From 7da45d65be36d36b880cc55c5036e96c24b53f00 Mon Sep 17 00:00:00 2001 From: Qiaowei Ren Date: Thu, 1 Mar 2018 14:38:11 +0800 Subject: remove ceph code This patch removes initial ceph code, due to license issue. Change-Id: I092d44f601cdf34aed92300fe13214925563081c Signed-off-by: Qiaowei Ren --- .../qa_scripts/openstack/files/kilo.template.conf | 1077 -------------------- 1 file changed, 1077 deletions(-) delete mode 100644 src/ceph/qa/qa_scripts/openstack/files/kilo.template.conf (limited to 'src/ceph/qa/qa_scripts/openstack/files/kilo.template.conf') diff --git a/src/ceph/qa/qa_scripts/openstack/files/kilo.template.conf b/src/ceph/qa/qa_scripts/openstack/files/kilo.template.conf deleted file mode 100644 index 35d359c..0000000 --- a/src/ceph/qa/qa_scripts/openstack/files/kilo.template.conf +++ /dev/null @@ -1,1077 +0,0 @@ -[general] - -# Path to a public key to install on servers. If a usable key has not -# been installed on the remote servers, the user is prompted for a -# password and this key is installed so the password will not be -# required again. -CONFIG_SSH_KEY=/root/.ssh/id_rsa.pub - -# Default password to be used everywhere (overridden by passwords set -# for individual services or users). -CONFIG_DEFAULT_PASSWORD= - -# Specify 'y' to install MariaDB. ['y', 'n'] -CONFIG_MARIADB_INSTALL=y - -# Specify 'y' to install OpenStack Image Service (glance). ['y', 'n'] -CONFIG_GLANCE_INSTALL=y - -# Specify 'y' to install OpenStack Block Storage (cinder). ['y', 'n'] -CONFIG_CINDER_INSTALL=y - -# Specify 'y' to install OpenStack Compute (nova). ['y', 'n'] -CONFIG_NOVA_INSTALL=y - -# Specify 'y' to install OpenStack Networking (neutron); otherwise, -# Compute Networking (nova) will be used. ['y', 'n'] -CONFIG_NEUTRON_INSTALL=y - -# Specify 'y' to install OpenStack Dashboard (horizon). ['y', 'n'] -CONFIG_HORIZON_INSTALL=y - -# Specify 'y' to install OpenStack Object Storage (swift). ['y', 'n'] -CONFIG_SWIFT_INSTALL=y - -# Specify 'y' to install OpenStack Metering (ceilometer). ['y', 'n'] -CONFIG_CEILOMETER_INSTALL=y - -# Specify 'y' to install OpenStack Data Processing (sahara). In case -# of sahara installation packstack also installs heat.['y', 'n'] -CONFIG_SAHARA_INSTALL=n - -# Specify 'y' to install OpenStack Orchestration (heat). ['y', 'n'] -CONFIG_HEAT_INSTALL=n - -# Specify 'y' to install OpenStack Database (trove) ['y', 'n'] -CONFIG_TROVE_INSTALL=n - -# Specify 'y' to install OpenStack Bare Metal Provisioning (ironic). -# ['y', 'n'] -CONFIG_IRONIC_INSTALL=n - -# Specify 'y' to install the OpenStack Client packages (command-line -# tools). An admin "rc" file will also be installed. ['y', 'n'] -CONFIG_CLIENT_INSTALL=y - -# Comma-separated list of NTP servers. Leave plain if Packstack -# should not install ntpd on instances. -CONFIG_NTP_SERVERS=clock.redhat.com - -# Specify 'y' to install Nagios to monitor OpenStack hosts. Nagios -# provides additional tools for monitoring the OpenStack environment. -# ['n'] -CONFIG_NAGIOS_INSTALL=n - -# Comma-separated list of servers to be excluded from the -# installation. This is helpful if you are running Packstack a second -# time with the same answer file and do not want Packstack to -# overwrite these server's configurations. Leave empty if you do not -# need to exclude any servers. -EXCLUDE_SERVERS= - -# Specify 'y' if you want to run OpenStack services in debug mode; -# otherwise, specify 'n'. ['y', 'n'] -CONFIG_DEBUG_MODE=y - -# Server on which to install OpenStack services specific to the -# controller role (for example, API servers or dashboard). -CONFIG_CONTROLLER_HOST=VARINET4ADDR - -# List the servers on which to install the Compute service. -CONFIG_COMPUTE_HOSTS=VARINET4ADDR - -# List of servers on which to install the network service such as -# Compute networking (nova network) or OpenStack Networking (neutron). -CONFIG_NETWORK_HOSTS=VARINET4ADDR - -# Specify 'y' if you want to use VMware vCenter as hypervisor and -# storage; otherwise, specify 'n'. ['y', 'n'] -CONFIG_VMWARE_BACKEND=n - -# Specify 'y' if you want to use unsupported parameters. This should -# be used only if you know what you are doing. Issues caused by using -# unsupported options will not be fixed before the next major release. -# ['y', 'n'] -CONFIG_UNSUPPORTED=n - -# Specify 'y' if you want to use subnet addresses (in CIDR format) -# instead of interface names in following options: -# CONFIG_NOVA_COMPUTE_PRIVIF, CONFIG_NOVA_NETWORK_PRIVIF, -# CONFIG_NOVA_NETWORK_PUBIF, CONFIG_NEUTRON_OVS_BRIDGE_IFACES, -# CONFIG_NEUTRON_LB_INTERFACE_MAPPINGS, CONFIG_NEUTRON_OVS_TUNNEL_IF. -# This is useful for cases when interface names are not same on all -# installation hosts. -CONFIG_USE_SUBNETS=n - -# IP address of the VMware vCenter server. -CONFIG_VCENTER_HOST= - -# User name for VMware vCenter server authentication. -CONFIG_VCENTER_USER= - -# Password for VMware vCenter server authentication. -CONFIG_VCENTER_PASSWORD= - -# Comma separated list of names of the VMware vCenter clusters. Note: -# if multiple clusters are specified each one is mapped to one -# compute, otherwise all computes are mapped to same cluster. -CONFIG_VCENTER_CLUSTER_NAMES= - -# (Unsupported!) Server on