master
Raw Download raw file
   1[general]
   2
   3# Path to a public key to install on servers. If a usable key has not
   4# been installed on the remote servers, the user is prompted for a
   5# password and this key is installed so the password will not be
   6# required again.
   7CONFIG_SSH_KEY=/home/centos/.ssh/id_rsa.pub
   8
   9# Default password to be used everywhere (overridden by passwords set
  10# for individual services or users).
  11CONFIG_DEFAULT_PASSWORD=
  12
  13# Specify 'y' to install MariaDB. ['y', 'n']
  14CONFIG_MARIADB_INSTALL=y
  15
  16# Specify 'y' to install OpenStack Image Service (glance). ['y', 'n']
  17CONFIG_GLANCE_INSTALL=y
  18
  19# Specify 'y' to install OpenStack Block Storage (cinder). ['y', 'n']
  20CONFIG_CINDER_INSTALL=y
  21
  22# Specify 'y' to install OpenStack Shared File System (manila). ['y',
  23# 'n']
  24CONFIG_MANILA_INSTALL=n
  25
  26# Specify 'y' to install OpenStack Compute (nova). ['y', 'n']
  27CONFIG_NOVA_INSTALL=y
  28
  29# Specify 'y' to install OpenStack Networking (neutron); otherwise,
  30# Compute Networking (nova) will be used. ['y', 'n']
  31CONFIG_NEUTRON_INSTALL=y
  32
  33# Specify 'y' to install OpenStack Dashboard (horizon). ['y', 'n']
  34CONFIG_HORIZON_INSTALL=y
  35
  36# Specify 'y' to install OpenStack Object Storage (swift). ['y', 'n']
  37CONFIG_SWIFT_INSTALL=y
  38
  39# Specify 'y' to install OpenStack Metering (ceilometer). ['y', 'n']
  40CONFIG_CEILOMETER_INSTALL=y
  41
  42# Specify 'y' to install OpenStack Orchestration (heat). ['y', 'n']
  43CONFIG_HEAT_INSTALL=n
  44
  45# Specify 'y' to install OpenStack Data Processing (sahara). ['y',
  46# 'n']
  47CONFIG_SAHARA_INSTALL=n
  48
  49# Specify 'y' to install OpenStack Database (trove) ['y', 'n']
  50CONFIG_TROVE_INSTALL=n
  51
  52# Specify 'y' to install OpenStack Bare Metal Provisioning (ironic).
  53# ['y', 'n']
  54CONFIG_IRONIC_INSTALL=n
  55
  56# Specify 'y' to install the OpenStack Client packages (command-line
  57# tools). An admin "rc" file will also be installed. ['y', 'n']
  58CONFIG_CLIENT_INSTALL=y
  59
  60# Comma-separated list of NTP servers. Leave plain if Packstack
  61# should not install ntpd on instances.
  62CONFIG_NTP_SERVERS=
  63
  64# Specify 'y' to install Nagios to monitor OpenStack hosts. Nagios
  65# provides additional tools for monitoring the OpenStack environment.
  66# ['y', 'n']
  67CONFIG_NAGIOS_INSTALL=y
  68
  69# Comma-separated list of servers to be excluded from the
  70# installation. This is helpful if you are running Packstack a second
  71# time with the same answer file and do not want Packstack to
  72# overwrite these server's configurations. Leave empty if you do not
  73# need to exclude any servers.
  74EXCLUDE_SERVERS=
  75
  76# Specify 'y' if you want to run OpenStack services in debug mode;
  77# otherwise, specify 'n'. ['y', 'n']
  78CONFIG_DEBUG_MODE=n
  79
  80# IP address of the server on which to install OpenStack services
  81# specific to the controller role (for example, API servers or
  82# dashboard).
  83CONFIG_CONTROLLER_HOST=52.20.3.64
  84
  85# List of IP addresses of the servers on which to install the Compute
  86# service.
  87CONFIG_COMPUTE_HOSTS=172.31.51.93
  88
  89# List of IP addresses of the server on which to install the network
  90# service such as Compute networking (nova network) or OpenStack
  91# Networking (neutron).
  92CONFIG_NETWORK_HOSTS=172.31.51.93
  93
  94# Specify 'y' if you want to use VMware vCenter as hypervisor and
  95# storage; otherwise, specify 'n'. ['y', 'n']
  96CONFIG_VMWARE_BACKEND=n
  97
  98# Specify 'y' if you want to use unsupported parameters. This should
  99# be used only if you know what you are doing. Issues caused by using
 100# unsupported options will not be fixed before the next major release.
 101# ['y', 'n']
 102CONFIG_UNSUPPORTED=n
 103
 104# Specify 'y' if you want to use subnet addresses (in CIDR format)
 105# instead of interface names in following options:
 106# CONFIG_NOVA_COMPUTE_PRIVIF, CONFIG_NOVA_NETWORK_PRIVIF,
 107# CONFIG_NOVA_NETWORK_PUBIF, CONFIG_NEUTRON_OVS_BRIDGE_IFACES,
 108# CONFIG_NEUTRON_LB_INTERFACE_MAPPINGS, CONFIG_NEUTRON_OVS_TUNNEL_IF.
 109# This is useful for cases when interface names are not same on all
 110# installation hosts.
 111CONFIG_USE_SUBNETS=n
 112
 113# IP address of the VMware vCenter server.
 114CONFIG_VCENTER_HOST=
 115
 116# User name for VMware vCenter server authentication.
 117CONFIG_VCENTER_USER=
 118
 119# Password for VMware vCenter server authentication.
 120CONFIG_VCENTER_PASSWORD=
 121
 122# Name of the VMware vCenter cluster.
 123CONFIG_VCENTER_CLUSTER_NAME=
 124
 125# (Unsupported!) IP address of the server on which to install
 126# OpenStack services specific to storage servers such as Image or
 127# Block Storage services.
 128CONFIG_STORAGE_HOST=172.31.51.93
 129
 130# (Unsupported!) IP address of the server on which to install
 131# OpenStack services specific to OpenStack Data Processing (sahara).
 132CONFIG_SAHARA_HOST=172.31.51.93
 133
 134# Specify 'y' to enable the EPEL repository (Extra Packages for
 135# Enterprise Linux). ['y', 'n']
 136CONFIG_USE_EPEL=n
 137
 138# Comma-separated list of URLs for any additional yum repositories,
 139# to use for installation.
 140CONFIG_REPO=
 141
 142# Specify 'y' to enable the RDO testing repository. ['y', 'n']
 143CONFIG_ENABLE_RDO_TESTING=n
 144
 145# To subscribe each server with Red Hat Subscription Manager, include
 146# this with CONFIG_RH_PW.
 147CONFIG_RH_USER=
 148
 149# To subscribe each server to receive updates from a Satellite
 150# server, provide the URL of the Satellite server. You must also
 151# provide a user name (CONFIG_SATELLITE_USERNAME) and password
 152# (CONFIG_SATELLITE_PASSWORD) or an access key (CONFIG_SATELLITE_AKEY)
 153# for authentication.
 154CONFIG_SATELLITE_URL=
 155
 156# To subscribe each server with Red Hat Subscription Manager, include
 157# this with CONFIG_RH_USER.
