cookbook-openstack-network/attributes/default.rb

1187 lines
56 KiB
Ruby

# encoding: UTF-8
#
# Cookbook Name:: openstack-network
# Attributes:: default
#
# Copyright 2013, AT&T
# Copyright 2014, IBM Corp.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
# Set to some text value if you want templated config files
# to contain a custom banner at the top of the written file
default['openstack']['network']['custom_template_banner'] = '
# This file autogenerated by Chef
# Do not edit, changes will be overwritten
'
default['openstack']['network']['verbose'] = 'False'
default['openstack']['network']['debug'] = 'False'
default['openstack']['network']['auth_strategy'] = 'keystone'
default['openstack']['network']['state_path'] = '/var/lib/neutron'
default['openstack']['network']['lock_path'] = '$state_path/lock'
# Set dbsync command timeout value
default['openstack']['network']['dbsync_timeout'] = 3600
# Specify policy.json remote file to import
default['openstack']['network']['policyfile_url'] = nil
# Gets set in the Network Endpoint when registering with Keystone
default['openstack']['network']['region'] = node['openstack']['region']
default['openstack']['network']['service_user'] = 'neutron'
default['openstack']['network']['service_role'] = 'admin'
default['openstack']['network']['service_name'] = 'neutron'
default['openstack']['network']['service_type'] = 'network'
default['openstack']['network']['service_tenant_name'] = 'service'
default['openstack']['network']['description'] = 'OpenStack Networking service'
default['openstack']['network']['rabbit_server_chef_role'] = 'rabbitmq-server'
# Number of separate worker processes to spawn. The default, 0, runs the
# worker thread in the current process. Greater than 0 launches that number of
# child processes as workers. The parent process manages them.
default['openstack']['network']['api_workers'] = 0
# Number of separate RPC worker processes to spawn. The default, 0, runs the
# worker thread in the current process. Greater than 0 launches that number of
# child processes as RPC workers. The parent process manages them.
# This feature is experimental until issues are addressed and testing has been
# enabled for various plugins for compatibility.
default['openstack']['network']['rpc_workers'] = 0
# The maximum number of seconds we will wait for an agent to checkin
default['openstack']['network']['api']['agent']['agent_down_time'] = 75
# The default agent reporting interval in seconds
default['openstack']['network']['api']['agent']['agent_report_interval'] = 30
# The agent signing directory for api server
default['openstack']['network']['api']['agent']['signing_dir'] = '/var/lib/neutron/keystone-signing'
# Keystone PKI signing directory.
default['openstack']['network']['api']['auth']['cache_dir'] = '/var/cache/neutron/api'
# The auth api version used to interact with identity service.
default['openstack']['network']['api']['auth']['version'] = node['openstack']['api']['auth']['version']
# A list of memcached server(s) for caching
default['openstack']['network']['api']['auth']['memcached_servers'] = nil
# Whether token data should be authenticated or authenticated and encrypted. Acceptable values are MAC or ENCRYPT
default['openstack']['network']['api']['auth']['memcache_security_strategy'] = nil
# This string is used for key derivation
default['openstack']['network']['api']['auth']['memcache_secret_key'] = nil
# Hash algorithms to use for hashing PKI tokens
default['openstack']['network']['api']['auth']['hash_algorithms'] = 'md5'
# A PEM encoded Certificate Authority to use when verifying HTTPs connections
default['openstack']['network']['api']['auth']['cafile'] = nil
# Whether to allow the client to perform insecure SSL (https) requests
default['openstack']['network']['api']['auth']['insecure'] = false
# logging attribute
default['openstack']['network']['log_dir'] = '/var/log/neutron'
default['openstack']['network']['syslog']['use'] = false
# The driver for Quota management in Neutron. Possible values:
# neutron.quota.ConfDriver
# neutron.db.quota_db.DbQuotaDriver (default)
#
# Note: set this to the DbDriver if you want to be able to update
# quotas for networks/subnets/security groups
default['openstack']['network']['quota']['driver'] = 'neutron.db.quota_db.DbQuotaDriver'
# default quotas will be used when no more specific tenant entry exists
# when using the DBDriver - override them below to adjust the default
# quotas
# resource name(s) that are supported in quota features
default['openstack']['network']['quota']['items'] = 'network,subnet,port'
# default number of resource allowed per tenant, minus for unlimited
# however if more specific setting exists for a quota resource (all known
# quota resources are specified below) those numbers will be used instead
# so unless new resources are introduces, this has no effect
default['openstack']['network']['quota']['default'] = -1
# number of networks allowed per tenant, and minus means unlimited
default['openstack']['network']['quota']['network'] = 10
# number of subnets allowed per tenant, and minus means unlimited
default['openstack']['network']['quota']['subnet'] = 10
# number of ports allowed per tenant, and minus means unlimited
default['openstack']['network']['quota']['port'] = 50
# number of security groups allowed per tenant, and minus means unlimited
default['openstack']['network']['quota']['security_group'] = 10
# number of security group rules allowed per tenant, and minus means unlimited
default['openstack']['network']['quota']['security_group_rule'] = 100
# Number of routers allowed per tenant. A negative value means unlimited.
default['openstack']['network']['quota']['router'] = 10
# Number of floating IPs allowed per tenant. A negative value means unlimited.
default['openstack']['network']['quota']['floatingip'] = 50
# (ListOpt) Specify service providers (drivers) for advanced services like loadbalancer, VPN, Firewall.
# Must be in form:
# service_provider=<service_type>:<name>:<driver>[:default]
# List of allowed service type include LOADBALANCER, FIREWALL, VPN
# Combination of <service type> and <name> must be unique; <driver> must also be unique
# this is multiline option, example for default provider:
# service_provider=LOADBALANCER:name:lbaas_plugin_driver_path:default
# example of non-default provider:
# service_provider=FIREWALL:name2:firewall_driver_path
# --- Reference implementations ---
default['openstack']['network']['service_provider'] = []
# The core plugin to use for neutron
default['openstack']['network']['core_plugin'] = 'neutron.plugins.ml2.plugin.Ml2Plugin'
# additional service plugins to use for neutron
# e.g. neutron.plugins.services.agent_loadbalancer.plugin.LoadBalancerPlugin
# for the loadbalancer reference implementation
default['openstack']['network']['service_plugins'] = []