which to install OpenStack services -# specific to storage servers such as Image or Block Storage services. -CONFIG_STORAGE_HOST=VARINET4ADDR - -# (Unsupported!) Server on which to install OpenStack services -# specific to OpenStack Data Processing (sahara). -CONFIG_SAHARA_HOST=VARINET4ADDR - -# Specify 'y' to enable the EPEL repository (Extra Packages for -# Enterprise Linux). ['y', 'n'] -CONFIG_USE_EPEL=n - -# Comma-separated list of URLs for any additional yum repositories, -# to use for installation. -CONFIG_REPO= - -# Specify 'y' to enable the RDO testing repository. ['y', 'n'] -CONFIG_ENABLE_RDO_TESTING=n - -# To subscribe each server with Red Hat Subscription Manager, include -# this with CONFIG_RH_PW. -CONFIG_RH_USER= - -# To subscribe each server to receive updates from a Satellite -# server, provide the URL of the Satellite server. You must also -# provide a user name (CONFIG_SATELLITE_USERNAME) and password -# (CONFIG_SATELLITE_PASSWORD) or an access key (CONFIG_SATELLITE_AKEY) -# for authentication. -CONFIG_SATELLITE_URL= - -# To subscribe each server with Red Hat Subscription Manager, include -# this with CONFIG_RH_USER. -CONFIG_RH_PW= - -# Specify 'y' to enable RHEL optional repositories. ['y', 'n'] -CONFIG_RH_OPTIONAL=y - -# HTTP proxy to use with Red Hat Subscription Manager. -CONFIG_RH_PROXY= - -# Port to use for Red Hat Subscription Manager's HTTP proxy. -CONFIG_RH_PROXY_PORT= - -# User name to use for Red Hat Subscription Manager's HTTP proxy. -CONFIG_RH_PROXY_USER= - -# Password to use for Red Hat Subscription Manager's HTTP proxy. -CONFIG_RH_PROXY_PW= - -# User name to authenticate with the RHN Satellite server; if you -# intend to use an access key for Satellite authentication, leave this -# blank. -CONFIG_SATELLITE_USER= - -# Password to authenticate with the RHN Satellite server; if you -# intend to use an access key for Satellite authentication, leave this -# blank. -CONFIG_SATELLITE_PW= - -# Access key for the Satellite server; if you intend to use a user -# name and password for Satellite authentication, leave this blank. -CONFIG_SATELLITE_AKEY= - -# Certificate path or URL of the certificate authority to verify that -# the connection with the Satellite server is secure. If you are not -# using Satellite in your deployment, leave this blank. -CONFIG_SATELLITE_CACERT= - -# Profile name that should be used as an identifier for the system in -# RHN Satellite (if required). -CONFIG_SATELLITE_PROFILE= - -# Comma-separated list of flags passed to the rhnreg_ks command. -# Valid flags are: novirtinfo, norhnsd, nopackages ['novirtinfo', -# 'norhnsd', 'nopackages'] -CONFIG_SATELLITE_FLAGS= - -# HTTP proxy to use when connecting to the RHN Satellite server (if -# required). -CONFIG_SATELLITE_PROXY= - -# User name to authenticate with the Satellite-server HTTP proxy. -CONFIG_SATELLITE_PROXY_USER= - -# User password to authenticate with the Satellite-server HTTP proxy. -CONFIG_SATELLITE_PROXY_PW= - -# Specify filepath for CA cert file. If CONFIG_SSL_CACERT_SELFSIGN is -# set to 'n' it has to be preexisting file. -CONFIG_SSL_CACERT_FILE=/etc/pki/tls/certs/selfcert.crt - -# Specify filepath for CA cert key file. If -# CONFIG_SSL_CACERT_SELFSIGN is set to 'n' it has to be preexisting -# file. -CONFIG_SSL_CACERT_KEY_FILE=/etc/pki/tls/private/selfkey.key - -# Enter the path to use to store generated SSL certificates in. -CONFIG_SSL_CERT_DIR=~/packstackca/ - -# Specify 'y' if you want Packstack to pregenerate the CA -# Certificate. -CONFIG_SSL_CACERT_SELFSIGN=y - -# Enter the selfsigned CAcert subject country. -CONFIG_SELFSIGN_CACERT_SUBJECT_C=-- - -# Enter the selfsigned CAcert subject state. -CONFIG_SELFSIGN_CACERT_SUBJECT_ST=State - -# Enter the selfsigned CAcert subject location. -CONFIG_SELFSIGN_CACERT_SUBJECT_L=City - -# Enter the selfsigned CAcert subject organization. -CONFIG_SELFSIGN_CACERT_SUBJECT_O=openstack - -# Enter the selfsigned CAcert subject organizational unit. -CONFIG_SELFSIGN_CACERT_SUBJECT_OU=packstack - -# Enter the selfsigned CAcert subject common name. -CONFIG_SELFSIGN_CACERT_SUBJECT_CN=VARHOSTNAME - -CONFIG_SELFSIGN_CACERT_SUBJECT_MAIL=admin@VARHOSTNAME - -# Service to be used as the AMQP broker. Allowed values are: qpid, -# rabbitmq ['qpid', 'rabbitmq'] -CONFIG_AMQP_BACKEND=rabbitmq - -# IP address of the server on which to install the AMQP service. -CONFIG_AMQP_HOST=VARINET4ADDR - -# Specify 'y' to enable SSL for the AMQP service. ['y', 'n'] -CONFIG_AMQP_ENABLE_SSL=n - -# Specify 'y' to enable authentication for the AMQP service. ['y', -# 'n'] -CONFIG_AMQP_ENABLE_AUTH=n - -# Password for the NSS certificate database of the AMQP service. -CONFIG_AMQP_NSS_CERTDB_PW=PW_PLACEHOLDER - -# User for AMQP authentication. -CONFIG_AMQP_AUTH_USER=amqp_user - -# Password for AMQP authentication. -CONFIG_AMQP_AUTH_PASSWORD=PW_PLACEHOLDER - -# IP address of the server on which to install MariaDB. If a MariaDB -# installation was not specified in CONFIG_MARIADB_INSTALL, specify -# the IP address of an existing database server (a MariaDB cluster can -# also be specified). -CONFIG_MARIADB_HOST=VARINET4ADDR - -# User name for the MariaDB administrative user. -CONFIG_MARIADB_USER=root - -# Password for the MariaDB administrative user. -CONFIG_MARIADB_PW=qum5net - -# Password to use for the Identity service (keystone) to access the -# database. -CONFIG_KEYSTONE_DB_PW=qum5net - -# Enter y if cron job for removing soft deleted DB rows should be -# created. -CONFIG_KEYSTONE_DB_PURGE_ENABLE=True - -# Default region name to use when creating tenants in the Identity -# service. -CONFIG_KEYSTONE_REGION=RegionOne - -# Token to use for the Identity service API. -CONFIG_KEYSTONE_ADMIN_TOKEN=9390caff845749c3ac74453eb4f384e2 - -# Email address for the Identity service 'admin' user. Defaults to -CONFIG_KEYSTONE_ADMIN_EMAIL=root@localhost - -# User name for the Identity service 'admin' user. Defaults to -# 'admin'. -CONFIG_KEYSTONE_ADMIN_USERNAME=admin - -# Password to use for the Identity service 'admin' user. -CONFIG_KEYSTONE_ADMIN_PW=qum5net - -# Password to use for the Identity service 'demo' user. -CONFIG_KEYSTONE_DEMO_PW=qum5net - -# Identity service API version string. ['v2.0', 'v3'] -CONFIG_KEYSTONE_API_VERSION=v2.0 - -# Identity service token format (UUID or PKI). The recommended format -# for new deployments is UUID. ['UUID', 'PKI'] -CONFIG_KEYSTONE_TOKEN_FORMAT=UUID - -# Name of service to use to run the Identity service (keystone or -# httpd). ['keystone', 'httpd'] -CONFIG_KEYSTONE_SERVICE_NAME=httpd - -# Type of Identity service backend (sql or ldap). ['sql', 'ldap'] -CONFIG_KEYSTONE_IDENTITY_BACKEND=sql - -# URL for the Identity service LDAP backend. -CONFIG_KEYSTONE_LDAP_URL=ldap://VARINET4ADDR - -# User DN for the Identity service LDAP backend. Used to bind to the -# LDAP server if the LDAP server does not allow anonymous -# authentication. -CONFIG_KEYSTONE_LDAP_USER_DN= - -# User DN password for the Identity service LDAP backend. -CONFIG_KEYSTONE_LDAP_USER_PASSWORD= - -# Base suffix for the Identity service LDAP backend. -CONFIG_KEYSTONE_LDAP_SUFFIX= - -# Query scope for the Identity service LDAP backend. Use 'one' for -# onelevel/singleLevel or 'sub' for subtree/wholeSubtree ('base' is -# not actually used by the Identity service and is therefore -# deprecated). ['base', 'one', 'sub'] -CONFIG_KEYSTONE_LDAP_QUERY_SCOPE=one - -# Query page size for the Identity service LDAP backend. -CONFIG_KEYSTONE_LDAP_PAGE_SIZE=-1 - -# User subtree for the Identity service LDAP backend. -CONFIG_KEYSTONE_LDAP_USER_SUBTREE= - -# User query filter for the Identity service LDAP backend. -CONFIG_KEYSTONE_LDAP_USER_FILTER= - -# User object class for the Identity service LDAP backend. -CONFIG_KEYSTONE_LDAP_USER_OBJECTCLASS= - -# User ID attribute for the Identity service LDAP backend. -CONFIG_KEYSTONE_LDAP_USER_ID_ATTRIBUTE= - -# User name attribute for the Identity service LDAP backend. -CONFIG_KEYSTONE_LDAP_USER_NAME_ATTRIBUTE= - -# User email address attribute for the Identity service LDAP backend. -CONFIG_KEYSTONE_LDAP_USER_MAIL_ATTRIBUTE= - -# User-enabled attribute for the Identity service LDAP backend. -CONFIG_KEYSTONE_LDAP_USER_ENABLED_ATTRIBUTE= - -# Bit mask integer applied to user-enabled attribute for the Identity -# service LDAP backend. Indicate the bit that the enabled value is -# stored in if the LDAP server represents "enabled" as a bit on an -# integer rather than a boolean. A value of "0" indicates the mask is -# not used (default). If this is not set to "0", the typical value is -# "2", typically used when -# "CONFIG_KEYSTONE_LDAP_USER_ENABLED_ATTRIBUTE = userAccountControl". -CONFIG_KEYSTONE_LDAP_USER_ENABLED_MASK=-1 - -# Value of enabled attribute which indicates user is enabled for the -# Identity service LDAP backend. This should match an appropriate -# integer value if the LDAP server uses non-boolean (bitmask) values -# to indicate whether a user is enabled or disabled. If this is not -# set as 'y', the typical value is "512". This is typically used when -# "CONFIG_KEYSTONE_LDAP_USER_ENABLED_ATTRIBUTE = userAccountControl". -CONFIG_KEYSTONE_LDAP_USER_ENABLED_DEFAULT=TRUE - -# Specify 'y' if users are disabled (not enabled) in the Identity -# service LDAP backend (inverts boolean-enalbed values). Some LDAP -# servers use a boolean lock attribute where "y" means an account is -# disabled. Setting this to 'y' allows these lock attributes to be -# used. This setting will have no effect if -# "CONFIG_KEYSTONE_LDAP_USER_ENABLED_MASK" is in use. ['n', 'y'] -CONFIG_KEYSTONE_LDAP_USER_ENABLED_INVERT=n - -# Comma-separated list of attributes stripped from LDAP user entry -# upon update. -CONFIG_KEYSTONE_LDAP_USER_ATTRIBUTE_IGNORE= - -# Identity service LDAP attribute mapped to default_project_id for -# users. -CONFIG_KEYSTONE_LDAP_USER_DEFAULT_PROJECT_ID_ATTRIBUTE= - -# Specify 'y' if you want to be able to create Identity service users -# through the Identity service interface; specify 'n' if you will -# create directly in the LDAP backend. ['n', 'y'] -CONFIG_KEYSTONE_LDAP_USER_ALLOW_CREATE=n - -# Specify 'y' if you want to be able to update Identity service users -# through the Identity service interface; specify 'n' if you will -# update directly in the LDAP backend. ['n', 'y'] -CONFIG_KEYSTONE_LDAP_USER_ALLOW_UPDATE=n - -# Specify 'y' if you want to be able