master
1[general]
2
3# Path to a public key to install on servers. If a usable key has not
4# been installed on the remote servers, the user is prompted for a
5# password and this key is installed so the password will not be
6# required again.
7CONFIG_SSH_KEY=/home/centos/.ssh/id_rsa.pub
8
9# Default password to be used everywhere (overridden by passwords set
10# for individual services or users).
11CONFIG_DEFAULT_PASSWORD=
12
13# Specify 'y' to install MariaDB. ['y', 'n']
14CONFIG_MARIADB_INSTALL=y
15
16# Specify 'y' to install OpenStack Image Service (glance). ['y', 'n']
17CONFIG_GLANCE_INSTALL=y
18
19# Specify 'y' to install OpenStack Block Storage (cinder). ['y', 'n']
20CONFIG_CINDER_INSTALL=y
21
22# Specify 'y' to install OpenStack Shared File System (manila). ['y',
23# 'n']
24CONFIG_MANILA_INSTALL=n
25
26# Specify 'y' to install OpenStack Compute (nova). ['y', 'n']
27CONFIG_NOVA_INSTALL=y
28
29# Specify 'y' to install OpenStack Networking (neutron); otherwise,
30# Compute Networking (nova) will be used. ['y', 'n']
31CONFIG_NEUTRON_INSTALL=y
32
33# Specify 'y' to install OpenStack Dashboard (horizon). ['y', 'n']
34CONFIG_HORIZON_INSTALL=y
35
36# Specify 'y' to install OpenStack Object Storage (swift). ['y', 'n']
37CONFIG_SWIFT_INSTALL=y
38
39# Specify 'y' to install OpenStack Metering (ceilometer). ['y', 'n']
40CONFIG_CEILOMETER_INSTALL=y
41
42# Specify 'y' to install OpenStack Orchestration (heat). ['y', 'n']
43CONFIG_HEAT_INSTALL=n
44
45# Specify 'y' to install OpenStack Data Processing (sahara). ['y',
46# 'n']
47CONFIG_SAHARA_INSTALL=n
48
49# Specify 'y' to install OpenStack Database (trove) ['y', 'n']
50CONFIG_TROVE_INSTALL=n
51
52# Specify 'y' to install OpenStack Bare Metal Provisioning (ironic).
53# ['y', 'n']
54CONFIG_IRONIC_INSTALL=n
55
56# Specify 'y' to install the OpenStack Client packages (command-line
57# tools). An admin "rc" file will also be installed. ['y', 'n']
58CONFIG_CLIENT_INSTALL=y
59
60# Comma-separated list of NTP servers. Leave plain if Packstack
61# should not install ntpd on instances.
62CONFIG_NTP_SERVERS=
63
64# Specify 'y' to install Nagios to monitor OpenStack hosts. Nagios
65# provides additional tools for monitoring the OpenStack environment.
66# ['y', 'n']
67CONFIG_NAGIOS_INSTALL=y
68
69# Comma-separated list of servers to be excluded from the
70# installation. This is helpful if you are running Packstack a second
71# time with the same answer file and do not want Packstack to
72# overwrite these server's configurations. Leave empty if you do not
73# need to exclude any servers.
74EXCLUDE_SERVERS=
75
76# Specify 'y' if you want to run OpenStack services in debug mode;
77# otherwise, specify 'n'. ['y', 'n']
78CONFIG_DEBUG_MODE=n
79
80# IP address of the server on which to install OpenStack services
81# specific to the controller role (for example, API servers or
82# dashboard).
83CONFIG_CONTROLLER_HOST=52.20.3.64
84
85# List of IP addresses of the servers on which to install the Compute
86# service.
87CONFIG_COMPUTE_HOSTS=172.31.51.93
88
89# List of IP addresses of the server on which to install the network
90# service such as Compute networking (nova network) or OpenStack
91# Networking (neutron).
92CONFIG_NETWORK_HOSTS=172.31.51.93
93
94# Specify 'y' if you want to use VMware vCenter as hypervisor and
95# storage; otherwise, specify 'n'. ['y', 'n']
96CONFIG_VMWARE_BACKEND=n
97
98# Specify 'y' if you want to use unsupported parameters. This should
99# be used only if you know what you are doing. Issues caused by using
100# unsupported options will not be fixed before the next major release.
101# ['y', 'n']
102CONFIG_UNSUPPORTED=n
103
104# Specify 'y' if you want to use subnet addresses (in CIDR format)
105# instead of interface names in following options:
106# CONFIG_NOVA_COMPUTE_PRIVIF, CONFIG_NOVA_NETWORK_PRIVIF,
107# CONFIG_NOVA_NETWORK_PUBIF, CONFIG_NEUTRON_OVS_BRIDGE_IFACES,
108# CONFIG_NEUTRON_LB_INTERFACE_MAPPINGS, CONFIG_NEUTRON_OVS_TUNNEL_IF.
109# This is useful for cases when interface names are not same on all
110# installation hosts.
111CONFIG_USE_SUBNETS=n
112
113# IP address of the VMware vCenter server.
114CONFIG_VCENTER_HOST=
115
116# User name for VMware vCenter server authentication.
117CONFIG_VCENTER_USER=
118
119# Password for VMware vCenter server authentication.
120CONFIG_VCENTER_PASSWORD=
121
122# Name of the VMware vCenter cluster.
123CONFIG_VCENTER_CLUSTER_NAME=
124
125# (Unsupported!) IP address of the server on which to install
126# OpenStack services specific to storage servers such as Image or
127# Block Storage services.
128CONFIG_STORAGE_HOST=172.31.51.93
129
130# (Unsupported!) IP address of the server on which to install
131# OpenStack services specific to OpenStack Data Processing (sahara).
132CONFIG_SAHARA_HOST=172.31.51.93
133
134# Specify 'y' to enable the EPEL repository (Extra Packages for
135# Enterprise Linux). ['y', 'n']
136CONFIG_USE_EPEL=n
137
138# Comma-separated list of URLs for any additional yum repositories,
139# to use for installation.
140CONFIG_REPO=
141
142# Specify 'y' to enable the RDO testing repository. ['y', 'n']
143CONFIG_ENABLE_RDO_TESTING=n
144
145# To subscribe each server with Red Hat Subscription Manager, include
146# this with CONFIG_RH_PW.
147CONFIG_RH_USER=
148
149# To subscribe each server to receive updates from a Satellite
150# server, provide the URL of the Satellite server. You must also
151# provide a user name (CONFIG_SATELLITE_USERNAME) and password
152# (CONFIG_SATELLITE_PASSWORD) or an access key (CONFIG_SATELLITE_AKEY)
153# for authentication.
154CONFIG_SATELLITE_URL=
155
156# To subscribe each server with Red Hat Subscription Manager, include
157# this with CONFIG_RH_USER.
158CONFIG_RH_PW=
159
160# Specify 'y' to enable RHEL optional repositories. ['y', 'n']
161CONFIG_RH_OPTIONAL=y
162
163# HTTP proxy to use with Red Hat Subscription Manager.