# The bridging interface driver.
# This is used by the L3, DHCP and LBaaS agents.
# Options are:
#
# - neutron.agent.linux.interface.OVSInterfaceDriver
# - neutron.agent.linux.interface.BridgeInterfaceDriver
#
default['openstack']['network']['interface_driver'] = 'neutron.agent.linux.interface.OVSInterfaceDriver'
# Maps the above core plugin driver to a simple name
# This is used in the neutron_plugin_package package name and common recipe case statements
default['openstack']['network']['core_plugin_map'] = {
'ovsneutronpluginv2' => 'openvswitch',
'linuxbridgepluginv2' => 'linuxbridge',
'ml2plugin' => 'ml2'
}
# This is used by SUSE to setup the sysconfig neutron initfile
default['openstack']['network']['plugin_conf_map'] = {
'ovsneutronpluginv2' => 'openvswitch/ovs_neutron_plugin.ini',
'linuxbridgepluginv2' => 'linuxbridge/linuxbridge_conf.ini',
'ml2plugin' => 'ml2/ml2_conf.ini'
}
# The agent can use other DHCP drivers. Dnsmasq is the simplest and requires
# no additional setup of the DHCP server.
default['openstack']['network']['dhcp_driver'] = 'neutron.agent.linux.dhcp.Dnsmasq'
# Use namespaces and optionally allow overlapping IPs. You
# must enable namespaces to use overlapping ips. Also,
# you must have kernel build with CONFIG_NET_NS=y and
# iproute2 package that supports namespaces.
default['openstack']['network']['use_namespaces'] = 'True'
default['openstack']['network']['allow_overlapping_ips'] = 'False'
# VPN agent configuration, default is false
# Must enable namespaces to set enable_vpn true
default['openstack']['network']['enable_vpn'] = false
# use neutron root wrap
default['openstack']['network']['use_rootwrap'] = true
# rootwrap.conf
default['openstack']['network']['rootwrap']['filters_path'] = '/etc/neutron/rootwrap.d,/usr/share/neutron/rootwrap'
default['openstack']['network']['rootwrap']['exec_dirs'] = '/sbin,/usr/sbin,/bin,/usr/bin'
default['openstack']['network']['rootwrap']['use_syslog'] = false
default['openstack']['network']['rootwrap']['syslog_log_facility'] = 'syslog'
default['openstack']['network']['rootwrap']['syslog_log_level'] = 'ERROR'
# DHCP lease duration
default['openstack']['network']['dhcp_lease_duration'] = 86400
# Driver or drivers to handle sending notifications and control exchange
default['openstack']['network']['notification_driver'] = 'neutron.openstack.common.notifier.rpc_notifier'
default['openstack']['network']['control_exchange'] = node['openstack']['mq']['network']['control_exchange']
# Common rpc definitions
default['openstack']['network']['rpc_thread_pool_size'] = 64
default['openstack']['network']['rpc_conn_pool_size'] = 30
default['openstack']['network']['rpc_response_timeout'] = 60
# ======== Neutron Nova interactions ==========
# Name of the plugin to load
default['openstack']['network']['nova']['auth_plugin'] = 'v2password'
# CA file for novaclient to verify server certificates
default['openstack']['network']['nova']['cafile'] = nil
# Boolean to control ignoring SSL errors on the nova url
default['openstack']['network']['nova']['insecure'] = false
# Send notification to nova when port status is active.
default['openstack']['network']['nova']['notify_nova_on_port_status_changes'] = 'True'
# Send notifications to nova when port data (fixed_ips/floatingips) change
# so nova can update it's cache.
default['openstack']['network']['nova']['notify_nova_on_port_data_changes'] = 'True'
# Name of nova region to use. Useful if keystone manages more than one region
default['openstack']['network']['nova']['region_name'] = node['openstack']['region']
# Username for connection to nova in admin context
default['openstack']['network']['nova']['admin_username'] = 'nova'
# User's domain ID for authentication.
default['openstack']['network']['nova']['user_domain_id'] = 'default'
# Version for connection to nova
# TODO: (MRV) Need to allow for this in Common.
default['openstack']['network']['nova']['url_version'] = '/v2'
# The uuid of the nova tenant
# Nil will cause the name below to be used.
default['openstack']['network']['nova']['admin_tenant_id'] = nil
# The name of the nova tenant
# defined here based upon Compute cookbook attribute:
# default['openstack']['compute']['service_tenant_name'] = 'service'
# Since this cookbook does not depend upon Compute, can't directly
# reference that here. Deprecated for Liberty.
default['openstack']['network']['nova']['admin_tenant_name'] = 'service'
# Project name for project scoping. Use this instead of deprecated 'admin_tenant_name',
# which is still used until Liberty.
default['openstack']['network']['nova']['project_name'] = node['openstack']['network']['nova']['admin_tenant_name']
# Project's domain ID for project.
default['openstack']['network']['nova']['project_domain_id'] = 'default'
# Number of seconds between sending events to nova if there are any events to send
default['openstack']['network']['nova']['send_events_interval'] = 2
# ============================= DHCP Agent Configuration ===================
# The scheduler class to use for scheduling to DHCP agents
default['openstack']['network']['dhcp']['scheduler'] = 'neutron.scheduler.dhcp_agent_scheduler.ChanceScheduler'
# Override the default mtu setting given to virtual machines
# to 1454 to allow for tunnel and other encapsulation overhead. You
# can adjust this from 1454 to 1500 if you do not want any lowering
# of the default guest MTU.
default['openstack']['network']['dhcp']['dhcp-option'] = '26,1454'
# Number of seconds between sync of DHCP agent with Neutron API server
default['openstack']['network']['dhcp']['resync_interval'] = 5
# OVS based plugins(Ryu, NEC, NVP, BigSwitch/Floodlight) that use OVS
# as OpenFlow switch and check port status
default['openstack']['network']['dhcp']['ovs_use_veth'] = 'False'
# The DHCP server can assist with providing metadata support on isolated
# networks. Setting this value to True will cause the DHCP server to append
# specific host routes to the DHCP request. The metadata service will only
# be activated when the subnet gateway_ip is None. The guest instance must
# be configured to request host routes via DHCP (Option 121).
default['openstack']['network']['dhcp']['enable_isolated_metadata'] = 'False'
# Allows for serving metadata requests coming from a dedicated metadata
# access network whose cidr is 169.254.169.254/16 (or larger prefix), and
# is connected to a Neutron router from which the VMs send metadata
# request. In this case DHCP Option 121 will not be injected in VMs, as
# they will be able to reach 169.254.169.254 through a router.
# This option requires enable_isolated_metadata = True
default['openstack']['network']['dhcp']['enable_metadata_network'] = 'False'
# the version of dnsmasq for centos 6.5 is two revs behind where the dhcp-agent needs
# to run properly. This is a version that allows and starts the dhcp-agent correctly.
default['openstack']['network']['dhcp']['dnsmasq_rpm_version'] = '2.65-1.el6.rfx.x86_64'
default['openstack']['network']['dhcp']['dnsmasq_rpm_source'] = "http://pkgs.repoforge.org/dnsmasq/dnsmasq-#{node['openstack']['network']['dhcp']['dnsmasq_rpm_version']}.rpm"
# The package architecture that will be built which should match the
# archecture of the server this cookbook will run on which will be
# amd64 or i386
default['openstack']['network']['dhcp']['dnsmasq_architecture'] = 'amd64'
# The debian package version that the above tarball will produce
default['openstack']['network']['dhcp']['dnsmasq_dpkgversion'] = '2.65-1'
