Advertisement
AshrafHassan

ovs_neutron_plugin.ini

Feb 16th, 2016
213
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Bash 5.93 KB | None | 0 0
  1. # cat /etc/neutron/plugins/openvswitch/ovs_neutron_plugin.ini
  2. [ovs]
  3. # Do not change this parameter unless you have a good reason to.
  4. # This is the name of the OVS integration bridge. There is one per hypervisor.
  5. # The integration bridge acts as a virtual "patch bay". All VM VIFs are
  6. # attached to this bridge and then "patched" according to their network
  7. # connectivity.
  8. #
  9. # integration_bridge = br-int
  10. integration_bridge = br-int
  11.  
  12. # Only used for the agent if tunnel_id_ranges is not empty for
  13. # the server.  In most cases, the default value should be fine.
  14. #
  15. # tunnel_bridge = br-tun
  16.  
  17. # Peer patch port in integration bridge for tunnel bridge
  18. # int_peer_patch_port = patch-tun
  19.  
  20. # Peer patch port in tunnel bridge for integration bridge
  21. # tun_peer_patch_port = patch-int
  22.  
  23. # Uncomment this line for the agent if tunnel_id_ranges is not
  24. # empty for the server. Set local-ip to be the local IP address of
  25. # this hypervisor.
  26. #
  27. # local_ip =
  28.  
  29. # (ListOpt) Comma-separated list of <physical_network>:<bridge> tuples
  30. # mapping physical network names to the agent's node-specific OVS
  31. # bridge names to be used for flat and VLAN networks. The length of
  32. # bridge names should be no more than 11. Each bridge must
  33. # exist, and should have a physical network interface configured as a
  34. # port. All physical networks configured on the server should have
  35. # mappings to appropriate bridges on each agent.
  36. #
  37. # bridge_mappings =
  38. bridge_mappings =physnet1:br-eno33559296
  39. # Example: bridge_mappings = physnet1:br-eth1
  40.  
  41. # (BoolOpt) Use veths instead of patch ports to interconnect the integration
  42. # bridge to physical networks. Support kernel without ovs patch port support
  43. # so long as it is set to True.
  44. # use_veth_interconnection = False
  45.  
  46. # (StrOpt) Which OVSDB backend to use, defaults to 'vsctl'
  47. # vsctl - The backend based on executing ovs-vsctl
  48. # native - The backend based on using native OVSDB
  49. # ovsdb_interface = vsctl
  50.  
  51. # (StrOpt) The connection string for the native OVSDB backend
  52. # To enable ovsdb-server to listen on port 6640:
  53. #   ovs-vsctl set-manager ptcp:6640:127.0.0.1
  54. # ovsdb_connection = tcp:127.0.0.1:6640
  55. enable_tunneling=False
  56.  
  57. [agent]
  58. # Agent's polling interval in seconds
  59. # polling_interval = 2
  60. polling_interval = 2
  61.  
  62. # Minimize polling by monitoring ovsdb for interface changes
  63. # minimize_polling = True
  64.  
  65. # When minimize_polling = True, the number of seconds to wait before
  66. # respawning the ovsdb monitor after losing communication with it
  67. # ovsdb_monitor_respawn_interval = 30
  68.  
  69. # (ListOpt) The types of tenant network tunnels supported by the agent.
  70. # Setting this will enable tunneling support in the agent. This can be set to
  71. # either 'gre' or 'vxlan'. If this is unset, it will default to [] and
  72. # disable tunneling support in the agent.
  73. # You can specify as many values here as your compute hosts supports.
  74. #
  75. # tunnel_types =
  76. # Example: tunnel_types = gre
  77. # Example: tunnel_types = vxlan
  78. # Example: tunnel_types = vxlan, gre
  79.  
  80. # (IntOpt) The port number to utilize if tunnel_types includes 'vxlan'. By
  81. # default, this will make use of the Open vSwitch default value of '4789' if
  82. # not specified.
  83. #
  84. # vxlan_udp_port =
  85. # Example: vxlan_udp_port = 8472
  86.  
  87. # (IntOpt) This is the MTU size of veth interfaces.
  88. # Do not change unless you have a good reason to.
  89. # The default MTU size of veth interfaces is 1500.
  90. # This option has no effect if use_veth_interconnection is False
  91. # veth_mtu =
  92. # Example: veth_mtu = 1504
  93.  
  94. # (BoolOpt) Flag to enable l2-population extension. This option should only be
  95. # used in conjunction with ml2 plugin and l2population mechanism driver. It'll
  96. # enable plugin to populate remote ports macs and IPs (using fdb_add/remove
  97. # RPC calbbacks instead of tunnel_sync/update) on OVS agents in order to
  98. # optimize tunnel management.
  99. #
  100. # l2_population = False
  101. l2_population = False
  102.  
  103. # Enable local ARP responder. Requires OVS 2.1. This is only used by the l2
  104. # population ML2 MechanismDriver.
  105. #
  106. # arp_responder = False
  107. arp_responder = False
  108.  
  109. # Enable suppression of ARP responses that don't match an IP address that
  110. # belongs to the port from which they originate.
  111. # Note: This prevents the VMs attached to this agent from spoofing,
  112. # it doesn't protect them from other devices which have the capability to spoof
  113. # (e.g. bare metal or VMs attached to agents without this flag set to True).
  114. # Requires a version of OVS that can match ARP headers.
  115. #
  116. # prevent_arp_spoofing = False
  117.  
  118. # (BoolOpt) Set or un-set the don't fragment (DF) bit on outgoing IP packet
  119. # carrying GRE/VXLAN tunnel. The default value is True.
  120. #
  121. # dont_fragment = True
  122.  
  123. # (BoolOpt) Set to True on L2 agents to enable support
  124. # for distributed virtual routing.
  125. #
  126. # enable_distributed_routing = False
  127. enable_distributed_routing = False
  128.  
  129. # (IntOpt) Set new timeout in seconds for new rpc calls after agent receives
  130. # SIGTERM. If value is set to 0, rpc timeout won't be changed"
  131. #
  132. # quitting_rpc_timeout = 10
  133.  
  134. [securitygroup]
  135. # Firewall driver for realizing neutron security group function.
  136. # firewall_driver = neutron.agent.firewall.NoopFirewallDriver
  137. firewall_driver = neutron.agent.linux.iptables_firewall.OVSHybridIptablesFirewallDriver
  138. # Example: firewall_driver = neutron.agent.linux.iptables_firewall.OVSHybridIptablesFirewallDriver
  139.  
  140. # Controls if neutron security group is enabled or not.
  141. # It should be false when you use nova security group.
  142. # enable_security_group = True
  143.  
  144. #-----------------------------------------------------------------------------
  145. # Sample Configurations.
  146. #-----------------------------------------------------------------------------
  147. #
  148. # 1. With VLANs on eth1.
  149. # [ovs]
  150. # integration_bridge = br-int
  151. # bridge_mappings = default:br-eth1
  152. #
  153. # 2. With GRE tunneling.
  154. # [ovs]
  155. # integration_bridge = br-int
  156. # tunnel_bridge = br-tun
  157. # local_ip = 10.0.0.3
  158. #
  159. # 3. With VXLAN tunneling.
  160. # [ovs]
  161. # integration_bridge = br-int
  162. # tunnel_bridge = br-tun
  163. # local_ip = 10.0.0.3
  164. # [agent]
  165. # tunnel_types = vxlan
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement