]> git.proxmox.com Git - mirror_ovs.git/blob - utilities/ovs-vsctl.8.in
14a8aa4a48acc0d563650031dff8c7f0914eab88
[mirror_ovs.git] / utilities / ovs-vsctl.8.in
1 .\" -*- nroff -*-
2 .so lib/ovs.tmac
3 .TH ovs\-vsctl 8 "@VERSION@" "Open vSwitch" "Open vSwitch Manual"
4 .\" This program's name:
5 .ds PN ovs\-vsctl
6 .
7 .SH NAME
8 ovs\-vsctl \- utility for querying and configuring \fBovs\-vswitchd\fR
9 .
10 .SH SYNOPSIS
11 \fBovs\-vsctl\fR [\fIoptions\fR] \fB\-\-\fR [\fIoptions\fR] \fIcommand
12 \fR[\fIargs\fR] [\fB\-\-\fR [\fIoptions\fR] \fIcommand \fR[\fIargs\fR]]...
13 .
14 .SH DESCRIPTION
15 The \fBovs\-vsctl\fR program configures \fBovs\-vswitchd\fR(8) by
16 providing a high\-level interface to its configuration database.
17 See \fBovs\-vswitchd.conf.db\fR(5) for comprehensive documentation of
18 the database schema.
19 .PP
20 \fBovs\-vsctl\fR connects to an \fBovsdb\-server\fR process that
21 maintains an Open vSwitch configuration database. Using this
22 connection, it queries and possibly applies changes to the database,
23 depending on the supplied commands. Then, if it applied any changes,
24 by default it waits until \fBovs\-vswitchd\fR has finished
25 reconfiguring itself before it exits. (If you use \fBovs\-vsctl\fR
26 when \fBovs\-vswitchd\fR is not running, use \fB\-\-no\-wait\fR.)
27 .PP
28 \fBovs\-vsctl\fR can perform any number of commands in a single run,
29 implemented as a single atomic transaction against the database.
30 .PP
31 The \fBovs\-vsctl\fR command line begins with global options (see
32 \fBOPTIONS\fR below for details). The global options are followed by
33 one or more commands. Each command should begin with \fB\-\-\fR by
34 itself as a command-line argument, to separate it from the following
35 commands. (The \fB\-\-\fR before the first command is optional.) The
36 command
37 itself starts with command-specific options, if any, followed by the
38 command name and any arguments. See \fBEXAMPLES\fR below for syntax
39 examples.
40 .
41 .SS "Linux VLAN Bridging Compatibility"
42 The \fBovs\-vsctl\fR program supports the model of a bridge
43 implemented by Open vSwitch, in which a single bridge supports ports
44 on multiple VLANs. In this model, each port on a bridge is either a
45 trunk port that potentially passes packets tagged with 802.1Q headers
46 that designate VLANs or it is assigned a single implicit VLAN that is
47 never tagged with an 802.1Q header.
48 .PP
49 For compatibility with software designed for the Linux bridge,
50 \fBovs\-vsctl\fR also supports a model in which traffic associated
51 with a given 802.1Q VLAN is segregated into a separate bridge. A
52 special form of the \fBadd\-br\fR command (see below) creates a ``fake
53 bridge'' within an Open vSwitch bridge to simulate this behavior.
54 When such a ``fake bridge'' is active, \fBovs\-vsctl\fR will treat it
55 much like a bridge separate from its ``parent bridge,'' but the actual
56 implementation in Open vSwitch uses only a single bridge, with ports on
57 the fake bridge assigned the implicit VLAN of the fake bridge of which
58 they are members. (A fake bridge for VLAN 0 receives packets that
59 have no 802.1Q tag or a tag with VLAN 0.)
60 .
61 .SH OPTIONS
62 .
63 The following options affect the behavior \fBovs\-vsctl\fR as a whole.
64 Some individual commands also accept their own options, which are
65 given just before the command name. If the first command on the
66 command line has options, then those options must be separated from
67 the global options by \fB\-\-\fR.
68 .
69 .IP "\fB\-\-db=\fIserver\fR"
70 Sets \fIserver\fR as the database server that \fBovs\-vsctl\fR
71 contacts to query or modify configuration. \fIserver\fR may be an
72 OVSDB active or passive connection method, as described in
73 \fBovsdb\fR(7). The default is \fBunix:@RUNDIR@/db.sock\fR.
74 .IP "\fB\-\-no\-wait\fR"
75 Prevents \fBovs\-vsctl\fR from waiting for \fBovs\-vswitchd\fR to
76 reconfigure itself according to the modified database. This
77 option should be used if \fBovs\-vswitchd\fR is not running;
78 otherwise, \fBovs\-vsctl\fR will not exit until \fBovs\-vswitchd\fR
79 starts.
80 .IP
81 This option has no effect if the commands specified do not change the
82 database.
83 .
84 .IP "\fB\-\-no\-syslog\fR"
85 By default, \fBovs\-vsctl\fR logs its arguments and the details of any
86 changes that it makes to the system log. This option disables this
87 logging.
88 .IP
89 This option is equivalent to \fB\-\-verbose=vsctl:syslog:warn\fR.
90 .
91 .IP "\fB\-\-oneline\fR"
92 Modifies the output format so that the output for each command is printed
93 on a single line. New-line characters that would otherwise separate
94 lines are printed as \fB\\n\fR, and any instances of \fB\\\fR that
95 would otherwise appear in the output are doubled.
96 Prints a blank line for each command that has no output.
97 This option does not affect the formatting of output from the
98 \fBlist\fR or \fBfind\fR commands; see \fBTable Formatting Options\fR
99 below.
100 .
101 .IP "\fB\-\-dry\-run\fR"
102 Prevents \fBovs\-vsctl\fR from actually modifying the database.
103 .
104 .IP "\fB\-t \fIsecs\fR"
105 .IQ "\fB\-\-timeout=\fIsecs\fR"
106 By default, or with a \fIsecs\fR of \fB0\fR, \fBovs\-vsctl\fR waits
107 forever for a response from the database. This option limits runtime
108 to approximately \fIsecs\fR seconds. If the timeout expires,
109 \fBovs\-vsctl\fR will exit with a \fBSIGALRM\fR signal. (A timeout
110 would normally happen only if the database cannot be contacted, or if
111 the system is overloaded.)
112 .
113 .IP "\fB\-\-retry\fR"
114 Without this option, if \fBovs\-vsctl\fR connects outward to the
115 database server (the default) then \fBovs\-vsctl\fR will try to
116 connect once and exit with an error if the connection fails (which
117 usually means that \fBovsdb\-server\fR is not running).
118 .IP
119 With this option, or if \fB\-\-db\fR specifies that \fBovs\-vsctl\fR
120 should listen for an incoming connection from the database server,
121 then \fBovs\-vsctl\fR will wait for a connection to the database
122 forever.
123 .IP
124 Regardless of this setting, \fB\-\-timeout\fR always limits how long
125 \fBovs\-vsctl\fR will wait.
126 .
127 .SS "Table Formatting Options"
128 These options control the format of output from the \fBlist\fR and
129 \fBfind\fR commands.
130 .so lib/table.man
131 .
132 .SS "Public Key Infrastructure Options"
133 .so lib/ssl.man
134 .so lib/ssl-bootstrap.man
135 .so lib/ssl-peer-ca-cert.man
136 .so lib/vlog.man
137 .so lib/common.man
138 .
139 .SH COMMANDS
140 The commands implemented by \fBovs\-vsctl\fR are described in the
141 sections below.
142 .SS "Open vSwitch Commands"
143 These commands work with an Open vSwitch as a whole.
144 .
145 .IP "\fBinit\fR"
146 Initializes the Open vSwitch database, if it is empty. If the
147 database has already been initialized, this command has no effect.
148 .IP
149 Any successful \fBovs\-vsctl\fR command automatically initializes the
150 Open vSwitch database if it is empty. This command is provided to
151 initialize the database without executing any other command.
152 .
153 .IP "\fBshow\fR"
154 Prints a brief overview of the database contents.
155 .
