1057 lines
49 KiB
Ruby
1057 lines
49 KiB
Ruby
# encoding: UTF-8
|
|
#
|
|
# Cookbook Name:: openstack-network
|
|
# Attributes:: default
|
|
#
|
|
# Copyright 2013, AT&T
|
|
# Copyright 2014, IBM Corp.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
#
|
|
|
|
# Set to some text value if you want templated config files
|
|
# to contain a custom banner at the top of the written file
|
|
default['openstack']['network']['custom_template_banner'] = '
|
|
# This file autogenerated by Chef
|
|
# Do not edit, changes will be overwritten
|
|
'
|
|
|
|
default['openstack']['network']['verbose'] = 'False'
|
|
default['openstack']['network']['debug'] = 'False'
|
|
default['openstack']['network']['auth_strategy'] = 'keystone'
|
|
|
|
default['openstack']['network']['state_path'] = '/var/lib/neutron'
|
|
default['openstack']['network']['lock_path'] = '$state_path/lock'
|
|
|
|
# Specify policy.json remote file to import
|
|
default['openstack']['network']['policyfile_url'] = nil
|
|
|
|
# DB Stamp comes late in dev cycle, allow override for development and test
|
|
default['openstack']['network']['db_stamp'] = node['openstack']['release']
|
|
|
|
# Gets set in the Network Endpoint when registering with Keystone
|
|
default['openstack']['network']['region'] = node['openstack']['region']
|
|
default['openstack']['network']['service_user'] = 'neutron'
|
|
default['openstack']['network']['service_role'] = 'admin'
|
|
default['openstack']['network']['service_name'] = 'neutron'
|
|
default['openstack']['network']['service_type'] = 'network'
|
|
default['openstack']['network']['description'] = 'OpenStack Networking service'
|
|
|
|
default['openstack']['network']['rabbit_server_chef_role'] = 'rabbitmq-server'
|
|
|
|
# Used in the Keystone authtoken middleware configuration
|
|
default['openstack']['network']['service_tenant_name'] = 'service'
|
|
default['openstack']['network']['service_user'] = 'neutron'
|
|
default['openstack']['network']['service_role'] = 'admin'
|
|
|
|
# The maximum number of seconds we will wait for an agent to checkin
|
|
default['openstack']['network']['api']['agent']['agent_down_time'] = 75
|
|
|
|
# The default agent reporting interval in seconds
|
|
default['openstack']['network']['api']['agent']['agent_report_interval'] = 30
|
|
|
|
# The agent signing directory for api server
|
|
default['openstack']['network']['api']['agent']['signing_dir'] = '/var/lib/neutron/keystone-signing'
|
|
|
|
# Keystone PKI signing directory.
|
|
default['openstack']['network']['api']['auth']['cache_dir'] = '/var/cache/neutron/api'
|
|
|
|
# The auth api version used to interact with identity service.
|
|
default['openstack']['network']['api']['auth']['version'] = node['openstack']['api']['auth']['version']
|
|
|
|
# Number of separate worker processes to spawn.
|
|
default['openstack']['network']['api_workers'] = 8
|
|
|
|
# Number of separate RPC worker processes to spawn.
|
|
default['openstack']['network']['rpc_workers'] = 8
|
|
|
|
# logging attribute
|
|
default['openstack']['network']['log_dir'] = '/var/log/neutron'
|
|
default['openstack']['network']['syslog']['use'] = false
|
|
|
|
# The driver for Quota management in Neutron. Possible values:
|
|
# neutron.quota.ConfDriver
|
|
# neutron.db.quota_db.DbQuotaDriver (default)
|
|
#
|
|
# Note: set this to the DbDriver if you want to be able to update
|
|
# quotas for networks/subnets/security groups
|
|
default['openstack']['network']['quota']['driver'] = 'neutron.db.quota_db.DbQuotaDriver'
|
|
|
|
# default quotas will be used when no more specific tenant entry exists
|
|
# when using the DBDriver - override them below to adjust the default
|
|
# quotas
|
|
|
|
# resource name(s) that are supported in quota features
|
|
default['openstack']['network']['quota']['items'] = 'network,subnet,port'
|
|
|
|
# default number of resource allowed per tenant, minus for unlimited
|
|
# however if more specific setting exists for a quota resource (all known
|
|
# quota resources are specified below) those numbers will be used instead
|
|
# so unless new resources are introduces, this has no effect
|
|
default['openstack']['network']['quota']['default'] = -1
|
|
|
|
# number of networks allowed per tenant, and minus means unlimited
|
|
default['openstack']['network']['quota']['network'] = 100
|
|
|
|
# number of subnets allowed per tenant, and minus means unlimited
|
|
default['openstack']['network']['quota']['subnet'] = 100
|
|
|
|
# number of ports allowed per tenant, and minus means unlimited
|
|
default['openstack']['network']['quota']['port'] = 8000
|
|
|
|
# number of security groups allowed per tenant, and minus means unlimited
|
|
default['openstack']['network']['quota']['security_group'] = 1000
|
|
|
|
# number of security group rules allowed per tenant, and minus means unlimited
|
|
default['openstack']['network']['quota']['security_group_rule'] = 1000
|
|
|
|
# Whether or not we want to disable offloading
|
|
# on all the NIC interfaces (currently only supports
|
|
# ubuntu and debian). This can help if openvswitch
|
|
# or nicira plugins are crashing the sdn routers
|
|
default['openstack']['network']['disable_offload'] = false
|
|
|
|
# configure neutron ha tool installation parameters
|
|
default['openstack']['network']['neutron_ha_cmd_cron'] = false
|
|
default['openstack']['network']['neutron_ha_cmd'] = '/usr/local/bin/neutron-ha-tool.py'
|
|
default['openstack']['network']['cron_l3_healthcheck'] = '*/1'
|
|
default['openstack']['network']['cron_replicate_dhcp'] = '*/1'
|
|
|
|
# (ListOpt) Specify service providers (drivers) for advanced services like loadbalancer, VPN, Firewall.
|
|
# Must be in form:
|
|
# service_provider=<service_type>:<name>:<driver>[:default]
|
|
# List of allowed service type include LOADBALANCER, FIREWALL, VPN
|
|
# Combination of <service type> and <name> must be unique; <driver> must also be unique
|
|
# this is multiline option, example for default provider:
|
|
# service_provider=LOADBALANCER:name:lbaas_plugin_driver_path:default
|
|
# example of non-default provider:
|
|
# service_provider=FIREWALL:name2:firewall_driver_path
|
|
# --- Reference implementations ---
|
|
default['openstack']['network']['service_provider'] = []
|
|
|
|
# The core plugin to use for neutron
|
|
default['openstack']['network']['core_plugin'] = 'neutron.plugins.ml2.plugin.Ml2Plugin'
|
|
|
|
# additional service plugins to use for neutron
|
|
# e.g. neutron.plugins.services.agent_loadbalancer.plugin.LoadBalancerPlugin
|
|
# for the loadbalancer reference implementation
|
|
default['openstack']['network']['service_plugins'] = []
