCP server can assist with providing metadata support on isolated
|
||||
# networks. Setting this value to True will cause the DHCP server to append
|
||||
# specific host routes to the DHCP request. The metadata service will only
|
||||
# be activated when the subnet does not contain any router port. The guest
|
||||
# instance must be configured to request host routes via DHCP (Option 121).
|
||||
# This option doesn't have any effect when force_metadata is set to True.
|
||||
# enable_isolated_metadata = False
|
||||
|
||||
# Allows for serving metadata requests coming from a dedicated metadata
|
||||
# access network whose cidr is 169.254.169.254/16 (or larger prefix), and
|
||||
# is connected to a Neutron router from which the VMs send metadata
|
||||
# request. In this case DHCP Option 121 will not be injected in VMs, as
|
||||
# they will be able to reach 169.254.169.254 through a router.
|
||||
# This option requires enable_isolated_metadata = True
|
||||
# enable_metadata_network = False
|
||||
|
||||
# Number of threads to use during sync process. Should not exceed connection
|
||||
# pool size configured on server.
|
||||
# num_sync_threads = 4
|
||||
|
||||
# Location to store DHCP server config files
|
||||
# dhcp_confs = $state_path/dhcp
|
||||
|
||||
# Domain to use for building the hostnames. This option will be deprecated in
|
||||
# a future release. It is being replaced by dns_domain in neutron.conf
|
||||
# dhcp_domain = openstacklocal
|
||||
|
||||
# Override the default dnsmasq settings with this file
|
||||
# dnsmasq_config_file =
|
||||
|
||||
# Comma-separated list of DNS servers which will be used by dnsmasq
|
||||
# as forwarders.
|
||||
# dnsmasq_dns_servers =
|
||||
|
||||
# Base log dir for dnsmasq logging. The log contains DHCP and DNS log
|
||||
# information and is useful for debugging issues with either DHCP or DNS.
|
||||
# If this section is null, disable dnsmasq log.
|
||||
# dnsmasq_base_log_dir =
|
||||
|
||||
# Limit number of leases to prevent a denial-of-service.
|
||||
# dnsmasq_lease_max = 16777216
|
||||
|
||||
# Location to DHCP lease relay UNIX domain socket
|
||||
# dhcp_lease_relay_socket = $state_path/dhcp/lease_relay
|
||||
|
||||
# Use broadcast in DHCP replies
|
||||
# dhcp_broadcast_reply = False
|
||||
|
||||
# Timeout for ovs-vsctl commands.
|
||||
# If the timeout expires, ovs commands will fail with ALARMCLOCK error.
|
||||
# ovs_vsctl_timeout = 10
|
||||
|
||||
[AGENT]
|
||||
# Log agent heartbeats from this DHCP agent
|
||||
# log_agent_heartbeats = False
|
117
etc/l3_agent.ini
117
etc/l3_agent.ini
@ -1,117 +0,0 @@
|
||||
[DEFAULT]
