Use sanitized values in new/updated tables
The tables have been regenerated with https://review.openstack.org/130993. Change-Id: Iacc095dd982a93740d1d475369e2cfc0bb1981ed
This commit is contained in:
parent
a739d69ddb
commit
31de3612d3
@ -49,7 +49,7 @@
|
||||
<td>(BoolOpt) Whether to log monkey patching</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>[DEFAULT] monkey_patch_modules = ['nova.api.ec2.cloud:nova.notifications.notify_decorator', 'nova.compute.api:nova.notifications.notify_decorator']</td>
|
||||
<td>[DEFAULT] monkey_patch_modules = nova.api.ec2.cloud:nova.notifications.notify_decorator, nova.compute.api:nova.notifications.notify_decorator</td>
|
||||
<td>(ListOpt) List of modules/decorators to monkey patch</td>
|
||||
</tr>
|
||||
<tr>
|
||||
@ -197,7 +197,7 @@
|
||||
<td>(BoolOpt) If true, the revocation list will be checked for cached tokens. This requires that PKI tokens are configured on the Keystone server.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>[keystone_authtoken] hash_algorithms = ['md5']</td>
|
||||
<td>[keystone_authtoken] hash_algorithms = md5</td>
|
||||
<td>(ListOpt) Hash algorithms to use for hashing PKI tokens. This may be a single algorithm or multiple. The algorithms are those supported by Python standard hashlib.new(). The hashes will be tried in the order given, so put the preferred one first for performance. The result of the first hash will be stored in the cache. This will typically be set to multiple values only while migrating from a less secure algorithm to a more secure one. Once all the old tokens are expired this option should be set to a single value for better performance.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
@ -285,7 +285,7 @@
|
||||
</tr>
|
||||
<tr>
|
||||
<td>[database] connection</td>
|
||||
<td>sqlite:////home/gpocentek/Workspace/OpenStack/openstack-doc-tools/autogenerate_config_docs/sources/ceilometer/ceilometer/openstack/common/db/$sqlite_db</td>
|
||||
<td>sqlite:////usr/lib/python/site-packages/ceilometer/ceilometer/openstack/common/db/$sqlite_db</td>
|
||||
<td>None</td>
|
||||
</tr>
|
||||
<tr>
|
||||
|
@ -85,7 +85,7 @@
|
||||
<td>(StrOpt) Location of ca certificates file to use for glance client requests.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>[DEFAULT] glance_core_properties = ['checksum', 'container_format', 'disk_format', 'image_name', 'image_id', 'min_disk', 'min_ram', 'name', 'size']</td>
|
||||
<td>[DEFAULT] glance_core_properties = checksum, container_format, disk_format, image_name, image_id, min_disk, min_ram, name, size</td>
|
||||
<td>(ListOpt) Default core properties of image</td>
|
||||
</tr>
|
||||
<tr>
|
||||
@ -509,7 +509,7 @@
|
||||
<td>(BoolOpt) If true, the revocation list will be checked for cached tokens. This requires that PKI tokens are configured on the Keystone server.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>[keystone_authtoken] hash_algorithms = ['md5']</td>
|
||||
<td>[keystone_authtoken] hash_algorithms = md5</td>
|
||||
<td>(ListOpt) Hash algorithms to use for hashing PKI tokens. This may be a single algorithm or multiple. The algorithms are those supported by Python standard hashlib.new(). The hashes will be tried in the order given, so put the preferred one first for performance. The result of the first hash will be stored in the cache. This will typically be set to multiple values only while migrating from a less secure algorithm to a more secure one. Once all the old tokens are expired this option should be set to a single value for better performance.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
|
@ -53,7 +53,7 @@
|
||||
<td>(StrOpt) The path to a file which contains the metadata to be returned with any location associated with this store. The file must contain a valid JSON dict.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>[glance_store] stores = ['file', 'http']</td>