164CONFIG_RH_PROXY=
165
166# Port to use for Red Hat Subscription Manager's HTTP proxy.
167CONFIG_RH_PROXY_PORT=
168
169# User name to use for Red Hat Subscription Manager's HTTP proxy.
170CONFIG_RH_PROXY_USER=
171
172# Password to use for Red Hat Subscription Manager's HTTP proxy.
173CONFIG_RH_PROXY_PW=
174
175# User name to authenticate with the RHN Satellite server; if you
176# intend to use an access key for Satellite authentication, leave this
177# blank.
178CONFIG_SATELLITE_USER=
179
180# Password to authenticate with the RHN Satellite server; if you
181# intend to use an access key for Satellite authentication, leave this
182# blank.
183CONFIG_SATELLITE_PW=
184
185# Access key for the Satellite server; if you intend to use a user
186# name and password for Satellite authentication, leave this blank.
187CONFIG_SATELLITE_AKEY=
188
189# Certificate path or URL of the certificate authority to verify that
190# the connection with the Satellite server is secure. If you are not
191# using Satellite in your deployment, leave this blank.
192CONFIG_SATELLITE_CACERT=
193
194# Profile name that should be used as an identifier for the system in
195# RHN Satellite (if required).
196CONFIG_SATELLITE_PROFILE=
197
198# Comma-separated list of flags passed to the rhnreg_ks command.
199# Valid flags are: novirtinfo, norhnsd, nopackages ['novirtinfo',
200# 'norhnsd', 'nopackages']
201CONFIG_SATELLITE_FLAGS=
202
203# HTTP proxy to use when connecting to the RHN Satellite server (if
204# required).
205CONFIG_SATELLITE_PROXY=
206
207# User name to authenticate with the Satellite-server HTTP proxy.
208CONFIG_SATELLITE_PROXY_USER=
209
210# User password to authenticate with the Satellite-server HTTP proxy.
211CONFIG_SATELLITE_PROXY_PW=
212
213# Specify filepath for CA cert file. If CONFIG_SSL_CACERT_SELFSIGN is
214# set to 'n' it has to be preexisting file.
215CONFIG_SSL_CACERT_FILE=/etc/pki/tls/certs/selfcert.crt
216
217# Specify filepath for CA cert key file. If
218# CONFIG_SSL_CACERT_SELFSIGN is set to 'n' it has to be preexisting
219# file.
220CONFIG_SSL_CACERT_KEY_FILE=/etc/pki/tls/private/selfkey.key
221
222# Enter the path to use to store generated SSL certificates in.
223CONFIG_SSL_CERT_DIR=~/packstackca/
224
225# Specify 'y' if you want Packstack to pregenerate the CA
226# Certificate.
227CONFIG_SSL_CACERT_SELFSIGN=y
228
229# Enter the selfsigned CAcert subject country.
230CONFIG_SELFSIGN_CACERT_SUBJECT_C=--
231
232# Enter the selfsigned CAcert subject state.
233CONFIG_SELFSIGN_CACERT_SUBJECT_ST=State
234
235# Enter the selfsigned CAcert subject location.
236CONFIG_SELFSIGN_CACERT_SUBJECT_L=City
237
238# Enter the selfsigned CAcert subject organization.
239CONFIG_SELFSIGN_CACERT_SUBJECT_O=openstack
240
241# Enter the selfsigned CAcert subject organizational unit.
242CONFIG_SELFSIGN_CACERT_SUBJECT_OU=packstack
243
244# Enter the selfsigned CAcert subject common name.
245CONFIG_SELFSIGN_CACERT_SUBJECT_CN=controller
246
247CONFIG_SELFSIGN_CACERT_SUBJECT_MAIL=admin@controller
248
249# Service to be used as the AMQP broker. Allowed values are: qpid,
250# rabbitmq ['qpid', 'rabbitmq']
251CONFIG_AMQP_BACKEND=rabbitmq
252
253# IP address of the server on which to install the AMQP service.
254CONFIG_AMQP_HOST=172.31.51.93
255
256# Specify 'y' to enable SSL for the AMQP service. ['y', 'n']
257CONFIG_AMQP_ENABLE_SSL=n
258
259# Specify 'y' to enable authentication for the AMQP service. ['y',
260# 'n']
261CONFIG_AMQP_ENABLE_AUTH=n
262
263# Password for the NSS certificate database of the AMQP service.
264CONFIG_AMQP_NSS_CERTDB_PW=PW_PLACEHOLDER
265
266# User for AMQP authentication.
267CONFIG_AMQP_AUTH_USER=amqp_user
268
269# Password for AMQP authentication.
270CONFIG_AMQP_AUTH_PASSWORD=PW_PLACEHOLDER
271
272# IP address of the server on which to install MariaDB. If a MariaDB
273# installation was not specified in CONFIG_MARIADB_INSTALL, specify
274# the IP address of an existing database server (a MariaDB cluster can
275# also be specified).
276CONFIG_MARIADB_HOST=172.31.51.93
277
278# User name for the MariaDB administrative user.
279CONFIG_MARIADB_USER=root
280
281# Password for the MariaDB administrative user.
282CONFIG_MARIADB_PW=9cc16509728d4714
283
284# Password to use for the Identity service (keystone) to access the
285# database.
286CONFIG_KEYSTONE_DB_PW=841cb5816a1b4a7b
287
288# Default region name to use when creating tenants in the Identity
289# service.
290CONFIG_KEYSTONE_REGION=RegionOne
291
292# Token to use for the Identity service API.
293CONFIG_KEYSTONE_ADMIN_TOKEN=42beae94da804c51a4f26d6fc5199929
294
295# Email address for the Identity service 'admin' user. Defaults to
296CONFIG_KEYSTONE_ADMIN_EMAIL=root@localhost
297
298# User name for the Identity service 'admin' user. Defaults to
299# 'admin'.
300CONFIG_KEYSTONE_ADMIN_USERNAME=admin
301
302# Password to use for the Identity service 'admin' user.
303CONFIG_KEYSTONE_ADMIN_PW=supersecret
304
305# Password to use for the Identity service 'demo' user.
306CONFIG_KEYSTONE_DEMO_PW=16f9b6c595df4629
307
308# Identity service API version string. ['v2.0', 'v3']
309CONFIG_KEYSTONE_API_VERSION=v2.0
310
311# Identity service token format (UUID or PKI). The recommended format
312# for new deployments is UUID. ['UUID', 'PKI']
313CONFIG_KEYSTONE_TOKEN_FORMAT=UUID
314
315# Name of service to use to run the Identity service (keystone or
316# httpd). ['keystone', 'httpd']
317CONFIG_KEYSTONE_SERVICE_NAME=keystone
318
319# Type of Identity service backend (sql or ldap). ['sql', 'ldap']
320CONFIG_KEYSTONE_IDENTITY_BACKEND=sql
321
322# URL for the Identity service LDAP backend.