|
||||
# Show debugging output in log (sets DEBUG log level output)
|
||||
# debug = False
|
||||
|
||||
# L3 requires that an interface driver be set. Choose the one that best
|
||||
# matches your plugin.
|
||||
# interface_driver =
|
||||
|
||||
# Example of interface_driver option for OVS based plugins (OVS, Ryu, NEC)
|
||||
# that supports L3 agent
|
||||
# interface_driver = openvswitch
|
||||
|
||||
# Use veth for an OVS interface or not.
|
||||
# Support kernels with limited namespace support
|
||||
# (e.g. RHEL 6.5) so long as ovs_use_veth is set to True.
|
||||
# ovs_use_veth = False
|
||||
|
||||
# Example of interface_driver option for LinuxBridge
|
||||
# interface_driver = linuxbridge
|
||||
|
||||
# If non-empty, the l3 agent can only configure a router that has the matching
|
||||
# router ID.
|
||||
# This option is deprecated and will be removed in the N release.
|
||||
# router_id =
|
||||
|
||||
# When external_network_bridge is set, each L3 agent can be associated
|
||||
# with no more than one external network. This value should be set to the UUID
|
||||
# of that external network. To allow L3 agent support multiple external
|
||||
# networks, both the external_network_bridge and gateway_external_network_id
|
||||
# must be left empty.
|
||||
# gateway_external_network_id =
|
||||
|
||||
# With IPv6, the network used for the external gateway does not need
|
||||
# to have an associated subnet, since the automatically assigned
|
||||
# link-local address (LLA) can be used. However, an IPv6 gateway address
|
||||
# is needed for use as the next-hop for the default route. If no IPv6
|
||||
# gateway address is configured here, (and only then) the neutron router
|
||||
# will be configured to get its default route from router advertisements (RAs)
|
||||
# from the upstream router; in which case the upstream router must also be
|
||||
# configured to send these RAs.
|
||||
# The ipv6_gateway, when configured, should be the LLA of the interface
|
||||
# on the upstream router. If a next-hop using a global unique address (GUA)
|
||||
# is desired, it needs to be done via a subnet allocated to the network
|
||||
# and not through this parameter.
|
||||
# ipv6_gateway =
|
||||
|
||||
# (StrOpt) Driver used for ipv6 prefix delegation. This needs to be
|
||||
# an entry point defined in the neutron.agent.linux.pd_drivers namespace. See
|
||||
# setup.cfg for entry points included with the neutron source.
|
||||
# prefix_delegation_driver = dibbler
|
||||
|
||||
# Indicates that this L3 agent should also handle routers that do not have
|
||||
# an external network gateway configured. This option should be True only
|
||||
# for a single agent in a Neutron deployment, and may be False for all agents
|
||||
# if all routers must have an external network gateway
|
||||
# handle_internal_only_routers = True
|
||||
|
||||
# Name of bridge used for external network traffic. This should be set to
|
||||
# empty value for the linux bridge. when this parameter is set, each L3 agent
|
||||
# can be associated with no more than one external network.
|
||||
# This option is deprecated and will be removed in the M release.
|
||||
# external_network_bridge = br-ex
|
||||
|
||||
# TCP Port used by Neutron metadata server
|
||||
# metadata_port = 9697
|
||||
|
||||
# Send this many gratuitous ARPs for HA setup. Set it below or equal to 0
|
||||
# to disable this feature.
|
||||
# send_arp_for_ha = 3
|
||||
|
||||
# seconds between re-sync routers' data if needed
|
||||
# periodic_interval = 40
|
||||
|
||||
# seconds to start to sync routers' data after
|
||||
# starting agent
|
||||
# periodic_fuzzy_delay = 5
|
||||
|
||||
# enable_metadata_proxy, which is true by default, can be set to False
|
||||
# if the Nova metadata server is not available
|
||||
# enable_metadata_proxy = True
|
||||
|
||||
# Iptables mangle mark used to mark metadata valid requests
|
||||
# metadata_access_mark = 0x1
|
||||
|
||||
# Iptables mangle mark used to mark ingress from external network
|
||||
# external_ingress_mark = 0x2
|
||||
|
||||
# Timeout for ovs-vsctl commands.
|
||||
# If the timeout expires, ovs commands will fail with ALARMCLOCK error.
|
||||
# ovs_vsctl_timeout = 10
|
||||
|
||||
# The working mode for the agent. Allowed values are:
|
||||