# Limit number of leases to prevent a denial-of-service.
default['openstack']['network']['dhcp']['dnsmasq_lease_max'] = 16777216
# Upstream resolver to use
# This will be used by dnsmasq to resolve recursively
# but will not be used if the tenant specifies a dns
# server in their subnet
#
# Defaults are spread out across multiple, presumably
# reliable, upstream providers
#
# 8.8.8.8 is Google
# 209.244.0.3 is Level3
#
# May be a comma separated list of servers
default['openstack']['network']['dhcp']['upstream_dns_servers'] = ['8.8.8.8', '209.244.0.3']
# Set the default domain in dnsmasq
default['openstack']['network']['dhcp']['default_domain'] = 'openstacklocal'
# If True, namespaces will be deleted when a dhcp server is disabled.
default['openstack']['network']['dhcp']['dhcp_delete_namespaces'] = 'False'
# Set the default num of dhcp agents for each network.
default['openstack']['network']['dhcp']['dhcp_agents_per_network'] = 1
# ============================= L3 Agent Configuration =====================
# For DVR(Disributed Virtual Router) is still not stable and rubost,
# so it make sense to set DVR disabled by default. User can set this
# attribute ture(bool) or 'ture'(bool) to enable DVR if they what
# they are doing. Set this 'auto', cookbook will do a simple check
# to decide whether or not to enable DVR, default is enabled with OVS.
default['openstack']['network']['l3']['router_distributed'] = 'False'
# The scheduler class to use for scheduling routers to L3 agents
default['openstack']['network']['l3']['scheduler'] = 'neutron.scheduler.l3_agent_scheduler.ChanceScheduler'
# If use_namespaces is set as False then the agent can only configure one router.
# This is done by setting the specific router_id.
default['openstack']['network']['l3']['router_id'] = nil
# Each L3 agent can be associated with at most one external network. This
# value should be set to the UUID of that external network. If empty,
# the agent will enforce that only a single external networks exists and
# use that external network id
default['openstack']['network']['l3']['gateway_external_network_id'] = nil
# If this name is specified and the ID above is nil, it will be looked up.
default['openstack']['network']['l3']['gateway_external_network_name'] = nil
# Indicates that this L3 agent should also handle routers that do not have
# an external network gateway configured. This option should be True only
# for a single agent in a Neutron deployment, and may be False for all agents
# if all routers must have an external network gateway
default['openstack']['network']['l3']['handle_internal_only_routers'] = 'True'
# Name of bridge used for external network traffic. This should be set to
# empty value for the linux bridge
default['openstack']['network']['l3']['external_network_bridge'] = 'br-ex'
# Interface to use for external bridge.
default['openstack']['network']['l3']['external_network_bridge_interface'] = 'eth1'
# TCP Port used by Neutron metadata server
default['openstack']['network']['l3']['metadata_port'] = 9697
# Send this many gratuitous ARPs for HA setup. Set it below or equal to 0
# to disable this feature.
default['openstack']['network']['l3']['send_arp_for_ha'] = 3
# seconds between re-sync routers' data if needed
default['openstack']['network']['l3']['periodic_interval'] = 40
# seconds to start to sync routers' data after
# starting agent
default['openstack']['network']['l3']['periodic_fuzzy_delay'] = 5
# If True, namespaces will be deleted when a router is destroyed
default['openstack']['network']['l3']['router_delete_namespaces'] = 'False'
# Set the default value of ha parameter for virtual router.
default['openstack']['network']['l3']['ha']['l3_ha'] = 'False'
# Set the default maximum number of l3 agents for each ha router.
default['openstack']['network']['l3']['ha']['max_l3_agents_per_router'] = 3
# Set the default advertisement interval in seconds
default['openstack']['network']['l3']['ha']['ha_vrrp_advert_int'] = 2
# ============================= VPN Agent Configuration ====================
# VPN device drivers which vpn agent will use
# vpn_device_driver_packages in platform-specific settings is used to get driver dependencies installed, default is openswan
# vpn_device_driver_services in platform-specific settings is used to enable services required by vpn drivers, default is ipsec
# default_config_area in platform-specific settings is used to set the area where default StrongSwan configuration files are located
default['openstack']['network']['vpn']['vpn_device_driver'] = ['neutron_vpnaas.services.vpn.device_drivers.ipsec.OpenSwanDriver']
# Status check interval for ipsec vpn
default['openstack']['network']['vpn']['ipsec_status_check_interval'] = 60
# Custom the vpnaas config file path
default['openstack']['network']['vpn']['config_file'] = '/etc/neutron/vpn_agent.ini'
# ============================= Metadata Agent Configuration ===============
# The name of the secret databag containing the metadata secret
default['openstack']['network']['metadata']['secret_name'] = 'neutron_metadata_secret'
# This attribute is used to designate the number of the separate
# neutron-metadata-agent processes to spawn. If it is not specified explicitly,
# the default value shall be half of the CPU cores.
default['openstack']['network']['metadata']['metadata_workers'] = nil
# ============================= LBaaS Agent Configuration ==================
# node['openstack']['network']['neutron_loadbalancer'] is deprecated. Use
# node['openstack']['network']['service_plugins'] for the loadbalancer plugin.
# See that attribute for details.
default['openstack']['network']['lbaas']['device_driver'] = 'neutron_lbaas.services.loadbalancer.drivers.haproxy.namespace_driver.HaproxyNSDriver'
# Number of seconds between sync of LBaaS agent with Neutron API server
default['openstack']['network']['lbaas']['periodic_interval'] = 10
# Set to True to enable lbaas
default['openstack']['network']['lbaas']['enabled'] = 'False'
# Custom the lbaas config file path
default['openstack']['network']['lbaas']['config_file'] = '/etc/neutron/lbaas_agent.ini'
# Set lbaas plugin
# Supported types are: 'ovs' (ovs based plugins(OVS, Ryu, NEC, NVP, BigSwitch/Floodlight))
# and 'linuxbridge'.
# The lbaas plugin type can also be used for other drivers using
# node['openstack']['network']['lbaas']['custom_interface_driver'] attribute.
# Set this attribute to 'other' in order to load a custom driver
default['openstack']['network']['lbaas_plugin'] = 'ovs'
# Custom plugin to support new interface drivers.
default['openstack']['network']['lbaas']['custom_interface_driver'] = nil
# Using veth pairs for OVS based plugins.
default['openstack']['network']['lbaas']['ovs_use_veth'] = 'False'
# ============================= FWaaS Configuration ==================
# Set to True to enable firewall service
default['openstack']['network']['fwaas']['enabled'] = 'False'
# Firewall service driver with linux iptables
default['openstack']['network']['fwaas']['driver'] = 'neutron_fwaas.services.firewall.drivers.linux.iptables_fwaas.IptablesFwaasDriver'
# Custom the fwaas config file path
default['openstack']['network']['fwaas']['config_file'] = '/etc/neutron/fwaas_driver.ini'
# ============================= OVS Plugin Configuration ===================
# Type of network to allocate for tenant networks. The default value 'local' is
# useful only for single-box testing and provides no connectivity between hosts.
# You MUST either change this to 'vlan' and configure network_vlan_ranges below
# or change this to 'gre' and configure tunnel_id_ranges below in order for tenant
# networks to provide connectivity between hosts. Set to 'none' to disable creation
# of tenant networks.
default['openstack']['network']['openvswitch']['tenant_network_type'] = 'local'