156 .IP "\fBemer\-reset\fR"
157 Reset the configuration into a clean state. It deconfigures OpenFlow
158 controllers, OVSDB servers, and SSL, and deletes port mirroring,
159 \fBfail_mode\fR, NetFlow, sFlow, and IPFIX configuration. This
160 command also removes all \fBother\-config\fR keys from all database
161 records, except that \fBother\-config:hwaddr\fR is preserved if it is
162 present in a Bridge record. Other networking configuration is left
163 as-is.
164 .
165 .SS "Bridge Commands"
166 These commands examine and manipulate Open vSwitch bridges.
167 .
168 .IP "[\fB\-\-may\-exist\fR] \fBadd\-br \fIbridge\fR"
169 Creates a new bridge named \fIbridge\fR. Initially the bridge will
170 have no ports (other than \fIbridge\fR itself).
171 .IP
172 Without \fB\-\-may\-exist\fR, attempting to create a bridge that
173 exists is an error. With \fB\-\-may\-exist\fR, this command does
174 nothing if \fIbridge\fR already exists as a real bridge.
175 .
176 .IP "[\fB\-\-may\-exist\fR] \fBadd\-br \fIbridge parent vlan\fR"
177 Creates a ``fake bridge'' named \fIbridge\fR within the existing Open
178 vSwitch bridge \fIparent\fR, which must already exist and must not
179 itself be a fake bridge. The new fake bridge will be on 802.1Q VLAN
180 \fIvlan\fR, which must be an integer between 0 and 4095. The parent
181 bridge must not already have a fake bridge for \fIvlan\fR. Initially
182 \fIbridge\fR will have no ports (other than \fIbridge\fR itself).
183 .IP
184 Without \fB\-\-may\-exist\fR, attempting to create a bridge that
185 exists is an error. With \fB\-\-may\-exist\fR, this command does
186 nothing if \fIbridge\fR already exists as a VLAN bridge under
187 \fIparent\fR for \fIvlan\fR.
188 .
189 .IP "[\fB\-\-if\-exists\fR] \fBdel\-br \fIbridge\fR"
190 Deletes \fIbridge\fR and all of its ports. If \fIbridge\fR is a real
191 bridge, this command also deletes any fake bridges that were created
192 with \fIbridge\fR as parent, including all of their ports.
193 .IP
194 Without \fB\-\-if\-exists\fR, attempting to delete a bridge that does
195 not exist is an error. With \fB\-\-if\-exists\fR, attempting to
196 delete a bridge that does not exist has no effect.
197 .
198 .IP "[\fB\-\-real\fR|\fB\-\-fake\fR] \fBlist\-br\fR"
199 Lists all existing real and fake bridges on standard output, one per
200 line. With \fB\-\-real\fR or \fB\-\-fake\fR, only bridges of that type
201 are returned.
202 .
203 .IP "\fBbr\-exists \fIbridge\fR"
204 Tests whether \fIbridge\fR exists as a real or fake bridge. If so,
205 \fBovs\-vsctl\fR exits successfully with exit code 0. If not,
206 \fBovs\-vsctl\fR exits unsuccessfully with exit code 2.
207 .
208 .IP "\fBbr\-to\-vlan \fIbridge\fR"
209 If \fIbridge\fR is a fake bridge, prints the bridge's 802.1Q VLAN as a
210 decimal integer. If \fIbridge\fR is a real bridge, prints 0.
211 .
212 .IP "\fBbr\-to\-parent \fIbridge\fR"
213 If \fIbridge\fR is a fake bridge, prints the name of its parent
214 bridge. If \fIbridge\fR is a real bridge, print \fIbridge\fR.
215 .
216 .IP "\fBbr\-set\-external\-id \fIbridge key\fR [\fIvalue\fR]"
217 Sets or clears an ``external ID'' value on \fIbridge\fR. These values
218 are intended to identify entities external to Open vSwitch with which
219 \fIbridge\fR is associated, e.g. the bridge's identifier in a
220 virtualization management platform. The Open vSwitch database schema
221 specifies well-known \fIkey\fR values, but \fIkey\fR and \fIvalue\fR
222 are otherwise arbitrary strings.