# - legacy: this preserves the existing behavior where the L3 agent is
|
||||
# deployed on a centralized networking node to provide L3 services
|
||||
# like DNAT, and SNAT. Use this mode if you do not want to adopt DVR.
|
||||
# - dvr: this mode enables DVR functionality, and must be used for an L3
|
||||
# agent that runs on a compute host.
|
||||
# - dvr_snat: this enables centralized SNAT support in conjunction with
|
||||
# DVR. This mode must be used for an L3 agent running on a centralized
|
||||
# node (or in single-host deployments, e.g. devstack).
|
||||
# agent_mode = legacy
|
||||
|
||||
# Location to store keepalived and all HA configurations
|
||||
# ha_confs_path = $state_path/ha_confs
|
||||
|
||||
# VRRP authentication type AH/PASS
|
||||
# ha_vrrp_auth_type = PASS
|
||||
|
||||
# VRRP authentication password
|
||||
# ha_vrrp_auth_password =
|
||||
|
||||
# The advertisement interval in seconds
|
||||
# ha_vrrp_advert_int = 2
|
||||
|
||||
[AGENT]
|
||||
# Log agent heartbeats from this L3 agent
|
||||
# log_agent_heartbeats = False
|
@ -1,58 +0,0 @@
|
||||
[DEFAULT]
|
||||
# Show debugging output in log (sets DEBUG log level output)
|
||||
# debug = True
|
||||
|
||||
# IP address used by Nova metadata server
|
||||
# nova_metadata_ip = 127.0.0.1
|
||||
|
||||
# TCP Port used by Nova metadata server
|
||||
# nova_metadata_port = 8775
|
||||
|
||||
# Which protocol to use for requests to Nova metadata server, http or https
|
||||
# nova_metadata_protocol = http
|
||||
|
||||
# Whether insecure SSL connection should be accepted for Nova metadata server
|
||||
# requests
|
||||
# nova_metadata_insecure = False
|
||||
|
||||
# Client certificate for nova api, needed when nova api requires client
|
||||
# certificates
|
||||
# nova_client_cert =
|
||||
|
||||
# Private key for nova client certificate
|
||||
# nova_client_priv_key =
|
||||
|
||||
# When proxying metadata requests, Neutron signs the Instance-ID header with a
|
||||
# shared secret to prevent spoofing. You may select any string for a secret,
|
||||
# but it must match here and in the configuration used by the Nova Metadata
|
||||
# Server. NOTE: Nova uses the same config key, but in [neutron] section.
|
||||
# metadata_proxy_shared_secret =
|
||||
|
||||
# Location of Metadata Proxy UNIX domain socket
|
||||
# metadata_proxy_socket = $state_path/metadata_proxy
|
||||
|
||||
# Metadata Proxy UNIX domain socket mode, 4 values allowed:
|
||||
# 'deduce': deduce mode from metadata_proxy_user/group values,
|
||||
# 'user': set metadata proxy socket mode to 0o644, to use when
|
||||
# metadata_proxy_user is agent effective user or root,
|
||||
# 'group': set metadata proxy socket mode to 0o664, to use when
|
||||
# metadata_proxy_group is agent effective group,
|
||||
# 'all': set metadata proxy socket mode to 0o666, to use otherwise.
|
||||
# metadata_proxy_socket_mode = deduce
|
||||
|
||||
# Number of separate worker processes for metadata server. Defaults to
|
||||
# half the number of CPU cores
|
||||
# metadata_workers =
|
||||
|
||||
# Number of backlog requests to configure the metadata server socket with
|
||||
# metadata_backlog = 4096
|
||||
|
||||
# URL to connect to the cache backend.
|
||||
# default_ttl=0 parameter will cause cache entries to never expire.
|
||||
# Otherwise default_ttl specifies time in seconds a cache entry is valid for.
|
||||
# No cache is used in case no value is passed.
|
||||
# cache_url = memory://?default_ttl=5
|
||||
|
||||
[AGENT]
|
||||
# Log agent heartbeats from this Metadata agent
|
||||
# log_agent_heartbeats = False
|
@ -1,16 +0,0 @@
|
||||
[DEFAULT]
|
||||
# Show debugging output in log (sets DEBUG log level output)
|
||||
# debug = True
|
||||
|
||||
# Default driver:
|
||||
# driver = neutron.services.metering.drivers.noop.noop_driver.NoopMeteringDriver
|
||||
# Example of non-default driver
|
||||
# driver = neutron.services.metering.drivers.iptables.iptables_driver.IptablesMeteringDriver
|
||||
|
||||
# Interval between two metering measures
|
||||
# measure_interval = 30
|
||||
|
||||
# Interval between two metering reports
|
||||
# report_interval = 300
|
||||
|
||||
# interface_driver = neutron.agent.linux.interface.OVSInterfaceDriver
|
1076
etc/neutron.conf
1076
etc/neutron.conf
File diff suppressed because it is too large
Load Diff
@ -1,59 +0,0 @@
|
||||
[linux_bridge]