 158CONFIG_RH_PW=
 159
 160# Specify 'y' to enable RHEL optional repositories. ['y', 'n']
 161CONFIG_RH_OPTIONAL=y
 162
 163# HTTP proxy to use with Red Hat Subscription Manager.
 164CONFIG_RH_PROXY=
 165
 166# Port to use for Red Hat Subscription Manager's HTTP proxy.
 167CONFIG_RH_PROXY_PORT=
 168
 169# User name to use for Red Hat Subscription Manager's HTTP proxy.
 170CONFIG_RH_PROXY_USER=
 171
 172# Password to use for Red Hat Subscription Manager's HTTP proxy.
 173CONFIG_RH_PROXY_PW=
 174
 175# User name to authenticate with the RHN Satellite server; if you
 176# intend to use an access key for Satellite authentication, leave this
 177# blank.
 178CONFIG_SATELLITE_USER=
 179
 180# Password to authenticate with the RHN Satellite server; if you
 181# intend to use an access key for Satellite authentication, leave this
 182# blank.
 183CONFIG_SATELLITE_PW=
 184
 185# Access key for the Satellite server; if you intend to use a user
 186# name and password for Satellite authentication, leave this blank.
 187CONFIG_SATELLITE_AKEY=
 188
 189# Certificate path or URL of the certificate authority to verify that
 190# the connection with the Satellite server is secure. If you are not
 191# using Satellite in your deployment, leave this blank.
 192CONFIG_SATELLITE_CACERT=
 193
 194# Profile name that should be used as an identifier for the system in
 195# RHN Satellite (if required).
 196CONFIG_SATELLITE_PROFILE=
 197
 198# Comma-separated list of flags passed to the rhnreg_ks command.
 199# Valid flags are: novirtinfo, norhnsd, nopackages ['novirtinfo',
 200# 'norhnsd', 'nopackages']
 201CONFIG_SATELLITE_FLAGS=
 202
 203# HTTP proxy to use when connecting to the RHN Satellite server (if
 204# required).
 205CONFIG_SATELLITE_PROXY=
 206
 207# User name to authenticate with the Satellite-server HTTP proxy.
 208CONFIG_SATELLITE_PROXY_USER=
 209
 210# User password to authenticate with the Satellite-server HTTP proxy.
 211CONFIG_SATELLITE_PROXY_PW=
 212
 213# Specify filepath for CA cert file. If CONFIG_SSL_CACERT_SELFSIGN is
 214# set to 'n' it has to be preexisting file.
 215CONFIG_SSL_CACERT_FILE=/etc/pki/tls/certs/selfcert.crt
 216
 217# Specify filepath for CA cert key file. If
 218# CONFIG_SSL_CACERT_SELFSIGN is set to 'n' it has to be preexisting
 219# file.
 220CONFIG_SSL_CACERT_KEY_FILE=/etc/pki/tls/private/selfkey.key
 221
 222# Enter the path to use to store generated SSL certificates in.
 223CONFIG_SSL_CERT_DIR=~/packstackca/
 224
 225# Specify 'y' if you want Packstack to pregenerate the CA
 226# Certificate.
 227CONFIG_SSL_CACERT_SELFSIGN=y
 228
 229# Enter the selfsigned CAcert subject country.
 230CONFIG_SELFSIGN_CACERT_SUBJECT_C=--
 231
 232# Enter the selfsigned CAcert subject state.
 233CONFIG_SELFSIGN_CACERT_SUBJECT_ST=State
 234
 235# Enter the selfsigned CAcert subject location.
 236CONFIG_SELFSIGN_CACERT_SUBJECT_L=City
 237
 238# Enter the selfsigned CAcert subject organization.
 239CONFIG_SELFSIGN_CACERT_SUBJECT_O=openstack
 240
 241# Enter the selfsigned CAcert subject organizational unit.
 242CONFIG_SELFSIGN_CACERT_SUBJECT_OU=packstack
 243
 244# Enter the selfsigned CAcert subject common name.
 245CONFIG_SELFSIGN_CACERT_SUBJECT_CN=controller
 246
 247CONFIG_SELFSIGN_CACERT_SUBJECT_MAIL=admin@controller
 248
 249# Service to be used as the AMQP broker. Allowed values are: qpid,
 250# rabbitmq ['qpid', 'rabbitmq']
 251CONFIG_AMQP_BACKEND=rabbitmq
 252
 253# IP address of the server on which to install the AMQP service.
 254CONFIG_AMQP_HOST=172.31.51.93
 255
 256# Specify 'y' to enable SSL for the AMQP service. ['y', 'n']
 257CONFIG_AMQP_ENABLE_SSL=n
 258
 259# Specify 'y' to enable authentication for the AMQP service. ['y',
 260# 'n']
 261CONFIG_AMQP_ENABLE_AUTH=n
 262
 263# Password for the NSS certificate database of the AMQP service.
 264CONFIG_AMQP_NSS_CERTDB_PW=PW_PLACEHOLDER
 265
 266# User for AMQP authentication.
 267CONFIG_AMQP_AUTH_USER=amqp_user
 268
 269# Password for AMQP authentication.
 270CONFIG_AMQP_AUTH_PASSWORD=PW_PLACEHOLDER
 271
 272# IP address of the server on which to install MariaDB. If a MariaDB
 273# installation was not specified in CONFIG_MARIADB_INSTALL, specify
 274# the IP address of an existing database server (a MariaDB cluster can
 275# also be specified).
 276CONFIG_MARIADB_HOST=172.31.51.93
 277
 278# User name for the MariaDB administrative user.
 279CONFIG_MARIADB_USER=root
 280
 281# Password for the MariaDB administrative user.
 282CONFIG_MARIADB_PW=9cc16509728d4714
 283
 284# Password to use for the Identity service (keystone) to access the
 285# database.
 286CONFIG_KEYSTONE_DB_PW=841cb5816a1b4a7b
 287
 288# Default region name to use when creating tenants in the Identity
 289# service.
 290CONFIG_KEYSTONE_REGION=RegionOne
 291
 292# Token to use for the Identity service API.
 293CONFIG_KEYSTONE_ADMIN_TOKEN=42beae94da804c51a4f26d6fc5199929
 294
 295# Email address for the Identity service 'admin' user.  Defaults to
 296CONFIG_KEYSTONE_ADMIN_EMAIL=root@localhost
 297
 298# User name for the Identity service 'admin' user.  Defaults to
 299# 'admin'.
 300CONFIG_KEYSTONE_ADMIN_USERNAME=admin
 301
 302# Password to use for the Identity service 'admin' user.
 303CONFIG_KEYSTONE_ADMIN_PW=supersecret
 304
 305# Password to use for the Identity service 'demo' user.
 306CONFIG_KEYSTONE_DEMO_PW=16f9b6c595df4629
 307
 308# Identity service API version string. ['v2.0', 'v3']
 309CONFIG_KEYSTONE_API_VERSION=v2.0
 310
 311# Identity service token format (UUID or PKI). The recommended format
 312# for new deployments is UUID. ['UUID', 'PKI']
 313CONFIG_KEYSTONE_TOKEN_FORMAT=UUID
 314
 315# Name of service to use to run the Identity service (keystone or
 316# httpd). ['keystone', 'httpd']
 317CONFIG_KEYSTONE_SERVICE_NAME=keystone
 318
 319# Type of Identity service backend (sql or ldap). ['sql', 'ldap']
 320CONFIG_KEYSTONE_IDENTITY_BACKEND=sql
 321
 322# URL for the Identity service LDAP backend.
 323CONFIG_KEYSTONE_LDAP_URL=ldap://172.31.51.93
 324
 325# User DN for the Identity service LDAP backend.  Used to bind to the
 326# LDAP server if the LDAP server does not allow anonymous
 327# authentication.
 328CONFIG_KEYSTONE_LDAP_USER_DN=
 329
 330# User DN password for the Identity service LDAP backend.
 331CONFIG_KEYSTONE_LDAP_USER_PASSWORD=
 332
 333# Base suffix for the Identity service LDAP backend.
 334CONFIG_KEYSTONE_LDAP_SUFFIX=
 335
 336# Query scope for the Identity service LDAP backend. Use 'one' for
 337# onelevel/singleLevel or 'sub' for subtree/wholeSubtree ('base' is
 338# not actually used by the Identity service and is therefore
 339# deprecated). ['base', 'one', 'sub']
 340CONFIG_KEYSTONE_LDAP_QUERY_SCOPE=one
 341
 342# Query page size for the Identity service LDAP backend.
 343CONFIG_KEYSTONE_LDAP_PAGE_SIZE=-1
 344
 345# User subtree for the Identity service LDAP backend.
 346CONFIG_KEYSTONE_LDAP_USER_SUBTREE=
 347
 348# User query filter for the Identity service LDAP backend.
 349CONFIG_KEYSTONE_LDAP_USER_FILTER=
 350
 351# User object class for the Identity service LDAP backend.
 352CONFIG_KEYSTONE_LDAP_USER_OBJECTCLASS=
 353
 354# User ID attribute for the Identity service LDAP backend.
 355CONFIG_KEYSTONE_LDAP_USER_ID_ATTRIBUTE=
 356
 357# User name attribute for the Identity service LDAP backend.
 358CONFIG_KEYSTONE_LDAP_USER_NAME_ATTRIBUTE=
 359
 360# User email address attribute for the Identity service LDAP backend.
 361CONFIG_KEYSTONE_LDAP_USER_MAIL_ATTRIBUTE=
 362
 363# User-enabled attribute for the Identity service LDAP backend.
 364CONFIG_KEYSTONE_LDAP_USER_ENABLED_ATTRIBUTE=
 365
 366# Bit mask integer applied to user-enabled attribute for the Identity
 367# service LDAP backend. Indicate the bit that the enabled value is
 368# stored in if the LDAP server represents "enabled" as a bit on an
 369# integer rather than a boolean. A value of "0" indicates the mask is
 370# not used (default). If this is not set to "0", the typical value is
 371# "2", typically used when
 372# "CONFIG_KEYSTONE_LDAP_USER_ENABLED_ATTRIBUTE = userAccountControl".
 373CONFIG_KEYSTONE_LDAP_USER_ENABLED_MASK=-1
 374
 375# Value of enabled attribute which indicates user is enabled for the
 376# Identity service LDAP backend. This should match an appropriate
 377# integer value if the LDAP server uses non-boolean (bitmask) values
 378# to indicate whether a user is enabled or disabled. If this is not
 379# set as 'y', the typical value is "512". This is typically used when
 380# "CONFIG_KEYSTONE_LDAP_USER_ENABLED_ATTRIBUTE = userAccountControl".
 381CONFIG_KEYSTONE_LDAP_USER_ENABLED_DEFAULT=TRUE
 382
 383# Specify 'y' if users are disabled (not enabled) in the Identity
 384# service LDAP backend (inverts boolean-enalbed values).  Some LDAP
 385# servers use a boolean lock attribute where "y" means an account is
 386# disabled. Setting this to 'y' allows these lock attributes to be
 387# used. This setting will have no effect if
 388# "CONFIG_KEYSTONE_LDAP_USER_ENABLED_MASK" is in use. ['n', 'y']
 389CONFIG_KEYSTONE_LDAP_USER_ENABLED_INVERT=n
 390
 391# Comma-separated list of attributes stripped from LDAP user entry
 392# upon update.
 393CONFIG_KEYSTONE_LDAP_USER_ATTRIBUTE_IGNORE=
 394
 395# Identity service LDAP attribute mapped to default_project_id for
 396# users.
 397CONFIG_KEYSTONE_LDAP_USER_DEFAULT_PROJECT_ID_ATTRIBUTE=
 398
 399# Specify 'y' if you want to be able to create Identity service users
 400# through the Identity service interface; specify 'n' if you will
 401# create directly in the LDAP backend. ['n', 'y']
 402CONFIG_KEYSTONE_LDAP_USER_ALLOW_CREATE=n
 403
 404# Specify 'y' if you want to be able to update Identity service users
 405# through the Identity service interface; specify 'n' if you will
 406# update directly in the LDAP backend. ['n', 'y']
 407CONFIG_KEYSTONE_LDAP_USER_ALLOW_UPDATE=n
 408
 409# Specify 'y' if you want to be able to delete Identity service users
 410# through the Identity service interface; specify 'n' if you will
 411# delete directly in the LDAP backend. ['n', 'y']
 412CONFIG_KEYSTONE_LDAP_USER_ALLOW_DELETE=n
 413
 414# Identity service LDAP attribute mapped to password.
 415CONFIG_KEYSTONE_LDAP_USER_PASS_ATTRIBUTE=
 416
 417# DN of the group entry to hold enabled LDAP users when using enabled
 418# emulation.
 419CONFIG_KEYSTONE_LDAP_USER_ENABLED_EMULATION_DN=
 420
 421# List of additional LDAP attributes for mapping additional attribute
 422# mappings for users. The attribute-mapping format is
 423# <ldap_attr>:<user_attr>, where ldap_attr is the attribute in the
 424# LDAP entry and user_attr is the Identity API attribute.
 425CONFIG_KEYSTONE_LDAP_USER_ADDITIONAL_ATTRIBUTE_MAPPING=
 426
 427# Group subtree for the Identity service LDAP backend.
 428CONFIG_KEYSTONE_LDAP_GROUP_SUBTREE=
 429
 430# Group query filter for the Identity service LDAP backend.
 431CONFIG_KEYSTONE_LDAP_GROUP_FILTER=
 432
 433# Group object class for the Identity service LDAP backend.
 434CONFIG_KEYSTONE_LDAP_GROUP_OBJECTCLASS=
 435
 436# Group ID attribute for the Identity service LDAP backend.
 437CONFIG_KEYSTONE_LDAP_GROUP_ID_ATTRIBUTE=
 438
 439# Group name attribute for the Identity service LDAP backend.
 440CONFIG_KEYSTONE_LDAP_GROUP_NAME_ATTRIBUTE=
 441
 442# Group member attribute for the Identity service LDAP backend.
 443CONFIG_KEYSTONE_LDAP_GROUP_MEMBER_ATTRIBUTE=
 444
 445# Group description attribute for the Identity service LDAP backend.
 446CONFIG_KEYSTONE_LDAP_GROUP_DESC_ATTRIBUTE=
 447
 448# Comma-separated list of attributes stripped from LDAP group entry
 449# upon update.