# Comma-separated list of <physical_network>[:<vlan_min>:<vlan_max>] tuples enumerating
# ranges of VLAN IDs on named physical networks that are available for allocation.
# All physical networks listed are available for flat and VLAN provider network
# creation. Specified ranges of VLAN IDs are available for tenant network
# allocation if tenant_network_type is 'vlan'. If empty, only gre and local
# networks may be created
#
# Example: network_vlan_ranges = physnet1:1000:2999
default['openstack']['network']['openvswitch']['network_vlan_ranges'] = nil
# Set to True in the server and the agents to enable support
# for GRE or VXLAN networks. Requires kernel support for OVS patch ports and
# GRE or VXLAN tunneling.
#
# WARNING: This option will be deprecated in the Icehouse release, at which
# point setting tunnel_type below will be required to enable
# tunneling.
default['openstack']['network']['openvswitch']['enable_tunneling'] = 'False'
# The type of tunnel network, if any, supported by the plugin. If
# this is set, it will cause tunneling to be enabled. If this is not set and
# the option enable_tunneling is set, this will default to 'gre'.
# 'gre' or 'vxlan'
default['openstack']['network']['openvswitch']['tunnel_type'] = ''
# Comma-separated list of <tun_min>:<tun_max> tuples
# enumerating ranges of GRE tunnel IDs that are available for tenant
# network allocation if tenant_network_type is 'gre'.
#
# Example: tunnel_id_ranges = 1:1000
default['openstack']['network']['openvswitch']['tunnel_id_ranges'] = nil
# Do not change this parameter unless you have a good reason to.
# This is the name of the OVS integration bridge. There is one per hypervisor.
# The integration bridge acts as a virtual 'patch bay'. All VM VIFs are
# attached to this bridge and then 'patched' according to their network
# connectivity
default['openstack']['network']['openvswitch']['integration_bridge'] = 'br-int'
# Only used for the agent if tunnel_id_ranges (above) is not empty for
# the server. In most cases, the default value should be fine
default['openstack']['network']['openvswitch']['tunnel_bridge'] = 'br-tun'
# Peer patch port in integration bridge for tunnel bridge (nil uses default)
default['openstack']['network']['openvswitch']['int_peer_patch_port'] = nil
# Peer patch port in tunnel bridge for integration bridge (nil uses default)
default['openstack']['network']['openvswitch']['tun_peer_patch_port'] = nil
# Comma-separated list of <physical_network>:<bridge> tuples
# mapping physical network names to the agent's node-specific OVS
# bridge names to be used for flat and VLAN networks. The length of
# bridge names should be no more than 11. Each bridge must
# exist, and should have a physical network interface configured as a
# port. All physical networks listed in network_vlan_ranges on the
# server should have mappings to appropriate bridges on each agent.
#
# Example: bridge_mappings = physnet1:br-eth1
default['openstack']['network']['openvswitch']['bridge_mappings'] = nil
# Create OVS data network bridge for the physical network and configure it
# with the specified port. If nil or empty string is specified, the data
# network bridge will not be created.
# Format: <data network bridge name>:<external interface>
#
# Example: bridge_mapping_interface = br-eth1:eth1
default['openstack']['network']['openvswitch']['bridge_mapping_interface'] = nil
# Agent's polling interval in seconds
default['openstack']['network']['openvswitch']['polling_interval'] = 2
# The types of tenant network tunnels supported by the openvswitch agent.
# Setting this will enable tunneling support in the agent. This can be set to
# either 'gre' or 'vxlan'. If this is unset, it will default to [] and
# disable tunneling in the agent. When running the agent with the OVS
# plugin, this value must be the same as "tunnel_type" in the "[ovs]" section.
# When running the agent with ML2, you can specify as many values here as
# your compute hosts support.
default['openstack']['network']['openvswitch']['tunnel_types'] = nil
# Agent's MTU size of veth interfaces
# With openvswitch vlan, default of veth_mtu = 1500 is 4 bytes short and you end up
# with either no traffic or abysmal network performance. Need the 4 extra bytes for
# the vlan id. In that case set the value to 1504.
default['openstack']['network']['openvswitch']['veth_mtu'] = 1500
# Firewall driver for realizing neutron security group function
default['openstack']['network']['openvswitch']['fw_driver'] = 'neutron.agent.linux.iptables_firewall.OVSHybridIptablesFirewallDriver'
# Controls if neutron security group is enabled or not.
# It should be false when you use nova security group.
default['openstack']['network']['openvswitch']['enable_security_group'] = 'True'
# The newest version of OVS which comes with 12.04 Precise is 1.4.0
# Which is legacy. Should we compile a newer version from source?
# If so, set ['openstack']['network']['openvswitch']['use_source_version']
# to true, and configure the packages, versions, checksums, etc. you wish
# to use
default['openstack']['network']['openvswitch']['use_source_version'] = false
# Url of the OVS source tarball
default['openstack']['network']['openvswitch']['openvswitch_url'] = 'http://git.openvswitch.org/cgi-bin/gitweb.cgi?p=openvswitch;a=snapshot;h=88dbaa9dc554d0ace1867bf23144788bd6f700bb;sf=tgz'
# Filename the above URL actually downloads.
default['openstack']['network']['openvswitch']['openvswitch_filename'] = 'openvswitch-88dbaa9.tar.gz'
# What is the base filename (essentially, the above without the .tar.gz)
default['openstack']['network']['openvswitch']['openvswitch_base_filename'] = 'openvswitch-88dbaa9'
# Checksum of the file for verification
default['openstack']['network']['openvswitch']['openvswitch_checksum'] = '22df718eb81fcfe93228e9bba8575e50'
# What version of the package does this install
default['openstack']['network']['openvswitch']['openvswitch_dpkgversion'] = '1.10.2-1'
# What arch are we building for
default['openstack']['network']['openvswitch']['openvswitch_architecture'] = 'amd64'
# ============================= LinuxBridge Plugin Configuration ===========
# Type of network to allocate for tenant networks. The
# default value 'local' is useful only for single-box testing and
# provides no connectivity between hosts. You MUST change this to
# 'vlan' and configure network_vlan_ranges below in order for tenant
# networks to provide connectivity between hosts. Set to 'none' to
# disable creation of tenant networks.
default['openstack']['network']['linuxbridge']['tenant_network_type'] = 'local'
# Comma-separated list of <physical_network>[:<vlan_min>:<vlan_max>] tuples enumerating
# ranges of VLAN IDs on named physical networks that are available for allocation.
# All physical networks listed are available for flat and VLAN provider network
# creation. Specified ranges of VLAN IDs are available for tenant network
# allocation if tenant_network_type is 'vlan'. If empty, only gre and local
# networks may be created.
#
# Example: network_vlan_ranges = physnet1:1000:2999
default['openstack']['network']['linuxbridge']['network_vlan_ranges'] = ''