to delete Identity service users -# through the Identity service interface; specify 'n' if you will -# delete directly in the LDAP backend. ['n', 'y'] -CONFIG_KEYSTONE_LDAP_USER_ALLOW_DELETE=n - -# Identity service LDAP attribute mapped to password. -CONFIG_KEYSTONE_LDAP_USER_PASS_ATTRIBUTE= - -# DN of the group entry to hold enabled LDAP users when using enabled -# emulation. -CONFIG_KEYSTONE_LDAP_USER_ENABLED_EMULATION_DN= - -# List of additional LDAP attributes for mapping additional attribute -# mappings for users. The attribute-mapping format is -# :, where ldap_attr is the attribute in the -# LDAP entry and user_attr is the Identity API attribute. -CONFIG_KEYSTONE_LDAP_USER_ADDITIONAL_ATTRIBUTE_MAPPING= - -# Group subtree for the Identity service LDAP backend. -CONFIG_KEYSTONE_LDAP_GROUP_SUBTREE= - -# Group query filter for the Identity service LDAP backend. -CONFIG_KEYSTONE_LDAP_GROUP_FILTER= - -# Group object class for the Identity service LDAP backend. -CONFIG_KEYSTONE_LDAP_GROUP_OBJECTCLASS= - -# Group ID attribute for the Identity service LDAP backend. -CONFIG_KEYSTONE_LDAP_GROUP_ID_ATTRIBUTE= - -# Group name attribute for the Identity service LDAP backend. -CONFIG_KEYSTONE_LDAP_GROUP_NAME_ATTRIBUTE= - -# Group member attribute for the Identity service LDAP backend. -CONFIG_KEYSTONE_LDAP_GROUP_MEMBER_ATTRIBUTE= - -# Group description attribute for the Identity service LDAP backend. -CONFIG_KEYSTONE_LDAP_GROUP_DESC_ATTRIBUTE= - -# Comma-separated list of attributes stripped from LDAP group entry -# upon update. -CONFIG_KEYSTONE_LDAP_GROUP_ATTRIBUTE_IGNORE= - -# Specify 'y' if you want to be able to create Identity service -# groups through the Identity service interface; specify 'n' if you -# will create directly in the LDAP backend. ['n', 'y'] -CONFIG_KEYSTONE_LDAP_GROUP_ALLOW_CREATE=n - -# Specify 'y' if you want to be able to update Identity service -# groups through the Identity service interface; specify 'n' if you -# will update directly in the LDAP backend. ['n', 'y'] -CONFIG_KEYSTONE_LDAP_GROUP_ALLOW_UPDATE=n - -# Specify 'y' if you want to be able to delete Identity service -# groups through the Identity service interface; specify 'n' if you -# will delete directly in the LDAP backend. ['n', 'y'] -CONFIG_KEYSTONE_LDAP_GROUP_ALLOW_DELETE=n - -# List of additional LDAP attributes used for mapping additional -# attribute mappings for groups. The attribute=mapping format is -# :, where ldap_attr is the attribute in the -# LDAP entry and group_attr is the Identity API attribute. -CONFIG_KEYSTONE_LDAP_GROUP_ADDITIONAL_ATTRIBUTE_MAPPING= - -# Specify 'y' if the Identity service LDAP backend should use TLS. -# ['n', 'y'] -CONFIG_KEYSTONE_LDAP_USE_TLS=n - -# CA certificate directory for Identity service LDAP backend (if TLS -# is used). -CONFIG_KEYSTONE_LDAP_TLS_CACERTDIR= - -# CA certificate file for Identity service LDAP backend (if TLS is -# used). -CONFIG_KEYSTONE_LDAP_TLS_CACERTFILE= - -# Certificate-checking strictness level for Identity service LDAP -# backend; valid options are: never, allow, demand. ['never', 'allow', -# 'demand'] -CONFIG_KEYSTONE_LDAP_TLS_REQ_CERT=demand - -# Password to use for the Image service (glance) to access the -# database. -CONFIG_GLANCE_DB_PW=qum5net - -# Password to use for the Image service to authenticate with the -# Identity service. -CONFIG_GLANCE_KS_PW=qum5net - -# Storage backend for the Image service (controls how the Image -# service stores disk images). Valid options are: file or swift -# (Object Storage). The Object Storage service must be enabled to use -# it as a working backend; otherwise, Packstack falls back to 'file'. -# ['file', 'swift'] -CONFIG_GLANCE_BACKEND=file - -# Password to use for the Block Storage service (cinder) to access -# the database. -CONFIG_CINDER_DB_PW=qum5net - -# Enter y if cron job for removing soft deleted DB rows should be -# created. -CONFIG_CINDER_DB_PURGE_ENABLE=True - -# Password to use for the Block Storage service to authenticate with -# the Identity service. -CONFIG_CINDER_KS_PW=qum5net - -# Storage backend to use for the Block Storage service; valid options -# are: lvm, gluster, nfs, vmdk, netapp. ['lvm', 'gluster', 'nfs', -# 'vmdk', 'netapp'] -CONFIG_CINDER_BACKEND=lvm - -# Specify 'y' to create the Block Storage volumes group. That is, -# Packstack creates a raw disk image in /var/lib/cinder, and mounts it -# using a loopback device. This should only be used for testing on a -# proof-of-concept installation of the Block Storage service (a file- -# backed volume group is not suitable for production usage). ['y', -# 'n'] -CONFIG_CINDER_VOLUMES_CREATE=y - -# Size of Block Storage volumes group. Actual volume size will be -# extended with 3% more space for VG metadata. Remember that the size -# of the volume group will restrict the amount of disk space that you -# can expose to Compute instances, and that the specified amount must -# be available on the device used for /var/lib/cinder. -CONFIG_CINDER_VOLUMES_SIZE=20G - -# A single or comma-separated list of Red Hat Storage (gluster) -# volume shares to mount. Example: 'ip-address:/vol-name', 'domain -# :/vol-name' -CONFIG_CINDER_GLUSTER_MOUNTS= - -# A