|
||||
# (ListOpt) Comma-separated list of
|
||||
# <physical_network>:<physical_interface> tuples mapping physical
|
||||
# network names to the agent's node-specific physical network
|
||||
# interfaces to be used for flat and VLAN networks. All physical
|
||||
# networks listed in network_vlan_ranges on the server should have
|
||||
# mappings to appropriate interfaces on each agent.
|
||||
#
|
||||
# physical_interface_mappings =
|
||||
# Example: physical_interface_mappings = physnet1:eth1
|
||||
|
||||
[vxlan]
|
||||
# (BoolOpt) enable VXLAN on the agent
|
||||
# VXLAN support can be enabled when agent is managed by ml2 plugin using
|
||||
# linuxbridge mechanism driver.
|
||||
# enable_vxlan = True
|
||||
#
|
||||
# (IntOpt) use specific TTL for vxlan interface protocol packets
|
||||
# ttl =
|
||||
#
|
||||
# (IntOpt) use specific TOS for vxlan interface protocol packets
|
||||
# tos =
|
||||
#
|
||||
# (StrOpt) multicast group or group range to use for broadcast emulation.
|
||||
# Specifying a range allows different VNIs to use different group addresses,
|
||||
# reducing or eliminating spurious broadcast traffic to the tunnel endpoints.
|
||||
# Ranges are specified by using CIDR notation. To reserve a unique group for
|
||||
# each possible (24-bit) VNI, use a /8 such as 239.0.0.0/8.
|
||||
# This setting must be the same on all the agents.
|
||||
# vxlan_group = 224.0.0.1
|
||||
#
|
||||
# (StrOpt) Local IP address to use for VXLAN endpoints (required)
|
||||
# local_ip =
|
||||
#
|
||||
# (BoolOpt) Flag to enable l2population extension. This option should be used
|
||||
# in conjunction with ml2 plugin l2population mechanism driver (in that case,
|
||||
# both linuxbridge and l2population mechanism drivers should be loaded).
|
||||
# It enables plugin to populate VXLAN forwarding table, in order to limit
|
||||
# the use of broadcast emulation (multicast will be turned off if kernel and
|
||||
# iproute2 supports unicast flooding - requires 3.11 kernel and iproute2 3.10)
|
||||
# l2_population = False
|
||||
|
||||
[agent]
|
||||
# Agent's polling interval in seconds
|
||||
# polling_interval = 2
|
||||
|
||||
# (IntOpt) Set new timeout in seconds for new rpc calls after agent receives
|
||||
# SIGTERM. If value is set to 0, rpc timeout won't be changed.
|
||||
#
|
||||
# quitting_rpc_timeout = 10
|
||||
|
||||
[securitygroup]
|
||||
# Firewall driver for realizing neutron security group function
|
||||
# firewall_driver = neutron.agent.firewall.NoopFirewallDriver
|
||||
# Example: firewall_driver = neutron.agent.linux.iptables_firewall.IptablesFirewallDriver
|
||||
|
||||
# Controls if neutron security group is enabled or not.
|
||||
# It should be false when you use nova security group.
|
||||
# enable_security_group = True
|
@ -1,121 +0,0 @@
|
||||
[ml2]