# (ListOpt) Comma-separated list of
# <physical_network>:<physical_interface> tuples mapping physical
# network names to the agent's node-specific physical network
# interfaces to be used for flat and VLAN networks. All physical
# networks listed in network_vlan_ranges on the server should have
# mappings to appropriate interfaces on each agent.
#
# Example: physical_interface_mappings = physnet1:eth1
default['openstack']['network']['linuxbridge']['physical_interface_mappings'] = ''
# (BoolOpt) enable VXLAN on the agent
# VXLAN support can be enabled when agent is managed by ml2 plugin using
# linuxbridge mechanism driver. Useless if set while using linuxbridge plugin.
default['openstack']['network']['linuxbridge']['enable_vxlan'] = false
# (IntOpt) use specific TTL for vxlan interface protocol packets
default['openstack']['network']['linuxbridge']['ttl'] = ''
# (IntOpt) use specific TOS for vxlan interface protocol packets
default['openstack']['network']['linuxbridge']['tos'] = ''
# (StrOpt) multicast group to use for broadcast emulation.
# This group must be the same on all the agents.
default['openstack']['network']['linuxbridge']['vxlan_group'] = '224.0.0.1'
# (BoolOpt) Flag to enable l2population extension. This option should be used
# in conjunction with ml2 plugin l2population mechanism driver (in that case,
# both linuxbridge and l2population mechanism drivers should be loaded).
# It enables plugin to populate VXLAN forwarding table, in order to limit
# the use of broadcast emulation (multicast will be turned off if kernel and
# iproute2 supports unicast flooding - requires 3.11 kernel and iproute2 3.10)
default['openstack']['network']['linuxbridge']['l2_population'] = false
# Agent's polling interval in seconds
default['openstack']['network']['linuxbridge']['polling_interval'] = 2
# (BoolOpt) Enable server RPC compatibility with old (pre-havana)
# agents.
#
# rpc_support_old_agents = False
# Example: rpc_support_old_agents = True
default['openstack']['network']['linuxbridge']['rpc_support_old_agents'] = false
# Firewall driver for realizing neutron security group function
# firewall_driver = neutron.agent.firewall.NoopFirewallDriver
# Example: firewall_driver = neutron.agent.linux.iptables_firewall.IptablesFirewallDriver
default['openstack']['network']['linuxbridge']['firewall_driver'] = 'neutron.agent.firewall.NoopFirewallDriver'
# Controls if neutron security group is enabled or not.
# It should be false when you use nova security group.
default['openstack']['network']['linuxbridge']['enable_security_group'] = 'True'
# ============================= BigSwitch Plugin Configuration =============
# Not really sure what this is...
default['openstack']['network']['bigswitch']['servers'] = 'localhost:8080'
# ============================= Brocade Plugin Configuration ===============
# username = <mgmt admin username>
default['openstack']['network']['brocade']['switch_username'] = 'admin'
# password = <mgmt admin password>
default['openstack']['network']['brocade']['switch_password'] = 'admin'
# address = <switch mgmt ip address>
default['openstack']['network']['brocade']['switch_address'] = '127.0.0.1'
# ostype = NOS
default['openstack']['network']['brocade']['switch_ostype'] = 'NOS'
# physical_interface = <physical network name>
#
# Example:
# physical_interface = physnet1
default['openstack']['network']['brocade']['physical_interface'] = 'physnet1'
# (ListOpt) Comma-separated list of
# <physical_network>[:<vlan_min>:<vlan_max>] tuples enumerating ranges
# of VLAN IDs on named physical networks that are available for
# allocation. All physical networks listed are available for flat and
# VLAN provider network creation.
#
# Default: network_vlan_ranges =
# Example: network_vlan_ranges = physnet1:1000:2999
default['openstack']['network']['brocade']['network_vlan_ranges'] = ''
# (ListOpt) Comma-separated list of
# <physical_network>:<physical_interface> tuples mapping physical
# network names to the agent's node-specific physical network
# interfaces to be used for flat and VLAN networks. All physical
# networks listed in network_vlan_ranges on the server should have
# mappings to appropriate interfaces on each agent.
#
# Example: physical_interface_mappings = physnet1:eth1
default['openstack']['network']['brocade']['physical_interface_mappings'] = ''
# ============================= Cisco Plugin Configuration =================
# The module and class name path for the nexus plugin
default['openstack']['network']['cisco']['nexus_plugin'] = 'neutron.plugins.cisco.nexus.cisco_nexus_plugin_v2.NexusPlugin'
# The module and class name path for the vswitch plugin
default['openstack']['network']['cisco']['vswitch_plugin'] = 'neutron.plugins.openvswitch.ovs_neutron_plugin.OVSNeutronPluginV2'
# Start of the tenant VLAN range
default['openstack']['network']['cisco']['vlan_start'] = 100
# End of the tenant VLAN range
default['openstack']['network']['cisco']['vlan_end'] = 3000
# Prefix for tenant VLANs
default['openstack']['network']['cisco']['vlan_name_prefix'] = 'q-'
# Maximum number of ports
default['openstack']['network']['cisco']['max_ports'] = 100
# Max number of port profiles
default['openstack']['network']['cisco']['max_port_profiles'] = 65568
# Maximum number of networks
default['openstack']['network']['cisco']['max_networks'] = 65568
# Module and class path for switch model
default['openstack']['network']['cisco']['model_class'] = 'neutron.plugins.cisco.models.virt_phy_sw_v2.VirtualPhysicalSwitchModelV2'
# Module and class path for VLAN network manager
default['openstack']['network']['cisco']['manager_class'] = 'neutron.plugins.cisco.segmentation.l2network_vlan_mgr_v2.L2NetworkVLANMgr'
# Module and class path for the Nexus driver
default['openstack']['network']['cisco']['nexus_driver'] = 'neutron.plugins.cisco.tests.unit.v2.nexus.fake_nexus_driver.CiscoNEXUSFakeDriver'
# For each Nexus switch, add a hash to the
# node['openstack']['network']['cisco']['nexus_switches'] Hash,
# using the switch's IP address as the outer Hash key with each
# hash containing this information:
#
# - ssh_port=<ssh port>
# - username=<credential username>
# - password=<credential password>
# - hosts = [ (<hostname>,<port>), ... ]
#
# Example:
#
# node['openstack']['network']['cisco']['nexus_switches']['1.1.1.1']['ssh_port'] = 22
# node['openstack']['network']['cisco']['nexus_switches']['1.1.1.1']['username'] = 'admin'
# node['openstack']['network']['cisco']['nexus_switches']['1.1.1.1']['password'] = 'mySecretPassword'
# node['openstack']['network']['cisco']['nexus_switches']['1.1.1.1']['hosts'] = [ [ 'compute1', '1/1' ],
# [ 'compute2', '1/2' ]]
#
#
# will write the following to the Cisco plugin config INI file:
# [NEXUS_SWITCH:1.1.1.1]
# compute1=1/1
# compute2=1/2
# ssh_port=22
# username=admin
# password=mySecretPassword
#
default['openstack']['network']['cisco']['nexus_switches'] = {}
# ============================= Hyper-V Plugin Configuration ===============
# Type of network to allocate for tenant networks. The
# default value 'local' is useful only for single-box testing and
# provides no connectivity between hosts. You MUST change this to
# 'vlan' and configure network_vlan_ranges below in order for tenant
# networks to provide connectivity between hosts. Set to 'none' to
# disable creation of tenant networks.
default['openstack']['network']['hyperv']['tenant_network_type'] = 'local'