323CONFIG_KEYSTONE_LDAP_URL=ldap://172.31.51.93
324
325# User DN for the Identity service LDAP backend. Used to bind to the
326# LDAP server if the LDAP server does not allow anonymous
327# authentication.
328CONFIG_KEYSTONE_LDAP_USER_DN=
329
330# User DN password for the Identity service LDAP backend.
331CONFIG_KEYSTONE_LDAP_USER_PASSWORD=
332
333# Base suffix for the Identity service LDAP backend.
334CONFIG_KEYSTONE_LDAP_SUFFIX=
335
336# Query scope for the Identity service LDAP backend. Use 'one' for
337# onelevel/singleLevel or 'sub' for subtree/wholeSubtree ('base' is
338# not actually used by the Identity service and is therefore
339# deprecated). ['base', 'one', 'sub']
340CONFIG_KEYSTONE_LDAP_QUERY_SCOPE=one
341
342# Query page size for the Identity service LDAP backend.
343CONFIG_KEYSTONE_LDAP_PAGE_SIZE=-1
344
345# User subtree for the Identity service LDAP backend.
346CONFIG_KEYSTONE_LDAP_USER_SUBTREE=
347
348# User query filter for the Identity service LDAP backend.
349CONFIG_KEYSTONE_LDAP_USER_FILTER=
350
351# User object class for the Identity service LDAP backend.
352CONFIG_KEYSTONE_LDAP_USER_OBJECTCLASS=
353
354# User ID attribute for the Identity service LDAP backend.
355CONFIG_KEYSTONE_LDAP_USER_ID_ATTRIBUTE=
356
357# User name attribute for the Identity service LDAP backend.
358CONFIG_KEYSTONE_LDAP_USER_NAME_ATTRIBUTE=
359
360# User email address attribute for the Identity service LDAP backend.
361CONFIG_KEYSTONE_LDAP_USER_MAIL_ATTRIBUTE=
362
363# User-enabled attribute for the Identity service LDAP backend.
364CONFIG_KEYSTONE_LDAP_USER_ENABLED_ATTRIBUTE=
365
366# Bit mask integer applied to user-enabled attribute for the Identity
367# service LDAP backend. Indicate the bit that the enabled value is
368# stored in if the LDAP server represents "enabled" as a bit on an
369# integer rather than a boolean. A value of "0" indicates the mask is
370# not used (default). If this is not set to "0", the typical value is
371# "2", typically used when
372# "CONFIG_KEYSTONE_LDAP_USER_ENABLED_ATTRIBUTE = userAccountControl".
373CONFIG_KEYSTONE_LDAP_USER_ENABLED_MASK=-1
374
375# Value of enabled attribute which indicates user is enabled for the
376# Identity service LDAP backend. This should match an appropriate
377# integer value if the LDAP server uses non-boolean (bitmask) values
378# to indicate whether a user is enabled or disabled. If this is not
379# set as 'y', the typical value is "512". This is typically used when
380# "CONFIG_KEYSTONE_LDAP_USER_ENABLED_ATTRIBUTE = userAccountControl".
381CONFIG_KEYSTONE_LDAP_USER_ENABLED_DEFAULT=TRUE
382
383# Specify 'y' if users are disabled (not enabled) in the Identity
384# service LDAP backend (inverts boolean-enalbed values). Some LDAP
385# servers use a boolean lock attribute where "y" means an account is
386# disabled. Setting this to 'y' allows these lock attributes to be
387# used. This setting will have no effect if
388# "CONFIG_KEYSTONE_LDAP_USER_ENABLED_MASK" is in use. ['n', 'y']
389CONFIG_KEYSTONE_LDAP_USER_ENABLED_INVERT=n
390
391# Comma-separated list of attributes stripped from LDAP user entry
392# upon update.
393CONFIG_KEYSTONE_LDAP_USER_ATTRIBUTE_IGNORE=
394
395# Identity service LDAP attribute mapped to default_project_id for
396# users.
397CONFIG_KEYSTONE_LDAP_USER_DEFAULT_PROJECT_ID_ATTRIBUTE=
398
399# Specify 'y' if you want to be able to create Identity service users
400# through the Identity service interface; specify 'n' if you will
401# create directly in the LDAP backend. ['n', 'y']
402CONFIG_KEYSTONE_LDAP_USER_ALLOW_CREATE=n
403
404# Specify 'y' if you want to be able to update Identity service users
405# through the Identity service interface; specify 'n' if you will
406# update directly in the LDAP backend. ['n', 'y']
407CONFIG_KEYSTONE_LDAP_USER_ALLOW_UPDATE=n
408
409# Specify 'y' if you want to be able to delete Identity service users
410# through the Identity service interface; specify 'n' if you will
411# delete directly in the LDAP backend. ['n', 'y']
412CONFIG_KEYSTONE_LDAP_USER_ALLOW_DELETE=n
413
414# Identity service LDAP attribute mapped to password.
415CONFIG_KEYSTONE_LDAP_USER_PASS_ATTRIBUTE=
416
417# DN of the group entry to hold enabled LDAP users when using enabled
418# emulation.
419CONFIG_KEYSTONE_LDAP_USER_ENABLED_EMULATION_DN=
420
421# List of additional LDAP attributes for mapping additional attribute
422# mappings for users. The attribute-mapping format is
423# <ldap_attr>:<user_attr>, where ldap_attr is the attribute in the
424# LDAP entry and user_attr is the Identity API attribute.
425CONFIG_KEYSTONE_LDAP_USER_ADDITIONAL_ATTRIBUTE_MAPPING=
426
427# Group subtree for the Identity service LDAP backend.
428CONFIG_KEYSTONE_LDAP_GROUP_SUBTREE=
429
430# Group query filter for the Identity service LDAP backend.
431CONFIG_KEYSTONE_LDAP_GROUP_FILTER=
432
433# Group object class for the Identity service LDAP backend.
434CONFIG_KEYSTONE_LDAP_GROUP_OBJECTCLASS=
435
436# Group ID attribute for the Identity service LDAP backend.
437CONFIG_KEYSTONE_LDAP_GROUP_ID_ATTRIBUTE=
438
439# Group name attribute for the Identity service LDAP backend.
440CONFIG_KEYSTONE_LDAP_GROUP_NAME_ATTRIBUTE=
441
442# Group member attribute for the Identity service LDAP backend.
443CONFIG_KEYSTONE_LDAP_GROUP_MEMBER_ATTRIBUTE=
444
445# Group description attribute for the Identity service LDAP backend.
446CONFIG_KEYSTONE_LDAP_GROUP_DESC_ATTRIBUTE=
447
448# Comma-separated list of attributes stripped from LDAP group entry
449# upon update.