single or comma-separated list of NFS exports to mount. Example: -# 'ip-address:/export-name' -CONFIG_CINDER_NFS_MOUNTS= - -# Administrative user account name used to access the NetApp storage -# system or proxy server. -CONFIG_CINDER_NETAPP_LOGIN= - -# Password for the NetApp administrative user account specified in -# the CONFIG_CINDER_NETAPP_LOGIN parameter. -CONFIG_CINDER_NETAPP_PASSWORD= - -# Hostname (or IP address) for the NetApp storage system or proxy -# server. -CONFIG_CINDER_NETAPP_HOSTNAME= - -# The TCP port to use for communication with the storage system or -# proxy. If not specified, Data ONTAP drivers will use 80 for HTTP and -# 443 for HTTPS; E-Series will use 8080 for HTTP and 8443 for HTTPS. -# Defaults to 80. -CONFIG_CINDER_NETAPP_SERVER_PORT=80 - -# Storage family type used on the NetApp storage system; valid -# options are ontap_7mode for using Data ONTAP operating in 7-Mode, -# ontap_cluster for using clustered Data ONTAP, or E-Series for NetApp -# E-Series. Defaults to ontap_cluster. ['ontap_7mode', -# 'ontap_cluster', 'eseries'] -CONFIG_CINDER_NETAPP_STORAGE_FAMILY=ontap_cluster - -# The transport protocol used when communicating with the NetApp -# storage system or proxy server. Valid values are http or https. -# Defaults to 'http'. ['http', 'https'] -CONFIG_CINDER_NETAPP_TRANSPORT_TYPE=http - -# Storage protocol to be used on the data path with the NetApp -# storage system; valid options are iscsi, fc, nfs. Defaults to nfs. -# ['iscsi', 'fc', 'nfs'] -CONFIG_CINDER_NETAPP_STORAGE_PROTOCOL=nfs - -# Quantity to be multiplied by the requested volume size to ensure -# enough space is available on the virtual storage server (Vserver) to -# fulfill the volume creation request. Defaults to 1.0. -CONFIG_CINDER_NETAPP_SIZE_MULTIPLIER=1.0 - -# Time period (in minutes) that is allowed to elapse after the image -# is last accessed, before it is deleted from the NFS image cache. -# When a cache-cleaning cycle begins, images in the cache that have -# not been accessed in the last M minutes, where M is the value of -# this parameter, are deleted from the cache to create free space on -# the NFS share. Defaults to 720. -CONFIG_CINDER_NETAPP_EXPIRY_THRES_MINUTES=720 - -# If the percentage of available space for an NFS share has dropped -# below the value specified by this parameter, the NFS image cache is -# cleaned. Defaults to 20. -CONFIG_CINDER_NETAPP_THRES_AVL_SIZE_PERC_START=20 - -# When the percentage of available space on an NFS share has reached -# the percentage specified by this parameter, the driver stops -# clearing files from the NFS image cache that have not been accessed -# in the last M minutes, where M is the value of the -# CONFIG_CINDER_NETAPP_EXPIRY_THRES_MINUTES parameter. Defaults to 60. -CONFIG_CINDER_NETAPP_THRES_AVL_SIZE_PERC_STOP=60 - -# Single or comma-separated list of NetApp NFS shares for Block -# Storage to use. Format: ip-address:/export-name. Defaults to ''. -CONFIG_CINDER_NETAPP_NFS_SHARES= - -# File with the list of available NFS shares. Defaults to -# '/etc/cinder/shares.conf'. -CONFIG_CINDER_NETAPP_NFS_SHARES_CONFIG=/etc/cinder/shares.conf - -# This parameter is only utilized when the storage protocol is -# configured to use iSCSI or FC. This parameter is used to restrict -# provisioning to the specified controller volumes. Specify the value -# of this parameter to be a comma separated list of NetApp controller -# volume names to be used for provisioning. Defaults to ''. -CONFIG_CINDER_NETAPP_VOLUME_LIST= - -# The vFiler unit on which provisioning of block storage volumes will -# be done. This parameter is only used by the driver when connecting -# to an instance with a storage family of Data ONTAP operating in -# 7-Mode Only use this parameter when utilizing the MultiStore feature -# on the NetApp storage system. Defaults to ''. -CONFIG_CINDER_NETAPP_VFILER= - -# The name of the config.conf stanza for a Data ONTAP (7-mode) HA -# partner. This option is only used by the driver when connecting to -# an instance with a storage family of Data ONTAP operating in 7-Mode, -# and it is required if the storage protocol selected is FC. Defaults -# to ''. -CONFIG_CINDER_NETAPP_PARTNER_BACKEND_NAME= - -# This option specifies the virtual storage server (Vserver) name on -# the storage cluster on which provisioning of block storage volumes -# should occur. Defaults to ''. -CONFIG_CINDER_NETAPP_VSERVER= - -# Restricts provisioning to the specified controllers. Value must be -# a comma-separated list of controller hostnames or IP addresses to be -# used for provisioning. This option is only utilized when the storage -# family is configured to use E-Series. Defaults to ''. -CONFIG_CINDER_NETAPP_CONTROLLER_IPS= - -# Password for the NetApp E-Series storage array. Defaults to ''. -CONFIG_CINDER_NETAPP_SA_PASSWORD= - -# This option is used to define how the controllers in the E-Series -# storage array will work with the particular operating system on the -# hosts that are connected to it. Defaults to 'linux_dm_mp' -CONFIG_CINDER_NETAPP_ESERIES_HOST_TYPE=linux_dm_mp - -# Path to the NetApp E-Series proxy application on a proxy server. -# The value is