 450CONFIG_KEYSTONE_LDAP_GROUP_ATTRIBUTE_IGNORE=
 451
 452# Specify 'y' if you want to be able to create Identity service
 453# groups through the Identity service interface; specify 'n' if you
 454# will create directly in the LDAP backend. ['n', 'y']
 455CONFIG_KEYSTONE_LDAP_GROUP_ALLOW_CREATE=n
 456
 457# Specify 'y' if you want to be able to update Identity service
 458# groups through the Identity service interface; specify 'n' if you
 459# will update directly in the LDAP backend. ['n', 'y']
 460CONFIG_KEYSTONE_LDAP_GROUP_ALLOW_UPDATE=n
 461
 462# Specify 'y' if you want to be able to delete Identity service
 463# groups through the Identity service interface; specify 'n' if you
 464# will delete directly in the LDAP backend. ['n', 'y']
 465CONFIG_KEYSTONE_LDAP_GROUP_ALLOW_DELETE=n
 466
 467# List of additional LDAP attributes used for mapping additional
 468# attribute mappings for groups. The attribute=mapping format is
 469# <ldap_attr>:<group_attr>, where ldap_attr is the attribute in the
 470# LDAP entry and group_attr is the Identity API attribute.
 471CONFIG_KEYSTONE_LDAP_GROUP_ADDITIONAL_ATTRIBUTE_MAPPING=
 472
 473# Specify 'y' if the Identity service LDAP backend should use TLS.
 474# ['n', 'y']
 475CONFIG_KEYSTONE_LDAP_USE_TLS=n
 476
 477# CA certificate directory for Identity service LDAP backend (if TLS
 478# is used).
 479CONFIG_KEYSTONE_LDAP_TLS_CACERTDIR=
 480
 481# CA certificate file for Identity service LDAP backend (if TLS is
 482# used).
 483CONFIG_KEYSTONE_LDAP_TLS_CACERTFILE=
 484
 485# Certificate-checking strictness level for Identity service LDAP
 486# backend; valid options are: never, allow, demand. ['never', 'allow',
 487# 'demand']
 488CONFIG_KEYSTONE_LDAP_TLS_REQ_CERT=demand
 489
 490# Password to use for the Image service (glance) to access the
 491# database.
 492CONFIG_GLANCE_DB_PW=2fac68f862254f62
 493
 494# Password to use for the Image service to authenticate with the
 495# Identity service.
 496CONFIG_GLANCE_KS_PW=b421ff11e8c74173
 497
 498# Storage backend for the Image service (controls how the Image
 499# service stores disk images). Valid options are: file or swift
 500# (Object Storage). The Object Storage service must be enabled to use
 501# it as a working backend; otherwise, Packstack falls back to 'file'.
 502# ['file', 'swift']
 503CONFIG_GLANCE_BACKEND=file
 504
 505# Password to use for the Block Storage service (cinder) to access
 506# the database.
 507CONFIG_CINDER_DB_PW=d70794d119e7411f
 508
 509# Password to use for the Block Storage service to authenticate with
 510# the Identity service.
 511CONFIG_CINDER_KS_PW=bf5f82c89cea40a0
 512
 513# Storage backend to use for the Block Storage service; valid options
 514# are: lvm, gluster, nfs, vmdk, netapp. ['lvm', 'gluster', 'nfs',
 515# 'vmdk', 'netapp']
 516CONFIG_CINDER_BACKEND=lvm
 517
 518# Specify 'y' to create the Block Storage volumes group. That is,
 519# Packstack creates a raw disk image in /var/lib/cinder, and mounts it
 520# using a loopback device. This should only be used for testing on a
 521# proof-of-concept installation of the Block Storage service (a file-
 522# backed volume group is not suitable for production usage). ['y',
 523# 'n']
 524CONFIG_CINDER_VOLUMES_CREATE=y
 525
 526# Size of Block Storage volumes group. Actual volume size will be
 527# extended with 3% more space for VG metadata. Remember that the size
 528# of the volume group will restrict the amount of disk space that you
 529# can expose to Compute instances, and that the specified amount must
 530# be available on the device used for /var/lib/cinder.
 531CONFIG_CINDER_VOLUMES_SIZE=20G
 532
 533# A single or comma-separated list of Red Hat Storage (gluster)
 534# volume shares to mount. Example: 'ip-address:/vol-name', 'domain
 535# :/vol-name'
 536CONFIG_CINDER_GLUSTER_MOUNTS=
 537
 538# A single or comma-separated list of NFS exports to mount. Example:
 539# 'ip-address:/export-name'
 540CONFIG_CINDER_NFS_MOUNTS=
 541
 542# Administrative user account name used to access the NetApp storage
 543# system or proxy server.
 544CONFIG_CINDER_NETAPP_LOGIN=
 545
 546# Password for the NetApp administrative user account specified in
 547# the CONFIG_CINDER_NETAPP_LOGIN parameter.
 548CONFIG_CINDER_NETAPP_PASSWORD=
 549
 550# Hostname (or IP address) for the NetApp storage system or proxy
 551# server.
 552CONFIG_CINDER_NETAPP_HOSTNAME=
 553
 554# The TCP port to use for communication with the storage system or
 555# proxy. If not specified, Data ONTAP drivers will use 80 for HTTP and
 556# 443 for HTTPS; E-Series will use 8080 for HTTP and 8443 for HTTPS.
 557# Defaults to 80.
 558CONFIG_CINDER_NETAPP_SERVER_PORT=80
 559
 560# Storage family type used on the NetApp storage system; valid
 561# options are ontap_7mode for using Data ONTAP operating in 7-Mode,
 562# ontap_cluster for using clustered Data ONTAP, or E-Series for NetApp
 563# E-Series. Defaults to ontap_cluster. ['ontap_7mode',
 564# 'ontap_cluster', 'eseries']
 565CONFIG_CINDER_NETAPP_STORAGE_FAMILY=ontap_cluster
 566
 567# The transport protocol used when communicating with the NetApp
 568# storage system or proxy server. Valid values are http or https.
 569# Defaults to 'http'. ['http', 'https']
 570CONFIG_CINDER_NETAPP_TRANSPORT_TYPE=http
 571
 572# Storage protocol to be used on the data path with the NetApp
 573# storage system; valid options are iscsi, fc, nfs. Defaults to nfs.
 574# ['iscsi', 'fc', 'nfs']
 575CONFIG_CINDER_NETAPP_STORAGE_PROTOCOL=nfs
 576
 577# Quantity to be multiplied by the requested volume size to ensure
 578# enough space is available on the virtual storage server (Vserver) to
 579# fulfill the volume creation request.  Defaults to 1.0.
 580CONFIG_CINDER_NETAPP_SIZE_MULTIPLIER=1.0
 581
 582# Time period (in minutes) that is allowed to elapse after the image
 583# is last accessed, before it is deleted from the NFS image cache.
 584# When a cache-cleaning cycle begins, images in the cache that have
 585# not been accessed in the last M minutes, where M is the value of
 586# this parameter, are deleted from the cache to create free space on
 587# the NFS share. Defaults to 720.
 588CONFIG_CINDER_NETAPP_EXPIRY_THRES_MINUTES=720
 589
 590# If the percentage of available space for an NFS share has dropped
 591# below the value specified by this parameter, the NFS image cache is
 592# cleaned.  Defaults to 20.