|
|
|
|
# The bridging interface driver.
|
|
# This is used by the L3, DHCP and LBaaS agents.
|
|
# Options are:
|
|
#
|
|
# - neutron.agent.linux.interface.OVSInterfaceDriver
|
|
# - neutron.agent.linux.interface.BridgeInterfaceDriver
|
|
#
|
|
default['openstack']['network']['interface_driver'] = 'neutron.agent.linux.interface.OVSInterfaceDriver'
|
|
|
|
# Maps the above core plugin driver to a simple name
|
|
# This is used in the neutron_plugin_package package name and common recipe case statements
|
|
default['openstack']['network']['core_plugin_map'] = {
|
|
'ovsneutronpluginv2' => 'openvswitch',
|
|
'linuxbridgepluginv2' => 'linuxbridge',
|
|
'ml2plugin' => 'ml2'
|
|
}
|
|
|
|
# This is used by SUSE to setup the sysconfig neutron initfile
|
|
default['openstack']['network']['plugin_conf_map'] = {
|
|
'ovsneutronpluginv2' => 'openvswitch/ovs_neutron_plugin.ini',
|
|
'linuxbridgepluginv2' => 'linuxbridge/linuxbridge_conf.ini',
|
|
'ml2plugin' => 'ml2/ml2_conf.ini'
|
|
}
|
|
|
|
# The agent can use other DHCP drivers. Dnsmasq is the simplest and requires
|
|
# no additional setup of the DHCP server.
|
|
default['openstack']['network']['dhcp_driver'] = 'neutron.agent.linux.dhcp.Dnsmasq'
|
|
|
|
# Use namespaces and optionally allow overlapping IPs. You
|
|
# must enable namespaces to use overlapping ips. Also,
|
|
# you must have kernel build with CONFIG_NET_NS=y and
|
|
# iproute2 package that supports namespaces.
|
|
default['openstack']['network']['use_namespaces'] = 'True'
|
|
default['openstack']['network']['allow_overlapping_ips'] = 'True'
|
|
|
|
# use neutron root wrap
|
|
default['openstack']['network']['use_rootwrap'] = true
|
|
|
|
# DHCP lease duration
|
|
default['openstack']['network']['dhcp_lease_duration'] = 86400
|
|
|
|
# Driver or drivers to handle sending notifications and control exchange
|
|
default['openstack']['network']['notification_driver'] = 'neutron.openstack.common.notifier.rpc_notifier'
|
|
default['openstack']['network']['control_exchange'] = node['openstack']['mq']['network']['control_exchange']
|
|
|
|
# Common rpc definitions
|
|
default['openstack']['network']['rpc_thread_pool_size'] = 240
|
|
default['openstack']['network']['rpc_conn_pool_size'] = 100
|
|
default['openstack']['network']['rpc_response_timeout'] = 300
|
|
default['openstack']['network']['rpc_cast_timeout'] = 300
|
|
|
|
# ======== Neutron Nova interactions ==========
|
|
# Send notification to nova when port status is active.
|
|
default['openstack']['network']['nova']['notify_nova_on_port_status_changes'] = 'True'
|
|
|
|
# Send notifications to nova when port data (fixed_ips/floatingips) change
|
|
# so nova can update it's cache.
|
|
default['openstack']['network']['nova']['notify_nova_on_port_data_changes'] = 'True'
|
|
|
|
# Name of nova region to use. Useful if keystone manages more than one region
|
|
default['openstack']['network']['nova']['region_name'] = node['openstack']['region']
|
|
|
|
# Username for connection to nova in admin context
|
|
default['openstack']['network']['nova']['admin_username'] = 'nova'
|
|
|
|
# Version for connection to nova
|
|
# TODO: (MRV) Need to allow for this in Common.
|
|
default['openstack']['network']['nova']['url_version'] = '/v2'
|
|
|
|
# The uuid of the nova tenant
|
|
# Nil will cause the uuid to be queried from keystone.
|
|
default['openstack']['network']['nova']['admin_tenant_id'] = nil
|
|
|
|
# Number of seconds between sending events to nova if there are any events to send
|
|
default['openstack']['network']['nova']['send_events_interval'] = 2
|
|
|
|
# ============================= DHCP Agent Configuration ===================
|
|
|
|
# The scheduler class to use for scheduling to DHCP agents
|
|
default['openstack']['network']['dhcp']['scheduler'] = 'neutron.scheduler.dhcp_agent_scheduler.ChanceScheduler'
|
|
|
|
# Override the default mtu setting given to virtual machines
|
|
# to 1454 to allow for tunnel and other encapsulation overhead. You
|
|
# can adjust this from 1454 to 1500 if you do not want any lowering
|
|
# of the default guest MTU.
|
|
default['openstack']['network']['dhcp']['dhcp-option'] = '26,1454'
|
|
|
|
# Number of seconds between sync of DHCP agent with Neutron API server
|
|
default['openstack']['network']['dhcp']['resync_interval'] = 5
|
|
|
|
# OVS based plugins(Ryu, NEC, NVP, BigSwitch/Floodlight) that use OVS
|
|
# as OpenFlow switch and check port status
|
|
default['openstack']['network']['dhcp']['ovs_use_veth'] = 'False'
|
|
|
|
# The DHCP server can assist with providing metadata support on isolated
|
|
# networks. Setting this value to True will cause the DHCP server to append
|
|
# specific host routes to the DHCP request. The metadata service will only
|
|
# be activated when the subnet gateway_ip is None. The guest instance must
|
|
# be configured to request host routes via DHCP (Option 121).
|
|
default['openstack']['network']['dhcp']['enable_isolated_metadata'] = 'False'
|
|
|
|
# Allows for serving metadata requests coming from a dedicated metadata
|
|
# access network whose cidr is 169.254.169.254/16 (or larger prefix), and
|
|
# is connected to a Neutron router from which the VMs send metadata
|
|
# request. In this case DHCP Option 121 will not be injected in VMs, as
|
|
# they will be able to reach 169.254.169.254 through a router.
|
|
# This option requires enable_isolated_metadata = True
|
|
default['openstack']['network']['dhcp']['enable_metadata_network'] = 'False'
|
|
|
|
# On ubuntu precise, we build dnsmasq from source to fetch a more recent
|
|
# version of dnsmasq since a backport is not available. For any other
|
|
# platform, dnsmasq will be installed as a package
|
|
#
|
|
# See https://lists.launchpad.net/openstack/msg11696.html
|
|
default['openstack']['network']['dhcp']['dnsmasq_url'] = 'https://codeload.github.com/guns/dnsmasq/tar.gz/v2.65'
|
|
|
|
# allow a wrapper to do this another way or use it's own package
|
|
default['openstack']['network']['dhcp']['dnsmasq_compile'] = true
|
|
|
|
# The name of the file we will fetch
|
|
default['openstack']['network']['dhcp']['dnsmasq_filename'] = 'v2.65.tar.gz'
|
|
|
|
# The checksum of the remote file we fetched
|
|
default['openstack']['network']['dhcp']['dnsmasq_checksum'] = 'f6cab8c64cb612089174f50927a05e2b'
|
|
|
|
# The package architecture that will be built which should match the
|
|
# archecture of the server this cookbook will run on which will be
|
|
# amd64 or i386
|
|
default['openstack']['network']['dhcp']['dnsmasq_architecture'] = 'amd64'
|
|
|
|
# The debian package version that the above tarball will produce
|
|
default['openstack']['network']['dhcp']['dnsmasq_dpkgversion'] = '2.65-1'