combined with the value of the -# CONFIG_CINDER_NETAPP_TRANSPORT_TYPE, CONFIG_CINDER_NETAPP_HOSTNAME, -# and CONFIG_CINDER_NETAPP_HOSTNAME options to create the URL used by -# the driver to connect to the proxy application. Defaults to -# '/devmgr/v2'. -CONFIG_CINDER_NETAPP_WEBSERVICE_PATH=/devmgr/v2 - -# Restricts provisioning to the specified storage pools. Only dynamic -# disk pools are currently supported. The value must be a comma- -# separated list of disk pool names to be used for provisioning. -# Defaults to ''. -CONFIG_CINDER_NETAPP_STORAGE_POOLS= - -# Password to use for OpenStack Bare Metal Provisioning (ironic) to -# access the database. -CONFIG_IRONIC_DB_PW=PW_PLACEHOLDER - -# Password to use for OpenStack Bare Metal Provisioning to -# authenticate with the Identity service. -CONFIG_IRONIC_KS_PW=PW_PLACEHOLDER - -# Enter y if cron job for removing soft deleted DB rows should be -# created. -CONFIG_NOVA_DB_PURGE_ENABLE=True - -# Password to use for the Compute service (nova) to access the -# database. -CONFIG_NOVA_DB_PW=qum5net - -# Password to use for the Compute service to authenticate with the -# Identity service. -CONFIG_NOVA_KS_PW=qum5net - -# Overcommitment ratio for virtual to physical CPUs. Specify 1.0 to -# disable CPU overcommitment. -CONFIG_NOVA_SCHED_CPU_ALLOC_RATIO=16.0 - -# Overcommitment ratio for virtual to physical RAM. Specify 1.0 to -# disable RAM overcommitment. -CONFIG_NOVA_SCHED_RAM_ALLOC_RATIO=1.5 - -# Protocol used for instance migration. Valid options are: tcp and -# ssh. Note that by default, the Compute user is created with the -# /sbin/nologin shell so that the SSH protocol will not work. To make -# the SSH protocol work, you must configure the Compute user on -# compute hosts manually. ['tcp', 'ssh'] -CONFIG_NOVA_COMPUTE_MIGRATE_PROTOCOL=tcp - -# Manager that runs the Compute service. -CONFIG_NOVA_COMPUTE_MANAGER=nova.compute.manager.ComputeManager - -# PEM encoded certificate to be used for ssl on the https server, -# leave blank if one should be generated, this certificate should not -# require a passphrase. If CONFIG_HORIZON_SSL is set to 'n' this -# parameter is ignored. -CONFIG_VNC_SSL_CERT= - -# SSL keyfile corresponding to the certificate if one was entered. If -# CONFIG_HORIZON_SSL is set to 'n' this parameter is ignored. -CONFIG_VNC_SSL_KEY= - -# Enter the PCI passthrough array of hash in JSON style for -# controller eg. [{"vendor_id":"1234", "product_id":"5678", -# "name":"default"}, {...}] -CONFIG_NOVA_PCI_ALIAS= - -# Enter the PCI passthrough whitelist array of hash in JSON style for -# controller eg. [{"vendor_id":"1234", "product_id":"5678", -# "name':"default"}, {...}] -CONFIG_NOVA_PCI_PASSTHROUGH_WHITELIST= - -# Private interface for flat DHCP on the Compute servers. -CONFIG_NOVA_COMPUTE_PRIVIF= - -# Compute Network Manager. ['^nova\.network\.manager\.\w+Manager$'] -CONFIG_NOVA_NETWORK_MANAGER=nova.network.manager.FlatDHCPManager - -# Public interface on the Compute network server. -CONFIG_NOVA_NETWORK_PUBIF=eth0 - -# Private interface for flat DHCP on the Compute network server. -CONFIG_NOVA_NETWORK_PRIVIF= - -# IP Range for flat DHCP. ['^[\:\.\da-fA-f]+(\/\d+){0,1}$'] -CONFIG_NOVA_NETWORK_FIXEDRANGE=192.168.32.0/22 - -# IP Range for floating IP addresses. ['^[\:\.\da- -# fA-f]+(\/\d+){0,1}$'] -CONFIG_NOVA_NETWORK_FLOATRANGE=10.3.4.0/22 - -# Specify 'y' to automatically assign a floating IP to new instances. -# ['y', 'n'] -CONFIG_NOVA_NETWORK_AUTOASSIGNFLOATINGIP=n - -# First VLAN for private networks (Compute networking). -CONFIG_NOVA_NETWORK_VLAN_START=100 - -# Number of networks to support (Compute networking). -CONFIG_NOVA_NETWORK_NUMBER=1 - -# Number of addresses in each private subnet (Compute networking). -CONFIG_NOVA_NETWORK_SIZE=255 - -# Password to use for OpenStack Networking (neutron) to authenticate -# with the Identity service. -CONFIG_NEUTRON_KS_PW=qum5net - -# The password to use for OpenStack Networking to access the -# database. -CONFIG_NEUTRON_DB_PW=qum5net - -# The name of the Open vSwitch bridge (or empty for linuxbridge) for -# the OpenStack Networking L3 agent to use for external traffic. -# Specify 'provider' if you intend to use a provider network to handle -# external traffic. -CONFIG_NEUTRON_L3_EXT_BRIDGE=br-ex - -# Password for the OpenStack Networking metadata agent. -CONFIG_NEUTRON_METADATA_PW=qum5net - -# Specify 'y' to install OpenStack Networking's Load-Balancing- -# as-a-Service (LBaaS). ['y', 'n'] -CONFIG_LBAAS_INSTALL=n - -# Specify 'y' to install OpenStack Networking's L3 Metering agent -# ['y', 'n'] -CONFIG_NEUTRON_METERING_AGENT_INSTALL=n - -# Specify 'y' to configure OpenStack Networking's Firewall- -# as-a-Service (FWaaS). ['y', 'n'] -CONFIG_NEUTRON_FWAAS=n - -# Specify 'y' to configure OpenStack Networking's VPN-as-a-Service -# (VPNaaS). ['y', 'n'] -CONFIG_NEUTRON_VPNAAS=n - -# Comma-separated list of network-type driver entry points to be -# loaded from the neutron.ml2.type_drivers namespace. ['local', -# 'flat', 'vlan', 'gre', 'vxlan'] -CONFIG_NEUTRON_ML2_TYPE_DRIVERS=vxlan - -# Comma-separated, ordered list of network types to allocate as -# tenant networks. The 'local' value is only useful