# Comma-separated list of <physical_network>[:<vlan_min>:<vlan_max>] tuples enumerating
# ranges of VLAN IDs on named physical networks that are available for allocation.
# All physical networks listed are available for flat and VLAN provider network
# creation. Specified ranges of VLAN IDs are available for tenant network
# allocation if tenant_network_type is 'vlan'. If empty, only gre and local
# networks may be created.
#
# Example: network_vlan_ranges = physnet1:1000:2999
default['openstack']['network']['hyperv']['network_vlan_ranges'] = ''
# Agent's polling interval in seconds
default['openstack']['network']['hyperv']['polling_interval'] = 2
# (ListOpt) Comma separated list of <physical_network>:<vswitch>
# where the physical networks can be expressed with wildcards,
# e.g.: .'*:external'.
# The referred external virtual switches need to be already present on
# the Hyper-V server.
# If a given physical network name will not match any value in the list
# the plugin will look for a virtual switch with the same name.
#
# Default: physical_network_vswitch_mappings = *:external
# Example: physical_network_vswitch_mappings = net1:external1,net2:external2
default['openstack']['network']['hyperv']['physical_network_vswitch_mappings'] = '*:external'
# (StrOpt) Private virtual switch name used for local networking.
#
# Default: local_network_vswitch = private
# Example: local_network_vswitch = custom_vswitch
default['openstack']['network']['hyperv']['local_network_vswitch'] = 'private'
# Firewall driver for realizing neutron security group function
default['openstack']['network']['hyperv']['firewall_driver'] = 'neutron.plugins.hyperv.agent.security_groups_driver.HyperVSecurityGroupsDriver'
# ============================= Metaplugin Plugin Configuration ============
## This is list of flavor:neutron_plugins
# extension method is used in the order of this list
default['openstack']['network']['metaplugin']['plugin_list'] = 'openvswitch:neutron.plugins.openvswitch.ovs_neutron_plugin.OVSNeutronPluginV2,linuxbridge:neutron.plugins.linuxbridge.lb_neutron_plugin.LinuxBridgePluginV2'
default['openstack']['network']['metaplugin']['l3_plugin_list'] = 'openvswitch:neutron.plugins.openvswitch.ovs_neutron_plugin.OVSNeutronPluginV2,linuxbridge:neutron.plugins.linuxbridge.lb_neutron_plugin.LinuxBridgePluginV2'
# Default 'flavor' for L2 and L3
default['openstack']['network']['metaplugin']['default_flavor'] = 'openvswitch'
default['openstack']['network']['metaplugin']['default_l3_flavor'] = 'openvswitch'
# ============================= Midonet Plugin Configuration ===============
# MidoNet API server URI
default['openstack']['network']['midonet']['midonet_uri'] = 'http://localhost:8080/midonet-api'
# MidoNet admin username
default['openstack']['network']['midonet']['username'] = 'admin'
# MidoNet admin password
default['openstack']['network']['midonet']['password'] = 'passw0rd'
# ID of the project that MidoNet admin user belongs to
default['openstack']['network']['midonet']['project_id'] = '77777777-7777-7777-7777-777777777777'
# Virtual provider router ID
default['openstack']['network']['midonet']['provider_router_id'] = '00112233-0011-0011-0011-001122334455'
# Virtual metadata router ID
default['openstack']['network']['midonet']['metadata_router_id'] = 'ffeeddcc-ffee-ffee-ffee-ffeeddccbbaa'
# ============================= NEC Plugin Configuration ===================
# Do not change this parameter unless you have a good reason to.
# This is the name of the OVS integration bridge. There is one per hypervisor.
# The integration bridge acts as a virtual 'patch port'. All VM VIFs are
# attached to this bridge and then 'patched' according to their network
# connectivity.
default['openstack']['network']['nec']['integration_bridge'] = 'br-int'
# Agent's polling interval in seconds
default['openstack']['network']['nec']['polling_interval'] = 2
# Firewall driver for realizing neutron security group function
default['openstack']['network']['nec']['firewall_driver'] = 'neutron.agent.linux.iptables_firewall.OVSHybridIptablesFirewallDriver'
# Specify OpenFlow Controller Host, Port and Driver to connect.
default['openstack']['network']['nec']['ofc_host'] = '127.0.0.1'
default['openstack']['network']['nec']['ofc_port'] = 8888
# Drivers are in neutron/plugins/nec/drivers/ .
default['openstack']['network']['nec']['ofc_driver'] = 'trema'
# PacketFilter is available when it's enabled in this configuration
# and supported by the driver.
default['openstack']['network']['nec']['ofc_enable_packet_filter'] = 'true'
# ============================= Nicira Plugin Configuration ================
# User name for NVP controller
default['openstack']['network']['nicira']['nvp_user'] = 'admin'
# Password for NVP controller
default['openstack']['network']['nicira']['nvp_password'] = 'admin'
# Total time limit for a cluster request
# (including retries across different controllers)
default['openstack']['network']['nicira']['req_timeout'] = 30
# Time before aborting a request on an unresponsive controller
default['openstack']['network']['nicira']['http_timeout'] = 10
# Maximum number of times a particular request should be retried
default['openstack']['network']['nicira']['retries'] = 2
# Maximum number of times a redirect response should be followed
default['openstack']['network']['nicira']['redirects'] = 2
# Comma-separated list of NVP controller endpoints (<ip>:<port>). When port
# is omitted, 443 is assumed. This option MUST be specified, e.g.:
default['openstack']['network']['nicira']['nvp_controllers'] = 'xx.yy.zz.ww:443, aa.bb.cc.dd, ee.ff.gg.hh.ee:80'
# UUID of the pre-existing default NVP Transport zone to be used for creating
# tunneled isolated 'Neutron' networks. This option MUST be specified, e.g.:
default['openstack']['network']['nicira']['default_tz_uuid'] = '1e8e52cf-fa7f-46b0-a14a-f99835a9cb53'
# (Optional) UUID of the cluster in NVP. It can be retrieved from NVP management
# console 'admin' section.
default['openstack']['network']['nicira']['nvp_cluster_uuid'] = '615be8e4-82e9-4fd2-b4b3-fd141e51a5a7'
# (Optional) UUID for the default l3 gateway service to use with this cluster.
# To be specified if planning to use logical routers with external gateways.
default['openstack']['network']['nicira']['default_l3_gw_service_uuid'] = ''