450CONFIG_KEYSTONE_LDAP_GROUP_ATTRIBUTE_IGNORE=
451
452# Specify 'y' if you want to be able to create Identity service
453# groups through the Identity service interface; specify 'n' if you
454# will create directly in the LDAP backend. ['n', 'y']
455CONFIG_KEYSTONE_LDAP_GROUP_ALLOW_CREATE=n
456
457# Specify 'y' if you want to be able to update Identity service
458# groups through the Identity service interface; specify 'n' if you
459# will update directly in the LDAP backend. ['n', 'y']
460CONFIG_KEYSTONE_LDAP_GROUP_ALLOW_UPDATE=n
461
462# Specify 'y' if you want to be able to delete Identity service
463# groups through the Identity service interface; specify 'n' if you
464# will delete directly in the LDAP backend. ['n', 'y']
465CONFIG_KEYSTONE_LDAP_GROUP_ALLOW_DELETE=n
466
467# List of additional LDAP attributes used for mapping additional
468# attribute mappings for groups. The attribute=mapping format is
469# <ldap_attr>:<group_attr>, where ldap_attr is the attribute in the
470# LDAP entry and group_attr is the Identity API attribute.
471CONFIG_KEYSTONE_LDAP_GROUP_ADDITIONAL_ATTRIBUTE_MAPPING=
472
473# Specify 'y' if the Identity service LDAP backend should use TLS.
474# ['n', 'y']
475CONFIG_KEYSTONE_LDAP_USE_TLS=n
476
477# CA certificate directory for Identity service LDAP backend (if TLS
478# is used).
479CONFIG_KEYSTONE_LDAP_TLS_CACERTDIR=
480
481# CA certificate file for Identity service LDAP backend (if TLS is
482# used).
483CONFIG_KEYSTONE_LDAP_TLS_CACERTFILE=
484
485# Certificate-checking strictness level for Identity service LDAP
486# backend; valid options are: never, allow, demand. ['never', 'allow',
487# 'demand']
488CONFIG_KEYSTONE_LDAP_TLS_REQ_CERT=demand
489
490# Password to use for the Image service (glance) to access the
491# database.
492CONFIG_GLANCE_DB_PW=2fac68f862254f62
493
494# Password to use for the Image service to authenticate with the
495# Identity service.
496CONFIG_GLANCE_KS_PW=b421ff11e8c74173
497
498# Storage backend for the Image service (controls how the Image
499# service stores disk images). Valid options are: file or swift
500# (Object Storage). The Object Storage service must be enabled to use
501# it as a working backend; otherwise, Packstack falls back to 'file'.
502# ['file', 'swift']
503CONFIG_GLANCE_BACKEND=file
504
505# Password to use for the Block Storage service (cinder) to access
506# the database.
507CONFIG_CINDER_DB_PW=d70794d119e7411f
508
509# Password to use for the Block Storage service to authenticate with
510# the Identity service.
511CONFIG_CINDER_KS_PW=bf5f82c89cea40a0
512
513# Storage backend to use for the Block Storage service; valid options
514# are: lvm, gluster, nfs, vmdk, netapp. ['lvm', 'gluster', 'nfs',
515# 'vmdk', 'netapp']
516CONFIG_CINDER_BACKEND=lvm
517
518# Specify 'y' to create the Block Storage volumes group. That is,
519# Packstack creates a raw disk image in /var/lib/cinder, and mounts it
520# using a loopback device. This should only be used for testing on a
521# proof-of-concept installation of the Block Storage service (a file-
522# backed volume group is not suitable for production usage). ['y',
523# 'n']
524CONFIG_CINDER_VOLUMES_CREATE=y
525
526# Size of Block Storage volumes group. Actual volume size will be
527# extended with 3% more space for VG metadata. Remember that the size
528# of the volume group will restrict the amount of disk space that you
529# can expose to Compute instances, and that the specified amount must
530# be available on the device used for /var/lib/cinder.
531CONFIG_CINDER_VOLUMES_SIZE=20G
532
533# A single or comma-separated list of Red Hat Storage (gluster)
534# volume shares to mount. Example: 'ip-address:/vol-name', 'domain
535# :/vol-name'
536CONFIG_CINDER_GLUSTER_MOUNTS=
537
538# A single or comma-separated list of NFS exports to mount. Example:
539# 'ip-address:/export-name'
540CONFIG_CINDER_NFS_MOUNTS=
541
542# Administrative user account name used to access the NetApp storage
543# system or proxy server.
544CONFIG_CINDER_NETAPP_LOGIN=
545
546# Password for the NetApp administrative user account specified in
547# the CONFIG_CINDER_NETAPP_LOGIN parameter.
548CONFIG_CINDER_NETAPP_PASSWORD=
549
550# Hostname (or IP address) for the NetApp storage system or proxy
551# server.
552CONFIG_CINDER_NETAPP_HOSTNAME=
553
554# The TCP port to use for communication with the storage system or
555# proxy. If not specified, Data ONTAP drivers will use 80 for HTTP and
556# 443 for HTTPS; E-Series will use 8080 for HTTP and 8443 for HTTPS.
557# Defaults to 80.
558CONFIG_CINDER_NETAPP_SERVER_PORT=80
559
560# Storage family type used on the NetApp storage system; valid
561# options are ontap_7mode for using Data ONTAP operating in 7-Mode,
562# ontap_cluster for using clustered Data ONTAP, or E-Series for NetApp
563# E-Series. Defaults to ontap_cluster. ['ontap_7mode',
564# 'ontap_cluster', 'eseries']
565CONFIG_CINDER_NETAPP_STORAGE_FAMILY=ontap_cluster
566
567# The transport protocol used when communicating with the NetApp
568# storage system or proxy server. Valid values are http or https.
569# Defaults to 'http'. ['http', 'https']
570CONFIG_CINDER_NETAPP_TRANSPORT_TYPE=http
571
572# Storage protocol to be used on the data path with the NetApp
573# storage system; valid options are iscsi, fc, nfs. Defaults to nfs.
574# ['iscsi', 'fc', 'nfs']
575CONFIG_CINDER_NETAPP_STORAGE_PROTOCOL=nfs
576
577# Quantity to be multiplied by the requested volume size to ensure
578# enough space is available on the virtual storage server (Vserver) to
579# fulfill the volume creation request. Defaults to 1.0.
580CONFIG_CINDER_NETAPP_SIZE_MULTIPLIER=1.0
581
582# Time period (in minutes) that is allowed to elapse after the image
583# is last accessed, before it is deleted from the NFS image cache.
584# When a cache-cleaning cycle begins, images in the cache that have
585# not been accessed in the last M minutes, where M is the value of
586# this parameter, are deleted from the cache to create free space on
587# the NFS share. Defaults to 720.
588CONFIG_CINDER_NETAPP_EXPIRY_THRES_MINUTES=720
589
590# If the percentage of available space for an NFS share has dropped
591# below the value specified by this parameter, the NFS image cache is
592# cleaned. Defaults to 20.
593CONFIG_CINDER_NETAPP_THRES_AVL_SIZE_PERC_START=20
594
595# When the percentage of available space on an NFS share has reached
596# the percentage specified by this parameter, the driver stops
597# clearing files from the NFS image cache that have not been accessed
598# in the last M minutes, where M is the value of the
599# CONFIG_CINDER_NETAPP_EXPIRY_THRES_MINUTES parameter. Defaults to 60.
