Chapter 9. Networking
This chapter explains the OpenStack Networking configuration options.
9.1. Networking configuration options
The options and descriptions listed in this introduction are auto generated from the code in the Networking service project, which provides software-defined networking between VMs run in Compute. The list contains common options, while the subsections list the options for the various networking plug-ins.
Configuration option = Default value | Description |
---|---|
[DEFAULT] | |
admin_password = None
|
(StrOpt) Admin password. |
admin_tenant_name = None
|
(StrOpt) Admin tenant name. |
admin_user = None
|
(StrOpt) Admin username. |
agent_down_time = 75
|
(IntOpt) Number of seconds required to flag the agent as down. Should be at least twice the 'report_interval' value to ensure the agent is permanently down. |
api_workers = None
|
(IntOpt) Number of separate API worker processes for service. |
auth_ca_cert = None
|
(StrOpt) Certificate Authority public key (CA cert) file for SSL. |
auth_insecure = False
|
(BoolOpt) Turn off certificate verification for SSL. |
auth_region = None
|
(StrOpt) Authentication region. |
auth_strategy = keystone
|
(StrOpt) The type of authentication to use. |
auth_url = None
|
(StrOpt) Authentication URL. |
base_mac = fa:16:3e:00:00:00
|
(StrOpt) The base MAC address neutron will use for VIFs. |
bind_host = 0.0.0.0
|
(StrOpt) The host IP address to bind to. |
bind_port = 9696
|
(IntOpt) The port to bind to. |
core_plugin = None
|
(StrOpt) The core plugin neutron will use. |
default_ipv4_subnet_pool = None
|
(StrOpt) Default IPv4 subnet-pool to be used for automatically allocating the subnet CIDR. |
default_ipv6_subnet_pool = None
|
(StrOpt) Default IPv6 subnet-pool to be used for automatically allocating the subnet CIDR. |
device_driver = ['neutron_lbaas.services.loadbalancer.drivers.haproxy.namespace_driver.HaproxyNSDriver']
|
(MultiStrOpt) Drivers used to manage loadbalancing devices |
dhcp_agent_notification = True
|
(BoolOpt) Allows resource operation notifications to be sent to DHCP agents. |
dhcp_agents_per_network = 1
|
(IntOpt) Number of DHCP agents scheduled to host a network. |
dhcp_broadcast_reply = False
|
(BoolOpt) Use broadcasts in DHCP replies. |
dhcp_confs = $state_path/dhcp
|
(StrOpt) Location to store DHCP server config files. |
dhcp_delete_namespaces = True
|
(BoolOpt) Delete namespace after removing a DHCP server. This option is deprecated and will be removed in a future release. |
dhcp_domain = openstacklocal
|
(StrOpt) Domain to use for building the hostnames. |
dhcp_lease_duration = 86400
|
(IntOpt) DHCP lease duration (in seconds). Use -1 to configure dnsmasq for an infinite lease duration. |
dhcp_load_type = networks
|
(StrOpt) Represents the resource type whose load is being reported by the agent. This can be 'networks' (default), 'subnets' or 'ports'. When specified, the server extracts the particular load sent as part of its agent configuration object from the agent report state, which is the number of resources being consumed. 'report_interval.dhcp_load_type' can be used in combination with 'network_scheduler_driver = neutron.scheduler.dhcp_agent_scheduler.WeightScheduler'. When the 'network_scheduler_driver' is 'WeightScheduler', 'dhcp_load_type' can be configured to represent the setting for the resource being balanced. For example: 'dhcp_load_type=networks'. |
dns_domain = openstacklocal
|
(StrOpt) Domain to use for building the hostnames. |
enable_new_agents = True
|
(BoolOpt) Agent starts with admin_state_up=False when enable_new_agents=False. In this case, a user's resources will not be scheduled automatically to the agent until the admininistrator changes admin_state_up to `True`. |
enable_services_on_agents_with_admin_state_down = False
|
(BoolOpt) Enable services on an agent where 'admin_state_up' is 'False'. If this option is 'False', and the 'admin_state_up' of an agent is 'False', its services will be disabled. Agents with 'admin_state_up' set to 'False' are not selected for automatic scheduling regardless of this option. However, manual scheduling to such agents is available if this option is 'True'. |
endpoint_type = adminURL
|
(StrOpt) Specifies the network service endpoint type to pull from the keystone catalog. |
endpoint_url = None
|
(StrOpt) The neutron endpoint URL. If not set, will then use the endpoint from the keystone catalog along with `endpoint_type`. |
executor_thread_pool_size = 64
|
(IntOpt) Size of executor thread pool. |
force_gateway_on_subnet = True
|
(BoolOpt) Requires that the configured gateway is on a subnet. For IPv6, it validates only if the gateway is not a link local address. Deprecated, to be removed during the K release, at which point the check will be mandatory. |
host = localhost
|
(StrOpt) Hostname to be used by the neutron server, agents, and services running on this machine. All the agents and services running on this machine must use the same host value. |
interface_driver = None
|
(StrOpt) The driver used to manage the virtual interface. |
ip_lib_force_root = False
|
(BoolOpt) Force 'ip_lib' calls to use the root helper. |
ipam_driver = None
|
(StrOpt) Specify the IPAM driver to use. |
mac_generation_retries = 16
|
(IntOpt) Number of times neutron will retry MAC generation. |
max_allowed_address_pair = 10
|
(IntOpt) Maximum number of allowed address pairs. |
max_dns_nameservers = 5
|
(IntOpt) Maximum number of DNS nameservers. |
max_fixed_ips_per_port = 5
|
(IntOpt) Maximum number of fixed IPs per port. |
max_subnet_host_routes = 20
|
(IntOpt) Maximum number of host routes per subnet. |
memcached_servers = None
|
(ListOpt) Specify the memcached servers, or enter 'None' for in-process cache. |
periodic_fuzzy_delay = 5
|
(IntOpt) To reduce stampeding, set the range of seconds to randomly delay when starting the periodic task scheduler. Use '0' to disable. |
periodic_interval = 40
|
(IntOpt) Seconds between running periodic tasks. |
periodic_monitoring_interval = 5
|
(IntOpt) Periodic interval at which the plugin checks for the monitoring L2 gateway agent. |
report_interval = 300
|
(IntOpt) Set the interval between metering reports. |
rootwrap_config = /etc/nova/rootwrap.conf
|
(StrOpt) Path to the rootwrap configuration file to use for running commands as root |
state_path = /var/lib/neutron
|
(StrOpt) Location for storing neutron state files. This directory must be writable by the agent. |
vlan_transparent = False
|
(BoolOpt) If 'True', this allows plugins to create VLAN transparent networks, if supported. |
[AGENT] | |
check_child_processes_action = respawn
|
(StrOpt) Action to be executed when a child process dies. |
check_child_processes_interval = 60
|
(IntOpt) Interval between checks of child process liveness (seconds). Use '0' to disable. |
log_agent_heartbeats = False
|
(BoolOpt) Log agent heartbeats |
root_helper = sudo
|
(StrOpt) Root helper application. |
root_helper_daemon = None
|
(StrOpt) Root helper daemon application to use, when possible. |
[certificates] | |
cert_manager_type = barbican
|
(StrOpt) Certificate Manager plugin. Defaults to `barbican`. |
storage_path = /var/lib/neutron-lbaas/certificates/
|
(StrOpt) Absolute path to the certificate storage directory. Defaults to env[OS_LBAAS_TLS_STORAGE]. |
[heleos] | |
admin_password = None
|
(StrOpt) ESM admin password. |
[keystone_authtoken] | |
memcached_servers = None
|
(ListOpt) Optional. Specifies a list of memcached server(s) to use for caching. If left undefined, tokens will instead be cached in-process. |
[qos] | |
notification_drivers = message_queue
|
(ListOpt) Specify the driver list to use when sending update notifications. |
9.1.1. Networking plug-ins
OpenStack Networking introduces the concept of a plug-in, which is a back-end implementation of the OpenStack Networking API. A plug-in can use a variety of technologies to implement the logical API requests. Some OpenStack Networking plug-ins might use basic Linux VLANs and IP tables, while others might use more advanced technologies, such as L2-in-L3 tunneling or OpenFlow. These sections detail the configuration options for the various plug-ins.
Note
The following plugins have been removed in Kilo:
- Ryu plugin. The Ryu team recommends that you migrate to the ML2 plugin with the ofagent mechanism driver. However, note that the functionality is not the same. There is no upgrade procedure currently available.
- Mellanox plugin.
9.1.1.1. BaGpipe configuration options
Configuration option = Default value | Description |
---|---|
[BAGPIPE] | |
bagpipe_bgp_ip = 127.0.0.1
|
(StrOpt) BGP component REST service IP address. |
bagpipe_bgp_port = 8082
|
(IntOpt) BGP component REST service IP port. |
mpls_bridge = br-mpls
|
(StrOpt) OVS MPLS bridge to use. |
mpls_from_tun_peer_patch_port = patch-from-tun
|
(StrOpt) OVS Peer patch port in MPLS bridge to tunnel bridge (traffic from tunnel bridge). |
mpls_to_tun_peer_patch_port = patch-to-tun
|
(StrOpt) OVS Peer patch port in MPLS bridge to tunnel bridge(traffic to tunnel bridge). |
ping_interval = 10
|
(IntOpt) The number of seconds the BGP component client will wait between polling for restart detection. |
tun_from_mpls_peer_patch_port = patch-from-mpls
|
(StrOpt) OVS Peer patch port in tunnel bridge to MPLS bridge (traffic from MPLS bridge). |
tun_to_mpls_peer_patch_port = patch-to-mpls
|
(StrOpt) OVS Peer patch port in tunnel bridge to MPLS bridge (traffic to MPLS bridge). |
9.1.1.2. BigSwitch configuration options
Configuration option = Default value | Description |
---|---|
[NOVA] | |
node_override_vif_802.1qbg =
|
(ListOpt) Nova compute nodes to manually set VIF type to 802.1qbg |
node_override_vif_802.1qbh =
|
(ListOpt) Nova compute nodes to manually set VIF type to 802.1qbh |
node_override_vif_binding_failed =
|
(ListOpt) Nova compute nodes to manually set VIF type to binding_failed |
node_override_vif_bridge =
|
(ListOpt) Nova compute nodes to manually set VIF type to bridge |
node_override_vif_distributed =
|
(ListOpt) Nova compute nodes to manually set VIF type to distributed |
node_override_vif_dvs =
|
(ListOpt) Nova compute nodes to manually set VIF type to dvs |
node_override_vif_hw_web =
|
(ListOpt) Nova compute nodes to manually set VIF type to hw_web |
node_override_vif_hyperv =
|
(ListOpt) Nova compute nodes to manually set VIF type to hyperv |
node_override_vif_ib_hostdev =
|
(ListOpt) Nova compute nodes to manually set VIF type to ib_hostdev |
node_override_vif_iovisor =
|
(ListOpt) Nova compute nodes to manually set VIF type to iovisor |
node_override_vif_ivs =
|
(ListOpt) Nova compute nodes to manually set VIF type to ivs |
node_override_vif_midonet =
|
(ListOpt) Nova compute nodes to manually set VIF type to midonet |
node_override_vif_other =
|
(ListOpt) Nova compute nodes to manually set VIF type to other |
node_override_vif_ovs =
|
(ListOpt) Nova compute nodes to manually set VIF type to ovs |
node_override_vif_unbound =
|
(ListOpt) Nova compute nodes to manually set VIF type to unbound |
node_override_vif_vhostuser =
|
(ListOpt) Nova compute nodes to manually set VIF type to vhostuser |
node_override_vif_vrouter =
|
(ListOpt) Nova compute nodes to manually set VIF type to vrouter |
vif_type = ivs
|
(StrOpt) Virtual interface type to configure on Nova compute nodes |
vif_types = unbound, binding_failed, distributed, ovs, bridge, other, ivs, iovisor, vhostuser, dvs, 802.1qbg, 802.1qbh, hyperv, midonet, ib_hostdev, hw_web, vrouter
|
(ListOpt) List of allowed vif_type values. |
[RESTPROXY] | |
add_meta_server_route = True
|
(BoolOpt) Determines whether a route to the metadata server should be injected into the VM |
auto_sync_on_failure = True
|
(BoolOpt) If neutron fails to create a resource because the back end controller doesn't know of a dependency, the plugin automatically triggers a full data synchronization to the controller. |
cache_connections = True
|
(BoolOpt) Re-use HTTP/HTTPS connections to the controller. |
consistency_interval = 60
|
(IntOpt) Time between verifications that the backend controller database is consistent with Neutron. (0 to disable) |
neutron_id = neutron-images
|
(StrOpt) User-defined identifier for this neutron deployment |
no_ssl_validation = False
|
(BoolOpt) Disables SSL certificate validation for controllers |
server_auth = None
|
(StrOpt) The username and password for authenticating against the Big Switch or Floodlight controller. |
server_ssl = True
|
(BoolOpt) If True, use SSL when connecting to the Big Switch or Floodlight controller. |
server_timeout = 10
|
(IntOpt) Maximum number of seconds to wait for proxy request to connect and complete. |
servers = localhost:8800
|
(ListOpt) A comma separated list of Big Switch/Floodlight servers, and port numbers. The plugin proxies the requests to the Big Switch/Floodlight server, which performs the networking configuration. Only one server is needed per deployment, but you can deploy multiple servers for failover. |
ssl_cert_directory = /etc/neutron/plugins/bigswitch/ssl
|
(StrOpt) Directory containing ca_certs and host_certs certificate directories. |
ssl_sticky = True
|
(BoolOpt) Trust and store the first certificate received for each controller address and use it to validate future connections to that address. |
sync_data = False
|
(BoolOpt) Sync data on connect |
thread_pool_size = 4
|
(IntOpt) Maximum number of threads to spawn to handle large volumes of port creations. |
[RESTPROXYAGENT] | |
integration_bridge = br-int
|
(StrOpt) Name of integration bridge on Compute nodes used for security group insertion. |
polling_interval = 5
|
(IntOpt) Seconds between agent checks for port changes |
virtual_switch_type = ivs
|
(StrOpt) Virtual switch type. |
[ROUTER] | |
max_router_rules = 200
|
(IntOpt) Maximum number of router rules |
tenant_default_router_rule = ['*:any:any:permit']
|
(MultiStrOpt) The default router rules installed in new tenant routers. Repeat the config option for each rule. Format is <tenant>:<source>:<destination>:<action> Use an * to specify default for all tenants. |
9.1.1.3. Brocade configuration options
Configuration option = Default value | Description |
---|---|
[PHYSICAL_INTERFACE] | |
physical_interface = eth0
|
(StrOpt) The network interface to use when creating a port |
[SWITCH] | |
address =
|
(StrOpt) The address of the host to SSH to |
ostype = NOS
|
(StrOpt) Currently unused |
password =
|
(StrOpt) The SSH password to use |
username =
|
(StrOpt) The SSH username to use |
9.1.1.4. Brocade MLX L3 plug-in
Configure switch names to be used as group names as described below
Configuration option = Default value | Description |
---|---|
[L3_BROCADE_MLX_EXAMPLE] | |
address =
|
(StrOpt) The IP address of the MLX switch |
password = password
|
(StrOpt) The SSH password of the switch |
physical_networks =
|
(StrOpt) Allowed physical networks where VLAN can be configured on this switch |
ports =
|
(StrOpt) Ports to be tagged in the VLAN being configured on the switch |
username = admin
|
(StrOpt) The SSH username for the switch |
[l3_brocade_mlx] | |
switch_names =
|
(StrOpt) Switches connected to the Compute nodes |
9.1.1.5. Brocade Vyatta layer 3 plug-in
The Brocade Vyatta Layer 3 plug-in configures Vyatta vRouter. More information about the plug-in is available at: Brocade_Vyatta_L3_Plugin.
Use the following options to configure the Brocade Vyatta Layer 3 plug-in.