|
|
|
|
# Limit number of leases to prevent a denial-of-service.
|
|
default['openstack']['network']['dhcp']['dnsmasq_lease_max'] = 16777216
|
|
|
|
# Upstream resolver to use
|
|
# This will be used by dnsmasq to resolve recursively
|
|
# but will not be used if the tenant specifies a dns
|
|
# server in their subnet
|
|
#
|
|
# Defaults are spread out across multiple, presumably
|
|
# reliable, upstream providers
|
|
#
|
|
# 8.8.8.8 is Google
|
|
# 209.244.0.3 is Level3
|
|
#
|
|
# May be a comma separated list of servers
|
|
default['openstack']['network']['dhcp']['upstream_dns_servers'] = ['8.8.8.8', '209.244.0.3']
|
|
|
|
# Set the default domain in dnsmasq
|
|
default['openstack']['network']['dhcp']['default_domain'] = 'openstacklocal'
|
|
|
|
# ============================= L3 Agent Configuration =====================
|
|
|
|
# The scheduler class to use for scheduling routers to L3 agents
|
|
default['openstack']['network']['l3']['scheduler'] = 'neutron.scheduler.l3_agent_scheduler.ChanceScheduler'
|
|
|
|
# If use_namespaces is set as False then the agent can only configure one router.
|
|
# This is done by setting the specific router_id.
|
|
default['openstack']['network']['l3']['router_id'] = nil
|
|
|
|
# Each L3 agent can be associated with at most one external network. This
|
|
# value should be set to the UUID of that external network. If empty,
|
|
# the agent will enforce that only a single external networks exists and
|
|
# use that external network id
|
|
default['openstack']['network']['l3']['gateway_external_network_id'] = nil
|
|
|
|
# Indicates that this L3 agent should also handle routers that do not have
|
|
# an external network gateway configured. This option should be True only
|
|
# for a single agent in a Neutron deployment, and may be False for all agents
|
|
# if all routers must have an external network gateway
|
|
default['openstack']['network']['l3']['handle_internal_only_routers'] = 'True'
|
|
|
|
# Name of bridge used for external network traffic. This should be set to
|
|
# empty value for the linux bridge
|
|
default['openstack']['network']['l3']['external_network_bridge'] = 'br-ex'
|
|
|
|
# Interface to use for external bridge.
|
|
default['openstack']['network']['l3']['external_network_bridge_interface'] = 'eth1'
|
|
|
|
# TCP Port used by Neutron metadata server
|
|
default['openstack']['network']['l3']['metadata_port'] = 9697
|
|
|
|
# Send this many gratuitous ARPs for HA setup. Set it below or equal to 0
|
|
# to disable this feature.
|
|
default['openstack']['network']['l3']['send_arp_for_ha'] = 3
|
|
|
|
# seconds between re-sync routers' data if needed
|
|
default['openstack']['network']['l3']['periodic_interval'] = 40
|
|
|
|
# seconds to start to sync routers' data after
|
|
# starting agent
|
|
default['openstack']['network']['l3']['periodic_fuzzy_delay'] = 5
|
|
|
|
# ============================= Metadata Agent Configuration ===============
|
|
|
|
# The location of the Nova Metadata API service to proxy to (nil uses default)
|
|
default['openstack']['network']['metadata']['nova_metadata_ip'] = '127.0.0.1'
|
|
default['openstack']['network']['metadata']['nova_metadata_port'] = 8775
|
|
|
|
# The name of the secret databag containing the metadata secret
|
|
default['openstack']['network']['metadata']['secret_name'] = 'neutron_metadata_secret'
|
|
|
|
# ============================= LBaaS Agent Configuration ==================
|
|
|
|
# node['openstack']['network']['neutron_loadbalancer'] is deprecated. Use
|
|
# node['openstack']['network']['service_plugins'] for the loadbalancer plugin.
|
|
# See that attribute for details.
|
|
|
|
default['openstack']['network']['lbaas']['device_driver'] = 'neutron.services.loadbalancer.drivers.haproxy.namespace_driver.HaproxyNSDriver'
|
|
|
|
# Number of seconds between sync of LBaaS agent with Neutron API server
|
|
default['openstack']['network']['lbaas']['periodic_interval'] = 10
|
|
|
|
# Set lbaas plugin
|
|
# Supported types are: 'ovs' (ovs based plugins(OVS, Ryu, NEC, NVP, BigSwitch/Floodlight))
|
|
# and 'linuxbridge'.
|
|
default['openstack']['network']['lbaas_plugin'] = 'ovs'
|
|
|
|
# ============================= OVS Plugin Configuration ===================
|
|
|
|
# Type of network to allocate for tenant networks. The default value 'local' is
|
|
# useful only for single-box testing and provides no connectivity between hosts.
|
|
# You MUST either change this to 'vlan' and configure network_vlan_ranges below
|
|
# or change this to 'gre' and configure tunnel_id_ranges below in order for tenant
|
|
# networks to provide connectivity between hosts. Set to 'none' to disable creation
|
|
# of tenant networks.
|
|
default['openstack']['network']['openvswitch']['tenant_network_type'] = 'local'
|
|
|
|
# Comma-separated list of <physical_network>[:<vlan_min>:<vlan_max>] tuples enumerating
|
|
# ranges of VLAN IDs on named physical networks that are available for allocation.
|
|
# All physical networks listed are available for flat and VLAN provider network
|
|
# creation. Specified ranges of VLAN IDs are available for tenant network
|
|
# allocation if tenant_network_type is 'vlan'. If empty, only gre and local
|
|
# networks may be created
|
|
#
|
|
# Example: network_vlan_ranges = physnet1:1000:2999
|
|
default['openstack']['network']['openvswitch']['network_vlan_ranges'] = nil
|
|
|
|
# Set to True in the server and the agents to enable support
|
|
# for GRE or VXLAN networks. Requires kernel support for OVS patch ports and
|
|
# GRE or VXLAN tunneling.
|
|
#
|
|
# WARNING: This option will be deprecated in the Icehouse release, at which
|
|
# point setting tunnel_type below will be required to enable
|
|
# tunneling.
|
|
default['openstack']['network']['openvswitch']['enable_tunneling'] = 'False'
|
|
|
|
# The type of tunnel network, if any, supported by the plugin. If
|
|
# this is set, it will cause tunneling to be enabled. If this is not set and
|
|
# the option enable_tunneling is set, this will default to 'gre'.
|
|
# 'gre' or 'vxlan'
|
|
default['openstack']['network']['openvswitch']['tunnel_type'] = ''
|
|
|
|
# Comma-separated list of <tun_min>:<tun_max> tuples
|
|
# enumerating ranges of GRE tunnel IDs that are available for tenant
|
|
# network allocation if tenant_network_type is 'gre'.
|
|
#
|
|
# Example: tunnel_id_ranges = 1:1000
|
|
default['openstack']['network']['openvswitch']['tunnel_id_ranges'] = nil
|
|
|
|
# Do not change this parameter unless you have a good reason to.
|
|
# This is the name of the OVS integration bridge. There is one per hypervisor.
|
|
# The integration bridge acts as a virtual 'patch bay'. All VM VIFs are
|
|
# attached to this bridge and then 'patched' according to their network
|
|
# connectivity
|
|
default['openstack']['network']['openvswitch']['integration_bridge'] = 'br-int'
|
|
|
|
# Only used for the agent if tunnel_id_ranges (above) is not empty for
|
|
# the server. In most cases, the default value should be fine
|
|
default['openstack']['network']['openvswitch']['tunnel_bridge'] = 'br-tun'