 593CONFIG_CINDER_NETAPP_THRES_AVL_SIZE_PERC_START=20
 594
 595# When the percentage of available space on an NFS share has reached
 596# the percentage specified by this parameter, the driver stops
 597# clearing files from the NFS image cache that have not been accessed
 598# in the last M minutes, where M is the value of the
 599# CONFIG_CINDER_NETAPP_EXPIRY_THRES_MINUTES parameter. Defaults to 60.
 600CONFIG_CINDER_NETAPP_THRES_AVL_SIZE_PERC_STOP=60
 601
 602# Single or comma-separated list of NetApp NFS shares for Block
 603# Storage to use.  Format: ip-address:/export-name. Defaults to ''.
 604CONFIG_CINDER_NETAPP_NFS_SHARES=
 605
 606# File with the list of available NFS shares.   Defaults to
 607# '/etc/cinder/shares.conf'.
 608CONFIG_CINDER_NETAPP_NFS_SHARES_CONFIG=/etc/cinder/shares.conf
 609
 610# This parameter is only utilized when the storage protocol is
 611# configured to use iSCSI or FC. This parameter is used to restrict
 612# provisioning to the specified controller volumes. Specify the value
 613# of this parameter to be a comma separated list of NetApp controller
 614# volume names to be used for provisioning. Defaults to ''.
 615CONFIG_CINDER_NETAPP_VOLUME_LIST=
 616
 617# The vFiler unit on which provisioning of block storage volumes will
 618# be done. This parameter is only used by the driver when connecting
 619# to an instance with a storage family of Data ONTAP operating in
 620# 7-Mode Only use this parameter when utilizing the MultiStore feature
 621# on the NetApp storage system. Defaults to ''.
 622CONFIG_CINDER_NETAPP_VFILER=
 623
 624# The name of the config.conf stanza for a Data ONTAP (7-mode) HA
 625# partner.  This option is only used by the driver when connecting to
 626# an instance with a storage family of Data ONTAP operating in 7-Mode,
 627# and it is required if the storage protocol selected is FC. Defaults
 628# to ''.
 629CONFIG_CINDER_NETAPP_PARTNER_BACKEND_NAME=
 630
 631# This option specifies the virtual storage server (Vserver) name on
 632# the storage cluster on which provisioning of block storage volumes
 633# should occur. Defaults to ''.
 634CONFIG_CINDER_NETAPP_VSERVER=
 635
 636# Restricts provisioning to the specified controllers. Value must be
 637# a comma-separated list of controller hostnames or IP addresses to be
 638# used for provisioning. This option is only utilized when the storage
 639# family is configured to use E-Series. Defaults to ''.
 640CONFIG_CINDER_NETAPP_CONTROLLER_IPS=
 641
 642# Password for the NetApp E-Series storage array. Defaults to ''.
 643CONFIG_CINDER_NETAPP_SA_PASSWORD=
 644
 645# This option is used to define how the controllers in the E-Series
 646# storage array will work with the particular operating system on the
 647# hosts that are connected to it. Defaults to 'linux_dm_mp'
 648CONFIG_CINDER_NETAPP_ESERIES_HOST_TYPE=linux_dm_mp
 649
 650# Path to the NetApp E-Series proxy application on a proxy server.
 651# The value is combined with the value of the
 652# CONFIG_CINDER_NETAPP_TRANSPORT_TYPE, CONFIG_CINDER_NETAPP_HOSTNAME,
 653# and CONFIG_CINDER_NETAPP_HOSTNAME options to create the URL used by
 654# the driver to connect to the proxy application. Defaults to
 655# '/devmgr/v2'.
 656CONFIG_CINDER_NETAPP_WEBSERVICE_PATH=/devmgr/v2
 657
 658# Restricts provisioning to the specified storage pools. Only dynamic
 659# disk pools are currently supported. The value must be a comma-
 660# separated list of disk pool names to be used for provisioning.
 661# Defaults to ''.
 662CONFIG_CINDER_NETAPP_STORAGE_POOLS=
 663
 664# Password to use for the OpenStack File Share service (manila) to
 665# access the database.
 666CONFIG_MANILA_DB_PW=PW_PLACEHOLDER
 667
 668# Password to use for the OpenStack File Share service (manila) to
 669# authenticate with the Identity service.
 670CONFIG_MANILA_KS_PW=PW_PLACEHOLDER
 671
 672# Backend for the OpenStack File Share service (manila); valid
 673# options are: generic or netapp. ['generic', 'netapp']
 674CONFIG_MANILA_BACKEND=generic
 675
 676# Denotes whether the driver should handle the responsibility of
 677# managing share servers. This must be set to false if the driver is
 678# to operate without managing share servers. Defaults to 'false'
 679# ['true', 'false']
 680CONFIG_MANILA_NETAPP_DRV_HANDLES_SHARE_SERVERS=false
 681
 682# The transport protocol used when communicating with the storage
 683# system or proxy server. Valid values are 'http' and 'https'.
 684# Defaults to 'https'. ['https', 'http']
 685CONFIG_MANILA_NETAPP_TRANSPORT_TYPE=https
 686
 687# Administrative user account name used to access the NetApp storage
 688# system.  Defaults to ''.
 689CONFIG_MANILA_NETAPP_LOGIN=admin
 690
 691# Password for the NetApp administrative user account specified in
 692# the CONFIG_MANILA_NETAPP_LOGIN parameter. Defaults to ''.
 693CONFIG_MANILA_NETAPP_PASSWORD=
 694
 695# Hostname (or IP address) for the NetApp storage system or proxy
 696# server. Defaults to ''.
 697CONFIG_MANILA_NETAPP_SERVER_HOSTNAME=
 698
 699# The storage family type used on the storage system; valid values
 700# are ontap_cluster for clustered Data ONTAP. Defaults to
 701# 'ontap_cluster'. ['ontap_cluster']
 702CONFIG_MANILA_NETAPP_STORAGE_FAMILY=ontap_cluster
 703
 704# The TCP port to use for communication with the storage system or
 705# proxy server. If not specified, Data ONTAP drivers will use 80 for
 706# HTTP and 443 for HTTPS. Defaults to '443'.
 707CONFIG_MANILA_NETAPP_SERVER_PORT=443
 708
 709# Pattern for searching available aggregates for NetApp provisioning.
 710# Defaults to '(.*)'.
 711CONFIG_MANILA_NETAPP_AGGREGATE_NAME_SEARCH_PATTERN=(.*)
 712
 713# Name of aggregate on which to create the NetApp root volume. This
 714# option only applies when the option
 715# CONFIG_MANILA_NETAPP_DRV_HANDLES_SHARE_SERVERS is set to True.
 716CONFIG_MANILA_NETAPP_ROOT_VOLUME_AGGREGATE=
 717
 718# NetApp root volume name. Defaults to 'root'.
 719CONFIG_MANILA_NETAPP_ROOT_VOLUME_NAME=root
 720
 721# This option specifies the storage virtual machine (previously
 722# called a Vserver) name on the storage cluster on which provisioning
 723# of shared file systems should occur. This option only applies when
 724# the option driver_handles_share_servers is set to False. Defaults to
 725# ''.
 726CONFIG_MANILA_NETAPP_VSERVER=
 727
 728# Denotes whether the driver should handle the responsibility of
 729# managing share servers. This must be set to false if the driver is
 730# to operate without managing share servers. Defaults to 'true'.
 731# ['true', 'false']
 732CONFIG_MANILA_GENERIC_DRV_HANDLES_SHARE_SERVERS=true
 733
 734# Volume name template for Manila service. Defaults to 'manila-
 735# share-%s'.
 736CONFIG_MANILA_GENERIC_VOLUME_NAME_TEMPLATE=manila-share-%s
 737
 738# Share mount path for Manila service. Defaults to '/shares'.
 739CONFIG_MANILA_GENERIC_SHARE_MOUNT_PATH=/shares
 740
 741# Location of disk image for Manila service instance. Defaults to '
 742CONFIG_MANILA_SERVICE_IMAGE_LOCATION=https://www.dropbox.com/s/vi5oeh10q1qkckh/ubuntu_1204_nfs_cifs.qcow2
 743
 744# User in Manila service instance.
 745CONFIG_MANILA_SERVICE_INSTANCE_USER=ubuntu
 746
 747# Password to service instance user.
 748CONFIG_MANILA_SERVICE_INSTANCE_PASSWORD=ubuntu
 749
 750# Type of networking that the backend will use. A more detailed
 751# description of each option is available in the Manila docs. Defaults
 752# to 'neutron'. ['neutron', 'nova-network', 'standalone']
 753CONFIG_MANILA_NETWORK_TYPE=neutron
 754
 755# Gateway IPv4 address that should be used. Required. Defaults to ''.
 756CONFIG_MANILA_NETWORK_STANDALONE_GATEWAY=
 757
 758# Network mask that will be used. Can be either decimal like '24' or
 759# binary like '255.255.255.0'. Required. Defaults to ''.
 760CONFIG_MANILA_NETWORK_STANDALONE_NETMASK=
 761
 762# Set it if network has segmentation (VLAN, VXLAN, etc). It will be
 763# assigned to share-network and share drivers will be able to use this
 764# for network interfaces within provisioned share servers. Optional.
 765# Example: 1001. Defaults to ''.
 766CONFIG_MANILA_NETWORK_STANDALONE_SEG_ID=
 767
 768# Can be IP address, range of IP addresses or list of addresses or
 769# ranges. Contains addresses from IP network that are allowed to be
 770# used. If empty, then will be assumed that all host addresses from
 771# network can be used. Optional. Examples: 10.0.0.10 or
 772# 10.0.0.10-10.0.0.20 or
 773# 10.0.0.10-10.0.0.20,10.0.0.30-10.0.0.40,10.0.0.50. Defaults to ''.
 774CONFIG_MANILA_NETWORK_STANDALONE_IP_RANGE=
 775
 776# IP version of network. Optional. Defaults to '4'. ['4', '6']
 777CONFIG_MANILA_NETWORK_STANDALONE_IP_VERSION=4
 778
 779# Password to use for OpenStack Bare Metal Provisioning (ironic) to
 780# access the database.
 781CONFIG_IRONIC_DB_PW=PW_PLACEHOLDER
 782
 783# Password to use for OpenStack Bare Metal Provisioning to
 784# authenticate with the Identity service.
 785CONFIG_IRONIC_KS_PW=PW_PLACEHOLDER
 786
 787# Password to use for the Compute service (nova) to access the
 788# database.
 789CONFIG_NOVA_DB_PW=fc7c306ac4604b46
 790
 791# Password to use for the Compute service to authenticate with the
 792# Identity service.
 793CONFIG_NOVA_KS_PW=ee6b96f94ff2426f
 794
 795# Overcommitment ratio for virtual to physical CPUs. Specify 1.0 to
 796# disable CPU overcommitment.
 797CONFIG_NOVA_SCHED_CPU_ALLOC_RATIO=16.0
 798
 799# Overcommitment ratio for virtual to physical RAM. Specify 1.0 to
 800# disable RAM overcommitment.
 801CONFIG_NOVA_SCHED_RAM_ALLOC_RATIO=1.5
 802
 803# Protocol used for instance migration. Valid options are: tcp and
 804# ssh. Note that by default, the Compute user is created with the
 805# /sbin/nologin shell so that the SSH protocol will not work. To make
 806# the SSH protocol work, you must configure the Compute user on
 807# compute hosts manually. ['tcp', 'ssh']
 808CONFIG_NOVA_COMPUTE_MIGRATE_PROTOCOL=tcp
 809
 810# Manager that runs the Compute service.
 811CONFIG_NOVA_COMPUTE_MANAGER=nova.compute.manager.ComputeManager
 812
 813# PEM encoded certificate to be used for ssl on the https server,
 814# leave blank if one should be generated, this certificate should not
 815# require a passphrase. If CONFIG_HORIZON_SSL is set to 'n' this
 816# parameter is ignored.
 817CONFIG_VNC_SSL_CERT=
 818
 819# SSL keyfile corresponding to the certificate if one was entered. If
 820# CONFIG_HORIZON_SSL is set to 'n' this parameter is ignored.
 821CONFIG_VNC_SSL_KEY=
 822
 823# Private interface for flat DHCP on the Compute servers.
 824CONFIG_NOVA_COMPUTE_PRIVIF=eth1
 825
 826# Compute Network Manager. ['^nova\.network\.manager\.\w+Manager$']
 827CONFIG_NOVA_NETWORK_MANAGER=nova.network.manager.FlatDHCPManager
 828
 829# Public interface on the Compute network server.
 830CONFIG_NOVA_NETWORK_PUBIF=eth0
 831
 832# Private interface for flat DHCP on the Compute network server.
 833CONFIG_NOVA_NETWORK_PRIVIF=eth1
 834
 835# IP Range for flat DHCP. ['^[\:\.\da-fA-f]+(\/\d+){0,1}$']
 836CONFIG_NOVA_NETWORK_FIXEDRANGE=192.168.32.0/22
 837
 838# IP Range for floating IP addresses. ['^[\:\.\da-
 839# fA-f]+(\/\d+){0,1}$']
 840CONFIG_NOVA_NETWORK_FLOATRANGE=10.3.4.0/22
 841
 842# Specify 'y' to automatically assign a floating IP to new instances.
 843# ['y', 'n']
 844CONFIG_NOVA_NETWORK_AUTOASSIGNFLOATINGIP=n
 845
 846# First VLAN for private networks (Compute networking).
 847CONFIG_NOVA_NETWORK_VLAN_START=100
 848
 849# Number of networks to support (Compute networking).
 850CONFIG_NOVA_NETWORK_NUMBER=1
 851
 852# Number of addresses in each private subnet (Compute networking).
 853CONFIG_NOVA_NETWORK_SIZE=255
 854
 855# Password to use for OpenStack Networking (neutron) to authenticate
 856# with the Identity service.
 857CONFIG_NEUTRON_KS_PW=8c3f85e9f3cd424b
 858
 859# The password to use for OpenStack Networking to access the
 860# database.
 861CONFIG_NEUTRON_DB_PW=8343c41200a04477
 862
 863# The name of the Open vSwitch bridge (or empty for linuxbridge) for
 864# the OpenStack Networking L3 agent to use for external  traffic.
 865# Specify 'provider' if you intend to use a provider network to handle
 866# external traffic.
 867CONFIG_NEUTRON_L3_EXT_BRIDGE=br-ex
 868
 869# Password for the OpenStack Networking metadata agent.