|
||||
<td>[glance_store] stores = file, http</td>
|
||||
<td>(ListOpt) List of stores enabled</td>
|
||||
</tr>
|
||||
<tr>
|
||||
@ -77,7 +77,7 @@
|
||||
<td>(BoolOpt) If true, the revocation list will be checked for cached tokens. This requires that PKI tokens are configured on the Keystone server.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>[keystone_authtoken] hash_algorithms = ['md5']</td>
|
||||
<td>[keystone_authtoken] hash_algorithms = md5</td>
|
||||
<td>(ListOpt) Hash algorithms to use for hashing PKI tokens. This may be a single algorithm or multiple. The algorithms are those supported by Python standard hashlib.new(). The hashes will be tried in the order given, so put the preferred one first for performance. The result of the first hash will be stored in the cache. This will typically be set to multiple values only while migrating from a less secure algorithm to a more secure one. Once all the old tokens are expired this option should be set to a single value for better performance.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
@ -118,11 +118,6 @@
|
||||
<td>amqp=WARN, amqplib=WARN, boto=WARN, qpid=WARN, sqlalchemy=WARN, suds=INFO, iso8601=WARN, requests.packages.urllib3.connectionpool=WARN</td>
|
||||
<td>amqp=WARN, amqplib=WARN, boto=WARN, qpid=WARN, sqlalchemy=WARN, suds=INFO, oslo.messaging=INFO, iso8601=WARN, requests.packages.urllib3.connectionpool=WARN</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>[DEFAULT] user_storage_quota</td>
|
||||
<td>0</td>
|
||||
<td>0</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>[DEFAULT] workers</td>
|
||||
<td>1</td>
|
||||
|
@ -133,7 +133,7 @@
|
||||
<td>(BoolOpt) If true, the revocation list will be checked for cached tokens. This requires that PKI tokens are configured on the Keystone server.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>[keystone_authtoken] hash_algorithms = ['md5']</td>
|
||||
<td>[keystone_authtoken] hash_algorithms = md5</td>
|
||||
<td>(ListOpt) Hash algorithms to use for hashing PKI tokens. This may be a single algorithm or multiple. The algorithms are those supported by Python standard hashlib.new(). The hashes will be tried in the order given, so put the preferred one first for performance. The result of the first hash will be stored in the cache. This will typically be set to multiple values only while migrating from a less secure algorithm to a more secure one. Once all the old tokens are expired this option should be set to a single value for better performance.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
@ -165,7 +165,7 @@
|
||||
</tr>
|
||||
<tr>
|
||||
<td>[DEFAULT] list_notifier_drivers</td>
|
||||
<td>heat.openstack.common.notifier.no_op_notifier</td>
|
||||
<td>['heat.openstack.common.notifier.no_op_notifier']</td>
|
||||
<td>None</td>
|
||||
</tr>
|
||||
<tr>
|
||||
@ -175,7 +175,7 @@
|
||||
</tr>
|
||||
<tr>
|
||||
<td>[database] connection</td>
|
||||
<td>sqlite:////home/gpocentek/Workspace/OpenStack/openstack-doc-tools/autogenerate_config_docs/sources/heat/heat/openstack/common/db/$sqlite_db</td>
|
||||
<td>sqlite:////usr/lib/python/site-packages/heat/heat/openstack/common/db/$sqlite_db</td>
|
||||
<td>None</td>
|
||||
</tr>
|
||||
<tr>
|
||||
|
@ -41,7 +41,7 @@
|
||||
<td>(IntOpt) Number of seconds a connection to memcached is held unused in the pool before it is closed. (keystone.cache.memcache_pool backend only)</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>[cache] memcache_servers = ['localhost:11211']</td>
|
||||
<td>[cache] memcache_servers = localhost:11211</td>
|
||||
<td>(ListOpt) Memcache servers in the format of "host:port". (dogpile.cache.memcache and keystone.cache.memcache_pool backends only)</td>
|
||||
</tr>
|
||||
<tr>
|
||||
@ -81,7 +81,7 @@
|