223 .IP
224 If \fIvalue\fR is specified, then \fIkey\fR is set to \fIvalue\fR for
225 \fIbridge\fR, overwriting any previous value. If \fIvalue\fR is
226 omitted, then \fIkey\fR is removed from \fIbridge\fR's set of external
227 IDs (if it was present).
228 .IP
229 For real bridges, the effect of this command is similar to that of a
230 \fBset\fR or \fBremove\fR command in the \fBexternal\-ids\fR column of
231 the \fBBridge\fR table. For fake bridges, it actually modifies keys
232 with names prefixed by \fBfake\-bridge\-\fR in the \fBPort\fR table.
233 .
234 .IP "\fBbr\-get\-external\-id \fIbridge\fR [\fIkey\fR]"
235 Queries the external IDs on \fIbridge\fR. If \fIkey\fR is specified,
236 the output is the value for that \fIkey\fR or the empty string if
237 \fIkey\fR is unset. If \fIkey\fR is omitted, the output is
238 \fIkey\fB=\fIvalue\fR, one per line, for each key-value pair.
239 .IP
240 For real bridges, the effect of this command is similar to that of a
241 \fBget\fR command in the \fBexternal\-ids\fR column of the
242 \fBBridge\fR table. For fake bridges, it queries keys with names
243 prefixed by \fBfake\-bridge\-\fR in the \fBPort\fR table.
244 .
245 .SS "Port Commands"
246 .
247 These commands examine and manipulate Open vSwitch ports. These
248 commands treat a bonded port as a single entity.
249 .
250 .IP "\fBlist\-ports \fIbridge\fR"
251 Lists all of the ports within \fIbridge\fR on standard output, one per
252 line. The local port \fIbridge\fR is not included in the list.
253 .
254 .IP "[\fB\-\-may\-exist\fR] \fBadd\-port \fIbridge port \fR[\fIcolumn\fR[\fB:\fIkey\fR]\fR=\fIvalue\fR]\&...\fR"
255 Creates on \fIbridge\fR a new port named \fIport\fR from the network
256 device of the same name.
257 .IP
258 Optional arguments set values of column in the Port record created by
259 the command. For example, \fBtag=9\fR would make the port an access
260 port for VLAN 9. The syntax is the same as that for the \fBset\fR
261 command (see \fBDatabase Commands\fR below).
262 .IP
263 Without \fB\-\-may\-exist\fR, attempting to create a port that exists
264 is an error. With \fB\-\-may\-exist\fR, this command does nothing if
265 \fIport\fR already exists on \fIbridge\fR and is not a bonded port.
266 .
267 .IP "[\fB\-\-if\-exists\fR] \fBdel\-port \fR[\fIbridge\fR] \fIport\fR"
268 Deletes \fIport\fR. If \fIbridge\fR is omitted, \fIport\fR is removed
269 from whatever bridge contains it; if \fIbridge\fR is specified, it
270 must be the real or fake bridge that contains \fIport\fR.
271 .IP
272 Without \fB\-\-if\-exists\fR, attempting to delete a port that does
273 not exist is an error. With \fB\-\-if\-exists\fR, attempting to
274 delete a port that does not exist has no effect.
275 .
276 .IP "[\fB\-\-if\-exists\fR] \fB\-\-with\-iface del\-port \fR[\fIbridge\fR] \fIiface\fR"
277 Deletes the port named \fIiface\fR or that has an interface named
278 \fIiface\fR. If \fIbridge\fR is omitted, the port is removed from
279 whatever bridge contains it; if \fIbridge\fR is specified, it must be
280 the real or fake bridge that contains the port.
281 .IP
282 Without \fB\-\-if\-exists\fR, attempting to delete the port for an
283 interface that does not exist is an error. With \fB\-\-if\-exists\fR,
284 attempting to delete the port for an interface that does not exist has
285 no effect.
286 .
287 .IP "\fBport\-to\-br \fIport\fR"
288 Prints the name of the bridge that contains \fIport\fR on standard
289 output.
290 .
291 .SS "Bond Commands"
292 .
293 These commands work with ports that have more than one interface,
294 which Open vSwitch calls ``bonds.''
295 .