600CONFIG_CINDER_NETAPP_THRES_AVL_SIZE_PERC_STOP=60
601
602# Single or comma-separated list of NetApp NFS shares for Block
603# Storage to use. Format: ip-address:/export-name. Defaults to ''.
604CONFIG_CINDER_NETAPP_NFS_SHARES=
605
606# File with the list of available NFS shares. Defaults to
607# '/etc/cinder/shares.conf'.
608CONFIG_CINDER_NETAPP_NFS_SHARES_CONFIG=/etc/cinder/shares.conf
609
610# This parameter is only utilized when the storage protocol is
611# configured to use iSCSI or FC. This parameter is used to restrict
612# provisioning to the specified controller volumes. Specify the value
613# of this parameter to be a comma separated list of NetApp controller
614# volume names to be used for provisioning. Defaults to ''.
615CONFIG_CINDER_NETAPP_VOLUME_LIST=
616
617# The vFiler unit on which provisioning of block storage volumes will
618# be done. This parameter is only used by the driver when connecting
619# to an instance with a storage family of Data ONTAP operating in
620# 7-Mode Only use this parameter when utilizing the MultiStore feature
621# on the NetApp storage system. Defaults to ''.
622CONFIG_CINDER_NETAPP_VFILER=
623
624# The name of the config.conf stanza for a Data ONTAP (7-mode) HA
625# partner. This option is only used by the driver when connecting to
626# an instance with a storage family of Data ONTAP operating in 7-Mode,
627# and it is required if the storage protocol selected is FC. Defaults
628# to ''.
629CONFIG_CINDER_NETAPP_PARTNER_BACKEND_NAME=
630
631# This option specifies the virtual storage server (Vserver) name on
632# the storage cluster on which provisioning of block storage volumes
633# should occur. Defaults to ''.
634CONFIG_CINDER_NETAPP_VSERVER=
635
636# Restricts provisioning to the specified controllers. Value must be
637# a comma-separated list of controller hostnames or IP addresses to be
638# used for provisioning. This option is only utilized when the storage
639# family is configured to use E-Series. Defaults to ''.
640CONFIG_CINDER_NETAPP_CONTROLLER_IPS=
641
642# Password for the NetApp E-Series storage array. Defaults to ''.
643CONFIG_CINDER_NETAPP_SA_PASSWORD=
644
645# This option is used to define how the controllers in the E-Series
646# storage array will work with the particular operating system on the
647# hosts that are connected to it. Defaults to 'linux_dm_mp'
648CONFIG_CINDER_NETAPP_ESERIES_HOST_TYPE=linux_dm_mp
649
650# Path to the NetApp E-Series proxy application on a proxy server.
651# The value is combined with the value of the
652# CONFIG_CINDER_NETAPP_TRANSPORT_TYPE, CONFIG_CINDER_NETAPP_HOSTNAME,
653# and CONFIG_CINDER_NETAPP_HOSTNAME options to create the URL used by
654# the driver to connect to the proxy application. Defaults to
655# '/devmgr/v2'.
656CONFIG_CINDER_NETAPP_WEBSERVICE_PATH=/devmgr/v2
657
658# Restricts provisioning to the specified storage pools. Only dynamic
659# disk pools are currently supported. The value must be a comma-
660# separated list of disk pool names to be used for provisioning.
661# Defaults to ''.
662CONFIG_CINDER_NETAPP_STORAGE_POOLS=
663
664# Password to use for the OpenStack File Share service (manila) to
665# access the database.
666CONFIG_MANILA_DB_PW=PW_PLACEHOLDER
667
668# Password to use for the OpenStack File Share service (manila) to
669# authenticate with the Identity service.
670CONFIG_MANILA_KS_PW=PW_PLACEHOLDER
671
672# Backend for the OpenStack File Share service (manila); valid
673# options are: generic or netapp. ['generic', 'netapp']
674CONFIG_MANILA_BACKEND=generic
675
676# Denotes whether the driver should handle the responsibility of
677# managing share servers. This must be set to false if the driver is
678# to operate without managing share servers. Defaults to 'false'
679# ['true', 'false']
680CONFIG_MANILA_NETAPP_DRV_HANDLES_SHARE_SERVERS=false
681
682# The transport protocol used when communicating with the storage
683# system or proxy server. Valid values are 'http' and 'https'.
684# Defaults to 'https'. ['https', 'http']
685CONFIG_MANILA_NETAPP_TRANSPORT_TYPE=https
686
687# Administrative user account name used to access the NetApp storage
688# system. Defaults to ''.
689CONFIG_MANILA_NETAPP_LOGIN=admin
690
691# Password for the NetApp administrative user account specified in
692# the CONFIG_MANILA_NETAPP_LOGIN parameter. Defaults to ''.
693CONFIG_MANILA_NETAPP_PASSWORD=
694
695# Hostname (or IP address) for the NetApp storage system or proxy
696# server. Defaults to ''.
697CONFIG_MANILA_NETAPP_SERVER_HOSTNAME=
698
699# The storage family type used on the storage system; valid values
700# are ontap_cluster for clustered Data ONTAP. Defaults to
701# 'ontap_cluster'. ['ontap_cluster']
702CONFIG_MANILA_NETAPP_STORAGE_FAMILY=ontap_cluster
703
704# The TCP port to use for communication with the storage system or
705# proxy server. If not specified, Data ONTAP drivers will use 80 for
706# HTTP and 443 for HTTPS. Defaults to '443'.
707CONFIG_MANILA_NETAPP_SERVER_PORT=443
708
709# Pattern for searching available aggregates for NetApp provisioning.
710# Defaults to '(.*)'.
711CONFIG_MANILA_NETAPP_AGGREGATE_NAME_SEARCH_PATTERN=(.*)
712
713# Name of aggregate on which to create the NetApp root volume. This
714# option only applies when the option
715# CONFIG_MANILA_NETAPP_DRV_HANDLES_SHARE_SERVERS is set to True.
716CONFIG_MANILA_NETAPP_ROOT_VOLUME_AGGREGATE=
717
718# NetApp root volume name. Defaults to 'root'.
719CONFIG_MANILA_NETAPP_ROOT_VOLUME_NAME=root
720
721# This option specifies the storage virtual machine (previously
722# called a Vserver) name on the storage cluster on which provisioning
723# of shared file systems should occur. This option only applies when
724# the option driver_handles_share_servers is set to False. Defaults to
725# ''.
726CONFIG_MANILA_NETAPP_VSERVER=
727
728# Denotes whether the driver should handle the responsibility of
729# managing share servers. This must be set to false if the driver is
730# to operate without managing share servers. Defaults to 'true'.
731# ['true', 'false']
732CONFIG_MANILA_GENERIC_DRV_HANDLES_SHARE_SERVERS=true
733
734# Volume name template for Manila service. Defaults to 'manila-
735# share-%s'.
736CONFIG_MANILA_GENERIC_VOLUME_NAME_TEMPLATE=manila-share-%s
737
738# Share mount path for Manila service. Defaults to '/shares'.