 870CONFIG_NEUTRON_METADATA_PW=fc1fca9bb48c4cb4
 871
 872# Specify 'y' to install OpenStack Networking's Load-Balancing-
 873# as-a-Service (LBaaS). ['y', 'n']
 874CONFIG_LBAAS_INSTALL=n
 875
 876# Specify 'y' to install OpenStack Networking's L3 Metering agent
 877# ['y', 'n']
 878CONFIG_NEUTRON_METERING_AGENT_INSTALL=n
 879
 880# Specify 'y' to configure OpenStack Networking's Firewall-
 881# as-a-Service (FWaaS). ['y', 'n']
 882CONFIG_NEUTRON_FWAAS=n
 883
 884# Comma-separated list of network-type driver entry points to be
 885# loaded from the neutron.ml2.type_drivers namespace. ['local',
 886# 'flat', 'vlan', 'gre', 'vxlan']
 887CONFIG_NEUTRON_ML2_TYPE_DRIVERS=vxlan
 888
 889# Comma-separated, ordered list of network types to allocate as
 890# tenant networks. The 'local' value is only useful for single-box
 891# testing and provides no connectivity between hosts. ['local',
 892# 'vlan', 'gre', 'vxlan']
 893CONFIG_NEUTRON_ML2_TENANT_NETWORK_TYPES=vxlan
 894
 895# Comma-separated ordered list of networking mechanism driver entry
 896# points to be loaded from the neutron.ml2.mechanism_drivers
 897# namespace. ['logger', 'test', 'linuxbridge', 'openvswitch',
 898# 'hyperv', 'ncs', 'arista', 'cisco_nexus', 'mlnx', 'l2population']
 899CONFIG_NEUTRON_ML2_MECHANISM_DRIVERS=openvswitch
 900
 901# Comma-separated list of physical_network names with which flat
 902# networks can be created. Use * to allow flat networks with arbitrary
 903# physical_network names.
 904CONFIG_NEUTRON_ML2_FLAT_NETWORKS=*
 905
 906# Comma-separated list of <physical_network>:<vlan_min>:<vlan_max> or
 907# <physical_network> specifying physical_network names usable for VLAN
 908# provider and tenant networks, as well as ranges of VLAN tags on each
 909# available for allocation to tenant networks.
 910CONFIG_NEUTRON_ML2_VLAN_RANGES=
 911
 912# Comma-separated list of <tun_min>:<tun_max> tuples enumerating
 913# ranges of GRE tunnel IDs that are available for tenant-network
 914# allocation. A tuple must be an array with tun_max +1 - tun_min >
 915# 1000000.
 916CONFIG_NEUTRON_ML2_TUNNEL_ID_RANGES=
 917
 918# Comma-separated list of addresses for VXLAN multicast group. If
 919# left empty, disables VXLAN from sending allocate broadcast traffic
 920# (disables multicast VXLAN mode). Should be a Multicast IP (v4 or v6)
 921# address.
 922CONFIG_NEUTRON_ML2_VXLAN_GROUP=
 923
 924# Comma-separated list of <vni_min>:<vni_max> tuples enumerating
 925# ranges of VXLAN VNI IDs that are available for tenant network
 926# allocation. Minimum value is 0 and maximum value is 16777215.
 927CONFIG_NEUTRON_ML2_VNI_RANGES=10:100
 928
 929# Name of the L2 agent to be used with OpenStack Networking.
 930# ['linuxbridge', 'openvswitch']
 931CONFIG_NEUTRON_L2_AGENT=openvswitch
 932
 933# Comma-separated list of interface mappings for the OpenStack
 934# Networking linuxbridge plugin. Each tuple in the list must be in the
 935# format <physical_network>:<net_interface>. Example:
 936# physnet1:eth1,physnet2:eth2,physnet3:eth3.
 937CONFIG_NEUTRON_LB_INTERFACE_MAPPINGS=
 938
 939# Comma-separated list of bridge mappings for the OpenStack
 940# Networking Open vSwitch plugin. Each tuple in the list must be in
 941# the format <physical_network>:<ovs_bridge>. Example: physnet1:br-
 942# eth1,physnet2:br-eth2,physnet3:br-eth3
 943CONFIG_NEUTRON_OVS_BRIDGE_MAPPINGS=
 944
 945# Comma-separated list of colon-separated Open vSwitch
 946# <bridge>:<interface> pairs. The interface will be added to the
 947# associated bridge. If you desire the bridge to be persistent a value
 948# must be added to this directive, also
 949# CONFIG_NEUTRON_OVS_BRIDGE_MAPPINGS must be set in order to create
 950# the proper port. This can be achieved from the command line by
 951# issuing the following command: packstack --allinone --os-neutron-
 952# ovs-bridge-mappings=ext-net:br-ex --os-neutron-ovs-bridge-interfaces
 953# =br-ex:eth0
 954CONFIG_NEUTRON_OVS_BRIDGE_IFACES=
 955
 956# Interface for the Open vSwitch tunnel. Packstack overrides the IP
 957# address used for tunnels on this hypervisor to the IP found on the
 958# specified interface (for example, eth1).
 959CONFIG_NEUTRON_OVS_TUNNEL_IF=
 960
 961# VXLAN UDP port.
 962CONFIG_NEUTRON_OVS_VXLAN_UDP_PORT=4789
 963
 964# Specify 'y' to set up Horizon communication over https. ['y', 'n']
 965CONFIG_HORIZON_SSL=n
 966
 967# Secret key to use for Horizon Secret Encryption Key.
 968CONFIG_HORIZON_SECRET_KEY=bdda0f58004a4c79bdf8061f9d3d9d60
 969
 970# PEM-encoded certificate to be used for SSL connections on the https
 971# server (the certificate should not require a passphrase). To
 972# generate a certificate, leave blank.
 973CONFIG_HORIZON_SSL_CERT=
 974
 975# SSL keyfile corresponding to the certificate if one was specified.
 976CONFIG_HORIZON_SSL_KEY=
 977
 978CONFIG_HORIZON_SSL_CACERT=
 979
 980# Password to use for the Object Storage service to authenticate with
 981# the Identity service.
 982CONFIG_SWIFT_KS_PW=1beea9a7e2194dea
 983
 984# Comma-separated list of devices to use as storage device for Object
 985# Storage. Each entry must take the format /path/to/dev (for example,
 986# specifying /dev/vdb installs /dev/vdb as the Object Storage storage
 987# device; Packstack does not create the filesystem, you must do this
 988# first). If left empty, Packstack creates a loopback device for test
 989# setup.
 990CONFIG_SWIFT_STORAGES=
 991
 992# Number of Object Storage storage zones; this number MUST be no
 993# larger than the number of configured storage devices.
 994CONFIG_SWIFT_STORAGE_ZONES=1
 995
 996# Number of Object Storage storage replicas; this number MUST be no
 997# larger than the number of configured storage zones.
 998CONFIG_SWIFT_STORAGE_REPLICAS=1
 999
1000# File system type for storage nodes. ['xfs', 'ext4']
1001CONFIG_SWIFT_STORAGE_FSTYPE=ext4
1002
1003# Custom seed number to use for swift_hash_path_suffix in
1004# /etc/swift/swift.conf. If you do not provide a value, a seed number
1005# is automatically generated.
1006CONFIG_SWIFT_HASH=b3890d3fc8b24b3a
1007
1008# Size of the Object Storage loopback file storage device.