Configuration option = Default value | Description |
---|---|
[VROUTER] | |
flavor = 2
|
(StrOpt) Nova VM flavor for instances of Vyatta vRouter. |
image_id = None
|
(StrOpt) Nova image id for instances of Vyatta vRouter. |
keystone_url = None
|
(StrOpt) Keystone URL. |
management_network_id = None
|
(StrOpt) Vyatta vRouter management network id. |
nova_poll_interval = 5
|
(IntOpt) Number of seconds between consecutive Nova queries when waiting for router instance status change. |
nova_spawn_timeout = 300
|
(IntOpt) Number of seconds to wait for Nova to activate instance before setting resource to error state. |
tenant_admin_name = None
|
(StrOpt) Name of tenant admin user. |
tenant_admin_password = None
|
(StrOpt) Tenant admin password. |
tenant_id = None
|
(StrOpt) UUID of tenant that holds Vyatta vRouter instances. |
vrouter_boot_timeout = 300
|
(IntOpt) Number of seconds to wait for Vyatta vRouter to boot before setting resource to error state. |
vrouter_credentials = vyatta:vyatta
|
(StrOpt) Vyatta vRouter login credentials |
vrouter_poll_interval = 5
|
(IntOpt) Number of seconds between consecutive Vyatta vRouter queries when waiting for router instance boot. |
9.1.1.6. CISCO configuration options
Configuration option = Default value | Description |
---|---|
[cfg_agent] | |
device_connection_timeout = 30
|
(IntOpt) Time in seconds for connecting to a hosting device |
fw_svc_helper_class = neutron_fwaas.services.firewall.drivers.cisco.csr_firewall_svc_helper.CsrFirewallServiceHelper
|
(StrOpt) Path of the firewall service helper class. |
hosting_device_dead_timeout = 300
|
(IntOpt) The time in seconds until a backlogged hosting device is presumed dead. This value should be set up high enough to recover from a period of connectivity loss or high load when the device may not be responding. |
routing_svc_helper_class = networking_cisco.plugins.cisco.cfg_agent.service_helpers.routing_svc_helper.RoutingServiceHelper
|
(StrOpt) Path of the routing service helper class. |
rpc_loop_interval = 10
|
(IntOpt) Interval when the process_services() loop executes in seconds. This is when the config agent lets each service helper process its neutron resources. |
[cisco_csr_ipsec] | |
status_check_interval = 60
|
(IntOpt) Status check interval for Cisco CSR IPSec connections |
[general] | |
backlog_processing_interval = 10
|
(IntOpt) Time in seconds between renewed scheduling attempts of non-scheduled routers. |
cfg_agent_down_time = 60
|
(IntOpt) Seconds of no status update until a cfg agent is considered down. |
default_security_group = mgmt_sec_grp
|
(StrOpt) Default security group applied on management port. Default value is mgmt_sec_grp. |
ensure_nova_running = True
|
(BoolOpt) Ensure that nova is running before attempting to create a VM. |
l3_admin_tenant = L3AdminTenant
|
(StrOpt) Name of the L3 admin tenant. |
management_network = osn_mgmt_nw
|
(StrOpt) Name of management network for device configuration. Default value is osn_mgmt_nw |
service_vm_config_path = /opt/stack/data/neutron/cisco/config_drive
|
(StrOpt) Path to config drive files for service VM instances. |
templates_path = /opt/stack/data/neutron/cisco/templates
|
(StrOpt) Path to templates for hosting devices. |
[hosting_devices] | |
csr1kv_booting_time = 420
|
(IntOpt) Booting time in seconds before a CSR1kv becomes operational. |
csr1kv_cfgagent_router_driver = networking_cisco.plugins.cisco.cfg_agent.device_drivers.csr1kv.csr1kv_routing_driver.CSR1kvRoutingDriver
|
(StrOpt) Config agent driver for CSR1kv. |
csr1kv_configdrive_template = csr1kv_cfg_template
|
(StrOpt) CSR1kv configdrive template file. |
csr1kv_device_driver = networking_cisco.plugins.cisco.l3.hosting_device_drivers.csr1kv_hd_driver.CSR1kvHostingDeviceDriver
|
(StrOpt) Hosting device driver for CSR1kv. |
csr1kv_flavor = 621
|
(StrOpt) UUID of Nova flavor for CSR1kv. |
csr1kv_image = csr1kv_openstack_img
|
(StrOpt) Name of Glance image for CSR1kv. |
csr1kv_password = cisco
|
(StrOpt) Password to use for CSR1kv configurations. |
csr1kv_plugging_driver = networking_cisco.plugins.cisco.l3.plugging_drivers.n1kv_trunking_driver.N1kvTrunkingPlugDriver
|
(StrOpt) Plugging driver for CSR1kv. |
csr1kv_username = stack
|
(StrOpt) Username to use for CSR1kv configurations. |
[ml2_cisco_n1kv] | |
max_vsm_retries = 2
|
(IntOpt) Maximum number of retry attempts for VSM REST API. |
[n1kv] | |
management_port_profile = osn_mgmt_pp
|
(StrOpt) Name of N1kv port profile for management ports. |
t1_network_profile = osn_t1_np
|
(StrOpt) Name of N1kv network profile for T1 networks (for example, trunk networks for VXLAN segmented traffic). |
t1_port_profile = osn_t1_pp
|
(StrOpt) Name of N1kv port profile for T1 ports (for example, ports carrying traffic from VXLAN segmented networks). |
t2_network_profile = osn_t2_np
|
(StrOpt) Name of N1kv network profile for T2 networks (for example, trunk networks for VLAN segmented traffic). |
t2_port_profile = osn_t2_pp
|
(StrOpt) Name of N1kv port profile for T2 ports (for example, ports carrying traffic from VLAN segmented networks). |
9.1.1.7. Fujitsu CFAB configuration options
Configuration option = Default value | Description |
---|---|
[fujitsu_cfab] | |
address =
|
(StrOpt) The address of the C-Fabric to telnet to. |
password = admin
|
(StrOpt) The C-Fabric password to use. |
physical_networks =
|
(ListOpt) List of <physical_network>:<vfab_id> tuples specifying physical_network names and corresponding vfab ids. |
pprofile_prefix =
|
(StrOpt) The prefix string for pprofile name. |
save_config = True
|
(BoolOpt) Whether to save configuration. |
share_pprofile = False
|
(BoolOpt) Whether to share a C-Fabric pprofile among Neutron ports using the same VLAN ID. |
username = admin
|
(StrOpt) The C-Fabric username to use. |
9.1.1.8. Fujitsu ISM configuration options
Configuration option = Default value | Description |
---|---|
[fujitsu_ism] | |
address = furukawa-ism
|
(StrOpt) The IP address or hostname of the ISM. |
certificate_authority = /etc/neutron/plugins/ml2/fujitsu/server.crt
|
(StrOpt) The certification authority for ISM. |
password = admin
|
(StrOpt) The ISM password to use. |
port = 25566
|
(StrOpt) The port number of the ISM. |
timeout = 30
|
(StrOpt) The API timeout value for ISM. |
username = admin
|
(StrOpt) The ISM username to use. |
9.1.1.9. CloudBase Hyper-V Agent configuration options
Configuration option = Default value | Description |
---|---|
[AGENT] | |
enable_metrics_collection = False
|
(BoolOpt) Enables metrics collections for switch ports by using Hyper-V's metric APIs. Collected data can by retrieved by other apps and services, e.g. ceilometer. Requires Hyper-V / Windows Server 2012 and above |
local_network_vswitch = private
|
(StrOpt) Private vswitch name used for local networks |
metrics_max_retries = 100
|
(IntOpt) Specifies the maximum number of retries to enable Hyper-V's port metrics collection. The agent will try to enable the feature once every polling_interval period for at most metrics_max_retries, or until it succeeds. |
neutron_metadata_address = 169.254.169.254
|
(StrOpt) Specifies the address which will serve the metadata for the instance. |
physical_network_vswitch_mappings =
|
(ListOpt) List of <physical_network>:<vswitch> where the physical networks can be expressed with wildcards, e.g. ."*:external" |
polling_interval = 2
|
(IntOpt) The number of seconds the agent will wait between polling for local device changes. |
[NVGRE] | |
enable_support = False
|
(BoolOpt) Enables Hyper-V NVGRE. Requires Windows Server 2012 or above. |
provider_tunnel_ip = None
|
(StrOpt) Specifies the tunnel IP which will be used and reported by this host for NVGRE networks. |
provider_vlan_id = 0
|
(IntOpt) Specifies the VLAN ID of the physical network, required for setting the NVGRE Provider Address. |
[hyperv] | |
force_hyperv_utils_v1 = False
|
(BoolOpt) Force V1 WMI utility classes |
[neutron] | |
admin_auth_url = http://localhost:5000/v2.0
|
(StrOpt) auth url for connecting to neutron in admin context |
admin_password = None
|
(StrOpt) password for connecting to neutron in admin context |
admin_tenant_name = None
|
(StrOpt) tenant name for connecting to neutron in admin context |
admin_username = None
|
(StrOpt) username for connecting to neutron in admin context |
auth_strategy = keystone
|
(StrOpt) auth strategy for connecting to neutron in admin context |
url = http://127.0.0.1:9696
|
(StrOpt) URL for connecting to neutron |
url_timeout = 30
|
(IntOpt) timeout value for connecting to neutron in seconds |
9.1.1.10. Embrane configuration options
Configuration option = Default value | Description |
---|---|
[heleos] | |
admin_username = admin
|
(StrOpt) ESM admin username. |
async_requests = True
|
(BoolOpt) Define if the requests have run asynchronously or not |
dummy_utif_id = None
|
(StrOpt) Dummy user traffic Security Zone id |
esm_mgmt = None
|
(StrOpt) ESM management root address |
inband_id = None
|
(StrOpt) In band Security Zone id |
mgmt_id = None
|
(StrOpt) Management Security Zone id |
oob_id = None
|
(StrOpt) Out of band Security Zone id |
resource_pool_id = default
|
(StrOpt) Shared resource pool id |
router_image = None
|
(StrOpt) Router image id (Embrane FW/VPN) |
9.1.1.11. IBM SDN-VE configuration options
Configuration option = Default value | Description |
---|---|
[SDNVE] | |
base_url = /one/nb/v2/
|
(StrOpt) Base URL for SDN-VE controller REST API. |
controller_ips = 127.0.0.1
|
(ListOpt) List of IP addresses of SDN-VE controller(s). |
default_tenant_type = OVERLAY
|
(StrOpt) Tenant type: OVERLAY (default) or OF. |
format = json
|
(StrOpt) SDN-VE request/response format. |
info = sdnve_info_string
|
(StrOpt) SDN-VE RPC subject. |
integration_bridge = None
|
(StrOpt) Integration bridge to use. |
interface_mappings =
|
(ListOpt) List of <physical_network_name>:<interface_name> mappings. |
of_signature = SDNVE-OF
|
(StrOpt) The string in tenant description that indicates the tenant is a OF tenant. |
out_of_band = True
|
(BoolOpt) Indicating if controller is out of band or not. |
overlay_signature = SDNVE-OVERLAY
|
(StrOpt) The string in tenant description that indicates the tenant is a OVERLAY tenant. |
password = admin
|
(StrOpt) SDN-VE administrator password. |
port = 8443
|
(StrOpt) SDN-VE controller port number. |
reset_bridge = True
|
(BoolOpt) Whether to reset the integration bridge before use. |
use_fake_controller = False
|
(BoolOpt) Whether to use a fake controller. |
userid = admin
|
(StrOpt) SDN-VE administrator user ID. |
[SDNVE_AGENT] | |
polling_interval = 2
|
(IntOpt) Agent polling interval if necessary. |
rpc = True
|
(BoolOpt) Whether to use rpc. |
9.1.1.12. Layer 2 Gateway configuration options
Configuration option = Default value | Description |
---|---|
[agent] | |
extensions =
|
(ListOpt) Extensions list to use |
9.1.1.13. Layer 2 Gateway configuration options
Configuration option = Default value | Description |
---|---|
[DEFAULT] | |
default_device_name = Switch1
|
(StrOpt) default_device_name of the l2 gateway |
default_l2_gw_service_uuid = None
|
(StrOpt) Unique identifier of the NSX L2 Gateway service which will be used by default for network gateways |
default_l3_gw_service_uuid = None
|
(StrOpt) Unique identifier of the NSX L3 Gateway service which will be used for implementing routers and floating IPs |
l2gw_callback_class = networking_l2gw.services.l2gateway.ovsdb.data.L2GatewayOVSDBCallbacks
|
(StrOpt) L2 gateway plugin callback class where the RPCs from the agent are going to get invoked |
quota_l2_gateway = 5
|
(IntOpt) Number of l2 gateways allowed per tenant, -1 for unlimited |
[ovsdb] | |
enable_manager = False
|
(BoolOpt) Set to 'True' if ovsdb Manager manages the client |
l2_gw_agent_ca_cert_base_path = None
|
(StrOpt) Trusted issuer CA cert |
l2_gw_agent_cert_base_path = None
|
(StrOpt) L2 gateway agent public certificate |
l2_gw_agent_priv_key_base_path = None
|
(StrOpt) L2 gateway agent private key |
max_connection_retries = 10
|
(IntOpt) Maximum number of retries to open a socket with the OVSDB server |
ovsdb_hosts = host1:127.0.0.1:6632
|
(StrOpt) OVSDB server name:host/IP:port |
periodic_interval = 20
|
(IntOpt) Seconds between periodic task runs |
9.1.1.14. Linux bridge Agent configuration options
Configuration option = Default value | Description |
---|---|
[LINUX_BRIDGE] | |
bridge_mappings =
|
(ListOpt) List of <physical_network>:<physical_bridge> |
physical_interface_mappings =
|
(ListOpt) List of <physical_network>:<physical_interface> |
[VXLAN] | |
enable_vxlan = True
|
(BoolOpt) Enable VXLAN on the agent. Can be enabled when agent is managed by the ML2 plugin, using the linuxbridge mechanism driver. |
l2_population = False
|
(BoolOpt) Extension to use alongside ML2 plugin's l2population mechanism driver. It enables the plugin to populate VXLAN forwarding table. |
local_ip = None
|
(IPOpt) Local IP address of the VXLAN endpoints. |
tos = None
|
(IntOpt) TOS for VXLAN interface protocol packets. |
ttl = None
|
(IntOpt) TTL for VXLAN interface protocol packets. |
vxlan_group = 224.0.0.1
|
(StrOpt) Multicast group for VXLAN interface. |
9.1.1.15. Modular Layer 2 (ml2) configuration options
The Modular Layer 2 (ml2) plug-in has two components: network types and mechanisms. You can configure these components separately. This section describes these configuration options.
Configure MTU for VXLAN tunnelling
Specific MTU configuration is necessary for VXLAN to function as expected:
- One option is to increase the MTU value of the physical interface and physical switch fabric by at least 50 bytes. For example, increase the MTU value to 1550. This value enables an automatic 50-byte MTU difference between the physical interface (1500) and the VXLAN interface (automatically 1500-50 = 1450). An MTU value of 1450 causes issues when virtual machine taps are configured at an MTU value of 1500.
- Another option is to decrease the virtual Ethernet devices' MTU. Set the
network_device_mtu
option to 1450 in theneutron.conf
file, and set all guest virtual machines' MTU to the same value by using a DHCP option. For information about how to use this option, see Configure OVS plug-in.