739CONFIG_MANILA_GENERIC_SHARE_MOUNT_PATH=/shares
740
741# Location of disk image for Manila service instance. Defaults to '
742CONFIG_MANILA_SERVICE_IMAGE_LOCATION=https://www.dropbox.com/s/vi5oeh10q1qkckh/ubuntu_1204_nfs_cifs.qcow2
743
744# User in Manila service instance.
745CONFIG_MANILA_SERVICE_INSTANCE_USER=ubuntu
746
747# Password to service instance user.
748CONFIG_MANILA_SERVICE_INSTANCE_PASSWORD=ubuntu
749
750# Type of networking that the backend will use. A more detailed
751# description of each option is available in the Manila docs. Defaults
752# to 'neutron'. ['neutron', 'nova-network', 'standalone']
753CONFIG_MANILA_NETWORK_TYPE=neutron
754
755# Gateway IPv4 address that should be used. Required. Defaults to ''.
756CONFIG_MANILA_NETWORK_STANDALONE_GATEWAY=
757
758# Network mask that will be used. Can be either decimal like '24' or
759# binary like '255.255.255.0'. Required. Defaults to ''.
760CONFIG_MANILA_NETWORK_STANDALONE_NETMASK=
761
762# Set it if network has segmentation (VLAN, VXLAN, etc). It will be
763# assigned to share-network and share drivers will be able to use this
764# for network interfaces within provisioned share servers. Optional.
765# Example: 1001. Defaults to ''.
766CONFIG_MANILA_NETWORK_STANDALONE_SEG_ID=
767
768# Can be IP address, range of IP addresses or list of addresses or
769# ranges. Contains addresses from IP network that are allowed to be
770# used. If empty, then will be assumed that all host addresses from
771# network can be used. Optional. Examples: 10.0.0.10 or
772# 10.0.0.10-10.0.0.20 or
773# 10.0.0.10-10.0.0.20,10.0.0.30-10.0.0.40,10.0.0.50. Defaults to ''.
774CONFIG_MANILA_NETWORK_STANDALONE_IP_RANGE=
775
776# IP version of network. Optional. Defaults to '4'. ['4', '6']
777CONFIG_MANILA_NETWORK_STANDALONE_IP_VERSION=4
778
779# Password to use for OpenStack Bare Metal Provisioning (ironic) to
780# access the database.
781CONFIG_IRONIC_DB_PW=PW_PLACEHOLDER
782
783# Password to use for OpenStack Bare Metal Provisioning to
784# authenticate with the Identity service.
785CONFIG_IRONIC_KS_PW=PW_PLACEHOLDER
786
787# Password to use for the Compute service (nova) to access the
788# database.
789CONFIG_NOVA_DB_PW=fc7c306ac4604b46
790
791# Password to use for the Compute service to authenticate with the
792# Identity service.
793CONFIG_NOVA_KS_PW=ee6b96f94ff2426f
794
795# Overcommitment ratio for virtual to physical CPUs. Specify 1.0 to
796# disable CPU overcommitment.
797CONFIG_NOVA_SCHED_CPU_ALLOC_RATIO=16.0
798
799# Overcommitment ratio for virtual to physical RAM. Specify 1.0 to
800# disable RAM overcommitment.
801CONFIG_NOVA_SCHED_RAM_ALLOC_RATIO=1.5
802
803# Protocol used for instance migration. Valid options are: tcp and
804# ssh. Note that by default, the Compute user is created with the
805# /sbin/nologin shell so that the SSH protocol will not work. To make
806# the SSH protocol work, you must configure the Compute user on
807# compute hosts manually. ['tcp', 'ssh']
808CONFIG_NOVA_COMPUTE_MIGRATE_PROTOCOL=tcp
809
810# Manager that runs the Compute service.
811CONFIG_NOVA_COMPUTE_MANAGER=nova.compute.manager.ComputeManager
812
813# PEM encoded certificate to be used for ssl on the https server,
814# leave blank if one should be generated, this certificate should not
815# require a passphrase. If CONFIG_HORIZON_SSL is set to 'n' this
816# parameter is ignored.
817CONFIG_VNC_SSL_CERT=
818
819# SSL keyfile corresponding to the certificate if one was entered. If
820# CONFIG_HORIZON_SSL is set to 'n' this parameter is ignored.
821CONFIG_VNC_SSL_KEY=
822
823# Private interface for flat DHCP on the Compute servers.
824CONFIG_NOVA_COMPUTE_PRIVIF=eth1
825
826# Compute Network Manager. ['^nova\.network\.manager\.\w+Manager$']
827CONFIG_NOVA_NETWORK_MANAGER=nova.network.manager.FlatDHCPManager
828
829# Public interface on the Compute network server.
830CONFIG_NOVA_NETWORK_PUBIF=eth0
831
832# Private interface for flat DHCP on the Compute network server.
833CONFIG_NOVA_NETWORK_PRIVIF=eth1
834
835# IP Range for flat DHCP. ['^[\:\.\da-fA-f]+(\/\d+){0,1}$']
836CONFIG_NOVA_NETWORK_FIXEDRANGE=192.168.32.0/22
837
838# IP Range for floating IP addresses. ['^[\:\.\da-
839# fA-f]+(\/\d+){0,1}$']
840CONFIG_NOVA_NETWORK_FLOATRANGE=10.3.4.0/22
841
842# Specify 'y' to automatically assign a floating IP to new instances.
843# ['y', 'n']
844CONFIG_NOVA_NETWORK_AUTOASSIGNFLOATINGIP=n
845
846# First VLAN for private networks (Compute networking).
847CONFIG_NOVA_NETWORK_VLAN_START=100
848
849# Number of networks to support (Compute networking).
850CONFIG_NOVA_NETWORK_NUMBER=1
851
852# Number of addresses in each private subnet (Compute networking).
853CONFIG_NOVA_NETWORK_SIZE=255
854
855# Password to use for OpenStack Networking (neutron) to authenticate
856# with the Identity service.
857CONFIG_NEUTRON_KS_PW=8c3f85e9f3cd424b
858
859# The password to use for OpenStack Networking to access the
860# database.
861CONFIG_NEUTRON_DB_PW=8343c41200a04477
862
863# The name of the Open vSwitch bridge (or empty for linuxbridge) for
864# the OpenStack Networking L3 agent to use for external traffic.
865# Specify 'provider' if you intend to use a provider network to handle
866# external traffic.
867CONFIG_NEUTRON_L3_EXT_BRIDGE=br-ex
868
869# Password for the OpenStack Networking metadata agent.