||||
<td>(BoolOpt) If true, the revocation list will be checked for cached tokens. This requires that PKI tokens are configured on the Keystone server.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>[keystone_authtoken] hash_algorithms = ['md5']</td>
|
||||
<td>[keystone_authtoken] hash_algorithms = md5</td>
|
||||
<td>(ListOpt) Hash algorithms to use for hashing PKI tokens. This may be a single algorithm or multiple. The algorithms are those supported by Python standard hashlib.new(). The hashes will be tried in the order given, so put the preferred one first for performance. The result of the first hash will be stored in the cache. This will typically be set to multiple values only while migrating from a less secure algorithm to a more secure one. Once all the old tokens are expired this option should be set to a single value for better performance.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
@ -141,7 +141,7 @@
|
||||
<td>(IntOpt) Connection pool size.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>[ldap] project_additional_attribute_mapping = []</td>
|
||||
<td>[ldap] project_additional_attribute_mapping = </td>
|
||||
<td>(ListOpt) Additional attribute mappings for projects. Attribute mapping format is <ldap_attr>:<user_attr>, where ldap_attr is the attribute in the LDAP entry and user_attr is the Identity API attribute.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
@ -157,7 +157,7 @@
|
||||
<td>(BoolOpt) Allow project update in LDAP backend.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>[ldap] project_attribute_ignore = []</td>
|
||||
<td>[ldap] project_attribute_ignore = </td>
|
||||
<td>(ListOpt) List of attributes stripped off the project on update.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
|
@ -197,7 +197,7 @@
|
||||
<td>(BoolOpt) Make the l2 agent run in DVR mode.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>[AGENT] physical_interface_mappings = []</td>
|
||||
<td>[AGENT] physical_interface_mappings = </td>
|
||||
<td>(ListOpt) List of <physical_network>:<physical_interface></td>
|
||||
</tr>
|
||||
<tr>
|
||||
@ -217,7 +217,7 @@
|
||||
<td>(IntOpt) Port to connect to opencontrail controller</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>[HYPERV] network_vlan_ranges = []</td>
|
||||
<td>[HYPERV] network_vlan_ranges = </td>
|
||||
<td>(ListOpt) List of <physical_network>:<vlan_min>:<vlan_max> or <physical_network></td>
|
||||
</tr>
|
||||
<tr>
|
||||
@ -225,19 +225,19 @@
|
||||
<td>(StrOpt) Network type for tenant networks (local, flat, vlan or none)</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>[NOVA] node_override_vif_distributed = []</td>
|
||||
<td>[NOVA] node_override_vif_distributed = </td>
|
||||
<td>(ListOpt) Nova compute nodes to manually set VIF type to distributed</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>[NOVA] node_override_vif_dvs = []</td>
|
||||
<td>[NOVA] node_override_vif_dvs = </td>
|
||||
<td>(ListOpt) Nova compute nodes to manually set VIF type to dvs</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>[NOVA] node_override_vif_hw_veb = []</td>
|
||||
<td>[NOVA] node_override_vif_hw_veb = </td>
|
||||
<td>(ListOpt) Nova compute nodes to manually set VIF type to hw_veb</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>[NOVA] node_override_vif_vrouter = []</td>
|
||||
<td>[NOVA] node_override_vif_vrouter = </td>
|
||||
<td>(ListOpt) Nova compute nodes to manually set VIF type to vrouter</td>
|
||||
</tr>
|
||||
<tr>
|
||||
@ -249,7 +249,7 @@
|
||||
<td>(StrOpt) Domain to use for building the hostnames</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>[NSX_DHCP] extra_domain_name_servers = []</td>
|
||||
<td>[NSX_DHCP] extra_domain_name_servers = </td>
|
||||
<td>(ListOpt) Comma separated list of additional domain name servers</td>
|
||||
</tr>
|
||||