|
|
|
|
# Peer patch port in integration bridge for tunnel bridge (nil uses default)
|
|
default['openstack']['network']['openvswitch']['int_peer_patch_port'] = nil
|
|
|
|
# Peer patch port in tunnel bridge for integration bridge (nil uses default)
|
|
default['openstack']['network']['openvswitch']['tun_peer_patch_port'] = nil
|
|
|
|
# Comma-separated list of <physical_network>:<bridge> tuples
|
|
# mapping physical network names to the agent's node-specific OVS
|
|
# bridge names to be used for flat and VLAN networks. The length of
|
|
# bridge names should be no more than 11. Each bridge must
|
|
# exist, and should have a physical network interface configured as a
|
|
# port. All physical networks listed in network_vlan_ranges on the
|
|
# server should have mappings to appropriate bridges on each agent.
|
|
#
|
|
# Example: bridge_mappings = physnet1:br-eth1
|
|
default['openstack']['network']['openvswitch']['bridge_mappings'] = nil
|
|
|
|
# Create OVS data network bridge for the physical network and configure it
|
|
# with the specified port. If nil or empty string is specified, the data
|
|
# network bridge will not be created.
|
|
# Format: <data network bridge name>:<external interface>
|
|
#
|
|
# Example: bridge_mapping_interface = br-eth1:eth1
|
|
default['openstack']['network']['openvswitch']['bridge_mapping_interface'] = nil
|
|
|
|
# Agent's polling interval in seconds
|
|
default['openstack']['network']['openvswitch']['polling_interval'] = 2
|
|
|
|
# Firewall driver for realizing neutron security group function
|
|
default['openstack']['network']['openvswitch']['fw_driver'] = 'neutron.agent.linux.iptables_firewall.OVSHybridIptablesFirewallDriver'
|
|
|
|
# Controls if neutron security group is enabled or not.
|
|
# It should be false when you use nova security group.
|
|
default['openstack']['network']['openvswitch']['enable_security_group'] = 'True'
|
|
|
|
# OVS host for GRE tunnel. If bind_interface is set, it will set the host IP of
|
|
# this interface, otherwise use default host.
|
|
default['openstack']['network']['openvswitch']['host'] = '127.0.0.1'
|
|
default['openstack']['network']['openvswitch']['bind_interface'] = nil
|
|
|
|
|
|
# The newest version of OVS which comes with 12.04 Precise is 1.4.0
|
|
# Which is legacy. Should we compile a newer version from source?
|
|
# If so, set ['openstack']['network']['openvswitch']['use_source_version']
|
|
# to true, and configure the packages, versions, checksums, etc. you wish
|
|
# to use
|
|
default['openstack']['network']['openvswitch']['use_source_version'] = false
|
|
|
|
# Url of the OVS source tarball
|
|
default['openstack']['network']['openvswitch']['openvswitch_url'] = 'http://git.openvswitch.org/cgi-bin/gitweb.cgi?p=openvswitch;a=snapshot;h=88dbaa9dc554d0ace1867bf23144788bd6f700bb;sf=tgz'
|
|
|
|
# Filename the above URL actually downloads.
|
|
default['openstack']['network']['openvswitch']['openvswitch_filename'] = 'openvswitch-88dbaa9.tar.gz'
|
|
|
|
# What is the base filename (essentially, the above without the .tar.gz)
|
|
default['openstack']['network']['openvswitch']['openvswitch_base_filename'] = 'openvswitch-88dbaa9'
|
|
|
|
# Checksum of the file for verification
|
|
default['openstack']['network']['openvswitch']['openvswitch_checksum'] = '22df718eb81fcfe93228e9bba8575e50'
|
|
|
|
# What version of the package does this install
|
|
default['openstack']['network']['openvswitch']['openvswitch_dpkgversion'] = '1.10.2-1'
|
|
|
|
# What arch are we building for
|
|
default['openstack']['network']['openvswitch']['openvswitch_architecture'] = 'amd64'
|
|
|
|
# ============================= LinuxBridge Plugin Configuration ===========
|
|
|
|
# Type of network to allocate for tenant networks. The
|
|
# default value 'local' is useful only for single-box testing and
|
|
# provides no connectivity between hosts. You MUST change this to
|
|
# 'vlan' and configure network_vlan_ranges below in order for tenant
|
|
# networks to provide connectivity between hosts. Set to 'none' to
|
|
# disable creation of tenant networks.
|
|
default['openstack']['network']['linuxbridge']['tenant_network_type'] = 'local'
|
|
|
|
# Comma-separated list of <physical_network>[:<vlan_min>:<vlan_max>] tuples enumerating
|
|
# ranges of VLAN IDs on named physical networks that are available for allocation.
|
|
# All physical networks listed are available for flat and VLAN provider network
|
|
# creation. Specified ranges of VLAN IDs are available for tenant network
|
|
# allocation if tenant_network_type is 'vlan'. If empty, only gre and local
|
|
# networks may be created.
|
|
#
|
|
# Example: network_vlan_ranges = physnet1:1000:2999
|
|
default['openstack']['network']['linuxbridge']['network_vlan_ranges'] = ''
|
|
|
|
# (ListOpt) Comma-separated list of
|
|
# <physical_network>:<physical_interface> tuples mapping physical
|
|
# network names to the agent's node-specific physical network
|
|
# interfaces to be used for flat and VLAN networks. All physical
|
|
# networks listed in network_vlan_ranges on the server should have
|
|
# mappings to appropriate interfaces on each agent.
|
|
#
|
|
# Example: physical_interface_mappings = physnet1:eth1
|
|
default['openstack']['network']['linuxbridge']['physical_interface_mappings'] = ''
|
|
|
|
# (BoolOpt) enable VXLAN on the agent
|
|
# VXLAN support can be enabled when agent is managed by ml2 plugin using
|
|
# linuxbridge mechanism driver. Useless if set while using linuxbridge plugin.
|
|
default['openstack']['network']['linuxbridge']['enable_vxlan'] = false
|
|
|
|
# (IntOpt) use specific TTL for vxlan interface protocol packets
|
|
default['openstack']['network']['linuxbridge']['ttl'] = ''
|
|
|
|
# (IntOpt) use specific TOS for vxlan interface protocol packets
|
|
default['openstack']['network']['linuxbridge']['tos'] = ''
|
|
|
|
# (StrOpt) multicast group to use for broadcast emulation.
|
|
# This group must be the same on all the agents.
|
|
default['openstack']['network']['linuxbridge']['vxlan_group'] = '224.0.0.1'
|
|
|
|
# (BoolOpt) Flag to enable l2population extension. This option should be used
|
|
# in conjunction with ml2 plugin l2population mechanism driver (in that case,
|
|
# both linuxbridge and l2population mechanism drivers should be loaded).
|
|
# It enables plugin to populate VXLAN forwarding table, in order to limit
|
|
# the use of broadcast emulation (multicast will be turned off if kernel and
|
|
# iproute2 supports unicast flooding - requires 3.11 kernel and iproute2 3.10)
|
|
default['openstack']['network']['linuxbridge']['l2_population'] = false
|
|
|
|
# Agent's polling interval in seconds
|
|
default['openstack']['network']['linuxbridge']['polling_interval'] = 2
|
|
|
|
# (BoolOpt) Enable server RPC compatibility with old (pre-havana)
|
|
# agents.
|
|
#
|
|
# rpc_support_old_agents = False
|
|
# Example: rpc_support_old_agents = True
|
|
default['openstack']['network']['linuxbridge']['rpc_support_old_agents'] = false
|
|
|
|
# Firewall driver for realizing neutron security group function
|
|
# firewall_driver = neutron.agent.firewall.NoopFirewallDriver
|
|
# Example: firewall_driver = neutron.agent.linux.iptables_firewall.IptablesFirewallDriver
|
|
default['openstack']['network']['linuxbridge']['firewall_driver'] = 'neutron.agent.firewall.NoopFirewallDriver'