|
||||
# (ListOpt) List of network type driver entrypoints to be loaded from
|
||||
# the neutron.ml2.type_drivers namespace.
|
||||
#
|
||||
# type_drivers = local,flat,vlan,gre,vxlan,geneve
|
||||
# Example: type_drivers = flat,vlan,gre,vxlan,geneve
|
||||
|
||||
# (ListOpt) Ordered list of network_types to allocate as tenant
|
||||
# networks. The default value 'local' is useful for single-box testing
|
||||
# but provides no connectivity between hosts.
|
||||
#
|
||||
# tenant_network_types = local
|
||||
# Example: tenant_network_types = vlan,gre,vxlan,geneve
|
||||
|
||||
|
||||
# (ListOpt) Ordered list of networking mechanism driver entrypoints
|
||||
# to be loaded from the neutron.ml2.mechanism_drivers namespace.
|
||||
# mechanism_drivers =
|
||||
# Example: mechanism_drivers = openvswitch,mlnx
|
||||
# Example: mechanism_drivers = arista
|
||||
# Example: mechanism_drivers = openvswitch,cisco_nexus,logger
|
||||
# Example: mechanism_drivers = openvswitch,brocade
|
||||
# Example: mechanism_drivers = linuxbridge,brocade
|
||||
|
||||
# (ListOpt) Ordered list of extension driver entrypoints
|
||||
# to be loaded from the neutron.ml2.extension_drivers namespace.
|
||||
# extension_drivers =
|
||||
# Example: extension_drivers = port_security,qos
|
||||
|
||||
# =========== items for MTU selection and advertisement =============
|
||||
# (IntOpt) Path MTU. The maximum permissible size of an unfragmented
|
||||
# packet travelling from and to addresses where encapsulated Neutron
|
||||
# traffic is sent. Drivers calculate maximum viable MTU for
|
||||
# validating tenant requests based on this value (typically,
|
||||
# path_mtu - max encap header size). If <=0, the path MTU is
|
||||
# indeterminate and no calculation takes place.
|
||||
# path_mtu = 0
|
||||
|
||||
# (IntOpt) Segment MTU. The maximum permissible size of an
|
||||
# unfragmented packet travelling a L2 network segment. If <=0,
|
||||
# the segment MTU is indeterminate and no calculation takes place.
|
||||
# segment_mtu = 0
|
||||
|
||||
# (ListOpt) Physical network MTUs. List of mappings of physical
|
||||
# network to MTU value. The format of the mapping is
|
||||
# <physnet>:<mtu val>. This mapping allows specifying a
|
||||
# physical network MTU value that differs from the default
|
||||
# segment_mtu value.
|
||||
# physical_network_mtus =
|
||||
# Example: physical_network_mtus = physnet1:1550, physnet2:1500
|
||||
# ======== end of items for MTU selection and advertisement =========
|
||||
|
||||
# (StrOpt) Default network type for external networks when no provider
|
||||
# attributes are specified. By default it is None, which means that if
|
||||
# provider attributes are not specified while creating external networks
|
||||
# then they will have the same type as tenant networks.
|
||||
# Allowed values for external_network_type config option depend on the
|
||||
# network type values configured in type_drivers config option.
|
||||
# external_network_type =
|
||||
# Example: external_network_type = local
|
||||
|
||||
[ml2_type_flat]
|
||||
# (ListOpt) List of physical_network names with which flat networks
|
||||
# can be created. Use default '*' to allow flat networks with arbitrary
|
||||
# physical_network names. Use an empty list to disable flat networks.
|
||||
#
|
||||
# flat_networks = *
|
||||
# Example:flat_networks = physnet1,physnet2
|
||||
# Example:flat_networks =
|
||||
|
||||
[ml2_type_vlan]
|
||||
# (ListOpt) List of <physical_network>[:<vlan_min>:<vlan_max>] tuples
|
||||
# specifying physical_network names usable for VLAN provider and
|
||||
# tenant networks, as well as ranges of VLAN tags on each
|
||||
# physical_network available for allocation as tenant networks.
|
||||
#
|
||||
# network_vlan_ranges =
|
||||
# Example: network_vlan_ranges = physnet1:1000:2999,physnet2
|
||||
|
||||
[ml2_type_gre]
|
||||
# (ListOpt) Comma-separated list of <tun_min>:<tun_max> tuples enumerating
|
||||
# ranges of GRE tunnel IDs that are available for tenant network allocation.
|
||||
# tunnel_id_ranges =
|
||||
|
||||
[ml2_type_vxlan]
|
||||
# (ListOpt) Comma-separated list of <vni_min>:<vni_max> tuples enumerating
|
||||
# ranges of VXLAN VNI IDs that are available for tenant network allocation.
|
||||
#
|
||||
# vni_ranges =
|
||||
|
||||
# (StrOpt) Multicast group for the VXLAN interface. When configured, will
|
||||
# enable sending all broadcast traffic to this multicast group. When left
|
||||
# unconfigured, will disable multicast VXLAN mode.
|
||||
#
|
||||
# vxlan_group =
|
||||
# Example: vxlan_group = 239.1.1.1
|
||||
|
||||
[ml2_type_geneve]