296 .IP "[\fB\-\-fake\-iface\fR] \fBadd\-bond \fIbridge port iface\fR\&... [\fIcolumn\fR[\fB:\fIkey\fR]\fR=\fIvalue\fR]\&...\fR"
297 Creates on \fIbridge\fR a new port named \fIport\fR that bonds
298 together the network devices given as each \fIiface\fR. At least two
299 interfaces must be named. If the interfaces are DPDK enabled then
300 the transaction will need to include operations to explicitly set the
301 interface type to 'dpdk'.
302 .IP
303 Optional arguments set values of column in the Port record created by
304 the command. The syntax is the same as that for the \fBset\fR command
305 (see \fBDatabase Commands\fR below).
306 .IP
307 With \fB\-\-fake\-iface\fR, a fake interface with the name \fIport\fR is
308 created. This should only be used for compatibility with legacy
309 software that requires it.
310 .IP
311 Without \fB\-\-may\-exist\fR, attempting to create a port that exists
312 is an error. With \fB\-\-may\-exist\fR, this command does nothing if
313 \fIport\fR already exists on \fIbridge\fR and bonds together exactly
314 the specified interfaces.
315 .
316 .IP "[\fB\-\-may\-exist\fR] \fBadd\-bond\-iface \fIbond iface\fR"
317 Adds \fIiface\fR as a new bond interface to the existing port
318 \fIbond\fR. If \fIbond\fR previously had only one port, this
319 transforms it into a bond.
320 .IP
321 Without \fB\-\-may\-exist\fR, attempting to add an \fIiface\fR that is
322 already part of \fIbond\fR is an error. With \fB\-\-may\-exist\fR,
323 this command does nothing if \fIiface\fR is already part of
324 \fIbond\fR. (It is still an error if \fIiface\fR is an interface of
325 some other port or bond.)
326 .
327 .IP "[\fB\-\-if\-exists\fR] \fBdel\-bond\-iface\fR [\fIbond\fR] \fIiface\fR"
328 Removes \fIiface\fR from its port. If \fIbond\fR is omitted,
329 \fIiface\fR is removed from whatever port contains it; if \fIbond\fR
330 is specified, it must be the port that contains \fIbond\fR.
331 .IP
332 If removing \fIiface\fR causes its port to have only a single
333 interface, then that port transforms from a bond into an ordinary
334 port. It is an error if \fIiface\fR is the only interface in its
335 port.
336 .IP
337 Without \fB\-\-if\-exists\fR, attempting to delete an interface that
338 does not exist is an error. With \fB\-\-if\-exists\fR, attempting to
339 delete an interface that does not exist has no effect.
340 .
341 .SS "Interface Commands"
342 .
343 These commands examine the interfaces attached to an Open vSwitch
344 bridge. These commands treat a bonded port as a collection of two or
345 more interfaces, rather than as a single port.
346 .
347 .IP "\fBlist\-ifaces \fIbridge\fR"
348 Lists all of the interfaces within \fIbridge\fR on standard output,
349 one per line. The local port \fIbridge\fR is not included in the
350 list.
351 .
352 .IP "\fBiface\-to\-br \fIiface\fR"
353 Prints the name of the bridge that contains \fIiface\fR on standard
354 output.
355 .
356 .SS "Conntrack Zone Commands"
357 These commands query and modify datapath CT zones and Timeout Policies.
358 .
359 .IP "[\fB\-\-may\-exist\fR] \fBadd\-zone\-tp \fIdatapath \fBzone=\fIzone_id \fIpolicies\fR"
360 Creates a conntrack zone timeout policy with \fIzone_id\fR in
361 \fIdatapath\fR. The \fIpolicies\fR consist of \fIkey\fB=\fIvalue\fR
362 pairs, separated by spaces. For example, \fBicmp_first=30
363 icmp_reply=60\fR specifies a 30-second timeout policy for the first ICMP
364 packet and a 60-second policy for ICMP reply packets. See the
365 \fBCT_Timeout_Policy\fR table in \fBovs-vswitchd.conf.db\fR(5) for the
366 supported keys.
367 .IP
368 Without \fB\-\-may\-exist\fR, attempting to add a \fIzone_id\fR that
369 already exists is an error. With \fB\-\-may\-exist\fR,
370 this command does nothing if \fIzone_id\fR already exists.
371 .