870CONFIG_NEUTRON_METADATA_PW=fc1fca9bb48c4cb4
871
872# Specify 'y' to install OpenStack Networking's Load-Balancing-
873# as-a-Service (LBaaS). ['y', 'n']
874CONFIG_LBAAS_INSTALL=n
875
876# Specify 'y' to install OpenStack Networking's L3 Metering agent
877# ['y', 'n']
878CONFIG_NEUTRON_METERING_AGENT_INSTALL=n
879
880# Specify 'y' to configure OpenStack Networking's Firewall-
881# as-a-Service (FWaaS). ['y', 'n']
882CONFIG_NEUTRON_FWAAS=n
883
884# Comma-separated list of network-type driver entry points to be
885# loaded from the neutron.ml2.type_drivers namespace. ['local',
886# 'flat', 'vlan', 'gre', 'vxlan']
887CONFIG_NEUTRON_ML2_TYPE_DRIVERS=vxlan
888
889# Comma-separated, ordered list of network types to allocate as
890# tenant networks. The 'local' value is only useful for single-box
891# testing and provides no connectivity between hosts. ['local',
892# 'vlan', 'gre', 'vxlan']
893CONFIG_NEUTRON_ML2_TENANT_NETWORK_TYPES=vxlan
894
895# Comma-separated ordered list of networking mechanism driver entry
896# points to be loaded from the neutron.ml2.mechanism_drivers
897# namespace. ['logger', 'test', 'linuxbridge', 'openvswitch',
898# 'hyperv', 'ncs', 'arista', 'cisco_nexus', 'mlnx', 'l2population']
899CONFIG_NEUTRON_ML2_MECHANISM_DRIVERS=openvswitch
900
901# Comma-separated list of physical_network names with which flat
902# networks can be created. Use * to allow flat networks with arbitrary
903# physical_network names.
904CONFIG_NEUTRON_ML2_FLAT_NETWORKS=*
905
906# Comma-separated list of <physical_network>:<vlan_min>:<vlan_max> or
907# <physical_network> specifying physical_network names usable for VLAN
908# provider and tenant networks, as well as ranges of VLAN tags on each
909# available for allocation to tenant networks.
910CONFIG_NEUTRON_ML2_VLAN_RANGES=
911
912# Comma-separated list of <tun_min>:<tun_max> tuples enumerating
913# ranges of GRE tunnel IDs that are available for tenant-network
914# allocation. A tuple must be an array with tun_max +1 - tun_min >
915# 1000000.
916CONFIG_NEUTRON_ML2_TUNNEL_ID_RANGES=
917
918# Comma-separated list of addresses for VXLAN multicast group. If
919# left empty, disables VXLAN from sending allocate broadcast traffic
920# (disables multicast VXLAN mode). Should be a Multicast IP (v4 or v6)
921# address.
922CONFIG_NEUTRON_ML2_VXLAN_GROUP=
923
924# Comma-separated list of <vni_min>:<vni_max> tuples enumerating
925# ranges of VXLAN VNI IDs that are available for tenant network
926# allocation. Minimum value is 0 and maximum value is 16777215.
927CONFIG_NEUTRON_ML2_VNI_RANGES=10:100
928
929# Name of the L2 agent to be used with OpenStack Networking.
930# ['linuxbridge', 'openvswitch']
931CONFIG_NEUTRON_L2_AGENT=openvswitch
932
933# Comma-separated list of interface mappings for the OpenStack
934# Networking linuxbridge plugin. Each tuple in the list must be in the
935# format <physical_network>:<net_interface>. Example:
936# physnet1:eth1,physnet2:eth2,physnet3:eth3.
937CONFIG_NEUTRON_LB_INTERFACE_MAPPINGS=
938
939# Comma-separated list of bridge mappings for the OpenStack
940# Networking Open vSwitch plugin. Each tuple in the list must be in
941# the format <physical_network>:<ovs_bridge>. Example: physnet1:br-
942# eth1,physnet2:br-eth2,physnet3:br-eth3
943CONFIG_NEUTRON_OVS_BRIDGE_MAPPINGS=
944
945# Comma-separated list of colon-separated Open vSwitch
946# <bridge>:<interface> pairs. The interface will be added to the
947# associated bridge. If you desire the bridge to be persistent a value
948# must be added to this directive, also
949# CONFIG_NEUTRON_OVS_BRIDGE_MAPPINGS must be set in order to create
950# the proper port. This can be achieved from the command line by
951# issuing the following command: packstack --allinone --os-neutron-
952# ovs-bridge-mappings=ext-net:br-ex --os-neutron-ovs-bridge-interfaces
953# =br-ex:eth0
954CONFIG_NEUTRON_OVS_BRIDGE_IFACES=
955
956# Interface for the Open vSwitch tunnel. Packstack overrides the IP
957# address used for tunnels on this hypervisor to the IP found on the
958# specified interface (for example, eth1).
959CONFIG_NEUTRON_OVS_TUNNEL_IF=
960
961# VXLAN UDP port.
962CONFIG_NEUTRON_OVS_VXLAN_UDP_PORT=4789
963
964# Specify 'y' to set up Horizon communication over https. ['y', 'n']
965CONFIG_HORIZON_SSL=n
966
967# Secret key to use for Horizon Secret Encryption Key.
968CONFIG_HORIZON_SECRET_KEY=bdda0f58004a4c79bdf8061f9d3d9d60
969
970# PEM-encoded certificate to be used for SSL connections on the https
971# server (the certificate should not require a passphrase). To
972# generate a certificate, leave blank.
973CONFIG_HORIZON_SSL_CERT=
974
975# SSL keyfile corresponding to the certificate if one was specified.
976CONFIG_HORIZON_SSL_KEY=
977
978CONFIG_HORIZON_SSL_CACERT=
979
980# Password to use for the Object Storage service to authenticate with
981# the Identity service.
982CONFIG_SWIFT_KS_PW=1beea9a7e2194dea
983
984# Comma-separated list of devices to use as storage device for Object
985# Storage. Each entry must take the format /path/to/dev (for example,
986# specifying /dev/vdb installs /dev/vdb as the Object Storage storage
987# device; Packstack does not create the filesystem, you must do this
988# first). If left empty, Packstack creates a loopback device for test
989# setup.
990CONFIG_SWIFT_STORAGES=
991
992# Number of Object Storage storage zones; this number MUST be no
993# larger than the number of configured storage devices.
994CONFIG_SWIFT_STORAGE_ZONES=1
995
996# Number of Object Storage storage replicas; this number MUST be no
997# larger than the number of configured storage zones.
998CONFIG_SWIFT_STORAGE_REPLICAS=1
999
1000# File system type for storage nodes. ['xfs', 'ext4']
1001CONFIG_SWIFT_STORAGE_FSTYPE=ext4
1002
1003# Custom seed number to use for swift_hash_path_suffix in
1004# /etc/swift/swift.conf. If you do not provide a value, a seed number
1005# is automatically generated.
1006CONFIG_SWIFT_HASH=b3890d3fc8b24b3a
1007
1008# Size of the Object Storage loopback file storage device.
1009CONFIG_SWIFT_STORAGE_SIZE=2G
1010
1011# Password used by Orchestration service user to authenticate against
1012# the database.
1013CONFIG_HEAT_DB_PW=PW_PLACEHOLDER
1014
1015# Encryption key to use for authentication in the Orchestration
1016# database (16, 24, or 32 chars).