|
||||
# (ListOpt) Comma-separated list of <vni_min>:<vni_max> tuples enumerating
|
||||
# ranges of Geneve VNI IDs that are available for tenant network allocation.
|
||||
#
|
||||
# vni_ranges =
|
||||
|
||||
# (IntOpt) Geneve encapsulation header size is dynamic, this
|
||||
# value is used to calculate the maximum MTU for the driver.
|
||||
# this is the sum of the sizes of the outer ETH+IP+UDP+GENEVE
|
||||
# header sizes.
|
||||
# The default size for this field is 50, which is the size of the
|
||||
# Geneve header without any additional option headers
|
||||
#
|
||||
# max_header_size =
|
||||
# Example: max_header_size = 50 (Geneve headers with no additional options)
|
||||
|
||||
[securitygroup]
|
||||
# Controls if neutron security group is enabled or not.
|
||||
# It should be false when you use nova security group.
|
||||
# enable_security_group = True
|
||||
|
||||
# Use ipset to speed-up the iptables security groups. Enabling ipset support
|
||||
# requires that ipset is installed on L2 agent node.
|
||||
# enable_ipset = True
|
@ -1,8 +0,0 @@
|
||||
# Defines configuration options for SRIOV NIC Switch MechanismDriver
|
||||
|
||||
[ml2_sriov]
|
||||
# (ListOpt) Comma-separated list of
|
||||
# supported Vendor PCI Devices, in format vendor_id:product_id
|
||||
#
|
||||
# supported_pci_vendor_devs = 15b3:1004, 8086:10ca
|
||||
# Example: supported_pci_vendor_devs = 15b3:1004
|
@ -1,213 +0,0 @@
|
||||
[ovs]