|
|
|
|
# Controls if neutron security group is enabled or not.
|
|
# It should be false when you use nova security group.
|
|
default['openstack']['network']['linuxbridge']['enable_security_group'] = 'True'
|
|
|
|
# ============================= BigSwitch Plugin Configuration =============
|
|
|
|
# Not really sure what this is...
|
|
default['openstack']['network']['bigswitch']['servers'] = 'localhost:8080'
|
|
|
|
# ============================= Brocade Plugin Configuration ===============
|
|
|
|
# username = <mgmt admin username>
|
|
default['openstack']['network']['brocade']['switch_username'] = 'admin'
|
|
|
|
# password = <mgmt admin password>
|
|
default['openstack']['network']['brocade']['switch_password'] = 'admin'
|
|
|
|
# address = <switch mgmt ip address>
|
|
default['openstack']['network']['brocade']['switch_address'] = '127.0.0.1'
|
|
|
|
# ostype = NOS
|
|
default['openstack']['network']['brocade']['switch_ostype'] = 'NOS'
|
|
|
|
# physical_interface = <physical network name>
|
|
#
|
|
# Example:
|
|
# physical_interface = physnet1
|
|
default['openstack']['network']['brocade']['physical_interface'] = 'physnet1'
|
|
|
|
# (ListOpt) Comma-separated list of
|
|
# <physical_network>[:<vlan_min>:<vlan_max>] tuples enumerating ranges
|
|
# of VLAN IDs on named physical networks that are available for
|
|
# allocation. All physical networks listed are available for flat and
|
|
# VLAN provider network creation.
|
|
#
|
|
# Default: network_vlan_ranges =
|
|
# Example: network_vlan_ranges = physnet1:1000:2999
|
|
default['openstack']['network']['brocade']['network_vlan_ranges'] = ''
|
|
|
|
# (ListOpt) Comma-separated list of
|
|
# <physical_network>:<physical_interface> tuples mapping physical
|
|
# network names to the agent's node-specific physical network
|
|
# interfaces to be used for flat and VLAN networks. All physical
|
|
# networks listed in network_vlan_ranges on the server should have
|
|
# mappings to appropriate interfaces on each agent.
|
|
#
|
|
# Example: physical_interface_mappings = physnet1:eth1
|
|
default['openstack']['network']['brocade']['physical_interface_mappings'] = ''
|
|
|
|
# ============================= Cisco Plugin Configuration =================
|
|
|
|
# The module and class name path for the nexus plugin
|
|
default['openstack']['network']['cisco']['nexus_plugin'] = 'neutron.plugins.cisco.nexus.cisco_nexus_plugin_v2.NexusPlugin'
|
|
|
|
# The module and class name path for the vswitch plugin
|
|
default['openstack']['network']['cisco']['vswitch_plugin'] = 'neutron.plugins.openvswitch.ovs_neutron_plugin.OVSNeutronPluginV2'
|
|
|
|
# Start of the tenant VLAN range
|
|
default['openstack']['network']['cisco']['vlan_start'] = 100
|
|
|
|
# End of the tenant VLAN range
|
|
default['openstack']['network']['cisco']['vlan_end'] = 3000
|
|
|
|
# Prefix for tenant VLANs
|
|
default['openstack']['network']['cisco']['vlan_name_prefix'] = 'q-'
|
|
|
|
# Maximum number of ports
|
|
default['openstack']['network']['cisco']['max_ports'] = 100
|
|
# Max number of port profiles
|
|
default['openstack']['network']['cisco']['max_port_profiles'] = 65568
|
|
|
|
# Maximum number of networks
|
|
default['openstack']['network']['cisco']['max_networks'] = 65568
|
|
|
|
# Module and class path for switch model
|
|
default['openstack']['network']['cisco']['model_class'] = 'neutron.plugins.cisco.models.virt_phy_sw_v2.VirtualPhysicalSwitchModelV2'
|
|
|
|
# Module and class path for VLAN network manager
|
|
default['openstack']['network']['cisco']['manager_class'] = 'neutron.plugins.cisco.segmentation.l2network_vlan_mgr_v2.L2NetworkVLANMgr'
|
|
|
|
# Module and class path for the Nexus driver
|
|
default['openstack']['network']['cisco']['nexus_driver'] = 'neutron.plugins.cisco.tests.unit.v2.nexus.fake_nexus_driver.CiscoNEXUSFakeDriver'
|
|
|
|
# For each Nexus switch, add a hash to the
|
|
# node['openstack']['network']['cisco']['nexus_switches'] Hash,
|
|
# using the switch's IP address as the outer Hash key with each
|
|
# hash containing this information:
|
|
#
|
|
# - ssh_port=<ssh port>
|
|
# - username=<credential username>
|
|
# - password=<credential password>
|
|
# - hosts = [ (<hostname>,<port>), ... ]
|
|
#
|
|
# Example:
|
|
#
|
|
# node['openstack']['network']['cisco']['nexus_switches']['1.1.1.1']['ssh_port'] = 22
|
|
# node['openstack']['network']['cisco']['nexus_switches']['1.1.1.1']['username'] = 'admin'
|
|
# node['openstack']['network']['cisco']['nexus_switches']['1.1.1.1']['password'] = 'mySecretPassword'
|
|
# node['openstack']['network']['cisco']['nexus_switches']['1.1.1.1']['hosts'] = [ [ 'compute1', '1/1' ],
|
|
# [ 'compute2', '1/2' ]]
|
|
#
|
|
#
|
|
# will write the following to the Cisco plugin config INI file:
|
|
# [NEXUS_SWITCH:1.1.1.1]
|
|
# compute1=1/1
|
|
# compute2=1/2
|
|
# ssh_port=22
|
|
# username=admin
|
|
# password=mySecretPassword
|
|
#
|
|
default['openstack']['network']['cisco']['nexus_switches'] = {}
|
|
|
|
# ============================= Hyper-V Plugin Configuration ===============
|
|
|
|
# Type of network to allocate for tenant networks. The
|
|
# default value 'local' is useful only for single-box testing and
|
|
# provides no connectivity between hosts. You MUST change this to
|
|
# 'vlan' and configure network_vlan_ranges below in order for tenant
|
|
# networks to provide connectivity between hosts. Set to 'none' to
|
|
# disable creation of tenant networks.
|
|
default['openstack']['network']['hyperv']['tenant_network_type'] = 'local'
|
|
|
|
# Comma-separated list of <physical_network>[:<vlan_min>:<vlan_max>] tuples enumerating
|
|
# ranges of VLAN IDs on named physical networks that are available for allocation.
|
|
# All physical networks listed are available for flat and VLAN provider network
|
|
# creation. Specified ranges of VLAN IDs are available for tenant network
|
|
# allocation if tenant_network_type is 'vlan'. If empty, only gre and local
|
|
# networks may be created.
|
|
#
|
|
# Example: network_vlan_ranges = physnet1:1000:2999
|
|
default['openstack']['network']['hyperv']['network_vlan_ranges'] = ''