for single-box -# testing and provides no connectivity between hosts. ['local', -# 'vlan', 'gre', 'vxlan'] -CONFIG_NEUTRON_ML2_TENANT_NETWORK_TYPES=vxlan - -# Comma-separated ordered list of networking mechanism driver entry -# points to be loaded from the neutron.ml2.mechanism_drivers -# namespace. ['logger', 'test', 'linuxbridge', 'openvswitch', -# 'hyperv', 'ncs', 'arista', 'cisco_nexus', 'mlnx', 'l2population', -# 'sriovnicswitch'] -CONFIG_NEUTRON_ML2_MECHANISM_DRIVERS=openvswitch - -# Comma-separated list of physical_network names with which flat -# networks can be created. Use * to allow flat networks with arbitrary -# physical_network names. -CONFIG_NEUTRON_ML2_FLAT_NETWORKS=* - -# Comma-separated list of :: or -# specifying physical_network names usable for VLAN -# provider and tenant networks, as well as ranges of VLAN tags on each -# available for allocation to tenant networks. -CONFIG_NEUTRON_ML2_VLAN_RANGES= - -# Comma-separated list of : tuples enumerating -# ranges of GRE tunnel IDs that are available for tenant-network -# allocation. A tuple must be an array with tun_max +1 - tun_min > -# 1000000. -CONFIG_NEUTRON_ML2_TUNNEL_ID_RANGES= - -# Comma-separated list of addresses for VXLAN multicast group. If -# left empty, disables VXLAN from sending allocate broadcast traffic -# (disables multicast VXLAN mode). Should be a Multicast IP (v4 or v6) -# address. -CONFIG_NEUTRON_ML2_VXLAN_GROUP= - -# Comma-separated list of : tuples enumerating -# ranges of VXLAN VNI IDs that are available for tenant network -# allocation. Minimum value is 0 and maximum value is 16777215. -CONFIG_NEUTRON_ML2_VNI_RANGES=10:100 - -# Name of the L2 agent to be used with OpenStack Networking. -# ['linuxbridge', 'openvswitch'] -CONFIG_NEUTRON_L2_AGENT=openvswitch - -# Comma separated list of supported PCI vendor devices defined by -# vendor_id:product_id according to the PCI ID Repository. -CONFIG_NEUTRON_ML2_SUPPORTED_PCI_VENDOR_DEVS=['15b3:1004', '8086:10ca'] - -# Specify 'y' if the sriov agent is required -CONFIG_NEUTRON_ML2_SRIOV_AGENT_REQUIRED=n - -# Comma-separated list of interface mappings for the OpenStack -# Networking ML2 SRIOV agent. Each tuple in the list must be in the -# format :. Example: -# physnet1:eth1,physnet2:eth2,physnet3:eth3. -CONFIG_NEUTRON_ML2_SRIOV_INTERFACE_MAPPINGS= - -# Comma-separated list of interface mappings for the OpenStack -# Networking linuxbridge plugin. Each tuple in the list must be in the -# format :. Example: -# physnet1:eth1,physnet2:eth2,physnet3:eth3. -CONFIG_NEUTRON_LB_INTERFACE_MAPPINGS= - -# Comma-separated list of bridge mappings for the OpenStack -# Networking Open vSwitch plugin. Each tuple in the list must be in -# the format :. Example: physnet1:br- -# eth1,physnet2:br-eth2,physnet3:br-eth3 -CONFIG_NEUTRON_OVS_BRIDGE_MAPPINGS= - -# Comma-separated list of colon-separated Open vSwitch -# : pairs. The interface will be added to the -# associated bridge. If you desire the bridge to be persistent a value -# must be added to this directive, also -# CONFIG_NEUTRON_OVS_BRIDGE_MAPPINGS must be set in order to create -# the proper port. This can be achieved from the command line by -# issuing the following command: packstack --allinone --os-neutron- -# ovs-bridge-mappings=ext-net:br-ex --os-neutron-ovs-bridge-interfaces -# =br-ex:eth0 -CONFIG_NEUTRON_OVS_BRIDGE_IFACES= - -# Interface for the Open vSwitch tunnel. Packstack overrides the IP -# address used for tunnels on this hypervisor to the IP found on the -# specified interface (for example, eth1). -CONFIG_NEUTRON_OVS_TUNNEL_IF= - -# VXLAN UDP port. -CONFIG_NEUTRON_OVS_VXLAN_UDP_PORT=4789 - -# Specify 'y' to set up Horizon communication over https. ['y', 'n'] -CONFIG_HORIZON_SSL=n - -# Secret key to use for Horizon Secret Encryption Key. -CONFIG_HORIZON_SECRET_KEY=e2ba54f295f84d0c8d645de8e36fcc33 - -# PEM-encoded certificate to be used for SSL connections on the https -# server. To generate a certificate, leave blank. -CONFIG_HORIZON_SSL_CERT= - -# SSL keyfile corresponding to the certificate if one was specified. -# The certificate should not require a passphrase. -CONFIG_HORIZON_SSL_KEY= - -CONFIG_HORIZON_SSL_CACERT= - -# Password to use for the Object Storage service to authenticate with -# the Identity service. -CONFIG_SWIFT_KS_PW=qum5net - -# Comma-separated list of devices to use as storage device for Object -# Storage. Each entry must take the format /path/to/dev (for example, -# specifying /dev/vdb installs /dev/vdb as the Object Storage storage -# device; Packstack does not create the filesystem, you must do this -# first). If left empty, Packstack creates a loopback device for test -# setup. -CONFIG_SWIFT_STORAGES= - -# Number of Object Storage storage zones; this number MUST be no -# larger than the number of configured storage devices. -CONFIG_SWIFT_STORAGE_ZONES=1 - -# Number of Object Storage storage replicas; this number MUST be no -# larger than the number of configured storage zones. -CONFIG_SWIFT_STORAGE_REPLICAS=1 - -# File system type for storage nodes. ['xfs', 'ext4'] -CONFIG_SWIFT_STORAGE_FSTYPE=ext4 - -# Custom seed number to use for swift_hash_path_suffix in -# /etc/swift/swift.conf. If