# (Optional) UUID for the default l2 gateway service to use with this cluster.
# To be specified for providing a predefined gateway tenant for connecting their networks.
default['openstack']['network']['nicira']['default_l2_gw_service_uuid'] = ''
# Name of the default interface name to be used on network-gateway. This value
# will be used for any device associated with a network gateway for which an
# interface name was not specified
default['openstack']['network']['nicira']['default_iface_name'] = 'breth0'
# number of network gateways allowed per tenant, -1 means unlimited
default['openstack']['network']['nicira']['quota_network_gateway'] = 5
# Maximum number of ports for each bridged logical switch
default['openstack']['network']['nicira']['max_lp_per_bridged_ls'] = 64
# Maximum number of ports for each overlay (stt, gre) logical switch
default['openstack']['network']['nicira']['max_lp_per_overlay_ls'] = 256
# Number of connects to each controller node.
default['openstack']['network']['nicira']['concurrent_connections'] = 3
# Acceptable values for 'metadata_mode' are:
# - 'access_network': this enables a dedicated connection to the metadata
# proxy for metadata server access via Neutron router.
# - 'dhcp_host_route': this enables host route injection via the dhcp agent.
# This option is only useful if running on a host that does not support
# namespaces otherwise access_network should be used.
default['openstack']['network']['nicira']['metadata_mode'] = 'access_network'
# ============================= PLUMGrid Plugin Configuration ==============
# This line should be pointing to the NOS server,
# for the PLUMgrid platform. In other deployments,
# this is known as controller
default['openstack']['network']['plumgrid']['nos_server'] = '127.0.0.1'
default['openstack']['network']['plumgrid']['nos_server_port'] = '<nos-port>'
# Authentification parameters for the NOS server.
# These are the admin credentials to manage and control
# the NOS server.
default['openstack']['network']['plumgrid']['username'] = '<nos-admin-username>'
default['openstack']['network']['plumgrid']['password'] = '<nos-admin-password>'
default['openstack']['network']['plumgrid']['servertimeout'] = 5
# Name of the network topology to be deployed by NOS
default['openstack']['network']['plumgrid']['topologyname'] = '<nos-topology-name>'
# ============================= Ryu Plugin Configuration ===================
# Do not change this parameter unless you have a good reason to.
# This is the name of the OVS integration bridge. There is one per hypervisor.
# The integration bridge acts as a virtual 'patch port'. All VM VIFs are
# attached to this bridge and then 'patched' according to their network
# connectivity.
default['openstack']['network']['ryu']['integration_bridge'] = 'br-int'
# openflow_rest_api = <host IP address of ofp rest api service>:<port: 8080>
default['openstack']['network']['ryu']['openflow_rest_api'] = '127.0.0.1:8080'
# tunnel key range: 0 < tunnel_key_min < tunnel_key_max
# VLAN: 12bits, GRE, VXLAN: 24bits
default['openstack']['network']['ryu']['tunnel_key_min'] = 1
default['openstack']['network']['ryu']['tunnel_key_max'] = '0xffffff'
# tunnel_ip = <ip address for tunneling>
# tunnel_interface = interface for tunneling
# when tunnel_ip is NOT specified, ip address is read
# from this interface
default['openstack']['network']['ryu']['tunnel_ip'] = ''
default['openstack']['network']['ryu']['tunnel_interface'] = 'eth0'
# ovsdb_port = port number on which ovsdb is listening
# ryu-agent uses this parameter to setup ovsdb.
# ovs-vsctl set-manager ptcp:<ovsdb_port>
# See set-manager section of man ovs-vsctl for details.
# currently ptcp is only supported.
# ovsdb_ip = <host IP address on which ovsdb is listening>
# ovsdb_interface = interface for ovsdb
# when ovsdb_addr NOT specifiied, ip address is gotten
# from this interface
default['openstack']['network']['ryu']['ovsdb_port'] = 6634
default['openstack']['network']['ryu']['ovsdb_ip'] = ''
default['openstack']['network']['ryu']['ovsdb_interface'] = 'eth0'
# Firewall driver for realizing neutron security group function
default['openstack']['network']['ryu']['firewall_driver'] = 'neutron.agent.linux.iptables_firewall.OVSHybridIptablesFirewallDriver'
# Agent's polling interval in seconds
default['openstack']['network']['ryu']['polling_interval'] = 2
# ============================= ML2 Plugin Configuration ===================
# (ListOpt) List of network type driver entrypoints to be loaded from
# the neutron.ml2.type_drivers namespace.
#
# type_drivers = local,flat,vlan,gre,vxlan
# Example: type_drivers = flat,vlan,gre,vxlan
default['openstack']['network']['ml2']['type_drivers'] = 'local,flat,vlan,gre,vxlan'
# (ListOpt) Ordered list of network_types to allocate as tenant
# networks. The default value 'local' is useful for single-box testing
# but provides no connectivity between hosts.
#
# tenant_network_types = local
# Example: tenant_network_types = vlan,gre,vxlan
default['openstack']['network']['ml2']['tenant_network_types'] = 'local'
# (ListOpt) Ordered list of networking mechanism driver entrypoints
# to be loaded from the neutron.ml2.mechanism_drivers namespace.
# mechanism_drivers =
# Example: mechanism_drivers = arista
# Example: mechanism_drivers = cisco,logger
default['openstack']['network']['ml2']['mechanism_drivers'] = 'openvswitch'
# (ListOpt) List of physical_network names with which flat networks
# can be created. Use * to allow flat networks with arbitrary
# physical_network names.
#
# flat_networks =
# Example:flat_networks = physnet1,physnet2
# Example:flat_networks = *
default['openstack']['network']['ml2']['flat_networks'] = ''
# (ListOpt) List of <physical_network>[:<vlan_min>:<vlan_max>] tuples
# specifying physical_network names usable for VLAN provider and
# tenant networks, as well as ranges of VLAN tags on each
# physical_network available for allocation as tenant networks.
#
# network_vlan_ranges =
# Example: network_vlan_ranges = physnet1:1000:2999,physnet2
default['openstack']['network']['ml2']['network_vlan_ranges'] = ''
# (ListOpt) Comma-separated list of <tun_min>:<tun_max> tuples enumerating
# ranges of GRE tunnel IDs that are available for tenant network allocation
default['openstack']['network']['ml2']['tunnel_id_ranges'] = ''
# (ListOpt) Comma-separated list of <vni_min>:<vni_max> tuples enumerating
# ranges of VXLAN VNI IDs that are available for tenant network allocation.
default['openstack']['network']['ml2']['vni_ranges'] = ''
# (StrOpt) Multicast group for the VXLAN interface. When configured, will
# enable sending all broadcast traffic to this multicast group. When left
# unconfigured, will disable multicast VXLAN mode.
#
# vxlan_group =
# Example: vxlan_group = 239.1.1.1
default['openstack']['network']['ml2']['vxlan_group'] = ''