|
|
|
|
# Agent's polling interval in seconds
|
|
default['openstack']['network']['hyperv']['polling_interval'] = 2
|
|
|
|
# (ListOpt) Comma separated list of <physical_network>:<vswitch>
|
|
# where the physical networks can be expressed with wildcards,
|
|
# e.g.: .'*:external'.
|
|
# The referred external virtual switches need to be already present on
|
|
# the Hyper-V server.
|
|
# If a given physical network name will not match any value in the list
|
|
# the plugin will look for a virtual switch with the same name.
|
|
#
|
|
# Default: physical_network_vswitch_mappings = *:external
|
|
# Example: physical_network_vswitch_mappings = net1:external1,net2:external2
|
|
default['openstack']['network']['hyperv']['physical_network_vswitch_mappings'] = '*:external'
|
|
|
|
# (StrOpt) Private virtual switch name used for local networking.
|
|
#
|
|
# Default: local_network_vswitch = private
|
|
# Example: local_network_vswitch = custom_vswitch
|
|
default['openstack']['network']['hyperv']['local_network_vswitch'] = 'private'
|
|
|
|
# Firewall driver for realizing neutron security group function
|
|
default['openstack']['network']['hyperv']['firewall_driver'] = 'neutron.plugins.hyperv.agent.security_groups_driver.HyperVSecurityGroupsDriver'
|
|
|
|
# ============================= Metaplugin Plugin Configuration ============
|
|
|
|
## This is list of flavor:neutron_plugins
|
|
# extension method is used in the order of this list
|
|
default['openstack']['network']['metaplugin']['plugin_list'] = 'openvswitch:neutron.plugins.openvswitch.ovs_neutron_plugin.OVSNeutronPluginV2,linuxbridge:neutron.plugins.linuxbridge.lb_neutron_plugin.LinuxBridgePluginV2'
|
|
default['openstack']['network']['metaplugin']['l3_plugin_list'] = 'openvswitch:neutron.plugins.openvswitch.ovs_neutron_plugin.OVSNeutronPluginV2,linuxbridge:neutron.plugins.linuxbridge.lb_neutron_plugin.LinuxBridgePluginV2'
|
|
|
|
# Default 'flavor' for L2 and L3
|
|
default['openstack']['network']['metaplugin']['default_flavor'] = 'openvswitch'
|
|
default['openstack']['network']['metaplugin']['default_l3_flavor'] = 'openvswitch'
|
|
|
|
# ============================= Midonet Plugin Configuration ===============
|
|
|
|
# MidoNet API server URI
|
|
default['openstack']['network']['midonet']['midonet_uri'] = 'http://localhost:8080/midonet-api'
|
|
|
|
# MidoNet admin username
|
|
default['openstack']['network']['midonet']['username'] = 'admin'
|
|
|
|
# MidoNet admin password
|
|
default['openstack']['network']['midonet']['password'] = 'passw0rd'
|
|
|
|
# ID of the project that MidoNet admin user belongs to
|
|
default['openstack']['network']['midonet']['project_id'] = '77777777-7777-7777-7777-777777777777'
|
|
|
|
# Virtual provider router ID
|
|
default['openstack']['network']['midonet']['provider_router_id'] = '00112233-0011-0011-0011-001122334455'
|
|
|
|
# Virtual metadata router ID
|
|
default['openstack']['network']['midonet']['metadata_router_id'] = 'ffeeddcc-ffee-ffee-ffee-ffeeddccbbaa'
|
|
|
|
# ============================= NEC Plugin Configuration ===================
|
|
|
|
# Do not change this parameter unless you have a good reason to.
|
|
# This is the name of the OVS integration bridge. There is one per hypervisor.
|
|
# The integration bridge acts as a virtual 'patch port'. All VM VIFs are
|
|
# attached to this bridge and then 'patched' according to their network
|
|
# connectivity.
|
|
default['openstack']['network']['nec']['integration_bridge'] = 'br-int'
|
|
|
|
# Agent's polling interval in seconds
|
|
default['openstack']['network']['nec']['polling_interval'] = 2
|
|
|
|
# Firewall driver for realizing neutron security group function
|
|
default['openstack']['network']['nec']['firewall_driver'] = 'neutron.agent.linux.iptables_firewall.OVSHybridIptablesFirewallDriver'
|
|
|
|
# Specify OpenFlow Controller Host, Port and Driver to connect.
|
|
default['openstack']['network']['nec']['ofc_host'] = '127.0.0.1'
|
|
default['openstack']['network']['nec']['ofc_port'] = 8888
|
|
|
|
# Drivers are in neutron/plugins/nec/drivers/ .
|
|
default['openstack']['network']['nec']['ofc_driver'] = 'trema'
|
|
|
|
# PacketFilter is available when it's enabled in this configuration
|
|
# and supported by the driver.
|
|
default['openstack']['network']['nec']['ofc_enable_packet_filter'] = 'true'
|
|
|
|
# ============================= Nicira Plugin Configuration ================
|
|
|
|
# User name for NVP controller
|
|
default['openstack']['network']['nicira']['nvp_user'] = 'admin'
|
|
|
|
# Password for NVP controller
|
|
default['openstack']['network']['nicira']['nvp_password'] = 'admin'
|
|
|
|
# Total time limit for a cluster request
|
|
# (including retries across different controllers)
|
|
default['openstack']['network']['nicira']['req_timeout'] = 30
|
|
|
|
# Time before aborting a request on an unresponsive controller
|
|
default['openstack']['network']['nicira']['http_timeout'] = 10
|
|
|
|
# Maximum number of times a particular request should be retried
|
|
default['openstack']['network']['nicira']['retries'] = 2
|
|
|
|
# Maximum number of times a redirect response should be followed
|
|
default['openstack']['network']['nicira']['redirects'] = 2
|
|
|
|
# Comma-separated list of NVP controller endpoints (<ip>:<port>). When port
|
|
# is omitted, 443 is assumed. This option MUST be specified, e.g.:
|
|
default['openstack']['network']['nicira']['nvp_controllers'] = 'xx.yy.zz.ww:443, aa.bb.cc.dd, ee.ff.gg.hh.ee:80'
|
|
|
|
# UUID of the pre-existing default NVP Transport zone to be used for creating
|
|
# tunneled isolated 'Neutron' networks. This option MUST be specified, e.g.:
|
|
default['openstack']['network']['nicira']['default_tz_uuid'] = '1e8e52cf-fa7f-46b0-a14a-f99835a9cb53'
|
|
|
|
# (Optional) UUID of the cluster in NVP. It can be retrieved from NVP management
|
|
# console 'admin' section.
|
|
default['openstack']['network']['nicira']['nvp_cluster_uuid'] = '615be8e4-82e9-4fd2-b4b3-fd141e51a5a7'
|
|
|
|
# (Optional) UUID for the default l3 gateway service to use with this cluster.
|
|
# To be specified if planning to use logical routers with external gateways.
|
|
default['openstack']['network']['nicira']['default_l3_gw_service_uuid'] = ''
|
|
|
|
# (Optional) UUID for the default l2 gateway service to use with this cluster.
|
|
# To be specified for providing a predefined gateway tenant for connecting their networks.
|
|
default['openstack']['network']['nicira']['default_l2_gw_service_uuid'] = ''
|
|
|
|
# Name of the default interface name to be used on network-gateway. This value
|
|
# will be used for any device associated with a network gateway for which an
|
|
# interface name was not specified
|
|
default['openstack']['network']['nicira']['default_iface_name'] = 'breth0'