Configuration option = Default value | Description |
---|---|
[ml2] | |
extension_drivers =
|
(ListOpt) An ordered list of extension driver entrypoints to be loaded from the neutron.ml2.extension_drivers namespace. |
external_network_type = None
|
(StrOpt) Default network type for external networks when no provider attributes are specified. The default is 'None', meaninging that if provider attributes are not specified while creating external networks, then they will have the same type as tenant networks. The allowed values for external_network_type config option depend on the network type values configured in type_drivers config option. |
mechanism_drivers =
|
(ListOpt) An ordered list of networking mechanism driver entrypoints to be loaded from the neutron.ml2.mechanism_drivers namespace. |
path_mtu = 0
|
(IntOpt) The maximum permissible size of an unfragmented packet travelling to and from addresses where encapsulated neutron traffic is sent. If <= 0, the path MTU is indeterminate. |
physical_network_mtus =
|
(ListOpt) A list of mappings of physical networks to MTU values. The format of the mapping is <physnet>:<mtu val>. This mapping allows specifying a physical network MTU value that differs from the default segment_mtu value. |
segment_mtu = 0
|
(IntOpt) The maximum permissible size of an unfragmented packet traversing a L2 network segment. If <= 0, the segment MTU is indeterminate. |
tenant_network_types = local
|
(ListOpt) Ordered list of network_types to allocate as tenant networks. |
type_drivers = local, flat, vlan, gre, vxlan, geneve
|
(ListOpt) List of network type driver entrypoints to be loaded from the neutron.ml2.type_drivers namespace. |
9.1.1.15.1. Modular Layer 2 (ml2) Flat Type configuration options
Configuration option = Default value | Description |
---|---|
[ml2_type_flat] | |
flat_networks =
|
(ListOpt) List of physical_network names with which flat networks can be created. Use * to allow flat networks with arbitrary physical_network names. |
9.1.1.15.2. Modular Layer 2 (ml2) GRE Type configuration options
Configuration option = Default value | Description |
---|---|
[ml2_type_gre] | |
tunnel_id_ranges =
|
(ListOpt) Comma-separated list of <tun_min>:<tun_max> tuples enumerating ranges of GRE tunnel IDs that are available for tenant network allocation |
9.1.1.15.3. Modular Layer 2 (ml2) VLAN Type configuration options
Configuration option = Default value | Description |
---|---|
[ml2_type_vlan] | |
network_vlan_ranges =
|
(ListOpt) List of <physical_network>:<vlan_min>:<vlan_max> or <physical_network> specifying physical_network names usable for VLAN provider and tenant networks, as well as ranges of VLAN tags on each available for allocation to tenant networks. |
9.1.1.15.4. Modular Layer 2 (ml2) VXLAN Type configuration options
Configuration option = Default value | Description |
---|---|
[ml2_type_vxlan] | |
vni_ranges =
|
(ListOpt) Comma-separated list of <vni_min>:<vni_max> tuples enumerating ranges of VXLAN VNI IDs that are available for tenant network allocation |
vxlan_group = None
|
(StrOpt) Multicast group for VXLAN. If unset, disables VXLAN multicast mode. |
9.1.1.15.5. Modular Layer 2 (ml2) Arista Mechanism configuration options
Configuration option = Default value | Description |
---|---|
[ml2_arista] | |
eapi_host =
|
(StrOpt) Arista EOS IP address. This is required field. If not set, all communications to Arista EOS will fail. |
eapi_password =
|
(StrOpt) Password for Arista EOS. This is required field. If not set, all communications to Arista EOS will fail. |
eapi_username =
|
(StrOpt) Username for Arista EOS. This is required field. If not set, all communications to Arista EOS will fail. |
region_name = RegionOne
|
(StrOpt) Defines Region Name that is assigned to this OpenStack Controller. This is useful when multiple OpenStack/neutron controllers are managing the same Arista HW clusters. Note that this name must match with the region name registered (or known) to keystone service. Authentication with keystone is performed by EOS. This is an optional field. If not set, a value of 'RegionOne' is assumed. |
sync_interval = 180
|
(IntOpt) Sync interval in seconds between neutron plugin and EOS. This interval defines how often the synchronization is performed. This is an optional field. If not set, a value of '180' seconds is assumed. |
use_fqdn = True
|
(BoolOpt) Defines if hostnames are sent to Arista EOS as FQDNs ("node1.domain.com") or as short names ("node1"). This is optional field. If not set, a value of 'True' is assumed. |
Configuration option = Default value | Description |
---|---|
[l3_arista] | |
l3_sync_interval = 180
|
(IntOpt) Sync interval in seconds between L3 Service plugin and EOS. This interval defines how often the synchronization is performed. This is an optional field. If not set, a value of 180 seconds is assumed |
mlag_config = False
|
(BoolOpt) This flag is used indicate if Arista Switches are configured in MLAG mode. If yes, all L3 config is pushed to both the switches automatically. If this flag is set to True, ensure to specify IP addresses of both switches. This is optional. If not set, a value of "False" is assumed. |
primary_l3_host =
|
(StrOpt) Arista EOS IP address. This is required field. If not set, all communications to Arista EOS will fail |
primary_l3_host_password =
|
(StrOpt) Password for Arista EOS. This is required field. If not set, all communications to Arista EOS will fail |
primary_l3_host_username =
|
(StrOpt) Username for Arista EOS. This is required field. If not set, all communications to Arista EOS will fail |
secondary_l3_host =
|
(StrOpt) Arista EOS IP address for second Switch MLAGed with the first one. This an optional field, however, if mlag_config flag is set, then this is required. If not set, all communications to Arista EOS will fail |
use_vrf = False
|
(BoolOpt) A "True" value for this flag indicates to create a router in VRF. If not set, all routers are created in default VRF. This is optional. If not set, a value of "False" is assumed. |
9.1.1.15.6. Modular Layer 2 (ml2) BaGpipe Mechanism configuration options
Configuration option = Default value | Description |
---|---|
[ml2_bagpipe] | |
as_number = 64512
|
(IntOpt) Autonomous System number |
[ml2_type_route_target] | |
rt_asn = 64512
|
(IntOpt) Route Target Autonomous System number. |
rt_nn_ranges =
|
(ListOpt) Comma-separated list of <rt_nn_min>:<rt_nn_max> tuples enumerating ranges of Route Target number that are available for tenant network allocation |
9.1.1.15.7. Modular Layer 2 (ml2) BigSwitch Mechanism configuration options
Configuration option = Default value | Description |
---|---|
[NOVA] | |
node_override_vif_802.1qbg =
|
(ListOpt) Nova compute nodes to manually set VIF type to 802.1qbg |
node_override_vif_802.1qbh =
|
(ListOpt) Nova compute nodes to manually set VIF type to 802.1qbh |
node_override_vif_binding_failed =
|
(ListOpt) Nova compute nodes to manually set VIF type to binding_failed |
node_override_vif_bridge =
|
(ListOpt) Nova compute nodes to manually set VIF type to bridge |
node_override_vif_distributed =
|
(ListOpt) Nova compute nodes to manually set VIF type to distributed |
node_override_vif_dvs =
|
(ListOpt) Nova compute nodes to manually set VIF type to dvs |
node_override_vif_hw_web =
|
(ListOpt) Nova compute nodes to manually set VIF type to hw_web |
node_override_vif_hyperv =
|
(ListOpt) Nova compute nodes to manually set VIF type to hyperv |
node_override_vif_ib_hostdev =
|
(ListOpt) Nova compute nodes to manually set VIF type to ib_hostdev |
node_override_vif_iovisor =
|
(ListOpt) Nova compute nodes to manually set VIF type to iovisor |
node_override_vif_ivs =
|
(ListOpt) Nova compute nodes to manually set VIF type to ivs |
node_override_vif_midonet =
|
(ListOpt) Nova compute nodes to manually set VIF type to midonet |
node_override_vif_other =
|
(ListOpt) Nova compute nodes to manually set VIF type to other |
node_override_vif_ovs =
|
(ListOpt) Nova compute nodes to manually set VIF type to ovs |
node_override_vif_unbound =
|
(ListOpt) Nova compute nodes to manually set VIF type to unbound |
node_override_vif_vhostuser =
|
(ListOpt) Nova compute nodes to manually set VIF type to vhostuser |
node_override_vif_vrouter =
|
(ListOpt) Nova compute nodes to manually set VIF type to vrouter |
vif_type = ivs
|
(StrOpt) Virtual interface type to configure on Nova compute nodes |
vif_types = unbound, binding_failed, distributed, ovs, bridge, other, ivs, iovisor, vhostuser, dvs, 802.1qbg, 802.1qbh, hyperv, midonet, ib_hostdev, hw_web, vrouter
|
(ListOpt) List of allowed vif_type values. |
[RESTPROXY] | |
add_meta_server_route = True
|
(BoolOpt) Determines if a route to the metadata server should be injected into the VM. |
auto_sync_on_failure = True
|
(BoolOpt) If neutron fails to create a resource because the back end controller doesn't know of a dependency, the plugin automatically triggers a full data synchronization to the controller. |
cache_connections = True
|
(BoolOpt) Re-use HTTP/HTTPS connections to the controller. |
consistency_interval = 60
|
(IntOpt) Time between verifications that the backend controller database is consistent with Neutron. (0 to disable) |
neutron_id = neutron-ubuntu1404-master
|
(StrOpt) User defined identifier for this Neutron deployment |
no_ssl_validation = False
|
(BoolOpt) Disables SSL certificate validation for controllers |
server_auth = None
|
(StrOpt) The username and password for authenticating against the Big Switch or Floodlight controller. |
server_ssl = True
|
(BoolOpt) If True, Use SSL when connecting to the Big Switch or Floodlight controller. |
server_timeout = 10
|
(IntOpt) Maximum number of seconds to wait for proxy request to connect and complete. |
servers = localhost:8800
|
(ListOpt) A comma separated list of Big Switch or Floodlight servers and port numbers. The plugin proxies the requests to the Big Switch/Floodlight server, which performs the networking configuration. Only one server is needed per deployment, but you can deploy multiple servers for failover. |
ssl_cert_directory = /etc/neutron/plugins/bigswitch/ssl
|
(StrOpt) Directory containing ca_certs and host_certs certificate directories. |
ssl_sticky = True
|
(BoolOpt) Trust and store the first certificate received for each controller address and use it to validate future connections to that address. |
sync_data = False
|
(BoolOpt) Sync data on connect |
thread_pool_size = 4
|
(IntOpt) Maximum number of threads to spawn to handle large volumes of port creations. |
[RESTPROXYAGENT] | |
integration_bridge = br-int
|
(StrOpt) Name of integration bridge on compute nodes used for security group insertion. |
polling_interval = 5
|
(IntOpt) Seconds between agent checks for port changes |
virtual_switch_type = ivs
|
(StrOpt) Virtual switch type. |
[ROUTER] | |
max_router_rules = 200
|
(IntOpt) Maximum number of router rules |
tenant_default_router_rule = ['*:any:any:permit']
|
(MultiStrOpt) The default router rules installed in new tenant routers. Repeat the config option for each rule. Format is <tenant>:<source>:<destination>:<action> Use an * to specify default for all tenants. |
9.1.1.15.8. Modular Layer 2 (ml2) Brocade Mechanism configuration options
Configuration option = Default value | Description |
---|---|
[ML2_BROCADE_MLX_EXAMPLE] | |
address =
|
(StrOpt) The address of the host to SSH to |
ostype = NI
|
(StrOpt) OS type of the device. |
password = password
|
(StrOpt) The SSH password to use |
physical_networks =
|
(StrOpt) Allowed physical networks |
ports =
|
(StrOpt) Ports |
transport = SSH
|
(StrOpt) Protocol used to communicate with the switch |
username = admin
|
(StrOpt) The SSH username to use |
[ml2_brocade] | |
address =
|
(StrOpt) The address of the host to SSH to |
ostype = NOS
|
(StrOpt) OS Type of the switch |
osversion = 4.0.0
|
(StrOpt) OS Version number |
password = password
|
(StrOpt) The SSH password to use |
physical_networks =
|
(StrOpt) Allowed physical networks |
rbridge_id = 1
|
(StrOpt) Rbridge id of provider edge router(s) |
username = admin
|
(StrOpt) The SSH username to use |
9.1.1.15.9. Modular Layer 3 (ml2) Brocade MLX ICX Mechanism configuration options
Configure switch names to be used as group names as described below
Configuration option = Default value | Description |
---|---|
[ml2_brocade_fi_ni] | |
switch_names =
|
(StrOpt) Switches connected to the compute nodes |
9.1.1.15.10. Modular Layer 2 (ml2) Cisco Mechanism configuration options
Configuration option = Default value | Description |
---|---|
[DEFAULT] | |
apic_system_id = openstack
|
(StrOpt) Prefix for APIC domain/names/profiles created |
[ml2_cisco] | |
host_key_checks = False
|
(BoolOpt) Enable strict host key checks when connecting to Nexus switches |
managed_physical_network = None
|
(StrOpt) The physical network managed by the switches. |
never_cache_ssh_connection = False
|
(BoolOpt) Prevent caching SSH connections to Nexus device |
persistent_switch_config = False
|
(BoolOpt) To make Nexus configuration persistent |
provider_vlan_auto_create = True
|
(BoolOpt) Provider VLANs are automatically created as needed on the Nexus switch |
provider_vlan_auto_trunk = True
|
(BoolOpt) Provider VLANs are automatically trunked as needed on the ports of the Nexus switch |
provider_vlan_name_prefix = p-
|
(StrOpt) VLAN Name prefix for provider VLANs |
svi_round_robin = False
|
(BoolOpt) Distribute SVI interfaces over all switches |
switch_heartbeat_time = 0
|
(IntOpt) Periodic time to check switch connection. (0=disabled) |
vlan_name_prefix = q-
|
(StrOpt) VLAN Name prefix |
vxlan_global_config = False
|
(BoolOpt) Create and delete Nexus switch VXLAN global settings; feature nv overlay, feature vn-segment-vlan-based, interface nve + source-interface loopback |
[ml2_cisco_apic] | |
apic_agent_poll_interval = 2
|
(FloatOpt) Interval between agent poll for topology (in sec) |
apic_agent_report_interval = 30
|
(FloatOpt) Interval between agent status updates (in sec) |
apic_app_profile_name = ${apic_system_id}_app
|
(StrOpt) Name for the app profile used for Openstack |
apic_domain_name = ${apic_system_id}
|
(StrOpt) Name for the domain created on APIC |
apic_entity_profile = ${apic_system_id}_entity_profile
|
(StrOpt) Name of the entity profile to be created |
apic_function_profile = ${apic_system_id}_function_profile
|
(StrOpt) Name of the function profile to be created |
apic_host_uplink_ports =
|
(ListOpt) The uplink ports to check for ACI connectivity |
apic_hosts =
|
(ListOpt) An ordered list of host names or IP addresses of the APIC controller(s). |
apic_lacp_profile = ${apic_system_id}_lacp_profile
|
(StrOpt) Name of the LACP profile to be created |
apic_name_mapping = use_name
|
(StrOpt) Name mapping strategy to use: use_uuid | use_name |
apic_node_profile = ${apic_system_id}_node_profile
|
(StrOpt) Name of the node profile to be created |
apic_password = None
|
(StrOpt) Password for the APIC controller |
apic_sync_interval = 0
|
(IntOpt) Synchronization interval in seconds |
apic_use_ssl = True
|
(BoolOpt) Use SSL to connect to the APIC controller |
apic_username = None
|
(StrOpt) Username for the APIC controller |
apic_vlan_ns_name = ${apic_system_id}_vlan_ns
|
(StrOpt) Name of the VLAN namespace to be used for Openstack |
apic_vlan_range = 2:4093
|
(StrOpt) Range of VLANs to be used for Openstack |
apic_vpc_pairs =
|
(ListOpt) The switch pairs for VPC connectivity |
[ml2_cisco_n1kv] | |
default_policy_profile = default-pp
|
(StrOpt) Cisco Nexus1000V default policy profile. |
http_pool_size = 4
|
(IntOpt) Number of threads to use to make HTTP requests. |
http_timeout = 15
|
(IntOpt) HTTP timeout, in seconds, for connections to the Cisco Nexus1000V VSMs. |
n1kv_vsm_ips = None
|
(ListOpt) Comma-separated IP Addresses of the Cisco Nexus1000V VSMs. |
password = None
|
(StrOpt) Password for all configured Cisco Nexus1000V VSMs. |
poll_duration = 60
|
(IntOpt) Cisco Nexus1000V policy profile polling duration in seconds. |
restrict_network_profiles = False
|
(BoolOpt) Restrict the visibility of network profiles to the tenants. |
restrict_policy_profiles = False
|
(BoolOpt) Restrict the visibility of policy profiles to the tenants. |
sync_interval = 300
|
(IntOpt) Time interval between consecutive neutron-VSM syncs. |
username = None
|
(StrOpt) Username for all configured Cisco Nexus1000V VSMs. |
[ml2_cisco_ucsm] | |
supported_pci_devs = 1137:0071, 8086:10c9
|
(ListOpt) List of comma separated vendor_id:product_id of SR_IOV capable devices supported by this MD. This MD supports both VM-FEX and SR-IOV devices. |
ucsm_host_list = None
|
(ListOpt) List of comma separated Host:Service Profile tuples providing the Service Profile associated with each host to be supported by this MD. |
ucsm_ip = None
|
(StrOpt) Cisco UCS Manager IP address. This is a required field to communicate with a Cisco UCS Manager. |
ucsm_password = None
|
(StrOpt) Password for UCS Manager. This is a required field to communicate with a Cisco UCS Manager. |
ucsm_username = None
|
(StrOpt) Username for UCS Manager. This is a required field to communicate with a Cisco UCS Manager. |
[ml2_type_nexus_vxlan] | |
mcast_ranges =
|
(ListOpt) List of multicast groups to be used for global VNIDs in the format - a:b,c,e:f. |
vni_ranges =
|
(ListOpt) List of global VNID ranges in the format - a:b, c:d. Multiple ranges can be separated by a comma |
9.1.1.15.11. Modular Layer 2 (ml2) Freescale SDN Mechanism configuration options
Configuration option = Default value | Description |
---|---|
[ml2_fslsdn] | |
crd_api_insecure = False
|
(BoolOpt) If set, ignore any SSL validation issues. |
crd_auth_strategy = keystone
|
(StrOpt) Auth strategy for connecting to neutron in admin context. |
crd_auth_url = http://127.0.0.1:5000/v2.0/
|
(StrOpt) CRD Auth URL. |
crd_ca_certificates_file = None
|
(StrOpt) Location of ca certificates file to use for CRD client requests. |
crd_password = password
|
(StrOpt) CRD Service Password. |
crd_region_name = RegionOne
|
(StrOpt) Region name for connecting to CRD Service in admin context. |
crd_tenant_name = service
|
(StrOpt) CRD Tenant Name. |
crd_url = http://127.0.0.1:9797
|
(StrOpt) URL for connecting to CRD service. |
crd_url_timeout = 30
|
(IntOpt) Timeout value for connecting to CRD service in seconds. |
crd_user_name = crd
|
(StrOpt) CRD service Username. |
9.1.1.15.12. Modular Layer 2 (ml2) Geneve Mechanism configuration options
Configuration option = Default value | Description |
---|---|
[ml2_type_geneve] | |
max_header_size = 50
|
(IntOpt) Geneve encapsulation header size is dynamic, this value is used to calculate the maximum MTU for the driver.this is the sum of the sizes of the outer ETH + IP + UDP + GENEVE header sizes |
vni_ranges =
|
(ListOpt) Comma-separated list of <vni_min>:<vni_max> tuples enumerating ranges of Geneve VNI IDs that are available for tenant network allocation |
9.1.1.15.13. Modular Layer 2 (ml2) OpenDaylight Mechanism configuration options
Use of VLANs with the OpenDaylight mechanism driver requires OpenDaylight Helium or newer to be installed.