# Controls if neutron security group is enabled or not.
# It should be false when you use nova security group.
default['openstack']['network']['ml2']['enable_security_group'] = 'True'
# Use ipset to speed-up the iptables security groups. Enabling ipset support
# requires that ipset is installed on L2 agent node.
default['openstack']['network']['ml2']['enable_ipset'] = 'True'
# Misc option support
# Allow additional strings to be added to neutron.conf
# For example: ['# Comment', 'key=value']
default['openstack']['network']['misc_neutron'] = []
# platform-specific settings
case platform_family
when 'fedora', 'rhel' # :pragma-foodcritic: ~FC024 - won't fix this
default['openstack']['network']['platform'] = {
'user' => 'neutron',
'group' => 'neutron',
'nova_network_packages' => ['openstack-nova-network'],
'neutron_packages' => ['openstack-neutron', 'openstack-neutron-ml2', 'iproute'],
'neutron_client_packages' => ['python-neutronclient'],
'neutron_dhcp_packages' => ['openstack-neutron', 'iproute'],
'neutron_l3_packages' => ['openstack-neutron', 'iproute', 'radvd', 'openstack-neutron-fwaas', 'keepalived'],
'neutron_vpn_packages' => ['openstack-neutron-vpnaas', 'iproute'],
'vpn_device_driver_packages' => ['openswan'],
'default_config_area' => '/usr/share/strongswan/templates/config/strongswan.d',
'neutron_lb_packages' => ['openstack-neutron-lbaas', 'haproxy', 'iproute'],
'neutron_openvswitch_packages' => ['openvswitch'],
'neutron_openvswitch_agent_packages' => ['openstack-neutron-openvswitch', 'iproute'],
'neutron_linuxbridge_agent_packages' => ['openstack-neutron-linuxbridge', 'iproute'],
'neutron_metadata_agent_packages' => [],
'neutron_plugin_package' => 'openstack-neutron-%plugin%',
'neutron_server_packages' => [],
'neutron_dhcp_agent_service' => 'neutron-dhcp-agent',
'neutron_l3_agent_service' => 'neutron-l3-agent',
'neutron_vpn_agent_service' => 'neutron-vpn-agent',
'vpn_device_driver_services' => ['ipsec'],
'neutron_lb_agent_service' => 'neutron-lbaas-agent',
'neutron_metadata_agent_service' => 'neutron-metadata-agent',
'neutron_openvswitch_service' => 'openvswitch',
'neutron_openvswitch_agent_service' => 'neutron-openvswitch-agent',
'neutron_linuxbridge_agent_service' => 'neutron-linuxbridge-agent',
'neutron_server_service' => 'neutron-server',
# TODO: networking-hperv has not been included in Fedora or RHEL distribution, need be created by users.
'neutron_hyperv_packages' => ['networking-hyperv'],
'package_overrides' => ''
}
when 'suse'
default['openstack']['network']['platform'] = {
'user' => 'openstack-neutron',
'group' => 'openstack-neutron',
'nova_network_packages' => ['openstack-nova-network'],
'neutron_packages' => ['openstack-neutron'],
'neutron_client_packages' => ['python-neutronclient'],
'neutron_dhcp_packages' => ['openstack-neutron-dhcp-agent'],
'neutron_l3_packages' => ['openstack-neutron-l3-agent', 'radvd', 'keepalived'],
'neutron_vpn_packages' => ['openstack-neutron-vpn-agent'],
'vpn_device_driver_packages' => ['openswan'],
'default_config_area' => '/etc/strongswan.d',
'neutron_lb_packages' => ['openstack-neutron-lbaas-agent'],
# plugins are installed by the main openstack-neutron package on SUSE
'neutron_plugin_package' => '',
'neutron_metadata_agent_packages' => ['openstack-neutron-metadata-agent'],
'neutron_openvswitch_packages' => ['openvswitch-switch'],
'neutron_openvswitch_agent_packages' => ['openstack-neutron-openvswitch-agent'],
'neutron_linuxbridge_agent_packages' => ['openstack-neutron-linuxbridge-agent'],
'neutron_metadata_agent_packages' => ['openstack-neutron-metadata-agent'],
'neutron_server_packages' => [],
'neutron_dhcp_agent_service' => 'openstack-neutron-dhcp-agent',
'neutron_l3_agent_service' => 'openstack-neutron-l3-agent',
'neutron_vpn_agent_service' => 'openstack-neutron-vpn-agent',
'vpn_device_driver_services' => ['ipsec'],
'neutron_lb_agent_service' => 'openstack-neutron-lbaas-agent',
'neutron_metadata_agent_service' => 'openstack-neutron-metadata-agent',
'neutron_openvswitch_service' => 'openvswitch-switch',
'neutron_openvswitch_agent_service' => 'openstack-neutron-openvswitch-agent',
'neutron_linuxbridge_agent_service' => 'openstack-neutron-linuxbridge-agent',
'neutron_server_service' => 'openstack-neutron',
# TODO: networking-hperv has not been included in SUSE distribution, need be created by users.
'neutron_hyperv_packages' => ['networking-hyperv'],
'package_overrides' => ''
}
when 'debian'
default['openstack']['network']['platform'] = {
'user' => 'neutron',
'group' => 'neutron',
'nova_network_packages' => ['nova-network'],
'neutron_packages' => ['neutron-common', 'python-pyparsing', 'python-cliff'],
'neutron_client_packages' => ['python-neutronclient', 'python-pyparsing'],
'neutron_dhcp_packages' => ['neutron-dhcp-agent'],
'neutron_l3_packages' => ['neutron-l3-agent', 'radvd', 'python-neutron-fwaas', 'keepalived'],
'neutron_vpn_packages' => ['python-neutron-vpnaas', 'neutron-vpn-agent'],
'vpn_device_driver_packages' => ['openswan'],
'default_config_area' => '/etc/strongswan.d',
'neutron_lb_packages' => ['python-neutron-lbaas', 'neutron-lbaas-agent', 'haproxy'],
'neutron_openvswitch_packages' => ['openvswitch-switch', 'openvswitch-datapath-dkms', 'bridge-utils'],
'neutron_openvswitch_build_packages' => %w(build-essential pkg-config fakeroot libssl-dev openssl debhelper autoconf dkms python-all python-qt4 python-zopeinterface python-twisted-conch),
'neutron_openvswitch_agent_packages' => ['neutron-plugin-openvswitch', 'neutron-plugin-openvswitch-agent'],
'neutron_linuxbridge_agent_packages' => ['neutron-plugin-linuxbridge', 'neutron-plugin-linuxbridge-agent'],
'neutron_metadata_agent_packages' => ['neutron-metadata-agent'],
'neutron_plugin_package' => 'neutron-plugin-%plugin%',
'neutron_server_packages' => ['neutron-server'],
'neutron_dhcp_agent_service' => 'neutron-dhcp-agent',
'neutron_l3_agent_service' => 'neutron-l3-agent',
'neutron_vpn_agent_service' => 'neutron-vpn-agent',
'vpn_device_driver_services' => ['ipsec'],
'neutron_lb_agent_service' => 'neutron-lbaas-agent',
'neutron_metadata_agent_service' => 'neutron-metadata-agent',
'neutron_openvswitch_service' => 'openvswitch-switch',
'neutron_openvswitch_agent_service' => 'neutron-plugin-openvswitch-agent',
'neutron_linuxbridge_agent_service' => 'neutron-plugin-linuxbridge-agent',
'neutron_server_service' => 'neutron-server',
# TODO: networking-hperv has not been included in DEBIAN distribution, need be created by users.
'neutron_hyperv_packages' => ['networking-hyperv'],
'package_overrides' => "-o Dpkg::Options::='--force-confold' -o Dpkg::Options::='--force-confdef'"
}
end