|
||||
# Do not change this parameter unless you have a good reason to.
|
||||
# This is the name of the OVS integration bridge. There is one per hypervisor.
|
||||
# The integration bridge acts as a virtual "patch bay". All VM VIFs are
|
||||
# attached to this bridge and then "patched" according to their network
|
||||
# connectivity.
|
||||
#
|
||||
# integration_bridge = br-int
|
||||
|
||||
# Only used for the agent if tunnel_id_ranges is not empty for
|
||||
# the server. In most cases, the default value should be fine.
|
||||
#
|
||||
# tunnel_bridge = br-tun
|
||||
|
||||
# Peer patch port in integration bridge for tunnel bridge
|
||||
# int_peer_patch_port = patch-tun
|
||||
|
||||
# Peer patch port in tunnel bridge for integration bridge
|
||||
# tun_peer_patch_port = patch-int
|
||||
|
||||
# Uncomment this line for the agent if tunnel_id_ranges is not
|
||||
# empty for the server. Set local-ip to be the local IP address of
|
||||
# this hypervisor.
|
||||
#
|
||||
# local_ip =
|
||||
|
||||
# (ListOpt) Comma-separated list of <physical_network>:<bridge> tuples
|
||||
# mapping physical network names to the agent's node-specific OVS
|
||||
# bridge names to be used for flat and VLAN networks. The length of
|
||||
# bridge names should be no more than 11. Each bridge must
|
||||
# exist, and should have a physical network interface configured as a
|
||||
# port. All physical networks configured on the server should have
|
||||
# mappings to appropriate bridges on each agent.
|
||||
#
|
||||
# Note: If you remove a bridge from this mapping, make sure to disconnect it
|
||||
# from the integration bridge as it won't be managed by the agent anymore.
|
||||
#
|
||||
# bridge_mappings =
|
||||
# Example: bridge_mappings = physnet1:br-eth1
|
||||
|
||||
# (BoolOpt) Use veths instead of patch ports to interconnect the integration
|
||||
# bridge to physical networks. Support kernel without ovs patch port support
|
||||
# so long as it is set to True.
|
||||
# use_veth_interconnection = False
|
||||
|
||||
# (StrOpt) Which OVSDB backend to use, defaults to 'vsctl'
|
||||
# vsctl - The backend based on executing ovs-vsctl
|
||||
# native - The backend based on using native OVSDB
|
||||
# ovsdb_interface = vsctl
|
||||
|
||||
# (StrOpt) The connection string for the native OVSDB backend
|
||||
# To enable ovsdb-server to listen on port 6640:
|
||||
# ovs-vsctl set-manager ptcp:6640:127.0.0.1
|
||||
# ovsdb_connection = tcp:127.0.0.1:6640
|
||||
|
||||
# (StrOpt) OpenFlow interface to use.
|
||||
# 'ovs-ofctl' or 'native'.
|
||||
# of_interface = ovs-ofctl
|
||||
#
|
||||
# (IPOpt)
|
||||
# Address to listen on for OpenFlow connections.
|
||||
# Used only for 'native' driver.
|
||||
# of_listen_address = 127.0.0.1
|
||||
#
|
||||
# (PortOpt)
|
||||
# Port to listen on for OpenFlow connections.
|
||||
# Used only for 'native' driver.
|
||||
# of_listen_port = 6633
|
||||
#
|
||||
# (IntOpt)
|
||||
# Timeout in seconds to wait for the local switch connecting the controller.
|
||||
# Used only for 'native' driver.
|
||||
# of_connect_timeout=30
|
||||
#
|
||||
# (IntOpt)
|
||||
# Timeout in seconds to wait for a single OpenFlow request.
|
||||
# Used only for 'native' driver.
|
||||
# of_request_timeout=10
|
||||
|
||||
# (StrOpt) ovs datapath to use.
|
||||
# 'system' is the default value and corresponds to the kernel datapath.
|
||||
# To enable the userspace datapath set this value to 'netdev'
|
||||
# datapath_type = system
|
||||
|
||||
# (StrOpt) OVS vhost-user socket directory.
|
||||
# '/var/run/openvswitch' is the default value
|
||||
# vhostuser_socket_dir = /var/run/openvswitch
|
||||
|
||||
[agent]
