| {%- if pillar.neutron.gateway is defined %} |
| {%- from "neutron/map.jinja" import gateway as neutron with context %} |
| {%- else %} |
| {%- from "neutron/map.jinja" import compute as neutron with context %} |
| {%- endif %} |
| {%- from "neutron/map.jinja" import fwaas with context %} |
| |
| [DEFAULT] |
| |
| # |
| # From neutron.base.agent |
| # |
| |
| # Name of Open vSwitch bridge to use (string value) |
| #ovs_integration_bridge = br-int |
| |
| # Uses veth for an OVS interface or not. Support kernels with limited namespace |
| # support (e.g. RHEL 6.5) and rate limiting on router's gateway port so long as |
| # ovs_use_veth is set to True. (boolean value) |
| #ovs_use_veth = false |
| {%- if neutron.ovs_use_veth is defined %} |
| ovs_use_veth = {{ neutron.ovs_use_veth }} |
| {%- endif %} |
| |
| # The driver used to manage the virtual interface. (string value) |
| #interface_driver = <None> |
| interface_driver = openvswitch |
| |
| # |
| # From neutron.l3.agent |
| # |
| |
| # The working mode for the agent. Allowed modes are: 'legacy' - this preserves |
| # the existing behavior where the L3 agent is deployed on a centralized |
| # networking node to provide L3 services like DNAT, and SNAT. Use this mode if |
| # you do not want to adopt DVR. 'dvr' - this mode enables DVR functionality and |
| # must be used for an L3 agent that runs on a compute host. 'dvr_snat' - this |
| # enables centralized SNAT support in conjunction with DVR. This mode must be |
| # used for an L3 agent running on a centralized node (or in single-host |
| # deployments, e.g. devstack). 'dvr_no_external' - this mode enables only |
| # East/West DVR routing functionality for a L3 agent that runs on a compute |
| # host, the North/South functionality such as DNAT and SNAT will be provided by |
| # the centralized network node that is running in 'dvr_snat' mode. This mode |
| # should be used when there is no external network connectivity on the compute |
| # host. (string value) |
| # Possible values: |
| # dvr - <No description provided> |
| # dvr_snat - <No description provided> |
| # legacy - <No description provided> |
| # dvr_no_external - <No description provided> |
| |
| agent_mode = {{ neutron.agent_mode }} |
| |
| # TCP Port used by Neutron metadata namespace proxy. (port value) |
| # Minimum value: 0 |
| # Maximum value: 65535 |
| #metadata_port = 9697 |
| metadata_port = 8775 |
| |
| # DEPRECATED: Send this many gratuitous ARPs for HA setup, if less than or |
| # equal to 0, the feature is disabled (integer value) |
| # This option is deprecated for removal. |
| # Its value may be silently ignored in the future. |
| #send_arp_for_ha = 3 |
| |
| # Indicates that this L3 agent should also handle routers that do not have an |
| # external network gateway configured. This option should be True only for a |
| # single agent in a Neutron deployment, and may be False for all agents if all |
| # routers must have an external network gateway. (boolean value) |
| #handle_internal_only_routers = true |
| |
| # DEPRECATED: When external_network_bridge is set, each L3 agent can be |
| # associated with no more than one external network. This value should be set |
| # to the UUID of that external network. To allow L3 agent support multiple |
| # external networks, both the external_network_bridge and |
| # gateway_external_network_id must be left empty. (string value) |
| # This option is deprecated for removal. |
| # Its value may be silently ignored in the future. |
| #gateway_external_network_id = |
| |
| # With IPv6, the network used for the external gateway does not need to have an |
| # associated subnet, since the automatically assigned link-local address (LLA) |
| # can be used. However, an IPv6 gateway address is needed for use as the next- |
| # hop for the default route. If no IPv6 gateway address is configured here, |
| # (and only then) the neutron router will be configured to get its default |
| # route from router advertisements (RAs) from the upstream router; in which |
| # case the upstream router must also be configured to send these RAs. The |
| # ipv6_gateway, when configured, should be the LLA of the interface on the |
| # upstream router. If a next-hop using a global unique address (GUA) is |
| # desired, it needs to be done via a subnet allocated to the network and not |
| # through this parameter. (string value) |
| #ipv6_gateway = |
| |
| # Driver used for ipv6 prefix delegation. This needs to be an entry point |
| # defined in the neutron.agent.linux.pd_drivers namespace. See setup.cfg for |
| # entry points included with the neutron source. (string value) |
| #prefix_delegation_driver = dibbler |
| |
| # Allow running metadata proxy. (boolean value) |
| #enable_metadata_proxy = true |
| |
| # Iptables mangle mark used to mark metadata valid requests. This mark will be |
| # masked with 0xffff so that only the lower 16 bits will be used. (string |
| # value) |
| #metadata_access_mark = 0x1 |
| |
| # Iptables mangle mark used to mark ingress from external network. This mark |
| # will be masked with 0xffff so that only the lower 16 bits will be used. |
| # (string value) |
| #external_ingress_mark = 0x2 |
| |
| # DEPRECATED: Name of bridge used for external network traffic. When this |