Configuration option = Default value | Description |
---|---|
[DEFAULT] | |
backdoor_port = None
|
(StrOpt) Enable eventlet backdoor. Acceptable values are 0, <port>, and <start>:<end>, where 0 results in listening on a random tcp port number; <port> results in listening on the specified port number (and not enabling backdoor if that port is in use); and <start>:<end> results in listening on the smallest unused port number within the specified range of port numbers. The chosen port is displayed in the service's log file. |
policy_default_rule = default
|
(StrOpt) Default rule. Enforced when a requested rule is not found. |
policy_dirs = ['policy.d']
|
(MultiStrOpt) Directories where policy configuration files are stored. They can be relative to any directory in the search path defined by the config_dir option, or absolute paths. The file defined by policy_file must exist for these directories to be searched. Missing or empty directories are ignored. |
policy_file = policy.json
|
(StrOpt) The JSON file that defines policies. |
run_external_periodic_tasks = True
|
(BoolOpt) Some periodic tasks can be run in a separate process. Should we run them here? |
[ml2_odl] | |
password = None
|
(StrOpt) HTTP password for authentication |
session_timeout = 30
|
(IntOpt) Tomcat session timeout in minutes. |
timeout = 10
|
(IntOpt) HTTP timeout in seconds. |
url = None
|
(StrOpt) HTTP URL of OpenDaylight REST interface. |
username = None
|
(StrOpt) HTTP username for authentication |
9.1.1.15.14. Modular Layer 2 (ml2) OpenFlow Agent (ofagent) Mechanism configuration options
Configuration option = Default value | Description |
---|---|
[AGENT] | |
dont_fragment = True
|
(BoolOpt) Set or un-set the don't fragment (DF) bit on outgoing IP packet carrying GRE/VXLAN tunnel. |
get_datapath_retry_times = 60
|
(IntOpt) Number of seconds to retry acquiring an Open vSwitch datapath |
9.1.1.15.15. Modular Layer 2 (ml2) L2 Population Mechanism configuration options
Configuration option = Default value | Description |
---|---|
[l2pop] | |
agent_boot_time = 180
|
(IntOpt) Delay within which agent is expected to update existing ports whent it restarts |
9.1.1.15.16. Modular Layer 2 (ml2) Tail-f NCS Mechanism configuration options
Configuration option = Default value | Description |
---|---|
[ml2_ncs] | |
password = None
|
(StrOpt) HTTP password for authentication |
timeout = 10
|
(IntOpt) HTTP timeout in seconds. |
url = None
|
(StrOpt) HTTP URL of Tail-f NCS REST interface. |
username = None
|
(StrOpt) HTTP username for authentication |
9.1.1.15.17. Modular Layer 2 (ml2) SR-IOV Mechanism configuration options
Configuration option = Default value | Description |
---|---|
[ml2_sriov] | |
agent_required = True
|
(BoolOpt) SRIOV neutron agent is required for port binding. DEPRECATED: This option is deprecated in the Liberty release and will be removed in the Mitaka release. From Mitaka the agent will always be required. |
supported_pci_vendor_devs = 15b3:1004, 8086:10ca
|
(ListOpt) Supported PCI vendor devices, defined by vendor_id:product_id according to the PCI ID Repository. Default enables support for Intel and Mellanox SR-IOV capable NICs |
9.1.1.16. MidoNet configuration options
Configuration option = Default value | Description |
---|---|
[MIDONET] | |
client = midonet.neutron.client.api.MidonetApiClient
|
(StrOpt) MidoNet client used to access MidoNet data storage. |
cluster_ip = localhost
|
(StrOpt) IP that the cluster service can be reached on |
cluster_port = 8088
|
(StrOpt) Port that the cluster service can be reached on |
midonet_uri = http://localhost:8080/midonet-api
|
(StrOpt) MidoNet API server URI. |
password = passw0rd
|
(StrOpt) MidoNet admin password. |
project_id = 77777777-7777-7777-7777-777777777777
|
(StrOpt) ID of the project that MidoNet admin user belongs to. |
tunnel_protocol = vxlan
|
(StrOpt) Tunnel protocol used by Midonet |
username = admin
|
(StrOpt) MidoNet admin username. |
9.1.1.17. NEC configuration options
Configuration option = Default value | Description |
---|---|
[OFC] | |
api_max_attempts = 3
|
(IntOpt) Maximum attempts per OFC API request. NEC plugin retries API request to OFC when OFC returns ServiceUnavailable (503). The value must be greater than 0. |
cert_file = None
|
(StrOpt) Location of certificate file. |
driver = trema
|
(StrOpt) Driver to use. |
enable_packet_filter = True
|
(BoolOpt) Enable packet filter. |
host = 127.0.0.1
|
(StrOpt) Host to connect to. |
insecure_ssl = False
|
(BoolOpt) Disable SSL certificate verification. |
key_file = None
|
(StrOpt) Location of key file. |
path_prefix =
|
(StrOpt) Base URL of OFC REST API. It is prepended to each API request. |
port = 8888
|
(StrOpt) Port to connect to. |
support_packet_filter_on_ofc_router = True
|
(BoolOpt) Support packet filter on OFC router interface. |
use_ssl = False
|
(BoolOpt) Use SSL to connect. |
[PROVIDER] | |
default_router_provider = l3-agent
|
(StrOpt) Default router provider to use. |
router_providers = l3-agent, openflow
|
(ListOpt) List of enabled router providers. |
[fwaas] | |
driver =
|
(StrOpt) Name of the FWaaS Driver |
9.1.1.18. One Convergence NVSD configuration options
Configuration option = Default value | Description |
---|---|
[AGENT] | |
integration_bridge = br-int
|
(StrOpt) Integration bridge |
[nvsd] | |
nvsd_ip = 127.0.0.1
|
(StrOpt) NVSD Controller IP address |
nvsd_passwd = oc123
|
(StrOpt) NVSD Controller password |
nvsd_port = 8082
|
(IntOpt) NVSD Controller Port number |
nvsd_retries = 0
|
(IntOpt) Number of login retries to NVSD controller |
nvsd_user = ocplugin
|
(StrOpt) NVSD Controller username |
request_timeout = 30
|
(IntOpt) NVSD controller REST API request timeout in seconds |
9.1.1.19. Open Networking Operating System (ONOS) configuration options
Configuration option = Default value | Description |
---|---|
[onos] | |
password =
|
(StrOpt) Password for authentication. |
url_path =
|
(StrOpt) ONOS ReST interface URL |
username =
|
(StrOpt) Username for authentication. |
9.1.1.20. OpenContrail configuration options
Configuration option = Default value | Description |
---|---|
[CONTRAIL] | |
api_server_ip = 127.0.0.1
|
(StrOpt) IP address to connect to the OpenContrail controller. |
api_server_port = 8082
|
(IntOpt) Port to connect to the OpenContrail controller. |
9.1.1.21. Open vSwitch Agent configuration options
Configuration option = Default value | Description |
---|---|
[DEFAULT] | |
ovs_integration_bridge = br-int
|
(StrOpt) Name of Open vSwitch bridge to use |
ovs_use_veth = False
|
(BoolOpt) Determines whether to use veth for an interface. |
ovs_vsctl_timeout = 10
|
(IntOpt) Timeout in seconds for ovs-vsctl commands |
[AGENT] | |
arp_responder = False
|
(BoolOpt) Enable local ARP responder if it is supported. Requires OVS 2.1 and ML2 l2population driver. Allows the switch (when supporting an overlay) to respond to an ARP request locally without performing a costly ARP broadcast into the overlay. |
dont_fragment = True
|
(BoolOpt) Set or un-set the 'don't fragment' (DF) bit on outgoing IP packet that is carrying GRE/VXLAN tunnel. |
drop_flows_on_start = False
|
(BoolOpt) Reset flow table on start. Setting this to True will cause brief traffic interruption. |
enable_distributed_routing = False
|
(BoolOpt) Make the l2 agent run in DVR mode. |
l2_population = False
|
(BoolOpt) Use ML2 l2population mechanism driver to learn remote MAC and IPs and improve tunnel scalability. |
minimize_polling = True
|
(BoolOpt) Minimize polling by monitoring ovsdb for interface changes. |
ovsdb_monitor_respawn_interval = 30
|
(IntOpt) The number of seconds to wait before respawning the ovsdb monitor after losing communication with it. |
prevent_arp_spoofing = True
|
(BoolOpt) Enable suppression of ARP responses that don't match an IP address that belongs to the port from which they originate. Note: This prevents the VMs attached to this agent from spoofing, it doesn't protect them from other devices which have the capability to spoof (e.g. bare metal or VMs attached to agents without this flag set to True). Spoofing rules will not be added to any ports that have port security disabled. For LinuxBridge, this requires ebtables. For OVS, it requires a version that supports matching ARP headers. |
quitting_rpc_timeout = 10
|
(IntOpt) Set new timeout in seconds for new RPC calls after agent receives SIGTERM. If value is set to 0, RPC timeout won't be changed |
tunnel_csum = False
|
(BoolOpt) Set or un-set the tunnel header checksum on outgoing IP packet carrying GRE/VXLAN tunnel. |
tunnel_types =
|
(ListOpt) Network types supported by the agent (GRE and/or VXLAN). |
veth_mtu = None
|
(IntOpt) MTU size of veth interfaces |
vxlan_udp_port = 4789
|
(IntOpt) The UDP port to use for VXLAN tunnels. |
[OVS] | |
bridge_mappings =
|
(ListOpt) List of <physical_network>:<bridge>. Deprecated for ofagent. |
datapath_type = system
|
(StrOpt) OVS datapath to use. |
int_peer_patch_port = patch-tun
|
(StrOpt) Peer patch port in integration bridge for tunnel bridge. |
integration_bridge = br-int
|
(StrOpt) Integration bridge to use. |
local_ip = None
|
(IPOpt) Local IP address of tunnel endpoint. |
of_connect_timeout = 30
|
(IntOpt) Timeout in seconds to wait for the local switch connecting the controller. Used only for 'native' driver. |
of_interface = ovs-ofctl
|
(StrOpt) OpenFlow interface to use. |
of_listen_address = 127.0.0.1
|
(IPOpt) Address to listen on for OpenFlow connections. Used only for 'native' driver. |
of_listen_port = 6633
|
(IntOpt) Port to listen on for OpenFlow connections. Used only for 'native' driver. |
of_request_timeout = 10
|
(IntOpt) Timeout in seconds to wait for a single OpenFlow request. Used only for 'native' driver. |
ovsdb_connection = tcp:127.0.0.1:6640
|
(StrOpt) The connection string for the native OVSDB backend. |
ovsdb_interface = vsctl
|
(StrOpt) The interface for interacting with the OVSDB. |
tun_peer_patch_port = patch-int
|
(StrOpt) Peer patch port in tunnel bridge for integration bridge. |
tunnel_bridge = br-tun
|
(StrOpt) Tunnel bridge to use. |
use_veth_interconnection = False
|
(BoolOpt) Use veths instead of patch ports to interconnect the integration bridge to physical bridges. |
9.1.1.22. Virtual Network for Open vSwitch options
Configuration option = Default value | Description |
---|---|
[ovn] | |
neutron_sync_mode = log
|
(StrOpt) The synchronization mode of OVN with Neutron DB. Available options are: 'off' - synchronization is off. 'log' - during neutron-server startup, check to see if OVN is in sync with the neutron database. Log warnings for any inconsistencies found so that an admin can investigate. 'repair' - during neutron-server startup, automatically create resources found in Neutron but not in OVN. Also remove resources from OVN that are no longer in neutron. |
ovsdb_connection = tcp:127.0.0.1:6640
|
(StrOpt) The connection string for the native OVSDB backend. |
ovsdb_connection_timeout = 60
|
(IntOpt) Timeout in seconds for the OVSDB connection transaction. |
9.1.1.23. IPv6 Prefix Delegation configuradtion options
Configuration option = Default value | Description |
---|---|
[DEFAULT] | |
pd_confs = $state_path/pd
|
(StrOpt) Location to store IPv6 PD files. |
pd_dhcp_driver = dibbler
|
(StrOpt) Service to handle DHCPv6 Prefix delegation. |
vendor_pen = 8888
|
(StrOpt) A decimal value as Vendor's Registered Private Enterprise Number as required by RFC3315 DUID-EN. |
9.1.1.24. PLUMgrid configuration options
Configuration option = Default value | Description |
---|---|
[plumgriddirector] | |
director_server = localhost
|
(StrOpt) PLUMgrid Director server to connect to |
director_server_port = 8080
|
(IntOpt) PLUMgrid Director server port to connect to |
distributed_locking = True
|
(BoolOpt) Distributed locking is enabled or disabled |
driver = networking_plumgrid.neutron.plugins.drivers.plumlib.Plumlib
|
(StrOpt) PLUMgrid Driver |
password = password
|
(StrOpt) PLUMgrid Director admin password |
servertimeout = 5
|
(IntOpt) PLUMgrid Director server timeout |
username = username
|
(StrOpt) PLUMgrid Director admin username |
9.1.1.25. SR-IOV configuration options
Configuration option = Default value | Description |
---|---|
[SRIOV_NIC] | |
exclude_devices =
|
(ListOpt) List of <network_device>:<excluded_devices> mapping network_device to the agent's node-specific list of virtual functions that should not be used for virtual networking. excluded_devices is a semicolon separated list of virtual functions (BDF format).to exclude from network_device. The network_device in the mapping should appear in the physical_device_mappings list. |
physical_device_mappings =
|
(ListOpt) List of <physical_network>:<network_device> mapping physical network names to the agent's node-specific physical network device of SR-IOV physical function to be used for VLAN networks. All physical networks listed in network_vlan_ranges on the server should have mappings to appropriate interfaces on each agent |
9.1.2. Configure the Oslo RPC messaging system
OpenStack projects use an open standard for messaging middleware known as AMQP. This messaging middleware enables the OpenStack services that run on multiple servers to talk to each other. OpenStack Oslo RPC supports two implementations of AMQP: RabbitMQ and Qpid.