372 .IP "[\fB\-\-if\-exists\fR] \fBdel\-zone\-tp \fIdatapath \fBzone=\fIzone_id\fR"
373 Delete the timeout policy associated with \fIzone_id\fR from \fIdatapath\fR.
374 .IP
375 Without \fB\-\-if\-exists\fR, attempting to delete a zone that
376 does not exist is an error. With \fB\-\-if\-exists\fR, attempting to
377 delete a zone that does not exist has no effect.
378 .
379 .IP "\fBlist\-zone\-tp \fIdatapath\fR"
380 Prints the timeout policies of all zones in \fIdatapath\fR.
381 .
382 .SS "OpenFlow Controller Connectivity"
383 .
384 \fBovs\-vswitchd\fR can perform all configured bridging and switching
385 locally, or it can be configured to communicate with one or more
386 external OpenFlow controllers. The switch is typically configured to
387 connect to a primary controller that takes charge of the bridge's flow
388 table to implement a network policy. In addition, the switch can be
389 configured to listen to connections from service controllers. Service
390 controllers are typically used for occasional support and maintenance,
391 e.g. with \fBovs\-ofctl\fR.
392 .
393 .IP "\fBget\-controller\fR \fIbridge\fR"
394 Prints the configured controller target.
395 .
396 .IP "\fBdel\-controller\fR \fIbridge\fR"
397 Deletes the configured controller target.
398 .
399 .IP "\fBset\-controller\fR \fIbridge\fR \fItarget\fR\&..."
400 Sets the configured controller target or targets. Each \fItarget\fR may
401 use any of the following forms:
402 .
403 .RS
404 .so lib/vconn-active.man
405 .so lib/vconn-passive.man
406 .RE
407 .
408 .ST "Controller Failure Settings"
409 .PP
410 When a controller is configured, it is, ordinarily, responsible for
411 setting up all flows on the switch. Thus, if the connection to
412 the controller fails, no new network connections can be set up. If
413 the connection to the controller stays down long enough, no packets
414 can pass through the switch at all.
415 .PP
416 If the value is \fBstandalone\fR, or if neither of these settings
417 is set, \fBovs\-vswitchd\fR will take over
418 responsibility for setting up
419 flows when no message has been received from the controller for three
420 times the inactivity probe interval. In this mode,
421 \fBovs\-vswitchd\fR causes the datapath to act like an ordinary
422 MAC-learning switch. \fBovs\-vswitchd\fR will continue to retry connecting
423 to the controller in the background and, when the connection succeeds,
424 it discontinues its standalone behavior.
425 .PP
426 If this option is set to \fBsecure\fR, \fBovs\-vswitchd\fR will not
427 set up flows on its own when the controller connection fails.
428 .
429 .IP "\fBget\-fail\-mode\fR \fIbridge\fR"
430 Prints the configured failure mode.
431 .
432 .IP "\fBdel\-fail\-mode\fR \fIbridge\fR"
433 Deletes the configured failure mode.
434 .
435 .IP "\fBset\-fail\-mode\fR \fIbridge\fR \fBstandalone\fR|\fBsecure\fR"
436 Sets the configured failure mode.
437 .
438 .SS "Manager Connectivity"
439 .
440 These commands manipulate the \fBmanager_options\fR column in the
441 \fBOpen_vSwitch\fR table and rows in the \fBManagers\fR table. When
442 \fBovsdb\-server\fR is configured to use the \fBmanager_options\fR column for
443 OVSDB connections (as described in the startup scripts provided with
444 Open vSwitch; the corresponding \fBovsdb\-server\fR command option is
445 \fB--remote=db:Open_vSwitch,Open_vSwitch,manager_options\fR), this allows the
446 administrator to use \fBovs\-vsctl\fR to configure database connections.
447 .
448 .IP "\fBget\-manager\fR"
449 Prints the configured manager(s).
450 .
451 .IP "\fBdel\-manager\fR"
452 Deletes the configured manager(s).
453 .
454 .IP "\fBset\-manager\fR \fItarget\fR\&..."
455 Sets the configured manager target or targets.
456 Each \fItarget\fR may be an OVSDB active or passive connection method,
457 e.g. \fBpssl:6640\fR, as described in \fBovsdb\fR(7).