| # parameter is set, the L3 agent will plug an interface directly into an |
| # external bridge which will not allow any wiring by the L2 agent. Using this |
| # will result in incorrect port statuses. This option is deprecated and will be |
| # removed in Ocata. (string value) |
| # This option is deprecated for removal. |
| # Its value may be silently ignored in the future. |
| #external_network_bridge = |
| |
| # Seconds between running periodic tasks. (integer value) |
| #periodic_interval = 40 |
| |
| # Number of separate API worker processes for service. If not specified, the |
| # default is equal to the number of CPUs available for best performance. |
| # (integer value) |
| #api_workers = <None> |
| |
| # Number of RPC worker processes for service. (integer value) |
| #rpc_workers = 1 |
| |
| # Number of RPC worker processes dedicated to state reports queue. (integer |
| # value) |
| #rpc_state_report_workers = 1 |
| |
| # Range of seconds to randomly delay when starting the periodic task scheduler |
| # to reduce stampeding. (Disable by setting to 0) (integer value) |
| #periodic_fuzzy_delay = 5 |
| |
| # Location to store keepalived/conntrackd config files (string value) |
| #ha_confs_path = $state_path/ha_confs |
| |
| # VRRP authentication type (string value) |
| # Possible values: |
| # AH - <No description provided> |
| # PASS - <No description provided> |
| #ha_vrrp_auth_type = PASS |
| |
| # VRRP authentication password (string value) |
| #ha_vrrp_auth_password = <None> |
| |
| # The advertisement interval in seconds (integer value) |
| #ha_vrrp_advert_int = 2 |
| |
| # Number of concurrent threads for keepalived server connection requests. More |
| # threads create a higher CPU load on the agent node. (integer value) |
| # Minimum value: 1 |
| #ha_keepalived_state_change_server_threads = (1 + <num_of_cpus>) / 2 |
| |
| # The VRRP health check interval in seconds. Values > 0 enable VRRP health |
| # checks. Setting it to 0 disables VRRP health checks. Recommended value is 5. |
| # This will cause pings to be sent to the gateway IP address(es) - requires |
| # ICMP_ECHO_REQUEST to be enabled on the gateway. If gateway fails, all routers |
| # will be reported as master, and master election will be repeated in round- |
| # robin fashion, until one of the router restore the gateway connection. |
| # (integer value) |
| #ha_vrrp_health_check_interval = 0 |
| |
| # Location to store IPv6 PD files. (string value) |
| #pd_confs = $state_path/pd |
| |
| # A decimal value as Vendor's Registered Private Enterprise Number as required |
| # by RFC3315 DUID-EN. (string value) |
| #vendor_pen = 8888 |
| |
| # Location to store IPv6 RA config files (string value) |
| #ra_confs = $state_path/ra |
| |
| # MinRtrAdvInterval setting for radvd.conf (integer value) |
| #min_rtr_adv_interval = 30 |
| |
| # MaxRtrAdvInterval setting for radvd.conf (integer value) |
| #max_rtr_adv_interval = 100 |
| |
| {%- if neutron.logging is defined %} |
| {%- set _data = neutron.logging %} |
| {%- include "oslo_templates/files/queens/oslo/_log.conf" %} |
| {%- endif %} |
| |
| [agent] |
| |
| # |
| # From neutron.az.agent |
| # |
| |
| # Availability zone of this node (string value) |
| #availability_zone = nova |
| |
| # |
| # From neutron.base.agent |
| # |
| |
| # Seconds between nodes reporting state to server; should be less than |
| # agent_down_time, best if it is half or less than agent_down_time. (floating |
| # point value) |
| #report_interval = 30 |
| |
| # Log agent heartbeats (boolean value) |
| #log_agent_heartbeats = false |
| |
| # |
| # From neutron.l3.agent |
| # |
| |
| # Extensions list to use (list value) |
| #extensions = |
| {%- if fwaas.get('enabled', False) %} |
| extensions = {{ fwaas[fwaas.api_version]['l3_extension'] }} |
| {%- endif %} |
| |
| |
| [ovs] |
| |
| # |
| # From neutron.base.agent |
| # |
| |
| # DEPRECATED: The interface for interacting with the OVSDB (string value) |
| # Possible values: |
| # native - <No description provided> |
| # vsctl - <No description provided> |
| # This option is deprecated for removal. |
| # Its value may be silently ignored in the future. |
| #ovsdb_interface = native |
| |
| # The connection string for the OVSDB backend. Will be used by ovsdb-client |
| # when monitoring and used for the all ovsdb commands when native |
| # ovsdb_interface is enabled (string value) |
| #ovsdb_connection = tcp:127.0.0.1:6640 |
| |
| # The SSL private key file to use when interacting with OVSDB. Required when |
| # using an "ssl:" prefixed ovsdb_connection (string value) |
| #ssl_key_file = <None> |
| |
| # The SSL certificate file to use when interacting with OVSDB. Required when |
| # using an "ssl:" prefixed ovsdb_connection (string value) |
| #ssl_cert_file = <None> |
| |
| # The Certificate Authority (CA) certificate to use when interacting with |
| # OVSDB. Required when using an "ssl:" prefixed ovsdb_connection (string |
| # value) |
| #ssl_ca_cert_file = <None> |
| |
| # Timeout in seconds for ovsdb commands. If the timeout expires, ovsdb commands |
| # will fail with ALARMCLOCK error. (integer value) |
| # Deprecated group/name - [DEFAULT]/ovs_vsctl_timeout |
| #ovsdb_timeout = 10 |