9.1.2.1. Configure RabbitMQ
OpenStack Oslo RPC uses RabbitMQ by default. Use these options to configure the RabbitMQ message system. The
rpc_backend
option is optional as long as RabbitMQ is the default messaging system. However, if it is included the configuration, you must set it to neutron.openstack.common.rpc.impl_kombu
.
rpc_backend=neutron.openstack.common.rpc.impl_kombu
Use these options to configure the RabbitMQ messaging system. You can configure messaging communication for different installation scenarios, tune retries for RabbitMQ, and define the size of the RPC thread pool. To monitor notifications through RabbitMQ, you must set the
notification_driver
option to neutron.openstack.common.notifier.rpc_notifier
in the neutron.conf
file:
Configuration option = Default value | Description |
---|---|
[oslo_messaging_rabbit] | |
amqp_auto_delete = False
|
(BoolOpt) Auto-delete queues in AMQP. |
amqp_durable_queues = False
|
(BoolOpt) Use durable queues in AMQP. |
fake_rabbit = False
|
(BoolOpt) Deprecated, use rpc_backend=kombu+memory or rpc_backend=fake |
heartbeat_rate = 2
|
(IntOpt) How often times during the heartbeat_timeout_threshold we check the heartbeat. |
heartbeat_timeout_threshold = 60
|
(IntOpt) Number of seconds after which the Rabbit broker is considered down if heartbeat's keep-alive fails (0 disable the heartbeat). EXPERIMENTAL |
kombu_reconnect_delay = 1.0
|
(FloatOpt) How long to wait before reconnecting in response to an AMQP consumer cancel notification. |
kombu_reconnect_timeout = 60
|
(IntOpt) How long to wait before considering a reconnect attempt to have failed. This value should not be longer than rpc_response_timeout. |
kombu_ssl_ca_certs =
|
(StrOpt) SSL certification authority file (valid only if SSL enabled). |
kombu_ssl_certfile =
|
(StrOpt) SSL cert file (valid only if SSL enabled). |
kombu_ssl_keyfile =
|
(StrOpt) SSL key file (valid only if SSL enabled). |
kombu_ssl_version =
|
(StrOpt) SSL version to use (valid only if SSL enabled). Valid values are TLSv1 and SSLv23. SSLv2, SSLv3, TLSv1_1, and TLSv1_2 may be available on some distributions. |
rabbit_ha_queues = False
|
(BoolOpt) Use HA queues in RabbitMQ (x-ha-policy: all). If you change this option, you must wipe the RabbitMQ database. |
rabbit_host = localhost
|
(StrOpt) The RabbitMQ broker address where a single node is used. |
rabbit_hosts = $rabbit_host:$rabbit_port
|
(ListOpt) RabbitMQ HA cluster host:port pairs. |
rabbit_login_method = AMQPLAIN
|
(StrOpt) The RabbitMQ login method. |
rabbit_max_retries = 0
|
(IntOpt) Maximum number of RabbitMQ connection retries. Default is 0 (infinite retry count). |
rabbit_password = guest
|
(StrOpt) The RabbitMQ password. |
rabbit_port = 5672
|
(IntOpt) The RabbitMQ broker port where a single node is used. |
rabbit_retry_backoff = 2
|
(IntOpt) How long to backoff for between retries when connecting to RabbitMQ. |
rabbit_retry_interval = 1
|
(IntOpt) How frequently to retry connecting with RabbitMQ. |
rabbit_use_ssl = False
|
(BoolOpt) Connect over SSL for RabbitMQ. |
rabbit_userid = guest
|
(StrOpt) The RabbitMQ userid. |
rabbit_virtual_host = /
|
(StrOpt) The RabbitMQ virtual host. |
send_single_reply = False
|
(BoolOpt) Send a single AMQP reply to call message. The current behavior since oslo-incubator is to send two AMQP replies - first one with the payload, a second one to ensure the other has finished to send the payload. We are going to remove it in the N release, but we must keep backward compatible at the same time. This option provides such compatibility - it defaults to False in Liberty and can be turned on for early adopters with new installations or for testing. This option will be removed in the Mitaka release. |
9.1.2.2. Configure Qpid
Use these options to configure the Qpid messaging system for OpenStack Oslo RPC. Qpid is not the default messaging system, so you must enable it by setting the
rpc_backend
option in the neutron.conf
file:
rpc_backend=neutron.openstack.common.rpc.impl_qpid
This critical option points the compute nodes to the Qpid broker (server). Set the
qpid_hostname
option to the host name where the broker runs in the neutron.conf
file.
Note
The
--qpid_hostname
parameter accepts a host name or IP address value.
qpid_hostname=hostname.example.com
If the Qpid broker listens on a port other than the AMQP default of
5672
, you must set the qpid_port
option to that value:
qpid_port=12345
If you configure the Qpid broker to require authentication, you must add a user name and password to the configuration:
qpid_username=username qpid_password=password
By default, TCP is used as the transport. To enable SSL, set the
qpid_protocol
option:
qpid_protocol=ssl
Use these additional options to configure the Qpid messaging driver for OpenStack Oslo RPC. These options are used infrequently.
Configuration option = Default value | Description |
---|---|
[oslo_messaging_qpid] | |
amqp_auto_delete = False
|
(BoolOpt) Auto-delete queues in AMQP. |
amqp_durable_queues = False
|
(BoolOpt) Use durable queues in AMQP. |
qpid_heartbeat = 60
|
(IntOpt) Seconds between connection keepalive heartbeats. |
qpid_hostname = localhost
|
(StrOpt) Qpid broker hostname. |
qpid_hosts = $qpid_hostname:$qpid_port
|
(ListOpt) Qpid HA cluster host:port pairs. |
qpid_password =
|
(StrOpt) Password for Qpid connection. |
qpid_port = 5672
|
(IntOpt) Qpid broker port. |
qpid_protocol = tcp
|
(StrOpt) Transport to use, either 'tcp' or 'ssl'. |
qpid_receiver_capacity = 1
|
(IntOpt) The number of prefetched messages held by receiver. |
qpid_sasl_mechanisms =
|
(StrOpt) Space separated list of SASL mechanisms to use for auth. |
qpid_tcp_nodelay = True
|
(BoolOpt) Whether to disable the Nagle algorithm. |
qpid_topology_version = 1
|
(IntOpt) The qpid topology version to use. Version 1 is what was originally used by impl_qpid. Version 2 includes some backwards-incompatible changes that allow broker federation to work. Users should update to version 2 when they are able to take everything down, as it requires a clean break. |
qpid_username =
|
(StrOpt) Username for Qpid connection. |
send_single_reply = False
|
(BoolOpt) Send a single AMQP reply to call message. The current behavior since oslo-incubator is to send two AMQP replies - first one with the payload, a second one to ensure the other has finished to send the payload. We are going to remove it in the N release, but we must keep backward compatible at the same time. This option provides such compatibility - it defaults to False in Liberty and can be turned on for early adopters with new installations or for testing. This option will be removed in the Mitaka release. |
9.1.2.3. Configure messaging
Use these common options to configure the RabbitMQ, and Qpid messaging drivers:
Configuration option = Default value | Description |
---|---|
[DEFAULT] | |
matchmaker_heartbeat_freq = 300
|
(IntOpt) Heartbeat frequency. |
matchmaker_heartbeat_ttl = 600
|
(IntOpt) Heartbeat time-to-live. |
rpc_backend = rabbit
|
(StrOpt) The messaging driver to use, defaults to rabbit. Other drivers include qpid and zmq. |
rpc_cast_timeout = 30
|
(IntOpt) Seconds to wait before a cast expires (TTL). Only supported by impl_zmq. |
rpc_conn_pool_size = 30
|
(IntOpt) Size of RPC connection pool. |
rpc_response_timeout = 60
|
(IntOpt) Seconds to wait for a response from a call. |
rpc_workers = 1
|
(IntOpt) Number of RPC worker processes for service |
[oslo_concurrency] | |
disable_process_locking = False
|
(BoolOpt) Enables or disables inter-process locks. |
lock_path = None
|
(StrOpt) Directory to use for lock files. For security, the specified directory should only be writable by the user running the processes that need locking. Defaults to environment variable OSLO_LOCK_PATH. If external locks are used, a lock path must be set. |
[oslo_messaging_amqp] | |
allow_insecure_clients = False
|
(BoolOpt) Accept clients using either SSL or plain TCP |
broadcast_prefix = broadcast
|
(StrOpt) address prefix used when broadcasting to all servers |
container_name = None
|
(StrOpt) Name for the AMQP container |
group_request_prefix = unicast
|
(StrOpt) address prefix when sending to any server in group |
idle_timeout = 0
|
(IntOpt) Timeout for inactive connections (in seconds) |
server_request_prefix = exclusive
|
(StrOpt) address prefix used when sending to a specific server |
ssl_ca_file =
|
(StrOpt) CA certificate PEM file for verifing server certificate |
ssl_cert_file =
|
(StrOpt) Identifying certificate PEM file to present to clients |
ssl_key_file =
|
(StrOpt) Private key PEM file used to sign cert_file certificate |
ssl_key_password = None
|
(StrOpt) Password for decrypting ssl_key_file (if encrypted) |
trace = False
|
(BoolOpt) Debug: dump AMQP frames to stdout |
Configuration option = Default value | Description |
---|---|
[matchmaker_redis] | |
host = 127.0.0.1
|
(StrOpt) Host to locate redis. |
password = None
|
(StrOpt) Password for Redis server (optional). |
port = 6379
|
(IntOpt) Use this port to connect to redis host. |
[matchmaker_ring] | |
ringfile = /etc/oslo/matchmaker_ring.json
|
(StrOpt) Matchmaker ring file (JSON). |
Configuration option = Default value | Description |
---|---|
[DEFAULT] | |
control_exchange = neutron
|
(StrOpt) The default exchange under which topics are scoped. May be overridden by an exchange name specified in the transport_url option. |
notification_driver = []
|
(MultiStrOpt) Driver or drivers to handle sending notifications. |
notification_topics = notifications
|
(ListOpt) AMQP topic used for OpenStack notifications. |
transport_url = None
|
(StrOpt) A URL representing the messaging driver to use and its full configuration. If not set, we fall back to the rpc_backend option and driver specific configuration. |
9.1.3. Agent
Use the following options to alter agent-related settings.
Configuration option = Default value | Description |
---|---|
[DEFAULT] | |
external_pids = $state_path/external/pids
|
(StrOpt) Location to store child pid files |
network_device_mtu = None
|
(IntOpt) MTU setting for device. |
prefix_delegation_driver = dibbler
|
(StrOpt) Driver used for ipv6 prefix delegation. This needs to be an entry point defined in the neutron.agent.linux.pd_drivers namespace. See setup.cfg for entry points included with the neutron source. |
use_rootwrap_daemon = False
|
(BoolOpt) Start and use a daemon that can run the commands that need to be run with root privileges. This option is usually enabled on nodes that run nova compute processes |
[AGENT] | |
agent_type = Open vSwitch agent
|
(StrOpt) Selects the Agent Type reported |
availability_zone = nova
|
(LengthStrOpt) Availability zone of this node |
physical_interface_mappings =
|
(ListOpt) List of <physical_network>:<physical_interface> |
9.1.4. API
Use the following options to alter API-related settings.
Configuration option = Default value | Description |
---|---|
[DEFAULT] | |
allow_bulk = True
|
(BoolOpt) Allow the usage of the bulk API |
allow_pagination = False
|
(BoolOpt) Allow the usage of the pagination |
allow_sorting = False
|
(BoolOpt) Allow the usage of the sorting |
api_extensions_path =
|
(StrOpt) The path for API extensions |
api_paste_config = api-paste.ini
|
(StrOpt) The API paste config file to use |
backlog = 4096
|
(IntOpt) Number of backlog requests to configure the socket with |
client_socket_timeout = 900
|
(IntOpt) Timeout for client connections socket operations. If an incoming connection is idle for this number of seconds it will be closed. A value of '0' means wait forever. |
max_header_line = 16384
|
(IntOpt) Max header line to accommodate large tokens |
pagination_max_limit = -1
|
(StrOpt) The maximum number of items returned in a single response, value was 'infinite' or negative integer means no limit |
retry_until_window = 30
|
(IntOpt) Number of seconds to keep retrying to listen |
service_plugins =
|
(ListOpt) The service plugins Neutron will use |
tcp_keepidle = 600
|
(IntOpt) Sets the value of TCP_KEEPIDLE in seconds for each server socket. Not supported on OS X. |
wsgi_keep_alive = True
|
(BoolOpt) If False, closes the client socket connection explicitly. |
[oslo_middleware] | |
max_request_body_size = 114688
|
(IntOpt) The maximum body size for each request, in bytes. |
secure_proxy_ssl_header = X-Forwarded-Proto
|
(StrOpt) The HTTP Header that will be used to determine what the original request protocol scheme was, even if it was hidden by an SSL termination proxy. |
[oslo_policy] | |
policy_default_rule = default
|
(StrOpt) Default rule. Enforced when a requested rule is not found. |
policy_dirs = ['policy.d']
|
(MultiStrOpt) Directories where policy configuration files are stored. They can be relative to any directory in the search path defined by the config_dir option, or absolute paths. The file defined by policy_file must exist for these directories to be searched. Missing or empty directories are ignored. |
policy_file = policy.json
|
(StrOpt) The JSON file that defines policies. |
[service_providers] | |
service_provider = []
|
(MultiStrOpt) Defines providers for advanced services using the format: <service_type>:<name>:<driver>[:default] |
9.1.5. Token authentication
Use the following options to alter token authentication settings.
Configuration option = Default value | Description |
---|---|
[keystone_authtoken] | |
admin_password = None
|
(StrOpt) Service user password. |
admin_tenant_name = admin
|
(StrOpt) Service tenant name. |
admin_token = None
|
(StrOpt) This option is deprecated and may be removed in a future release. Single shared secret with the Keystone configuration used for bootstrapping a Keystone installation, or otherwise bypassing the normal authentication process. This option should not be used, use `admin_user` and `admin_password` instead. |
admin_user = None
|
(StrOpt) Service username. |
auth_admin_prefix =
|
(StrOpt) Prefix to prepend at the beginning of the path. Deprecated, use identity_uri. |
auth_host = 127.0.0.1
|
(StrOpt) Host providing the admin Identity API endpoint. Deprecated, use identity_uri. |
auth_plugin = None
|
(StrOpt) Name of the plugin to load |
auth_port = 35357
|
(IntOpt) Port of the admin Identity API endpoint. Deprecated, use identity_uri. |
auth_protocol = https
|
(StrOpt) Protocol of the admin Identity API endpoint (http or https). Deprecated, use identity_uri. |
auth_section = None
|
(StrOpt) Config Section from which to load plugin specific options |
auth_uri = None
|
(StrOpt) Complete public Identity API endpoint. |
auth_version = None
|
(StrOpt) API version of the admin Identity API endpoint. |
cache = None
|
(StrOpt) Env key for the swift cache. |
cafile = None
|
(StrOpt) A PEM encoded Certificate Authority to use when verifying HTTPs connections. Defaults to system CAs. |
certfile = None
|
(StrOpt) Required if identity server requires client certificate |
check_revocations_for_cached = False
|
(BoolOpt) If true, the revocation list will be checked for cached tokens. This requires that PKI tokens are configured on the identity server. |
delay_auth_decision = False
|
(BoolOpt) Do not handle authorization requests within the middleware, but delegate the authorization decision to downstream WSGI components. |
enforce_token_bind = permissive
|
(StrOpt) Used to control the use and type of token binding. Can be set to: "disabled" to not check token binding. "permissive" (default) to validate binding information if the bind type is of a form known to the server and ignore it if not. "strict" like "permissive" but if the bind type is unknown the token will be rejected. "required" any form of token binding is needed to be allowed. Finally the name of a binding method that must be present in tokens. |
hash_algorithms = md5
|
(ListOpt) Hash algorithms to use for hashing PKI tokens. This may be a single algorithm or multiple. The algorithms are those supported by Python standard hashlib.new(). The hashes will be tried in the order given, so put the preferred one first for performance. The result of the first hash will be stored in the cache. This will typically be set to multiple values only while migrating from a less secure algorithm to a more secure one. Once all the old tokens are expired this option should be set to a single value for better performance. |
http_connect_timeout = None
|
(IntOpt) Request timeout value for communicating with Identity API server. |
http_request_max_retries = 3
|
(IntOpt) How many times are we trying to reconnect when communicating with Identity API Server. |
identity_uri = None
|
(StrOpt) Complete admin Identity API endpoint. This should specify the unversioned root endpoint e.g. https://localhost:35357/ |
include_service_catalog = True
|
(BoolOpt) (Optional) Indicate whether to set the X-Service-Catalog header. If False, middleware will not ask for service catalog on token validation and will not set the X-Service-Catalog header. |
insecure = False
|
(BoolOpt) Verify HTTPS connections. |
keyfile = None
|
(StrOpt) Required if identity server requires client certificate |
memcache_pool_conn_get_timeout = 10
|
(IntOpt) (Optional) Number of seconds that an operation will wait to get a memcache client connection from the pool. |
memcache_pool_dead_retry = 300
|
(IntOpt) (Optional) Number of seconds memcached server is considered dead before it is tried again. |
memcache_pool_maxsize = 10
|
(IntOpt) (Optional) Maximum total number of open connections to every memcached server. |
memcache_pool_socket_timeout = 3
|
(IntOpt) (Optional) Socket timeout in seconds for communicating with a memcache server. |
memcache_pool_unused_timeout = 60
|
(IntOpt) (Optional) Number of seconds a connection to memcached is held unused in the pool before it is closed. |
memcache_secret_key = None
|
(StrOpt) (Optional, mandatory if memcache_security_strategy is defined) This string is used for key derivation. |
memcache_security_strategy = None
|
(StrOpt) (Optional) If defined, indicate whether token data should be authenticated or authenticated and encrypted. Acceptable values are MAC or ENCRYPT. If MAC, token data is authenticated (with HMAC) in the cache. If ENCRYPT, token data is encrypted and authenticated in the cache. If the value is not one of these options or empty, auth_token will raise an exception on initialization. |
memcache_use_advanced_pool = False
|
(BoolOpt) (Optional) Use the advanced (eventlet safe) memcache client pool. The advanced pool will only work under python 2.x. |
revocation_cache_time = 10
|
(IntOpt) Determines the frequency at which the list of revoked tokens is retrieved from the Identity service (in seconds). A high number of revocation events combined with a low cache duration may significantly reduce performance. |
signing_dir = None
|
(StrOpt) Directory used to cache files related to PKI tokens. |
token_cache_time = 300
|
(IntOpt) In order to prevent excessive effort spent validating tokens, the middleware caches previously-seen tokens for a configurable duration (in seconds). Set to -1 to disable caching completely. |
9.1.6. Compute
Use the following options to alter Compute-related settings.
Configuration option = Default value | Description |
---|---|
[DEFAULT] | |
notify_nova_on_port_data_changes = True
|
(BoolOpt) Send notification to nova when port data (fixed_ips/floatingip) changes so nova can update its cache. |
notify_nova_on_port_status_changes = True
|
(BoolOpt) Send notification to nova when port status changes |
nova_admin_auth_url = http://localhost:5000/v2.0
|
(StrOpt) Authorization URL for connecting to nova in admin context. Deprecated in favour of an auth plugin in [nova]. |
nova_admin_password = None
|
(StrOpt) Password for connection to nova in admin context. Deprecated in favour of an auth plugin in [nova]. |
nova_admin_tenant_id = None
|
(StrOpt) The uuid of the admin nova tenant. Deprecated in favour of an auth plugin in [nova]. |
nova_admin_tenant_name = None
|
(StrOpt) The name of the admin nova tenant. Deprecated in favour of an auth plugin in [nova]. |
nova_admin_username = None
|
(StrOpt) Username for connecting to nova in admin context. Deprecated in favour of an auth plugin in [nova]. |
nova_client_cert =
|
(StrOpt) Client certificate for nova metadata api server. |
nova_client_priv_key =
|
(StrOpt) Private key of client certificate. |
nova_url = http://127.0.0.1:8774/v2
|
(StrOpt) URL for connection to nova. Deprecated in favour of an auth plugin in [nova]. |
send_events_interval = 2
|
(IntOpt) Number of seconds between sending events to nova if there are any events to send. |
9.1.7. CORS
Use the following options to alter CORS-related settings.
Configuration option = Default value | Description |
---|---|
[cors] | |
allow_credentials = True
|
(BoolOpt) Indicate that the actual request can include user credentials |
allow_headers = Content-Type, Cache-Control, Content-Language, Expires, Last-Modified, Pragma
|
(ListOpt) Indicate which header field names may be used during the actual request. |
allow_methods = GET, POST, PUT, DELETE, OPTIONS
|
(ListOpt) Indicate which methods can be used during the actual request. |
allowed_origin = None
|
(StrOpt) Indicate whether this resource may be shared with the domain received in the requests "origin" header. |
expose_headers = Content-Type, Cache-Control, Content-Language, Expires, Last-Modified, Pragma
|
(ListOpt) Indicate which headers are safe to expose to the API. Defaults to HTTP Simple Headers. |
max_age = 3600
|
(IntOpt) Maximum cache age of CORS preflight requests. |
[cors.subdomain] | |
allow_credentials = True
|
(BoolOpt) Indicate that the actual request can include user credentials |
allow_headers = Content-Type, Cache-Control, Content-Language, Expires, Last-Modified, Pragma
|
(ListOpt) Indicate which header field names may be used during the actual request. |
allow_methods = GET, POST, PUT, DELETE, OPTIONS
|
(ListOpt) Indicate which methods can be used during the actual request. |
allowed_origin = None
|
(StrOpt) Indicate whether this resource may be shared with the domain received in the requests "origin" header. |
expose_headers = Content-Type, Cache-Control, Content-Language, Expires, Last-Modified, Pragma
|
(ListOpt) Indicate which headers are safe to expose to the API. Defaults to HTTP Simple Headers. |
max_age = 3600
|
(IntOpt) Maximum cache age of CORS preflight requests. |
9.1.8. Database
Use the following options to alter Database-related settings.
Configuration option = Default value | Description |
---|---|
[database] | |
backend = sqlalchemy
|
(StrOpt) The back end to use for the database. |
connection = None
|
(StrOpt) The SQLAlchemy connection string to use to connect to the database. |
connection_debug = 0
|
(IntOpt) Verbosity of SQL debugging information: 0=None, 100=Everything. |
connection_trace = False
|
(BoolOpt) Add Python stack traces to SQL as comment strings. |
db_inc_retry_interval = True
|
(BoolOpt) If True, increases the interval between retries of a database operation up to db_max_retry_interval. |
db_max_retries = 20
|
(IntOpt) Maximum retries in case of connection error or deadlock error before error is raised. Set to -1 to specify an infinite retry count. |
db_max_retry_interval = 10
|
(IntOpt) If db_inc_retry_interval is set, the maximum seconds between retries of a database operation. |
db_retry_interval = 1
|
(IntOpt) Seconds between retries of a database transaction. |
idle_timeout = 3600
|
(IntOpt) Timeout before idle SQL connections are reaped. |
max_overflow = None
|
(IntOpt) If set, use this value for max_overflow with SQLAlchemy. |
max_pool_size = None
|
(IntOpt) Maximum number of SQL connections to keep open in a pool. |
max_retries = 10
|
(IntOpt) Maximum number of database connection retries during startup. Set to -1 to specify an infinite retry count. |
min_pool_size = 1
|
(IntOpt) Minimum number of SQL connections to keep open in a pool. |
mysql_sql_mode = TRADITIONAL
|
(StrOpt) The SQL mode to be used for MySQL sessions. This option, including the default, overrides any server-set SQL mode. To use whatever SQL mode is set by the server configuration, set this to no value. Example: mysql_sql_mode= |
pool_timeout = None
|
(IntOpt) If set, use this value for pool_timeout with SQLAlchemy. |
retry_interval = 10
|
(IntOpt) Interval between retries of opening a SQL connection. |
slave_connection = None
|
(StrOpt) The SQLAlchemy connection string to use to connect to the slave database. |
sqlite_db = oslo.sqlite
|
(StrOpt) The file name to use with SQLite. |
sqlite_synchronous = True
|
(BoolOpt) If True, SQLite uses synchronous mode. |
use_db_reconnect = False
|
(BoolOpt) Enable the experimental use of database reconnect on connection lost. |
9.1.9. DHCP agent
Use the following options to alter Database-related settings.
Configuration option = Default value | Description |
---|---|
[DEFAULT] | |
advertise_mtu = False
|
(BoolOpt) If True, effort is made to advertise MTU settings to VMs via network methods (DHCP and RA MTU options) when the network's preferred MTU is known. |
dhcp_driver = neutron.agent.linux.dhcp.Dnsmasq
|
(StrOpt) The driver used to manage the DHCP server. |
dnsmasq_base_log_dir = None
|
(StrOpt) Base log dir for dnsmasq logging. The log contains DHCP and DNS log information and is useful for debugging issues with either DHCP or DNS. If this section is null, disable dnsmasq log. |
dnsmasq_config_file =
|
(StrOpt) Override the default dnsmasq settings with this file |
dnsmasq_dns_servers = None
|
(ListOpt) Comma-separated list of the DNS servers which will be used as forwarders. |
dnsmasq_lease_max = 16777216
|
(IntOpt) Limit number of leases to prevent a denial-of-service. |
enable_isolated_metadata = False
|
(BoolOpt) Support Metadata requests on isolated networks. |
enable_metadata_network = False
|
(BoolOpt) Allows for serving metadata requests from a dedicated network. Requires enable_isolated_metadata = True |
force_metadata = False
|
(BoolOpt) Force to use DHCP to get Metadata on all networks. |
num_sync_threads = 4
|
(IntOpt) Number of threads to use during sync process. |
resync_interval = 5
|
(IntOpt) Interval to resync. |
use_namespaces = True
|
(BoolOpt) Allow overlapping IP. This option is deprecated and will be removed in a future release. |
9.1.10. Distributed virtual router
Use the following options to alter DVR-related settings.
Configuration option = Default value | Description |
---|---|
[DEFAULT] | |
dvr_base_mac = fa:16:3f:00:00:00
|
(StrOpt) The base mac address used for unique DVR instances by Neutron. The first 3 octets will remain unchanged. If the 4th octet is not 00, it will also be used. The others will be randomly generated. The 'dvr_base_mac' *must* be different from 'base_mac' to avoid mixing them up with MAC's allocated for tenant ports. A 4 octet example would be dvr_base_mac = fa:16:3f:4f:00:00. The default is 3 octet |
router_distributed = False
|
(BoolOpt) System-wide flag to determine the type of router that tenants can create. Only admin can override. |
9.1.11. Firewall-as-a-Service driver
Use the following options in the
fwaas_driver.ini
file for the FWaaS driver.
Configuration option = Default value | Description |
---|---|
[fwaas] | |
enabled = False
|
(BoolOpt) Enable FWaaS |
Configuration option = Default value | Description |
---|---|
[ngfw] | |
smc_api_auth_key =
|
(StrOpt) Authentication key to SMC API |
smc_api_version =
|
(StrOpt) verion of SMC API |
smc_url =
|
(StrOpt) URL to contact SMC server |
Configuration option = Default value | Description |
---|---|
[vArmour] | |
director = localhost
|
(StrOpt) vArmour director ip |
director_port = 443
|
(StrOpt) vArmour director port |
password = varmour
|
(StrOpt) vArmour director password |
username = varmour
|
(StrOpt) vArmour director username |
9.1.12. Load-Balancer-as-a-Service configuration options
Use the following options in the
neutron_lbaas.conf
file for the LBaaS agent.
Configuration option = Default value | Description |
---|---|
[DEFAULT] | |
interface_driver = None
|
(StrOpt) The driver used to manage the virtual interface. |
loadbalancer_pool_scheduler_driver = neutron_lbaas.services.loadbalancer.agent_scheduler.ChanceScheduler
|
(StrOpt) Driver to use for scheduling pool to a default loadbalancer agent |
loadbalancer_scheduler_driver = neutron_lbaas.agent_scheduler.ChanceScheduler
|
(StrOpt) Driver to use for scheduling to a default loadbalancer agent |
periodic_interval = 40
|
(IntOpt) Seconds between running periodic tasks |
loadbalancer_scheduler_driver = neutron_lbaas.agent_scheduler.ChanceScheduler
|
(StrOpt) Driver to use for scheduling to a default loadbalancer agent |
loadbalancer_pool_scheduler_driver = neutron_lbaas.services.loadbalancer.agent_scheduler.ChanceScheduler
|
(StrOpt) Driver to use for scheduling pool to a default loadbalancer agent |
[service_auth] | |
auth_url = http://127.0.0.1:5000/v2.0
|
(StrOpt) Authentication endpoint |
admin_tenant_name = admin
|
(StrOpt) The service admin tenant name |
admin_user = admin
|
(StrOpt) The service admin user name |
admin_password = password
|
(StrOpt) The service admin password |
admin_user_domain = admin
|
(StrOpt) The admin user domain name |
admin_project_domain = admin
|
(StrOpt) The admin project domain name |
region = RegionOne
|
(StrOpt) The deployment region |
service_name = lbaas
|
(StrOpt) The name of the service |
auth_version = 2
|
(StrOpt) The auth version used to authenticate |
[service_providers] | |
service_provider = []
|
(MultiStrOpt) Defines providers for advanced services using the format: <service_type>:<name>:<driver>[:default] |
[certificates] | |
cert_manager_type = barbican
|
(StrOpt) Certificate Manager plugin. Defaults to barbican. |
storage_path = /var/lib/neutron-lbaas/certificates/
|
(StrOpt) Absolute path to the certificate storage directory. Defaults to env[OS_LBAAS_TLS_STORAGE]. |
[service_auth] | |
admin_password = password
|
(StrOpt) The service admin password |
admin_project_domain = admin
|
(StrOpt) The admin project domain name |
admin_tenant_name = admin
|
(StrOpt) The service admin tenant name |
admin_user = admin
|
(StrOpt) The service admin user name |
admin_user_domain = admin
|
(StrOpt) The admin user domain name |
auth_url = http://127.0.0.1:5000/v2.0
|
(StrOpt) Authentication endpoint |
auth_version = 2
|
(StrOpt) The auth version used to authenticate |
region = RegionOne
|
(StrOpt) The deployment region |
service_name = lbaas
|
(StrOpt) The name of the service |
Use the following options in the
lbaas_agent.ini
file for the LBaaS agent.
Configuration option = Default value | Description |
---|---|
[DEFAULT] | |
periodic_interval = 40
|
(IntOpt) Seconds between running periodic tasks. |
interface_driver = None
|
(StrOpt) The driver used to manage the virtual interface. |
debug = False
|
(BoolOpt) Print debugging output (set logging level to DEBUG instead of default INFO level). |
ovs_use_veth = False
|
(BoolOpt) Determines whether to use veth for an interface. |
device_driver = ['neutron_lbaas.services.loadbalancer.drivers.haproxy.namespace_driver.HaproxyNSDriver']
|
(MultiStrOpt) Drivers used to manage loadbalancing devices |
[haproxy] | |
loadbalancer_state_path = $state_path/lbaas
|
(StrOpt) Location to store config and state files |
send_gratuitous_arp = 3
|
(IntOpt) When delete and re-add the same vip, send this many gratuitous ARPs to flush the ARP cache in the Router. Set it below or equal to 0 to disable this feature. |
user_group = nogroup
|
(StrOpt) The user group. |
Use the following options in the
services_lbaas.conf
file for the LBaaS agent.