you do not provide a value, a seed number -# is automatically generated. -CONFIG_SWIFT_HASH=54760d6b88814b53 - -# Size of the Object Storage loopback file storage device. -CONFIG_SWIFT_STORAGE_SIZE=2G - -# Password used by Orchestration service user to authenticate against -# the database. -CONFIG_HEAT_DB_PW=PW_PLACEHOLDER - -# Encryption key to use for authentication in the Orchestration -# database (16, 24, or 32 chars). -CONFIG_HEAT_AUTH_ENC_KEY=2e06ca7c4aa3400c - -# Password to use for the Orchestration service to authenticate with -# the Identity service. -CONFIG_HEAT_KS_PW=PW_PLACEHOLDER - -# Specify 'y' to install the Orchestration CloudWatch API. ['y', 'n'] -CONFIG_HEAT_CLOUDWATCH_INSTALL=n - -# Specify 'y' to install the Orchestration CloudFormation API. ['y', -# 'n'] -CONFIG_HEAT_CFN_INSTALL=n - -# Name of the Identity domain for Orchestration. -CONFIG_HEAT_DOMAIN=heat - -# Name of the Identity domain administrative user for Orchestration. -CONFIG_HEAT_DOMAIN_ADMIN=heat_admin - -# Password for the Identity domain administrative user for -# Orchestration. -CONFIG_HEAT_DOMAIN_PASSWORD=PW_PLACEHOLDER - -# Specify 'y' to provision for demo usage and testing. ['y', 'n'] -CONFIG_PROVISION_DEMO=y - -# Specify 'y' to configure the OpenStack Integration Test Suite -# (tempest) for testing. The test suite requires OpenStack Networking -# to be installed. ['y', 'n'] -CONFIG_PROVISION_TEMPEST=n - -# CIDR network address for the floating IP subnet. -CONFIG_PROVISION_DEMO_FLOATRANGE=172.24.4.224/28 - -# The name to be assigned to the demo image in Glance (default -# "cirros"). -CONFIG_PROVISION_IMAGE_NAME=cirros - -# A URL or local file location for an image to download and provision -# in Glance (defaults to a URL for a recent "cirros" image). -CONFIG_PROVISION_IMAGE_URL=http://download.cirros-cloud.net/0.3.3/cirros-0.3.3-x86_64-disk.img - -# Format for the demo image (default "qcow2"). -CONFIG_PROVISION_IMAGE_FORMAT=qcow2 - -# User to use when connecting to instances booted from the demo -# image. -CONFIG_PROVISION_IMAGE_SSH_USER=cirros - -# Name of the Integration Test Suite provisioning user. If you do not -# provide a user name, Tempest is configured in a standalone mode. -CONFIG_PROVISION_TEMPEST_USER= - -# Password to use for the Integration Test Suite provisioning user. -CONFIG_PROVISION_TEMPEST_USER_PW=PW_PLACEHOLDER - -# CIDR network address for the floating IP subnet. -CONFIG_PROVISION_TEMPEST_FLOATRANGE=172.24.4.224/28 - -# URI of the Integration Test Suite git repository. -CONFIG_PROVISION_TEMPEST_REPO_URI=https://github.com/openstack/tempest.git - -# Revision (branch) of the Integration Test Suite git repository. -CONFIG_PROVISION_TEMPEST_REPO_REVISION=master - -# Specify 'y' to configure the Open vSwitch external bridge for an -# all-in-one deployment (the L3 external bridge acts as the gateway -# for virtual machines). ['y', 'n'] -CONFIG_PROVISION_OVS_BRIDGE=y - -# Password to use for OpenStack Data Processing (sahara) to access -# the database. -CONFIG_SAHARA_DB_PW=PW_PLACEHOLDER - -# Password to use for OpenStack Data Processing to authenticate with -# the Identity service. -CONFIG_SAHARA_KS_PW=PW_PLACEHOLDER - -# Secret key for signing Telemetry service (ceilometer) messages. -CONFIG_CEILOMETER_SECRET=d1cd21accf764049 - -# Password to use for Telemetry to authenticate with the Identity -# service. -CONFIG_CEILOMETER_KS_PW=qum5net - -# Backend driver for Telemetry's group membership coordination. -# ['redis', 'none'] -CONFIG_CEILOMETER_COORDINATION_BACKEND=redis - -# IP address of the server on which to install MongoDB. -CONFIG_MONGODB_HOST=VARINET4ADDR - -# IP address of the server on which to install the Redis master -# server. -CONFIG_REDIS_MASTER_HOST=VARINET4ADDR - -# Port on which the Redis server(s) listens. -CONFIG_REDIS_PORT=6379 - -# Specify 'y' to have Redis try to use HA. ['y', 'n'] -CONFIG_REDIS_HA=n - -# Hosts on which to install Redis slaves. -CONFIG_REDIS_SLAVE_HOSTS= - -# Hosts on which to install Redis sentinel servers. -CONFIG_REDIS_SENTINEL_HOSTS= - -# Host to configure as the Redis coordination sentinel. -CONFIG_REDIS_SENTINEL_CONTACT_HOST= - -# Port on which Redis sentinel servers listen. -CONFIG_REDIS_SENTINEL_PORT=26379 - -# Quorum value for Redis sentinel servers. -CONFIG_REDIS_SENTINEL_QUORUM=2 - -# Name of the master server watched by the Redis sentinel. ['[a-z]+'] -CONFIG_REDIS_MASTER_NAME=mymaster - -# Password to use for OpenStack Database-as-a-Service (trove) to -# access the database. -CONFIG_TROVE_DB_PW=PW_PLACEHOLDER - -# Password to use for OpenStack Database-as-a-Service to authenticate -# with the Identity service. -CONFIG_TROVE_KS_PW=PW_PLACEHOLDER - -# User name to use when OpenStack Database-as-a-Service connects to -# the Compute service. -CONFIG_TROVE_NOVA_USER=trove - -# Tenant to use when OpenStack Database-as-a-Service connects to the -# Compute service. -CONFIG_TROVE_NOVA_TENANT=services - -# Password to use when OpenStack Database-as-a-Service connects to -# the Compute service. -CONFIG_TROVE_NOVA_PW=PW_PLACEHOLDER - -# Password of the nagiosadmin user on the Nagios server. -CONFIG_NAGIOS_PW=PW_PLACEHOLDER -- cgit 1.2.3-korg