|
|
|
|
# number of network gateways allowed per tenant, -1 means unlimited
|
|
default['openstack']['network']['nicira']['quota_network_gateway'] = 5
|
|
|
|
# Maximum number of ports for each bridged logical switch
|
|
default['openstack']['network']['nicira']['max_lp_per_bridged_ls'] = 64
|
|
|
|
# Maximum number of ports for each overlay (stt, gre) logical switch
|
|
default['openstack']['network']['nicira']['max_lp_per_overlay_ls'] = 256
|
|
|
|
# Number of connects to each controller node.
|
|
default['openstack']['network']['nicira']['concurrent_connections'] = 3
|
|
|
|
# Acceptable values for 'metadata_mode' are:
|
|
# - 'access_network': this enables a dedicated connection to the metadata
|
|
# proxy for metadata server access via Neutron router.
|
|
# - 'dhcp_host_route': this enables host route injection via the dhcp agent.
|
|
# This option is only useful if running on a host that does not support
|
|
# namespaces otherwise access_network should be used.
|
|
default['openstack']['network']['nicira']['metadata_mode'] = 'access_network'
|
|
|
|
# ============================= PLUMGrid Plugin Configuration ==============
|
|
|
|
# This line should be pointing to the NOS server,
|
|
# for the PLUMgrid platform. In other deployments,
|
|
# this is known as controller
|
|
default['openstack']['network']['plumgrid']['nos_server'] = '127.0.0.1'
|
|
default['openstack']['network']['plumgrid']['nos_server_port'] = '<nos-port>'
|
|
|
|
# Authentification parameters for the NOS server.
|
|
# These are the admin credentials to manage and control
|
|
# the NOS server.
|
|
default['openstack']['network']['plumgrid']['username'] = '<nos-admin-username>'
|
|
default['openstack']['network']['plumgrid']['password'] = '<nos-admin-password>'
|
|
default['openstack']['network']['plumgrid']['servertimeout'] = 5
|
|
|
|
# Name of the network topology to be deployed by NOS
|
|
default['openstack']['network']['plumgrid']['topologyname'] = '<nos-topology-name>'
|
|
|
|
# ============================= Ryu Plugin Configuration ===================
|
|
|
|
# Do not change this parameter unless you have a good reason to.
|
|
# This is the name of the OVS integration bridge. There is one per hypervisor.
|
|
# The integration bridge acts as a virtual 'patch port'. All VM VIFs are
|
|
# attached to this bridge and then 'patched' according to their network
|
|
# connectivity.
|
|
default['openstack']['network']['ryu']['integration_bridge'] = 'br-int'
|
|
|
|
# openflow_rest_api = <host IP address of ofp rest api service>:<port: 8080>
|
|
default['openstack']['network']['ryu']['openflow_rest_api'] = '127.0.0.1:8080'
|
|
|
|
# tunnel key range: 0 < tunnel_key_min < tunnel_key_max
|
|
# VLAN: 12bits, GRE, VXLAN: 24bits
|
|
default['openstack']['network']['ryu']['tunnel_key_min'] = 1
|
|
default['openstack']['network']['ryu']['tunnel_key_max'] = '0xffffff'
|
|
|
|
# tunnel_ip = <ip address for tunneling>
|
|
# tunnel_interface = interface for tunneling
|
|
# when tunnel_ip is NOT specified, ip address is read
|
|
# from this interface
|
|
default['openstack']['network']['ryu']['tunnel_ip'] = ''
|
|
default['openstack']['network']['ryu']['tunnel_interface'] = 'eth0'
|
|
|
|
# ovsdb_port = port number on which ovsdb is listening
|
|
# ryu-agent uses this parameter to setup ovsdb.
|
|
# ovs-vsctl set-manager ptcp:<ovsdb_port>
|
|
# See set-manager section of man ovs-vsctl for details.
|
|
# currently ptcp is only supported.
|
|
# ovsdb_ip = <host IP address on which ovsdb is listening>
|
|
# ovsdb_interface = interface for ovsdb
|
|
# when ovsdb_addr NOT specifiied, ip address is gotten
|
|
# from this interface
|
|
default['openstack']['network']['ryu']['ovsdb_port'] = 6634
|
|
default['openstack']['network']['ryu']['ovsdb_ip'] = ''
|
|
default['openstack']['network']['ryu']['ovsdb_interface'] = 'eth0'
|
|
|
|
# Firewall driver for realizing neutron security group function
|
|
default['openstack']['network']['ryu']['firewall_driver'] = 'neutron.agent.linux.iptables_firewall.OVSHybridIptablesFirewallDriver'
|
|
|
|
# Agent's polling interval in seconds
|
|
default['openstack']['network']['ryu']['polling_interval'] = 2
|
|
|
|
# ============================= ML2 Plugin Configuration ===================
|
|
# (ListOpt) List of network type driver entrypoints to be loaded from
|
|
# the neutron.ml2.type_drivers namespace.
|
|
#
|
|
# type_drivers = local,flat,vlan,gre,vxlan
|
|
# Example: type_drivers = flat,vlan,gre,vxlan
|
|
default['openstack']['network']['ml2']['type_drivers'] = 'local,flat,vlan,gre,vxlan'
|
|
|
|
# (ListOpt) Ordered list of network_types to allocate as tenant
|
|
# networks. The default value 'local' is useful for single-box testing
|
|
# but provides no connectivity between hosts.
|
|
#
|
|
# tenant_network_types = local
|
|
# Example: tenant_network_types = vlan,gre,vxlan
|
|
default['openstack']['network']['ml2']['tenant_network_types'] = 'local'
|
|
|
|
# (ListOpt) Ordered list of networking mechanism driver entrypoints
|
|
# to be loaded from the neutron.ml2.mechanism_drivers namespace.
|
|
# mechanism_drivers =
|
|
# Example: mechanism_drivers = arista
|
|
# Example: mechanism_drivers = cisco,logger
|
|
default['openstack']['network']['ml2']['mechanism_drivers'] = 'openvswitch'
|
|
|
|
# (ListOpt) List of physical_network names with which flat networks
|
|
# can be created. Use * to allow flat networks with arbitrary
|
|
# physical_network names.
|
|
#
|
|
# flat_networks =
|
|
# Example:flat_networks = physnet1,physnet2
|
|
# Example:flat_networks = *
|
|
default['openstack']['network']['ml2']['flat_networks'] = ''
|
|
|
|
# (ListOpt) List of <physical_network>[:<vlan_min>:<vlan_max>] tuples
|
|
# specifying physical_network names usable for VLAN provider and
|
|
# tenant networks, as well as ranges of VLAN tags on each
|
|
# physical_network available for allocation as tenant networks.
|
|
#
|
|
# network_vlan_ranges =
|
|
# Example: network_vlan_ranges = physnet1:1000:2999,physnet2
|
|
default['openstack']['network']['ml2']['network_vlan_ranges'] = ''
|
|
|
|
# (ListOpt) Comma-separated list of <tun_min>:<tun_max> tuples enumerating
|
|
# ranges of GRE tunnel IDs that are available for tenant network allocation
|
|
default['openstack']['network']['ml2']['tunnel_id_ranges'] = ''
|
|
|
|
# (ListOpt) Comma-separated list of <vni_min>:<vni_max> tuples enumerating
|
|
# ranges of VXLAN VNI IDs that are available for tenant network allocation.
|
|
default['openstack']['network']['ml2']['vni_ranges'] = ''
|
|
|
|
# (StrOpt) Multicast group for the VXLAN interface. When configured, will
|
|
# enable sending all broadcast traffic to this multicast group. When left
|
|
# unconfigured, will disable multicast VXLAN mode.
|
|
#
|
|
# vxlan_group =
|
|
# Example: vxlan_group = 239.1.1.1
|
|
default['openstack']['network']['ml2']['vxlan_group'] = ''