<tr>
|
||||
@ -333,11 +333,11 @@
|
||||
<td>(BoolOpt) Use ipset to speed-up the iptables based security groups.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>[SRIOV_NIC] exclude_devices = []</td>
|
||||
<td>[SRIOV_NIC] exclude_devices = </td>
|
||||
<td>(ListOpt) List of <network_device>:<excluded_devices> mapping network_device to the agent's node-specific list of virtual functions that should not be used for virtual networking. excluded_devices is a semicolon separated list of virtual functions (BDF format).to exclude from network_device. The network_device in the mapping should appear in the physical_device_mappings list.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>[SRIOV_NIC] physical_device_mappings = []</td>
|
||||
<td>[SRIOV_NIC] physical_device_mappings = </td>
|
||||
<td>(ListOpt) List of <physical_network>:<network_device> mapping physical network names to the agent's node-specific physical network device of SR-IOV physical function to be used for VLAN networks. All physical networks listed in network_vlan_ranges on the server should have mappings to appropriate interfaces on each agent</td>
|
||||
</tr>
|
||||
<tr>
|
||||
@ -469,7 +469,7 @@
|
||||
<td>(BoolOpt) If true, the revocation list will be checked for cached tokens. This requires that PKI tokens are configured on the Keystone server.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>[keystone_authtoken] hash_algorithms = ['md5']</td>
|
||||
<td>[keystone_authtoken] hash_algorithms = md5</td>
|
||||
<td>(ListOpt) Hash algorithms to use for hashing PKI tokens. This may be a single algorithm or multiple. The algorithms are those supported by Python standard hashlib.new(). The hashes will be tried in the order given, so put the preferred one first for performance. The result of the first hash will be stored in the cache. This will typically be set to multiple values only while migrating from a less secure algorithm to a more secure one. Once all the old tokens are expired this option should be set to a single value for better performance.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
@ -505,7 +505,7 @@
|
||||
<td>(BoolOpt) A "True" value for this flag indicates to create a router in VRF. If not set, all routers are created in default VRF.This is optional. If not set, a value of "False" is assumed.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>[ml2] extension_drivers = []</td>
|
||||
<td>[ml2] extension_drivers = </td>
|
||||
<td>(ListOpt) An ordered list of extension driver entrypoints to be loaded from the neutron.ml2.extension_drivers namespace.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
@ -537,11 +537,11 @@
|
||||
<td>(StrOpt) Name of the function profile to be created</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>[ml2_cisco_apic] apic_host_uplink_ports = []</td>
|
||||
<td>[ml2_cisco_apic] apic_host_uplink_ports = </td>
|
||||
<td>(ListOpt) The uplink ports to check for ACI connectivity</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>[ml2_cisco_apic] apic_hosts = []</td>
|
||||
<td>[ml2_cisco_apic] apic_hosts = </td>
|
||||
<td>(ListOpt) An ordered list of host names or IP addresses of the APIC controller(s).</td>
|
||||
</tr>
|
||||
<tr>
|
||||
@ -581,7 +581,7 @@
|
||||
<td>(StrOpt) Range of VLAN's to be used for Openstack</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>[ml2_cisco_apic] apic_vpc_pairs = []</td>
|
||||
<td>[ml2_cisco_apic] apic_vpc_pairs = </td>
|
||||
<td>(ListOpt) The switch pairs for VPC connectivity</td>
|
||||
</tr>
|
||||
<tr>
|
||||
@ -633,7 +633,7 @@
|
||||
<td>(BoolOpt) SRIOV neutron agent is required for port binding</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>[ml2_sriov] supported_pci_vendor_devs = ['15b3:1004', '8086:10c9']</td>
|
||||
<td>[ml2_sriov] supported_pci_vendor_devs = 15b3:1004, 8086:10c9</td>