1017CONFIG_HEAT_AUTH_ENC_KEY=15405bbafcb94737
1018
1019# Password to use for the Orchestration service to authenticate with
1020# the Identity service.
1021CONFIG_HEAT_KS_PW=PW_PLACEHOLDER
1022
1023# Specify 'y' to install the Orchestration CloudWatch API. ['y', 'n']
1024CONFIG_HEAT_CLOUDWATCH_INSTALL=n
1025
1026# Specify 'y' to install the Orchestration CloudFormation API. ['y',
1027# 'n']
1028CONFIG_HEAT_CFN_INSTALL=n
1029
1030# Name of the Identity domain for Orchestration.
1031CONFIG_HEAT_DOMAIN=heat
1032
1033# Name of the Identity domain administrative user for Orchestration.
1034CONFIG_HEAT_DOMAIN_ADMIN=heat_admin
1035
1036# Password for the Identity domain administrative user for
1037# Orchestration.
1038CONFIG_HEAT_DOMAIN_PASSWORD=PW_PLACEHOLDER
1039
1040# Specify 'y' to provision for demo usage and testing. ['y', 'n']
1041CONFIG_PROVISION_DEMO=y
1042
1043# Specify 'y' to configure the OpenStack Integration Test Suite
1044# (tempest) for testing. The test suite requires OpenStack Networking
1045# to be installed. ['y', 'n']
1046CONFIG_PROVISION_TEMPEST=n
1047
1048# CIDR network address for the floating IP subnet.
1049CONFIG_PROVISION_DEMO_FLOATRANGE=172.24.4.224/28
1050
1051# The name to be assigned to the demo image in Glance (default
1052# "cirros").
1053CONFIG_PROVISION_IMAGE_NAME=cirros
1054
1055# A URL or local file location for an image to download and provision
1056# in Glance (defaults to a URL for a recent "cirros" image).
1057CONFIG_PROVISION_IMAGE_URL=http://download.cirros-cloud.net/0.3.3/cirros-0.3.3-x86_64-disk.img
1058
1059# Format for the demo image (default "qcow2").
1060CONFIG_PROVISION_IMAGE_FORMAT=qcow2
1061
1062# User to use when connecting to instances booted from the demo
1063# image.
1064CONFIG_PROVISION_IMAGE_SSH_USER=cirros
1065
1066# Name of the Integration Test Suite provisioning user. If you do not
1067# provide a user name, Tempest is configured in a standalone mode.
1068CONFIG_PROVISION_TEMPEST_USER=
1069
1070# Password to use for the Integration Test Suite provisioning user.
1071CONFIG_PROVISION_TEMPEST_USER_PW=PW_PLACEHOLDER
1072
1073# CIDR network address for the floating IP subnet.
1074CONFIG_PROVISION_TEMPEST_FLOATRANGE=172.24.4.224/28
1075
1076# URI of the Integration Test Suite git repository.
1077CONFIG_PROVISION_TEMPEST_REPO_URI=https://github.com/openstack/tempest.git
1078
1079# Revision (branch) of the Integration Test Suite git repository.
1080CONFIG_PROVISION_TEMPEST_REPO_REVISION=master
1081
1082# Specify 'y' to configure the Open vSwitch external bridge for an
1083# all-in-one deployment (the L3 external bridge acts as the gateway
1084# for virtual machines). ['y', 'n']
1085CONFIG_PROVISION_ALL_IN_ONE_OVS_BRIDGE=n
1086
1087# Secret key for signing Telemetry service (ceilometer) messages.
1088CONFIG_CEILOMETER_SECRET=09667c76079c4ecf
1089
1090# Password to use for Telemetry to authenticate with the Identity
1091# service.
1092CONFIG_CEILOMETER_KS_PW=1049876e6d034c15
1093
1094# Backend driver for Telemetry's group membership coordination.
1095# ['redis', 'none']
1096CONFIG_CEILOMETER_COORDINATION_BACKEND=redis
1097
1098# IP address of the server on which to install MongoDB.
1099CONFIG_MONGODB_HOST=172.31.51.93
1100
1101# IP address of the server on which to install the Redis master
1102# server.
1103CONFIG_REDIS_MASTER_HOST=172.31.51.93
1104
1105# Port on which the Redis server(s) listens.
1106CONFIG_REDIS_PORT=6379
1107
1108# Specify 'y' to have Redis try to use HA. ['y', 'n']
1109CONFIG_REDIS_HA=n
1110
1111# Hosts on which to install Redis slaves.
1112CONFIG_REDIS_SLAVE_HOSTS=
1113
1114# Hosts on which to install Redis sentinel servers.
1115CONFIG_REDIS_SENTINEL_HOSTS=
1116
1117# Host to configure as the Redis coordination sentinel.
1118CONFIG_REDIS_SENTINEL_CONTACT_HOST=
1119
1120# Port on which Redis sentinel servers listen.
1121CONFIG_REDIS_SENTINEL_PORT=26379
1122
1123# Quorum value for Redis sentinel servers.
1124CONFIG_REDIS_SENTINEL_QUORUM=2
1125
1126# Name of the master server watched by the Redis sentinel. ['[a-z]+']
1127CONFIG_REDIS_MASTER_NAME=mymaster
1128
1129# Password to use for OpenStack Data Processing (sahara) to access
1130# the database.
1131CONFIG_SAHARA_DB_PW=PW_PLACEHOLDER
1132
1133# Password to use for OpenStack Data Processing to authenticate with
1134# the Identity service.
1135CONFIG_SAHARA_KS_PW=PW_PLACEHOLDER
1136
1137# Password to use for OpenStack Database-as-a-Service (trove) to
1138# access the database.
1139CONFIG_TROVE_DB_PW=PW_PLACEHOLDER
1140
1141# Password to use for OpenStack Database-as-a-Service to authenticate
1142# with the Identity service.
1143CONFIG_TROVE_KS_PW=PW_PLACEHOLDER
1144
1145# User name to use when OpenStack Database-as-a-Service connects to
1146# the Compute service.
1147CONFIG_TROVE_NOVA_USER=trove
1148
1149# Tenant to use when OpenStack Database-as-a-Service connects to the
1150# Compute service.
1151CONFIG_TROVE_NOVA_TENANT=services
1152
1153# Password to use when OpenStack Database-as-a-Service connects to
1154# the Compute service.
1155CONFIG_TROVE_NOVA_PW=PW_PLACEHOLDER
1156
1157# Password of the nagiosadmin user on the Nagios server.
1158CONFIG_NAGIOS_PW=ae710cf3d0e54cbc
1159
1160# Please replace x.x.x.x below with the controller public IP
1161NOVNCPROXY_URL="http://52.20.3.64:6080/vnc_auto.html"
1162NOVA_VNC_ENABLED=True
1163
1164# Please replace x.x.x.x below with the controller internal IP
1165VNCSERVER_LISTEN=172.31.51.93
1166VNCSERVER_PROXYCLIENT_ADDRESS=$VNCSERVER_LISTEN