![James Page](/assets/img/avatar_default.png)
Add full support for DPDK; this includes a number of configuration options to allow the number of cores and memory allocated per NUMA node to be changed. By default, the first core and 1024MB of RAM of each NUMA node will be configured for DPDK use. When DPDK is enabled, OVS bridges are configured as datapath type 'netdev' rather than type 'system' to allow use of userspace DPDK packet processing; Security groups are also disabled, as iptables based rules cannot be applied against userspace sockets. DPDK device binding is undertaken using /etc/dpdk/interfaces and the dpdk init script provided as part of the DPDK package; device resolution is determined using the data-port configuration option using the <bridge:<mac address> format - MAC addresses are used to resolve underlying PCI device names for binding with DPDK. It's assumed that hugepage memory configuration is either done as part of system boot as kernel command line options (set via MAAS) or using the hugepages configuration option on the nova-compute charm. Change-Id: Ieb2ac522b07e495f1855e304d31eef59c316c0e4
31 lines
951 B
INI
31 lines
951 B
INI
# mitaka
|
|
###############################################################################
|
|
# [ WARNING ]
|
|
# Configuration file maintained by Juju. Local changes may be overwritten.
|
|
# Config managed by neutron-openvswitch charm
|
|
###############################################################################
|
|
[ovs]
|
|
enable_tunneling = True
|
|
local_ip = {{ local_ip }}
|
|
bridge_mappings = {{ bridge_mappings }}
|
|
{% if enable_dpdk -%}
|
|
datapath_type = netdev
|
|
{% endif -%}
|
|
|
|
[agent]
|
|
tunnel_types = {{ overlay_network_type }}
|
|
l2_population = {{ l2_population }}
|
|
enable_distributed_routing = {{ distributed_routing }}
|
|
prevent_arp_spoofing = {{ prevent_arp_spoofing }}
|
|
{% if veth_mtu -%}
|
|
veth_mtu = {{ veth_mtu }}
|
|
{% endif -%}
|
|
|
|
[securitygroup]
|
|
{% if neutron_security_groups and not enable_dpdk -%}
|
|
enable_security_group = True
|
|
firewall_driver = neutron.agent.linux.iptables_firewall.OVSHybridIptablesFirewallDriver
|
|
{% else -%}
|
|
enable_security_group = False
|
|
{% endif -%}
|