Configuration option = Default value | Description |
---|---|
[haproxy] | |
send_gratuitous_arp = 3
|
(IntOpt) When delete and re-add the same vip, send this many gratuitous ARPs to flush the ARP cache in the Router. Set it below or equal to 0 to disable this feature. |
user_group = nogroup
|
(StrOpt) The user group |
loadbalancer_state_path = $state_path/lbaas
|
(StrOpt) Location to store config and state files |
periodic_interval = 10
|
(IntOpt) Seconds between periodic task runs |
interface_driver = None
|
(StrOpt) The driver used to manage the virtual interface. |
jinja_config_template = /usr/lib/python/site-packages/neutron_lbaas/services/loadbalancer/drivers/haproxy/templates/haproxy.loadbalancer.j2
|
(StrOpt) Jinja template file for haproxy configuration |
[octavia] | |
base_url = http://127.0.0.1:9876
|
(StrOpt) URL of Octavia controller root |
[heleoslb] | |
admin_password = None
|
(StrOpt) ESM admin password. |
admin_username = None
|
(StrOpt) ESM admin username. |
async_requests = None
|
(BoolOpt) Define if the requests have run asynchronously or not |
dummy_utif_id = None
|
(StrOpt) Dummy user traffic Security Zone id for LBs |
esm_mgmt = None
|
(StrOpt) ESM management root address |
inband_id = None
|
(StrOpt) In band Security Zone id for LBs |
lb_flavor = small
|
(StrOpt) choose LB image flavor to use, accepted values: small, medium |
lb_image = None
|
(StrOpt) Load Balancer image id (Embrane LB) |
mgmt_id = None
|
(StrOpt) Management Security Zone id for LBs |
oob_id = None
|
(StrOpt) Out of band Security Zone id for LBs |
resource_pool_id = None
|
(StrOpt) Shared resource pool id |
sync_interval = 60
|
(IntOpt) resource synchronization interval in seconds |
[netscaler_driver] | |
is_synchronous = True
|
(StrOpt) Setting for option to enable synchronous operationsNetScaler Control Center Server. |
netscaler_ncc_cleanup_mode = None
|
(StrOpt) Setting to enable/disable cleanup mode for NetScaler Control Center Server |
netscaler_ncc_password = None
|
(StrOpt) Password to login to the NetScaler Control Center Server. |
netscaler_ncc_uri = None
|
(StrOpt) The URL to reach the NetScaler Control Center Server. |
netscaler_ncc_username = None
|
(StrOpt) Username to login to the NetScaler Control Center Server. |
netscaler_status_collection = True,300
|
(StrOpt) Setting for member status collection fromNetScaler Control Center Server. |
periodic_task_interval = 2
|
(StrOpt) Setting for periodic task collection interval fromNetScaler Control Center Server.. |
[octavia] | |
base_url = http://127.0.0.1:9876
|
(StrOpt) URL of Octavia controller root |
request_poll_interval = 3
|
(IntOpt) Interval in seconds to poll octavia when an entity is created, updated, or deleted. |
request_poll_timeout = 100
|
(IntOpt) Time to stop polling octavia when a status of an entity does not change. |
[radware] | |
actions_to_skip = setup_l2_l3
|
(ListOpt) List of actions that are not pushed to the completion queue. |
ha_secondary_address = None
|
(StrOpt) IP address of secondary vDirect server. |
l2_l3_ctor_params = {'ha_network_name': 'HA-Network', 'service': '_REPLACE_', 'ha_ip_pool_name': 'default', 'twoleg_enabled': '_REPLACE_', 'allocate_ha_ips': True, 'allocate_ha_vrrp': True}
|
(DictOpt) Parameter for l2_l3 workflow constructor. |
l2_l3_setup_params = {'data_ip_address': '192.168.200.99', 'data_port': 1, 'gateway': '192.168.200.1', 'ha_port': 2, 'data_ip_mask': '255.255.255.0'}
|
(DictOpt) Parameter for l2_l3 workflow setup. |
l2_l3_workflow_name = openstack_l2_l3
|
(StrOpt) Name of l2_l3 workflow. Default: openstack_l2_l3. |
l4_action_name = BaseCreate
|
(StrOpt) Name of the l4 workflow action. Default: BaseCreate. |
l4_workflow_name = openstack_l4
|
(StrOpt) Name of l4 workflow. Default: openstack_l4. |
service_adc_type = VA
|
(StrOpt) Service ADC type. Default: VA. |
service_adc_version =
|
(StrOpt) Service ADC version. |
service_cache = 20
|
(IntOpt) Size of service cache. Default: 20. |
service_compression_throughput = 100
|
(IntOpt) Service compression throughput. Default: 100. |
service_ha_pair = False
|
(BoolOpt) Enables or disables the Service HA pair. Default: False. |
service_isl_vlan = -1
|
(IntOpt) A required VLAN for the interswitch link to use. |
service_resource_pool_ids =
|
(ListOpt) Resource pool IDs. |
service_session_mirroring_enabled = False
|
(BoolOpt) Enable or disable Alteon interswitch link for stateful session failover. Default: False. |
service_ssl_throughput = 100
|
(IntOpt) Service SSL throughput. Default: 100. |
service_throughput = 1000
|
(IntOpt) Service throughput. Default: 1000. |
vdirect_address = None
|
(StrOpt) IP address of vDirect server. |
vdirect_password = radware
|
(StrOpt) vDirect user password. |
vdirect_user = vDirect
|
(StrOpt) vDirect user name. |
[radwarev2] | |
child_workflow_template_names = manage_l3
|
(ListOpt) Name of child workflow templates used.Default: manage_l3 |
ha_secondary_address = None
|
(StrOpt) IP address of secondary vDirect server. |
service_adc_type = VA
|
(StrOpt) Service ADC type. Default: VA. |
service_adc_version =
|
(StrOpt) Service ADC version. |
service_cache = 20
|
(IntOpt) Size of service cache. Default: 20. |
service_compression_throughput = 100
|
(IntOpt) Service compression throughput. Default: 100. |
service_ha_pair = False
|
(BoolOpt) Enables or disables the Service HA pair. Default: False. |
service_isl_vlan = -1
|
(IntOpt) A required VLAN for the interswitch link to use. |
service_resource_pool_ids =
|
(ListOpt) Resource pool IDs. |
service_session_mirroring_enabled = False
|
(BoolOpt) Enable or disable Alteon interswitch link for stateful session failover. Default: False. |
service_ssl_throughput = 100
|
(IntOpt) Service SSL throughput. Default: 100. |
service_throughput = 1000
|
(IntOpt) Service throughput. Default: 1000. |
stats_action_name = stats
|
(StrOpt) Name of the workflow action for statistics. Default: stats. |
vdirect_address = None
|
(StrOpt) IP address of vDirect server. |
vdirect_password = radware
|
(StrOpt) vDirect user password. |
vdirect_user = vDirect
|
(StrOpt) vDirect user name. |
workflow_action_name = apply
|
(StrOpt) Name of the workflow action. Default: apply. |
workflow_params = {'data_ip_address': '192.168.200.99', 'ha_network_name': 'HA-Network', 'ha_port': 2, 'allocate_ha_ips': True, 'ha_ip_pool_name': 'default', 'allocate_ha_vrrp': True, 'data_port': 1, 'gateway': '192.168.200.1', 'twoleg_enabled': '_REPLACE_', 'data_ip_mask': '255.255.255.0'}
|
(DictOpt) Parameter for l2_l3 workflow constructor. |
workflow_template_name = os_lb_v2
|
(StrOpt) Name of the workflow template. Default: os_lb_v2. |
[radwarev2_debug] | |
configure_l3 = True
|
(BoolOpt) Configule ADC with L3 parameters? |
configure_l4 = True
|
(BoolOpt) Configule ADC with L4 parameters? |
provision_service = True
|
(BoolOpt) Provision ADC service? |
Use the following options in the
/etc/octavia/octavia.conf
file for octavia config.
Configuration option = Default value | Description |
---|---|
[DEFAULT] | |
verbose = False
|
(BoolOpt) Print more verbose output (set logging level to INFO instead of default WARNING level). |
debug = False
|
(BoolOpt) Print more verbose output (set logging level to INFO instead of default WARNING level). |
bind_host = 0.0.0.0
|
(StrOpt) The host IP to bind to the api service to . |
bind_port = 9876
|
(IntOpt) The port to bind to the api service to. |
api_handler = simulated_handler
|
(StrOpt) The handler that the API communicates with. |
octavia_plugins = hot_plug_plugin
|
(StrOpt) Name of the controller plugin to use. |
os_region_name =
|
(StrOpt) Region in Identity service catalog to use for communication with the OpenStack services. |
host =
|
(StrOpt) Hostname to be used by the host machine for services running on it.The default value is the hostname of the host machine. |
[database] | |
connection = mysql+pymysql://root:pass@127.0.0.1:3306/octavia
|
(StrOpt) The SQLAlchemy connection string used to connect to the database. |
[health_manager] | |
bind_ip = 0.0.0.0
|
(StrOpt) IP address the controller will listen on for heart beats from the amphora. |
bind_port = 5555
|
(IntOpt) Port number the controller will listen on for heart beats from the amphora. |
controller_ip_port_list =
|
(StrOpt) List of controller ip and port pairs for the heartbeat receivers. Example [127.0.0.1:5555, 127.0.0.1:5555]. |
failover_threads = 10
|
(IntOpt) Number of threads performing amphora failovers. |
status_update_threads = 50
|
(IntOpt) Number of threads performing amphora status update. |
heartbeat_interval = 10
|
(IntOpt) Sleep time between sending hearthbeats from the amphora. |
heartbeat_key =
|
(StrOpt) key used to authenticate the heartbeat message sent by the amphora. |
heartbeat_timeout = 60
|
(IntOpt) Interval, in seconds, to wait before failing over an amphora. |
health_check_interval = 3
|
(IntOpt) Sleep time between health checks in seconds. |
sock_rlimit = 0
|
(IntOpt) sets the value of the heartbeat recv buffer. |
[keystone_authtoken] | |
auth_uri = https://localhost:5000/v3
|
(StrOpt) Complete public Identity API endpoint. |
admin_user = octavia
|
(StrOpt) Keystone account username. |
admin_password = password
|
(StrOpt) Keystone account password. |
admin_tenant_name = service
|
(StrOpt) Keystone service account tenant name to validate user tokens. |
insecure = False
|
(BoolOpt) Verify HTTPS connections. |
[keystone_authtoken_v3] | |
admin_user_domain = default
|
(StrOpt) Admin user keystone authentication domain. |
admin_project_domain = default
|
(StrOpt) Admin project keystone authentication domain. |
[certificates] | |
cert_generator_class = octavia.certificates.generator.LocalCertGenerator
|
(StrOpt) Class name which generate certificates. |
cert_manager_class = octavia.certificates.manager.LocalCertManager
|
(StrOpt) Class name of certificate manager. |
ca_certificate = /etc/ssl/certs/ssl-cert-snakeoil.pem
|
(StrOpt) Absolute path to the CA Certificate for signing. Defaults to env[OS_OCTAVIA_TLS_CA_CERT].Local Cert generator only. |
ca_private_key = /etc/ssl/private/ssl-cert-snakeoil.key
|
(StrOpt) Absolute path to the Private Key for signing. Defaults to env[OS_OCTAVIA_TLS_CA_KEY].Local Cert generator only. |
ca_private_key_passphrase =
|
(StrOpt) Passphrase for the Private Key. Defaults to env[OS_OCTAVIA_CA_KEY_PASS] or None.Local Cert generator only. |
signing_digest = sha256
|
(StrOpt) Certificate signing digest. Defaults to env[OS_OCTAVIA_CA_SIGNING_DIGEST] or sha256.Local Cert generator only. |
storage_path = /var/lib/octavia/certificates/
|
(StrOpt) Absolute path to the certificate storage directory. Defaults to env[OS_OCTAVIA_TLS_STORAGE].Local Cert manager only. |
[octavia_network] | |
lb_network_name =
|
(StrOpt) Network to communicate with amphora. |
max_retries = 15
|
(IntOpt) The maximum attempts to retry an action with the networking service. |
retry_interval = 1
|
(IntOpt) Seconds to wait before retrying an action with the networking service. |
[haproxy_amphora] | |
base_path = /var/lib/octavia
|
(StrOpt) Base directory for amphora files on amphora. |
base_cert_dir = /var/lib/octavia/certs
|
(StrOpt) Base directory for cert storage on amphora. |
haproxy_template = /var/lib/octavia/custom_template
|
(StrOpt) Custom haproxy template. |
base_log_dir = /logs
|
(StrOpt) Base director for log on amphora. |
connection_max_retries = 300
|
(IntOpt) Retry threshold for connecting to amphorae. |
connection_retry_interval = 5
|
(IntOpt) Retry threshold for connecting to amphorae. |
cert_manager = barbican_cert_manager
|
(StrOpt) Name of the cert manager to use. |
username = ubuntu
|
(StrOpt) Name of user for access to amphora,ssh driver only. |
key_path = /opt/stack/.ssh/id_rsa
|
(StrOpt) Local absolute path to the private key loaded on amphora at boot,ssh driver only. |
bind_host = 0.0.0.0
|
(StrOpt) The host IP to bind to amphora hose/REST driver only. |
bind_port = 9191
|
(IntOpt) The port to bind to.REST driver only. |
haproxy_cmd = /usr/sbin/haproxy
|
(StrOpt) The full path to haproxy. |
respawn_count = 2
|
(IntOpt) The respawn count for haproxy's upstart script. |
respawn_interval = 2
|
(IntOpt) The respawn interval for haproxy's upstart script. |
haproxy_cert_dir = /tmp
|
(StrOpt) The directory to store haproxy cert files in. |
[controller_worker] | |
amp_active_retries = 10
|
(IntOpt) Retry attempts to wait for Amphora to become active. |
amp_active_wait_sec = 10
|
(IntOpt) Seconds to wait for an Amphora to become active. |
amp_flavor_id =
|
(StrOpt) Nova instance flavor id for the Amphora. |
amp_image_id =
|
(StrOpt) Glance image id for the Amphora image to boot. |
amp_ssh_key_name =
|
(StrOpt) SSH key name used to boot the Amphora.REST driver/or debugging. |
amp_network =
|
(StrOpt) Network to attach to the Amphora. |
amp_secgroup_list =
|
(StrOpt) List of security groups to attach to the Amphora. |
client_ca = /etc/octavia/certs/ca_01.pem
|
(StrOpt) Client CA for the amphora agent to use.REST driver only. |
amphora_driver = amphora_noop_driver
|
(StrOpt) Name of the amphora driver to use. |
compute_driver = compute_noop_driver
|
(StrOpt) Name of the compute driver to use. |
network_driver = network_noop_driver
|
(StrOpt) Name of the network driver to use. |
cert_generator = local_cert_generator
|
(StrOpt) Name of the cert generator to use. |
[task_flow] | |
engine = serial
|
(StrOpt) TaskFlow engine to use. |
max_workers = 5
|
(IntOpt) The maximum number of workers. |
[oslo_messaging_rabbi] | |
rabbit_userid = octavia
|
(StrOpt) RabbitMQ username. |
rabbit_password = password
|
(StrOpt) RabbitMQ password. |
rabbit_port = 5672
|
(IntOpt) RabbitMQ port. |
rabbit_hosts = localhost:5672
|
(StrOpt) RabbitMQ host. |
[oslo_messaging] | |
rpc_thread_pool_size = 2
|
(IntOpt) Queue Consumer Thread Pool Size. |
topic = octavia_prov
|
(StrOpt) Topic (i.e. Queue) Name. |
[house_keeping] | |
spare_check_interval = 30
|
(IntOpt) Interval in seconds to initiate spare amphora checks. |
spare_amphora_pool_size = 0
|
(IntOpt) Number of spare amphorae. |
cleanup_interval = 30
|
(IntOpt) Cleanup interval for Deleted amphora. |
amphora_expiry_age = 604800
|
(IntOpt) Amphora expiry age in seconds. Default is 1 week. |
9.1.13. VPN-as-a-Service configuration options
Use the following options in the
vpnaas_agent.ini
file for the VPNaaS agent.
Configuration option = Default value | Description |
---|---|
[vpnagent] | |
vpn_device_driver = ['neutron_vpnaas.services.vpn.device_drivers.vyatta_ipsec.VyattaIPSecDriver']
|
(MultiStrOpt) The vpn device drivers Neutron will use |
Configuration option = Default value | Description |
---|---|
[ipsec] | |
config_base_dir = $state_path/ipsec
|
(StrOpt) Location to store ipsec server config files |
enable_detailed_logging = False
|
(BoolOpt) Enable detail logging for ipsec pluto process. If the flag set to True, the detailed logging will be written into config_base_dir/<pid>/logs. |
ipsec_status_check_interval = 60
|
(IntOpt) Interval for checking ipsec status |
Configuration option = Default value | Description |
---|---|
[openswan] | |
ipsec_config_template = /usr/lib/python/site-packages/neutron_vpnaas/services/vpn/device_drivers/template/openswan/ipsec.conf.template
|
(StrOpt) Template file for ipsec configuration |
ipsec_secret_template = /usr/lib/python/site-packages/neutron_vpnaas/services/vpn/device_drivers/template/openswan/ipsec.secret.template
|
(StrOpt) Template file for ipsec secret configuration |
Configuration option = Default value | Description |
---|---|
[strongswan] | |
default_config_area = /etc/strongswan.d
|
(StrOpt) The area where default StrongSwan configuration files are located. |
ipsec_config_template = /usr/lib/python/site-packages/neutron_vpnaas/services/vpn/device_drivers/template/strongswan/ipsec.conf.template
|
(StrOpt) Template file for ipsec configuration. |
ipsec_secret_template = /usr/lib/python/site-packages/neutron_vpnaas/services/vpn/device_drivers/template/strongswan/ipsec.secret.template
|
(StrOpt) Template file for ipsec secret configuration. |
strongswan_config_template = /usr/lib/python/site-packages/neutron_vpnaas/services/vpn/device_drivers/template/strongswan/strongswan.conf.template
|
(StrOpt) Template file for strongswan configuration. |
9.1.14. IPv6 router advertisement
Use the following options to alter IPv6 RA settings.
Configuration option = Default value | Description |
---|---|
[DEFAULT] | |
ra_confs = $state_path/ra
|
(StrOpt) Location to store IPv6 RA config files |
9.1.15. L3 agent
Use the following options in the
l3_agent.ini
file for the L3 agent.