|
||||
<td>(ListOpt) Supported PCI vendor devices, defined by vendor_id:product_id according to the PCI ID Repository. Default enables support for Intel and Mellanox SR-IOV capable NICs</td>
|
||||
</tr>
|
||||
<tr>
|
||||
@ -693,7 +693,7 @@
|
||||
<td>(StrOpt) PLUMgrid Director admin username</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>[radware] actions_to_skip = ['setup_l2_l3']</td>
|
||||
<td>[radware] actions_to_skip = setup_l2_l3</td>
|
||||
<td>(ListOpt) List of actions that are not pushed to the completion queue.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
@ -745,7 +745,7 @@
|
||||
<td>(IntOpt) A required VLAN for the interswitch link to use.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>[radware] service_resource_pool_ids = []</td>
|
||||
<td>[radware] service_resource_pool_ids = </td>
|
||||
<td>(ListOpt) Resource pool IDs.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
|
@ -13,7 +13,7 @@
|
||||
</tr>
|
||||
</thead>
|
||||
<tr>
|
||||
<td>[DEFAULT] baremetal_scheduler_default_filters = ['RetryFilter', 'AvailabilityZoneFilter', 'ComputeFilter', 'ComputeCapabilitiesFilter', 'ImagePropertiesFilter', 'ExactRamFilter', 'ExactDiskFilter', 'ExactCoreFilter']</td>
|
||||
<td>[DEFAULT] baremetal_scheduler_default_filters = RetryFilter, AvailabilityZoneFilter, ComputeFilter, ComputeCapabilitiesFilter, ImagePropertiesFilter, ExactRamFilter, ExactDiskFilter, ExactCoreFilter</td>
|
||||
<td>(ListOpt) Which filter class names to use for filtering baremetal hosts when not specified in the request.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
@ -25,7 +25,7 @@
|
||||
<td>(IntOpt) Waiting time interval (seconds) between block device allocation retries on failures</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>[DEFAULT] compute_resources = ['vcpu']</td>
|
||||
<td>[DEFAULT] compute_resources = vcpu</td>
|
||||
<td>(ListOpt) The names of the extra resources to track.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
@ -97,7 +97,7 @@
|
||||
<td>(IntOpt) The bit length of the encryption key to be used to encrypt ephemeral storage (in XTS mode only half of the bits are used for encryption key)</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>[glance] allowed_direct_url_schemes = []</td>
|
||||
<td>[glance] allowed_direct_url_schemes = </td>
|
||||
<td>(ListOpt) A list of url scheme that can be downloaded directly via the direct_url. Currently supported schemes: [file].</td>
|
||||
</tr>
|
||||
<tr>
|
||||
@ -173,7 +173,7 @@
|
||||
<td>(BoolOpt) If true, the revocation list will be checked for cached tokens. This requires that PKI tokens are configured on the Keystone server.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>[keystone_authtoken] hash_algorithms = ['md5']</td>
|
||||
<td>[keystone_authtoken] hash_algorithms = md5</td>
|
||||
<td>(ListOpt) Hash algorithms to use for hashing PKI tokens. This may be a single algorithm or multiple. The algorithms are those supported by Python standard hashlib.new(). The hashes will be tried in the order given, so put the preferred one first for performance. The result of the first hash will be stored in the cache. This will typically be set to multiple values only while migrating from a less secure algorithm to a more secure one. Once all the old tokens are expired this option should be set to a single value for better performance.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
@ -181,7 +181,7 @@
|
||||
<td>(StrOpt) Complete admin Identity API endpoint. This should specify the unversioned root endpoint e.g. https://localhost:35357/</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>[libvirt] gid_maps = []</td>
|
||||
<td>[libvirt] gid_maps = </td>
|
||||
<td>(ListOpt) List of guid targets and ranges.Syntax is guest-gid:host-gid:countMaximum of 5 allowed.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
