openstack-ansible-os_neutron/templates/plugins/ml2/linuxbridge_agent.ini.j2
Jonathan Rosser 43f4fe7b3a Set appropriate default for vxlan multicast ttl
Currently no default is set which means vlxan multicast traffic
is dropped at the first L3 router. This patch increases the default
to 32 which is sufficient for any reasonable network fabric and
can be overridden if necessary.

Without this patch vxlan project networks on a routed underlay network
are not functional

Change-Id: Iddf2e412b3d1f23362d94a7eabd8c062d68ae287
Closes-Bug: 1755790
2019-02-13 16:55:28 +00:00

54 lines
2.0 KiB
Django/Jinja

# {{ ansible_managed }}
# Linux bridge agent physical interface mappings
[linux_bridge]
{% if neutron_provider_networks.network_mappings is defined and ((neutron_provider_networks.network_mappings | length) > 0) %}
physical_interface_mappings = {{ neutron_provider_networks.network_mappings }}
{% endif %}
# Linux bridge agent VXLAN networks
[vxlan]
{% if neutron_vxlan_enabled | bool %}
enable_vxlan = True
vxlan_group = {{ neutron_vxlan_group }}
# VXLAN local tunnel endpoint
local_ip = {{ neutron_local_ip }}
l2_population = {{ neutron_plugins[neutron_plugin_type].l2_population }}
ttl = {{ neutron_vxlan_ttl }}
{% else %}
# Disable VXLAN for deployments with only flat or VLAN networks
enable_vxlan = False
{% endif %}
# Agent
[agent]
{# If we're deploying this template to a hypervisor, we should make a list #}
{# of extensions that need to be enabled in the agent. #}
{% if 'nova_compute' in group_names %}
{% set _extensions = [] %}
{% if 'ml2.sriov' in neutron_plugin_types %}
{% set _ = _extensions.append('fdb') %}
{% endif %}
{% if 'qos' in neutron_plugin_base %}
{% set _ = _extensions.append('qos') %}
{% endif %}
extensions = {{ _extensions | join(',') }}
{% if 'ml2.sriov' in neutron_plugin_types %}
# If an interface is shared between sriov ports and normal ports, it must be defined here
# to allow traffic between the two ports on the same host
[FDB]
shared_physical_device_mappings = {{ neutron_provider_networks.network_sriov_mappings }}
{% endif %}
{% endif %}
# Security groups
[securitygroup]
firewall_driver = {{ neutron_plugins[neutron_plugin_type].driver_firewall }}
enable_security_group = True