Configuration option = Default value | Description |
---|---|
[DEFAULT] | |
agent_mode = legacy
|
(StrOpt) The working mode for the agent. Allowed modes are: 'legacy' - this preserves the existing behavior where the L3 agent is deployed on a centralized networking node to provide L3 services like DNAT, and SNAT. Use this mode if you do not want to adopt DVR. 'dvr' - this mode enables DVR functionality and must be used for an L3 agent that runs on a compute host. 'dvr_snat' - this enables centralized SNAT support in conjunction with DVR. This mode must be used for an L3 agent running on a centralized node (or in single-host deployments, e.g. devstack) |
allow_automatic_dhcp_failover = True
|
(BoolOpt) Automatically remove networks from offline DHCP agents. |
allow_automatic_l3agent_failover = False
|
(BoolOpt) Automatically reschedule routers from offline L3 agents to online L3 agents. |
enable_metadata_proxy = True
|
(BoolOpt) Allow running metadata proxy. |
enable_snat_by_default = True
|
(BoolOpt) Define the default value of enable_snat if not provided in external_gateway_info. |
external_ingress_mark = 0x2
|
(StrOpt) IPtables mangle mark used to mark ingress from external network |
external_network_bridge = br-ex
|
(StrOpt) Name of bridge used for external network traffic. |
gateway_external_network_id =
|
(StrOpt) UUID of external network for routers implemented by the agents. |
ha_confs_path = $state_path/ha_confs
|
(StrOpt) Location to store keepalived/conntrackd config files |
ha_vrrp_advert_int = 2
|
(IntOpt) The advertisement interval in seconds |
ha_vrrp_auth_password = None
|
(StrOpt) VRRP authentication password |
ha_vrrp_auth_type = PASS
|
(StrOpt) VRRP authentication type |
handle_internal_only_routers = True
|
(BoolOpt) Agent should implement routers with no gateway |
ipv6_gateway =
|
(StrOpt) With IPv6, the network used for the external gateway does not need to have an associated subnet, since the automatically assigned link-local address (LLA) can be used. However, an IPv6 gateway address is needed for use as the next-hop for the default route. If no IPv6 gateway address is configured here, (and only then) the neutron router will be configured to get its default route from router advertisements (RAs) from the upstream router; in which case the upstream router must also be configured to send these RAs. The ipv6_gateway, when configured, should be the LLA of the interface on the upstream router. If a next-hop using a global unique address (GUA) is desired, it needs to be done via a subnet allocated to the network and not through this parameter. |
l3_ha = False
|
(BoolOpt) Enable HA mode for virtual routers. |
l3_ha_net_cidr = 169.254.192.0/18
|
(StrOpt) Subnet used for the l3 HA admin network. |
l3_ha_network_physical_name =
|
(StrOpt) The physical network name with which the HA network can be created. |
l3_ha_network_type =
|
(StrOpt) The network type to use when creating the HA network for an HA router. By default or if empty, the first 'tenant_network_types' is used. This is helpful when the VRRP traffic should use a specific network which is not the default one. |
max_l3_agents_per_router = 3
|
(IntOpt) Maximum number of agents on which a router will be scheduled. |
min_l3_agents_per_router = 2
|
(IntOpt) Minimum number of agents on which a router will be scheduled. |
router_id =
|
(StrOpt) If namespaces is disabled, the l3 agent can only configure a router that has the matching router ID. |
send_arp_for_ha = 3
|
(IntOpt) Send this many gratuitous ARPs for HA setup, if less than or equal to 0, the feature is disabled |
[AGENT] | |
comment_iptables_rules = True
|
(BoolOpt) Add comments to iptables rules. |
use_helper_for_ns_read = True
|
(BoolOpt) Use the root helper to read the namespaces from the operating system. |
9.1.16. Logging
Use the following options to alter logging settings.
Configuration option = Default value | Description |
---|---|
[DEFAULT] | |
debug = False
|
(BoolOpt) Print debugging output (set logging level to DEBUG instead of default INFO level). |
default_log_levels = amqp=WARN, amqplib=WARN, boto=WARN, qpid=WARN, sqlalchemy=WARN, suds=INFO, oslo.messaging=INFO, iso8601=WARN, requests.packages.urllib3.connectionpool=WARN, urllib3.connectionpool=WARN, websocket=WARN, requests.packages.urllib3.util.retry=WARN, urllib3.util.retry=WARN, keystonemiddleware=WARN, routes.middleware=WARN, stevedore=WARN, taskflow=WARN
|
(ListOpt) List of logger=LEVEL pairs. |
fatal_deprecations = False
|
(BoolOpt) Enables or disables fatal status of deprecations. |
fatal_exception_format_errors = False
|
(BoolOpt) Make exception message format errors fatal |
instance_format = "[instance: %(uuid)s] "
|
(StrOpt) The format for an instance that is passed with the log message. |
instance_uuid_format = "[instance: %(uuid)s] "
|
(StrOpt) The format for an instance UUID that is passed with the log message. |
log_config_append = None
|
(StrOpt) The name of a logging configuration file. This file is appended to any existing logging configuration files. For details about logging configuration files, see the Python logging module documentation. |
log_date_format = %Y-%m-%d %H:%M:%S
|
(StrOpt) Format string for %%(asctime)s in log records. Default: %(default)s . |
log_dir = None
|
(StrOpt) (Optional) The base directory used for relative --log-file paths. |
log_file = None
|
(StrOpt) (Optional) Name of log file to output to. If no default is set, logging will go to stdout. |
log_format = None
|
(StrOpt) DEPRECATED. A logging.Formatter log message format string which may use any of the available logging.LogRecord attributes. This option is deprecate, use logging_context_format_string and logging_default_format_string instead. |
logging_context_format_string = %(asctime)s.%(msecs)03d %(process)d %(levelname)s %(name)s [%(request_id)s %(user_identity)s] %(instance)s%(message)s
|
(StrOpt) Format string to use for log messages with context. |
logging_debug_format_suffix = %(funcName)s %(pathname)s:%(lineno)d
|
(StrOpt) Data to append to log format when level is DEBUG. |
logging_default_format_string = %(asctime)s.%(msecs)03d %(process)d %(levelname)s %(name)s [-] %(instance)s%(message)s
|
(StrOpt) Format string to use for log messages without context. |
logging_exception_prefix = %(asctime)s.%(msecs)03d %(process)d TRACE %(name)s %(instance)s
|
(StrOpt) Prefix each line of exception output with this format. |
publish_errors = False
|
(BoolOpt) Enables or disables publication of error events. |
syslog_log_facility = LOG_USER
|
(StrOpt) Syslog facility to receive log lines. |
use_ssl = False
|
(BoolOpt) Enable SSL on the API server |
use_stderr = True
|
(BoolOpt) Log output to standard error. |
use_syslog = False
|
(BoolOpt) Use syslog for logging. Existing syslog format is DEPRECATED during I, and will change in J to honor RFC5424. |
use_syslog_rfc_format = False
|
(BoolOpt) (Optional) Enables or disables syslog rfc5424 format for logging. If enabled, prefixes the MSG part of the syslog message with APP-NAME (RFC5424). The format without the APP-NAME is deprecated in I, and will be removed in J. |
verbose = False
|
(BoolOpt) Print more verbose output (set logging level to INFO instead of default WARNING level). |
[oslo_versionedobjects] | |
fatal_exception_format_errors = False
|
(BoolOpt) Make exception message format errors fatal |
9.1.17. Metadata Agent
Use the following options in the
metadata_agent.ini
file for the Metadata agent.
Configuration option = Default value | Description |
---|---|
[DEFAULT] | |
metadata_access_mark = 0x1
|
(StrOpt) Iptables mangle mark used to mark metadata valid requests. This mark will be masked with 0xffff so that only the lower 16 bits will be used. |
metadata_backlog = 4096
|
(IntOpt) Number of backlog requests to configure the metadata server socket with |
metadata_port = 9697
|
(IntOpt) TCP Port used by Neutron metadata namespace proxy. |
metadata_proxy_group =
|
(StrOpt) Group (gid or name) running metadata proxy after its initialization (if empty: agent effective group). |
metadata_proxy_shared_secret =
|
(StrOpt) Shared secret to sign instance-id request |
metadata_proxy_socket = $state_path/metadata_proxy
|
(StrOpt) Location for Metadata Proxy UNIX domain socket. |
metadata_proxy_socket_mode = deduce
|
(StrOpt) Metadata Proxy UNIX domain socket mode, 4 values allowed: 'deduce': deduce mode from metadata_proxy_user/group values, 'user': set metadata proxy socket mode to 0o644, to use when metadata_proxy_user is agent effective user or root, 'group': set metadata proxy socket mode to 0o664, to use when metadata_proxy_group is agent effective group or root, 'all': set metadata proxy socket mode to 0o666, to use otherwise. |
metadata_proxy_user =
|
(StrOpt) User (uid or name) running metadata proxy after its initialization (if empty: agent effective user). |
metadata_proxy_watch_log = None
|
(BoolOpt) Enable/Disable log watch by metadata proxy. It should be disabled when metadata_proxy_user/group is not allowed to read/write its log file and copytruncate logrotate option must be used if logrotate is enabled on metadata proxy log files. Option default value is deduced from metadata_proxy_user: watch log is enabled if metadata_proxy_user is agent effective user id/name. |
metadata_workers = 1
|
(IntOpt) Number of separate worker processes for metadata server (defaults to half of the number of CPUs) |
nova_metadata_insecure = False
|
(BoolOpt) Allow to perform insecure SSL (https) requests to nova metadata |
nova_metadata_ip = 127.0.0.1
|
(StrOpt) IP address used by Nova metadata server. |
nova_metadata_port = 8775
|
(IntOpt) TCP Port used by Nova metadata server. |
nova_metadata_protocol = http
|
(StrOpt) Protocol to access nova metadata, http or https |
Note
Previously, neutron metadata agent connected to a neutron server via REST API using a neutron client. This is ineffective because keystone is then fully involved into the authentication process and gets overloaded.
The neutron metadata agent has been reworked to use RPC by default to connect to a server since Kilo release. This is a typical way of interacting between neutron server and its agents. If neutron server does not support metadata RPC then neutron client will be used.
Warning
Do not run the
neutron-ns-metadata-proxy
proxy namespace as root on a node with the L3 agent running. In OpenStack Kilo and newer, you can change the permissions of neutron-ns-metadata-proxy
after the proxy installation using the metadata_proxy_user
and metadata_proxy_group
options.
9.1.18. Metering Agent
Use the following options in the
metering_agent.ini
file for the Metering agent.
Configuration option = Default value | Description |
---|---|
[DEFAULT] | |
driver = neutron.services.metering.drivers.noop.noop_driver.NoopMeteringDriver
|
(StrOpt) Metering driver |
measure_interval = 30
|
(IntOpt) Interval between two metering measures |
[AGENT] | |
report_interval = 30
|
(FloatOpt) Seconds between nodes reporting state to server; should be less than agent_down_time, best if it is half or less than agent_down_time. |
9.1.19. Nova
Use the following options in the
neutron.conf
file to change nova-related settings.
Configuration option = Default value | Description |
---|---|
[nova] | |
auth_plugin = None
|
(StrOpt) Name of the plugin to load |
auth_section = None
|
(StrOpt) Config Section from which to load plugin specific options |
cafile = None
|
(StrOpt) PEM encoded Certificate Authority to use when verifying HTTPs connections. |
certfile = None
|
(StrOpt) PEM encoded client certificate cert file |
insecure = False
|
(BoolOpt) Verify HTTPS connections. |
keyfile = None
|
(StrOpt) PEM encoded client certificate key file |
region_name = None
|
(StrOpt) Name of nova region to use. Useful if keystone manages more than one region. |
timeout = None
|
(IntOpt) Timeout value for http requests |
9.1.20. Policy
Use the following options in the
neutron.conf
file to change policy settings.
Configuration option = Default value | Description |
---|---|
[DEFAULT] | |
allow_overlapping_ips = False
|
(BoolOpt) Allow overlapping IP support in Neutron |
9.1.21. Quotas
Use the following options in the
neutron.conf
file for the quota system.
Configuration option = Default value | Description |
---|---|
[DEFAULT] | |
max_routes = 30
|
(IntOpt) Maximum number of routes |
[QUOTAS] | |
default_quota = -1
|
(IntOpt) Default number of resource allowed per tenant. A negative value means unlimited. |
quota_driver = neutron.db.quota.driver.DbQuotaDriver
|
(StrOpt) Default driver to use for quota checks |
quota_firewall = 1
|
(IntOpt) Number of firewalls allowed per tenant. A negative value means unlimited. |
quota_firewall_policy = 1
|
(IntOpt) Number of firewall policies allowed per tenant. A negative value means unlimited. |
quota_firewall_rule = 100
|
(IntOpt) Number of firewall rules allowed per tenant. A negative value means unlimited. |
quota_floatingip = 50
|
(IntOpt) Number of floating IPs allowed per tenant. A negative value means unlimited. |
quota_health_monitor = -1
|
(IntOpt) Number of health monitors allowed per tenant. A negative value means unlimited. |
quota_healthmonitor = -1
|
(IntOpt) Number of health monitors allowed per tenant. A negative value means unlimited. |
quota_items = network, subnet, port
|
(ListOpt) Resource name(s) that are supported in quota features. This option is now deprecated for removal. |
quota_listener = -1
|
(IntOpt) Number of Loadbalancer Listeners allowed per tenant. A negative value means unlimited. |
quota_loadbalancer = 10
|
(IntOpt) Number of LoadBalancers allowed per tenant. A negative value means unlimited. |
quota_member = -1
|
(IntOpt) Number of pool members allowed per tenant. A negative value means unlimited. |
quota_network = 10
|
(IntOpt) Number of networks allowed per tenant. A negative value means unlimited. |
quota_network_gateway = 5
|
(IntOpt) Number of network gateways allowed per tenant, -1 for unlimited |
quota_packet_filter = 100
|
(IntOpt) Number of packet_filters allowed per tenant, -1 for unlimited |
quota_pool = 10
|
(IntOpt) Number of pools allowed per tenant. A negative value means unlimited. |
quota_port = 50
|
(IntOpt) Number of ports allowed per tenant. A negative value means unlimited. |
quota_rbac_entry = 10
|
(IntOpt) Default number of RBAC entries allowed per tenant. A negative value means unlimited. |
quota_router = 10
|
(IntOpt) Number of routers allowed per tenant. A negative value means unlimited. |
quota_security_group = 10
|
(IntOpt) Number of security groups allowed per tenant. A negative value means unlimited. |
quota_security_group_rule = 100
|
(IntOpt) Number of security rules allowed per tenant. A negative value means unlimited. |
quota_subnet = 10
|
(IntOpt) Number of subnets allowed per tenant, A negative value means unlimited. |
quota_vip = 10
|
(IntOpt) Number of vips allowed per tenant. A negative value means unlimited. |
track_quota_usage = True
|
(BoolOpt) Keep in track in the database of current resourcequota usage. Plugins which do not leverage the neutron database should set this flag to False |
9.1.22. Scheduler
Use the following options in the
neutron.conf
file to change scheduler settings.
Configuration option = Default value | Description |
---|---|
[DEFAULT] | |
network_auto_schedule = True
|
(BoolOpt) Allow auto scheduling networks to DHCP agent. |
network_scheduler_driver = neutron.scheduler.dhcp_agent_scheduler.WeightScheduler
|
(StrOpt) Driver to use for scheduling network to DHCP agent |
router_auto_schedule = True
|
(BoolOpt) Allow auto scheduling of routers to L3 agent. |
router_delete_namespaces = True
|
(BoolOpt) Delete namespace after removing a router.This option is deprecated and will be removed in a future release. |
router_scheduler_driver = neutron.scheduler.l3_agent_scheduler.LeastRoutersScheduler
|
(StrOpt) Driver to use for scheduling router to a default L3 agent |
9.1.23. Security Groups
Use the following options in the configuration file for your driver to change security group settings.
Configuration option = Default value | Description |
---|---|
[SECURITYGROUP] | |
defer_apply = True
|
(BoolOpt) Enable defer_apply on security bridge. |
enable_ipset = True
|
(BoolOpt) Use ipset to speed-up the iptables based security groups. |
enable_security_group = True
|
(BoolOpt) Controls whether the neutron security group API is enabled in the server. It should be false when using no security groups or using the nova security group API. |
firewall_driver = None
|
(StrOpt) Driver for security groups firewall in the L2 agent |
ovsvapp_firewall_driver = networking_vsphere.drivers.ovs_firewall.OVSFirewallDriver
|
(StrOpt) DriverManager implementation for OVS based Firewall. |
security_bridge_mapping = br-sec
|
(StrOpt) <security_bridge>:<phy_interface> |
Note
Now Networking uses iptables to achieve security group functions. In L2 agent with
enable_ipset
option enabled, it makes use of IPset to improve security group's performance, as it represents a hash set which is insensitive to the number of elements.
When a port is created, L2 agent will add an additional IPset chain to it's iptables chain, if the security group that this port belongs to has rules between other security group, the member of that security group will be added to the ipset chain.
If a member of a security group is changed, it used to reload iptables rules which is expensive. However, when IPset option is enabled on L2 agent, it does not need to reload iptables if only members of security group were changed, it should just update an IPset.
Note
A single default security group has been introduced in order to avoid race conditions when creating a tenant's default security group. The race conditions are caused by the uniqueness check of a new security group name. A table
default_security_group
implements such a group. It has tenant_id
field as a primary key and security_group_id
, which is an identifier of a default security group. The migration that introduces this table has a sanity check that verifies if a default security group is not duplicated in any tenant.
9.1.24. SSL and Certification Authority
Use the following options in the
neutron.conf
file to enable SSL.
Configuration option = Default value | Description |
---|---|
[DEFAULT] | |
ssl_ca_file = None
|
(StrOpt) CA certificate file to use to verify connecting clients |
ssl_cert_file = None
|
(StrOpt) Certificate file to use when starting the server securely |
ssl_key_file = None
|
(StrOpt) Private key file to use when starting the server securely |