458 .
459 .SS "SSL Configuration"
460 When \fBovs\-vswitchd\fR is configured to connect over SSL for management or
461 controller connectivity, the following parameters are required:
462 .TP
463 \fIprivate-key\fR
464 Specifies a PEM file containing the private key used as the virtual
465 switch's identity for SSL connections to the controller.
466 .TP
467 \fIcertificate\fR
468 Specifies a PEM file containing a certificate, signed by the
469 certificate authority (CA) used by the controller and manager, that
470 certifies the virtual switch's private key, identifying a trustworthy
471 switch.
472 .TP
473 \fIca-cert\fR
474 Specifies a PEM file containing the CA certificate used to verify that
475 the virtual switch is connected to a trustworthy controller.
476 .PP
477 These files are read only once, at \fBovs\-vswitchd\fR startup time. If
478 their contents change, \fBovs\-vswitchd\fR must be killed and restarted.
479 .PP
480 These SSL settings apply to all SSL connections made by the virtual
481 switch.
482 .
483 .IP "\fBget\-ssl\fR"
484 Prints the SSL configuration.
485 .
486 .IP "\fBdel\-ssl\fR"
487 Deletes the current SSL configuration.
488 .
489 .IP "[\fB\-\-bootstrap\fR] \fBset\-ssl\fR \fIprivate-key\fR \fIcertificate\fR \fIca-cert\fR"
490 Sets the SSL configuration. The \fB\-\-bootstrap\fR option is described
491 below.
492 .
493 .ST "CA Certificate Bootstrap"
494 .PP
495 Ordinarily, all of the files named in the SSL configuration must exist
496 when \fBovs\-vswitchd\fR starts. However, if the \fIca-cert\fR file
497 does not exist and the \fB\-\-bootstrap\fR
498 option is given, then \fBovs\-vswitchd\fR will attempt to obtain the
499 CA certificate from the controller on its first SSL connection and
500 save it to the named PEM file. If it is successful, it will
501 immediately drop the connection and reconnect, and from then on all
502 SSL connections must be authenticated by a certificate signed by the
503 CA certificate thus obtained.
504 .PP
505 \fBThis option exposes the SSL connection to a man-in-the-middle
506 attack obtaining the initial CA certificate\fR, but it may be useful
507 for bootstrapping.
508 .PP
509 This option is only useful if the controller sends its CA certificate
510 as part of the SSL certificate chain. The SSL protocol does not
511 require the controller to send the CA certificate.
512 .
513 .SS "Auto-Attach Commands"
514 .
515 The IETF Auto-Attach SPBM draft standard describes a compact method of using
516 IEEE 802.1AB Link Layer Discovery Protocol (LLDP) together with a IEEE 802.1aq
517 Shortest Path Bridging (SPB) network to automatically attach network devices to
518 individual services in a SPB network. The intent here is to allow network
519 applications and devices using OVS to be able to easily take advantage of
520 features offered by industry standard SPB networks. A fundamental element of
521 the Auto-Attach feature is to map traditional VLANs onto SPB I_SIDs. These
522 commands manage the Auto-Attach I-SID/VLAN mappings.
523 .
524 .IP "\fBadd\-aa\-mapping \fIbridge i-sid vlan\fR"
525 Creates a new Auto-Attach mapping on \fIbridge\fR for \fIi-sid\fR
526 and \fIvlan\fR.
527 .
528 .IP "\fBdel\-aa\-mapping \fIbridge i-sid vlan\fR"
529 Deletes an Auto-Attach mapping on \fIbridge\fR for \fIi-sid\fR
530 and \fIvlan\fR.
531 .IP "\fBget\-aa\-mapping \fIbridge\fR"
532 Lists all of the Auto-Attach mappings within \fIbridge\fR on standard output.
533 .
534 .SS "Database Commands"
535 .
536 These commands query and modify the contents of \fBovsdb\fR tables.
537 They are a slight abstraction of the \fBovsdb\fR interface and as such
538 they operate at a lower level than other \fBovs\-vsctl\fR commands.