@ -201,7 +201,7 @@
|
||||
<td>(StrOpt) The data source used to the populate the host "serial" UUID exposed to guest in the virtual BIOS. Permitted options are "hardware", "os", "none" or "auto" (default).</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>[libvirt] uid_maps = []</td>
|
||||
<td>[libvirt] uid_maps = </td>
|
||||
<td>(ListOpt) List of uid targets and ranges.Syntax is guest-uid:host-uid:countMaximum of 5 allowed.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
|
@ -161,7 +161,7 @@
|
||||
<td>(BoolOpt) If true, the revocation list will be checked for cached tokens. This requires that PKI tokens are configured on the Keystone server.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>[keystone_authtoken] hash_algorithms = ['md5']</td>
|
||||
<td>[keystone_authtoken] hash_algorithms = md5</td>
|
||||
<td>(ListOpt) Hash algorithms to use for hashing PKI tokens. This may be a single algorithm or multiple. The algorithms are those supported by Python standard hashlib.new(). The hashes will be tried in the order given, so put the preferred one first for performance. The result of the first hash will be stored in the cache. This will typically be set to multiple values only while migrating from a less secure algorithm to a more secure one. Once all the old tokens are expired this option should be set to a single value for better performance.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
@ -297,11 +297,11 @@
|
||||
<td>(StrOpt) None</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>[postgresql] ignore_dbs = ['postgres']</td>
|
||||
<td>[postgresql] ignore_dbs = postgres</td>
|
||||
<td>(ListOpt) None</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>[postgresql] ignore_users = ['os_admin', 'postgres', 'root']</td>
|
||||
<td>[postgresql] ignore_users = os_admin, postgres, root</td>
|
||||
<td>(ListOpt) None</td>
|
||||
</tr>
|
||||
<tr>
|
||||
@ -317,11 +317,11 @@
|
||||
<td>(BoolOpt) Enable the automatic creation of the root user for the service during instance-create. The generated password for the root user is immediately returned in the response of instance-create as the 'password' field.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>[postgresql] tcp_ports = ['5432']</td>
|
||||
<td>[postgresql] tcp_ports = 5432</td>
|
||||
<td>(ListOpt) List of TCP ports and/or port ranges to open in the security group (only applicable if trove_security_groups_support is True).</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>[postgresql] udp_ports = []</td>
|
||||
<td>[postgresql] udp_ports = </td>
|
||||
<td>(ListOpt) List of UPD ports and/or port ranges to open in the security group (only applicable if trove_security_groups_support is True).</td>
|
||||
</tr>
|
||||
<tr>
|
||||
@ -382,7 +382,7 @@
|
||||
</tr>
|
||||
<tr>
|
||||
<td>[DEFAULT] notification_service_id</td>
|
||||
<td>{'couchbase': 'fa62fe68-74d9-4779-a24e-36f19602c415', 'mongodb': 'c8c907af-7375-456f-b929-b637ff9209ee', 'mysql': '2f3ff068-2bfb-4f70-9a9d-a6bb65bc084b', 'redis': 'b216ffc5-1947-456c-a4cf-70f94c05f7d0', 'cassandra': '459a230d-4e97-4344-9067-2a54a310b0ed'}</td>
|
||||
<td>{'couchbase': 'fa62fe68-74d9-4779-a24e-36f19602c415', 'mongodb': 'c8c907af-7375-456f-b929-b637ff9209ee', 'cassandra': '459a230d-4e97-4344-9067-2a54a310b0ed', 'redis': 'b216ffc5-1947-456c-a4cf-70f94c05f7d0', 'mysql': '2f3ff068-2bfb-4f70-9a9d-a6bb65bc084b'}</td>
|
||||
<td>{'postgresql': 'ac277e0d-4f21-40aa-b347-1ea31e571720', 'couchbase': 'fa62fe68-74d9-4779-a24e-36f19602c415', 'mongodb': 'c8c907af-7375-456f-b929-b637ff9209ee', 'redis': 'b216ffc5-1947-456c-a4cf-70f94c05f7d0', 'mysql': '2f3ff068-2bfb-4f70-9a9d-a6bb65bc084b', 'cassandra': '459a230d-4e97-4344-9067-2a54a310b0ed'}</td>
|
||||
</tr>
|
||||
<tr>
|
||||
|
Loading…
Reference in New Issue
Block a user