|
||||
# Log agent heartbeats from this OVS agent
|
||||
# log_agent_heartbeats = False
|
||||
|
||||
# Agent's polling interval in seconds
|
||||
# polling_interval = 2
|
||||
|
||||
# Minimize polling by monitoring ovsdb for interface changes
|
||||
# minimize_polling = True
|
||||
|
||||
# When minimize_polling = True, the number of seconds to wait before
|
||||
# respawning the ovsdb monitor after losing communication with it
|
||||
# ovsdb_monitor_respawn_interval = 30
|
||||
|
||||
# (ListOpt) The types of tenant network tunnels supported by the agent.
|
||||
# Setting this will enable tunneling support in the agent. This can be set to
|
||||
# either 'gre' or 'vxlan'. If this is unset, it will default to [] and
|
||||
# disable tunneling support in the agent.
|
||||
# You can specify as many values here as your compute hosts supports.
|
||||
#
|
||||
# tunnel_types =
|
||||
# Example: tunnel_types = gre
|
||||
# Example: tunnel_types = vxlan
|
||||
# Example: tunnel_types = vxlan, gre
|
||||
|
||||
# (PortOpt) The port number to utilize if tunnel_types includes 'vxlan'. By
|
||||
# default, this will make use of the Open vSwitch default value of '4789' if
|
||||
# not specified.
|
||||
#
|
||||
# vxlan_udp_port =
|
||||
# Example: vxlan_udp_port = 8472
|
||||
|
||||
# (IntOpt) This is the MTU size of veth interfaces.
|
||||
# Do not change unless you have a good reason to.
|
||||
# The default MTU size of veth interfaces is 1500.
|
||||
# This option has no effect if use_veth_interconnection is False
|
||||
# veth_mtu =
|
||||
# Example: veth_mtu = 1504
|
||||
|
||||
# (BoolOpt) Flag to enable l2-population extension. This option should only be
|
||||
# used in conjunction with ml2 plugin and l2population mechanism driver. It'll
|
||||
# enable plugin to populate remote ports macs and IPs (using fdb_add/remove
|
||||
# RPC calbbacks instead of tunnel_sync/update) on OVS agents in order to
|
||||
# optimize tunnel management.
|
||||
#
|
||||
# l2_population = False
|
||||
|
||||
# Enable local ARP responder. Requires OVS 2.1. This is only used by the l2
|
||||
# population ML2 MechanismDriver.
|
||||
#
|
||||
# arp_responder = False
|
||||
|
||||
# Enable suppression of ARP responses that don't match an IP address that
|
||||
# belongs to the port from which they originate.
|
||||
# Note: This prevents the VMs attached to this agent from spoofing,
|
||||
# it doesn't protect them from other devices which have the capability to spoof
|
||||
# (e.g. bare metal or VMs attached to agents without this flag set to True).
|
||||
# Requires a version of OVS that can match ARP headers.
|
||||
#
|
||||
# prevent_arp_spoofing = True
|
||||
|
||||
# (BoolOpt) Set or un-set the don't fragment (DF) bit on outgoing IP packet
|
||||
# carrying GRE/VXLAN tunnel. The default value is True.
|
||||
#
|
||||
# dont_fragment = True
|
||||
|
||||
# (BoolOpt) Set to True on L2 agents to enable support
|
||||
# for distributed virtual routing.
|
||||
#
|
||||
# enable_distributed_routing = False
|
||||
|
||||
# (IntOpt) Set new timeout in seconds for new rpc calls after agent receives
|
||||
# SIGTERM. If value is set to 0, rpc timeout won't be changed"
|
||||
#
|
||||
# quitting_rpc_timeout = 10
|
||||
|
||||
# (ListOpt) Extensions list to use
|
||||
# Example: extensions = qos
|
||||
#
|
||||
# extensions =
|
||||
|
||||
# (BoolOpt) Set or un-set the checksum on outgoing IP packet
|
||||
# carrying GRE/VXLAN tunnel. The default value is False.
|
||||
#
|
||||
# tunnel_csum = False
|
||||
|
||||
# (StrOpt) agent_type to report.
|
||||
# This config entry allows configuration of the neutron agent type reported
|
||||
# by the default ovs l2 agent. This allows multiple ovs mechanism drivers
|
||||
# to share a common ovs agent implementation. NOTE: this value will be
|
||||
# removed in the mitaka cycle.
|
||||
#
|
||||
# agent_type = 'Open vSwitch agent'
|
||||
|
||||
[securitygroup]
|
||||
# Firewall driver for realizing neutron security group function.
|
||||
# firewall_driver = neutron.agent.firewall.NoopFirewallDriver
|
||||
# Example: firewall_driver = neutron.agent.linux.iptables_firewall.OVSHybridIptablesFirewallDriver
|
||||
|
||||
# Controls if neutron security group is enabled or not.
|
||||
# It should be false when you use nova security group.
|
||||
# enable_security_group = True
|
||||
|
||||
#-----------------------------------------------------------------------------
|
||||
# Sample Configurations.
|
||||
#-----------------------------------------------------------------------------
|
||||
#
|
||||
# 1. With VLANs on eth1.
|
||||
# [ovs]
|
||||
# integration_bridge = br-int
|
||||
# bridge_mappings = default:br-eth1
|
||||
#
|
||||
# 2. With GRE tunneling.
|
||||
# [ovs]
|
||||
# integration_bridge = br-int
|
||||
# tunnel_bridge = br-tun
|
||||
# local_ip = 10.0.0.3
|
||||
#
|
||||
# 3. With VXLAN tunneling.
|
||||
# [ovs]
|
||||
# integration_bridge = br-int
|
||||
# tunnel_bridge = br-tun
|
||||
# local_ip = 10.0.0.3
|
||||
# [agent]
|
||||
# tunnel_types = vxlan
|
@ -1,26 +0,0 @@
|
||||
# Defines configuration options for SRIOV NIC Switch Agent
|
||||
|
||||
[sriov_nic]
|
||||
# (ListOpt) Comma-separated list of <physical_network>:<network_device>
|
||||
# tuples mapping physical network names to the agent's node-specific
|
||||
# physical network device interfaces of SR-IOV physical function to be used
|
||||
# for VLAN networks. All physical networks listed in network_vlan_ranges on
|
||||
# the server should have mappings to appropriate interfaces on each agent.
|
||||
#
|
||||
# physical_device_mappings =
|
||||
# Example: physical_device_mappings = physnet1:eth1
|
||||
#
|
||||
# (ListOpt) Comma-separated list of <network_device>:<vfs__to_exclude>
|
||||
# tuples, mapping network_device to the agent's node-specific list of virtual
|
||||
# functions that should not be used for virtual networking.
|
||||
# vfs_to_exclude is a semicolon-separated list of virtual
|
||||
# functions to exclude from network_device. The network_device in the
|
||||
# mapping should appear in the physical_device_mappings list.
|
||||
# exclude_devices =
|
||||
# Example: exclude_devices = eth1:0000:07:00.2; 0000:07:00.3
|
||||
|
||||
[agent]
|
||||
# (ListOpt) Extensions list to use
|
||||
# Example: extensions = qos
|
||||
#
|
||||
# extensions =
|
Loading…
Reference in New Issue
Block a user