|
|
|
|
# Controls if neutron security group is enabled or not.
|
|
# It should be false when you use nova security group.
|
|
default['openstack']['network']['ml2']['enable_security_group'] = 'True'
|
|
|
|
# Misc option support
|
|
# Allow additional strings to be added to neutron.conf
|
|
# For example: ['# Comment', 'key=value']
|
|
default['openstack']['network']['misc_neutron'] = []
|
|
|
|
# platform-specific settings
|
|
case platform_family
|
|
when 'fedora', 'rhel' # :pragma-foodcritic: ~FC024 - won't fix this
|
|
default['openstack']['network']['platform'] = {
|
|
'user' => 'neutron',
|
|
'group' => 'neutron',
|
|
'mysql_python_packages' => ['MySQL-python'],
|
|
'db2_python_packages' => ['python-ibm-db', 'python-ibm-db-sa'],
|
|
'postgresql_python_packages' => ['python-psycopg2'],
|
|
'nova_network_packages' => ['openstack-nova-network'],
|
|
'neutron_packages' => ['iproute', 'pyparsing', 'python-cliff', 'python-neutron', 'openstack-neutron'],
|
|
'neutron_client_packages' => ['python-neutronclient'],
|
|
'neutron_dhcp_packages' => ['openstack-neutron'],
|
|
'neutron_dhcp_build_packages' => [],
|
|
'neutron_l3_packages' => ['openstack-neutron'],
|
|
'neutron_lb_packages' => ['openstack-neutron', 'haproxy'],
|
|
'neutron_openvswitch_packages' => ['openvswitch'],
|
|
'neutron_openvswitch_agent_packages' => ['openstack-neutron-openvswitch'],
|
|
'neutron_linuxbridge_agent_packages' => ['openstack-neutron-linuxbridge'],
|
|
'neutron_metadata_agent_packages' => [],
|
|
'neutron_plugin_package' => 'openstack-neutron-%plugin%',
|
|
'neutron_server_packages' => ['openstack-neutron-ml2'],
|
|
'neutron_dhcp_agent_service' => 'neutron-dhcp-agent',
|
|
'neutron_l3_agent_service' => 'neutron-l3-agent',
|
|
'neutron_lb_agent_service' => 'neutron-lbaas-agent',
|
|
'neutron_metadata_agent_service' => 'neutron-metadata-agent',
|
|
'neutron_openvswitch_service' => 'openvswitch',
|
|
'neutron_openvswitch_agent_service' => 'neutron-openvswitch-agent',
|
|
'neutron_linuxbridge_agent_service' => 'neutron-linuxbridge-agent',
|
|
'neutron_server_service' => 'neutron-server',
|
|
'package_overrides' => ''
|
|
}
|
|
when 'suse'
|
|
default['openstack']['network']['platform'] = {
|
|
'user' => 'openstack-neutron',
|
|
'group' => 'openstack-neutron',
|
|
'mysql_python_packages' => ['python-mysql'],
|
|
'postgresql_python_packages' => ['python-psycopg2'],
|
|
'nova_network_packages' => ['openstack-nova-network'],
|
|
'neutron_packages' => ['openstack-neutron'],
|
|
'neutron_client_packages' => ['python-neutronclient'],
|
|
'neutron_dhcp_packages' => ['openstack-neutron-dhcp-agent'],
|
|
'neutron_dhcp_build_packages' => [],
|
|
'neutron_l3_packages' => ['openstack-neutron-l3-agent'],
|
|
'neutron_lb_packages' => ['openstack-neutron-lbaas-agent'],
|
|
# plugins are installed by the main openstack-neutron package on SUSE
|
|
'neutron_plugin_package' => '',
|
|
'neutron_metadata_agent_packages' => ['openstack-neutron-metadata-agent'],
|
|
'neutron_openvswitch_packages' => ['openvswitch-switch'],
|
|
'neutron_openvswitch_agent_packages' => ['openstack-neutron-openvswitch-agent'],
|
|
'neutron_linuxbridge_agent_packages' => ['openstack-neutron-linuxbridge-agent'],
|
|
'neutron_metadata_agent_packages' => ['openstack-neutron-metadata-agent'],
|
|
'neutron_server_packages' => [],
|
|
'neutron_dhcp_agent_service' => 'openstack-neutron-dhcp-agent',
|
|
'neutron_l3_agent_service' => 'openstack-neutron-l3-agent',
|
|
'neutron_lb_agent_service' => 'openstack-neutron-lbaas-agent',
|
|
'neutron_metadata_agent_service' => 'openstack-neutron-metadata-agent',
|
|
'neutron_openvswitch_service' => 'openvswitch-switch',
|
|
'neutron_openvswitch_agent_service' => 'openstack-neutron-openvswitch-agent',
|
|
'neutron_linuxbridge_agent_service' => 'openstack-neutron-linuxbridge-agent',
|
|
'neutron_server_service' => 'openstack-neutron',
|
|
'package_overrides' => ''
|
|
}
|
|
when 'debian'
|
|
default['openstack']['network']['platform'] = {
|
|
'user' => 'neutron',
|
|
'group' => 'neutron',
|
|
'mysql_python_packages' => ['python-mysqldb'],
|
|
'postgresql_python_packages' => ['python-psycopg2'],
|
|
'nova_network_packages' => ['nova-network'],
|
|
'neutron_packages' => ['neutron-common', 'python-pyparsing', 'python-cliff'],
|
|
'neutron_client_packages' => ['python-neutronclient', 'python-pyparsing'],
|
|
'neutron_dhcp_packages' => ['neutron-dhcp-agent'],
|
|
'neutron_dhcp_build_packages' => %w(build-essential pkg-config libidn11-dev libdbus-1-dev libnetfilter-conntrack-dev gettext),
|
|
'neutron_l3_packages' => ['neutron-l3-agent'],
|
|
'neutron_lb_packages' => ['neutron-lbaas-agent', 'haproxy'],
|
|
'neutron_openvswitch_packages' => ['openvswitch-switch', 'openvswitch-datapath-dkms', 'bridge-utils'],
|
|
'neutron_openvswitch_build_packages' => %w(build-essential pkg-config fakeroot libssl-dev openssl debhelper autoconf dkms python-all python-qt4 python-zopeinterface python-twisted-conch),
|
|
'neutron_openvswitch_agent_packages' => ['neutron-plugin-openvswitch', 'neutron-plugin-openvswitch-agent'],
|
|
'neutron_linuxbridge_agent_packages' => ['neutron-plugin-linuxbridge', 'neutron-plugin-linuxbridge-agent'],
|
|
'neutron_metadata_agent_packages' => ['neutron-metadata-agent'],
|
|
'neutron_plugin_package' => 'neutron-plugin-%plugin%',
|
|
'neutron_server_packages' => ['neutron-server'],
|
|
'neutron_dhcp_agent_service' => 'neutron-dhcp-agent',
|
|
'neutron_l3_agent_service' => 'neutron-l3-agent',
|
|
'neutron_lb_agent_service' => 'neutron-lbaas-agent',
|
|
'neutron_metadata_agent_service' => 'neutron-metadata-agent',
|
|
'neutron_openvswitch_service' => 'openvswitch-switch',
|
|
'neutron_openvswitch_agent_service' => 'neutron-plugin-openvswitch-agent',
|
|
'neutron_linuxbridge_agent_service' => 'neutron-plugin-linuxbridge-agent',
|
|
'neutron_server_service' => 'neutron-server',
|
|
'package_overrides' => "-o Dpkg::Options::='--force-confold' -o Dpkg::Options::='--force-confdef'"
|
|
}
|
|
end
|