1009CONFIG_SWIFT_STORAGE_SIZE=2G
1010
1011# Password used by Orchestration service user to authenticate against
1012# the database.
1013CONFIG_HEAT_DB_PW=PW_PLACEHOLDER
1014
1015# Encryption key to use for authentication in the Orchestration
1016# database (16, 24, or 32 chars).
1017CONFIG_HEAT_AUTH_ENC_KEY=15405bbafcb94737
1018
1019# Password to use for the Orchestration service to authenticate with
1020# the Identity service.
1021CONFIG_HEAT_KS_PW=PW_PLACEHOLDER
1022
1023# Specify 'y' to install the Orchestration CloudWatch API. ['y', 'n']
1024CONFIG_HEAT_CLOUDWATCH_INSTALL=n
1025
1026# Specify 'y' to install the Orchestration CloudFormation API. ['y',
1027# 'n']
1028CONFIG_HEAT_CFN_INSTALL=n
1029
1030# Name of the Identity domain for Orchestration.
1031CONFIG_HEAT_DOMAIN=heat
1032
1033# Name of the Identity domain administrative user for Orchestration.
1034CONFIG_HEAT_DOMAIN_ADMIN=heat_admin
1035
1036# Password for the Identity domain administrative user for
1037# Orchestration.
1038CONFIG_HEAT_DOMAIN_PASSWORD=PW_PLACEHOLDER
1039
1040# Specify 'y' to provision for demo usage and testing. ['y', 'n']
1041CONFIG_PROVISION_DEMO=y
1042
1043# Specify 'y' to configure the OpenStack Integration Test Suite
1044# (tempest) for testing. The test suite requires OpenStack Networking
1045# to be installed. ['y', 'n']
1046CONFIG_PROVISION_TEMPEST=n
1047
1048# CIDR network address for the floating IP subnet.
1049CONFIG_PROVISION_DEMO_FLOATRANGE=172.24.4.224/28
1050
1051# The name to be assigned to the demo image in Glance (default
1052# "cirros").
1053CONFIG_PROVISION_IMAGE_NAME=cirros
1054
1055# A URL or local file location for an image to download and provision
1056# in Glance (defaults to a URL for a recent "cirros" image).
1057CONFIG_PROVISION_IMAGE_URL=http://download.cirros-cloud.net/0.3.3/cirros-0.3.3-x86_64-disk.img
1058
1059# Format for the demo image (default "qcow2").
1060CONFIG_PROVISION_IMAGE_FORMAT=qcow2
1061
1062# User to use when connecting to instances booted from the demo
1063# image.
1064CONFIG_PROVISION_IMAGE_SSH_USER=cirros
1065
1066# Name of the Integration Test Suite provisioning user. If you do not
1067# provide a user name, Tempest is configured in a standalone mode.
1068CONFIG_PROVISION_TEMPEST_USER=
1069
1070# Password to use for the Integration Test Suite provisioning user.
1071CONFIG_PROVISION_TEMPEST_USER_PW=PW_PLACEHOLDER
1072
1073# CIDR network address for the floating IP subnet.
1074CONFIG_PROVISION_TEMPEST_FLOATRANGE=172.24.4.224/28
1075
1076# URI of the Integration Test Suite git repository.
1077CONFIG_PROVISION_TEMPEST_REPO_URI=https://github.com/openstack/tempest.git
1078
1079# Revision (branch) of the Integration Test Suite git repository.
1080CONFIG_PROVISION_TEMPEST_REPO_REVISION=master
1081
1082# Specify 'y' to configure the Open vSwitch external bridge for an
1083# all-in-one deployment (the L3 external bridge acts as the gateway
1084# for virtual machines). ['y', 'n']
1085CONFIG_PROVISION_ALL_IN_ONE_OVS_BRIDGE=n
1086
1087# Secret key for signing Telemetry service (ceilometer) messages.
1088CONFIG_CEILOMETER_SECRET=09667c76079c4ecf
1089
1090# Password to use for Telemetry to authenticate with the Identity
1091# service.
1092CONFIG_CEILOMETER_KS_PW=1049876e6d034c15
1093
1094# Backend driver for Telemetry's group membership coordination.
1095# ['redis', 'none']
1096CONFIG_CEILOMETER_COORDINATION_BACKEND=redis
1097
1098# IP address of the server on which to install MongoDB.
1099CONFIG_MONGODB_HOST=172.31.51.93
1100
1101# IP address of the server on which to install the Redis master
1102# server.
1103CONFIG_REDIS_MASTER_HOST=172.31.51.93
1104
1105# Port on which the Redis server(s) listens.
1106CONFIG_REDIS_PORT=6379
1107
1108# Specify 'y' to have Redis try to use HA. ['y', 'n']
1109CONFIG_REDIS_HA=n
1110
1111# Hosts on which to install Redis slaves.
1112CONFIG_REDIS_SLAVE_HOSTS=
1113
1114# Hosts on which to install Redis sentinel servers.
1115CONFIG_REDIS_SENTINEL_HOSTS=
1116
1117# Host to configure as the Redis coordination sentinel.
1118CONFIG_REDIS_SENTINEL_CONTACT_HOST=
1119
1120# Port on which Redis sentinel servers listen.
1121CONFIG_REDIS_SENTINEL_PORT=26379
1122
1123# Quorum value for Redis sentinel servers.
1124CONFIG_REDIS_SENTINEL_QUORUM=2
1125
1126# Name of the master server watched by the Redis sentinel. ['[a-z]+']
1127CONFIG_REDIS_MASTER_NAME=mymaster
1128
1129# Password to use for OpenStack Data Processing (sahara) to access
1130# the database.
1131CONFIG_SAHARA_DB_PW=PW_PLACEHOLDER
1132
1133# Password to use for OpenStack Data Processing to authenticate with
1134# the Identity service.
1135CONFIG_SAHARA_KS_PW=PW_PLACEHOLDER
1136
1137# Password to use for OpenStack Database-as-a-Service (trove) to
1138# access the database.
1139CONFIG_TROVE_DB_PW=PW_PLACEHOLDER
1140
1141# Password to use for OpenStack Database-as-a-Service to authenticate
1142# with the Identity service.
1143CONFIG_TROVE_KS_PW=PW_PLACEHOLDER
1144
1145# User name to use when OpenStack Database-as-a-Service connects to
1146# the Compute service.
1147CONFIG_TROVE_NOVA_USER=trove
1148
1149# Tenant to use when OpenStack Database-as-a-Service connects to the
1150# Compute service.
1151CONFIG_TROVE_NOVA_TENANT=services
1152
1153# Password to use when OpenStack Database-as-a-Service connects to
1154# the Compute service.
1155CONFIG_TROVE_NOVA_PW=PW_PLACEHOLDER
1156
1157# Password of the nagiosadmin user on the Nagios server.
1158CONFIG_NAGIOS_PW=ae710cf3d0e54cbc
1159
1160# Please replace x.x.x.x below with the controller public IP
1161NOVNCPROXY_URL="http://52.20.3.64:6080/vnc_auto.html"
1162NOVA_VNC_ENABLED=True
1163
1164# Please replace x.x.x.x below with the controller internal IP
1165VNCSERVER_LISTEN=172.31.51.93
1166VNCSERVER_PROXYCLIENT_ADDRESS=$VNCSERVER_LISTEN