539 .PP
540 .ST "Identifying Tables, Records, and Columns"
541 .PP
542 Each of these commands has a \fItable\fR parameter to identify a table
543 within the database. Many of them also take a \fIrecord\fR parameter
544 that identifies a particular record within a table. The \fIrecord\fR
545 parameter may be the UUID for a record, and many tables offer
546 additional ways to identify records. Some commands also take
547 \fIcolumn\fR parameters that identify a particular field within the
548 records in a table.
549 .PP
550 For a list of tables and their columns, see \fBovs-vswitchd.conf.db\fR(5) or
551 see the table listing from the \fB--help\fR option.
552 .PP
553 Record names must be specified in full and with correct
554 capitalization, except that UUIDs may be abbreviated to their first 4
555 (or more) hex digits, as long as that is unique within the table.
556 Names of tables and columns are not case-sensitive, and \fB\-\fR and
557 \fB_\fR are treated interchangeably. Unique abbreviations of table
558 and column names are acceptable, e.g. \fBnet\fR or \fBn\fR is
559 sufficient to identify the \fBNetFlow\fR table.
560 .
561 .so lib/db-ctl-base.man
562 .SH "EXAMPLES"
563 Create a new bridge named br0 and add port eth0 to it:
564 .IP
565 .B "ovs\-vsctl add\-br br0"
566 .br
567 .B "ovs\-vsctl add\-port br0 eth0"
568 .PP
569 Alternatively, perform both operations in a single atomic transaction:
570 .IP
571 .B "ovs\-vsctl add\-br br0 \-\- add\-port br0 eth0"
572 .PP
573 Delete bridge \fBbr0\fR, reporting an error if it does not exist:
574 .IP
575 .B "ovs\-vsctl del\-br br0"
576 .PP
577 Delete bridge \fBbr0\fR if it exists:
578 .IP
579 .B "ovs\-vsctl \-\-if\-exists del\-br br0"
580 .PP
581 Set the \fBqos\fR column of the \fBPort\fR record for \fBeth0\fR to
582 point to a new \fBQoS\fR record, which in turn points with its queue 0
583 to a new \fBQueue\fR record:
584 .IP
585 .B "ovs\-vsctl \-\- set port eth0 qos=@newqos \-\- \-\-id=@newqos create qos type=linux\-htb other\-config:max\-rate=1000000 queues:0=@newqueue \-\- \-\-id=@newqueue create queue other\-config:min\-rate=1000000 other\-config:max\-rate=1000000"
586 .SH "CONFIGURATION COOKBOOK"
587 .SS "Port Configuration"
588 .PP
589 Add an ``internal port'' \fBvlan10\fR to bridge \fBbr0\fR as a VLAN
590 access port for VLAN 10, and configure it with an IP address:
591 .IP
592 .B "ovs\-vsctl add\-port br0 vlan10 tag=10 \-\- set Interface vlan10 type=internal"
593 .IP
594 .B "ip addr add 192.168.0.123/24 dev vlan10"
595 .
596 .PP
597 Add a GRE tunnel port \fBgre0\fR to remote IP address 1.2.3.4 to
598 bridge \fBbr0\fR:
599 .IP
600 .B "ovs\-vsctl add\-port br0 gre0 \-\- set Interface gre0 type=gre options:remote_ip=1.2.3.4"
601 .
602 .SS "Port Mirroring"
603 .PP
604 Mirror all packets received or sent on \fBeth0\fR or \fBeth1\fR onto
605 \fBeth2\fR, assuming that all of those ports exist on bridge \fBbr0\fR
606 (as a side-effect this causes any packets received on \fBeth2\fR to be
607 ignored):
608 .IP
609 .B "ovs\-vsctl \-\- set Bridge br0 mirrors=@m \(rs"
610 .IP
611 .B "\-\- \-\-id=@eth0 get Port eth0 \(rs"
612 .IP
613 .B "\-\- \-\-id=@eth1 get Port eth1 \(rs"
614 .IP
615 .B "\-\- \-\-id=@eth2 get Port eth2 \(rs"
616 .IP
617 .B "\-\- \-\-id=@m create Mirror name=mymirror select-dst-port=@eth0,@eth1 select-src-port=@eth0,@eth1 output-port=@eth2"
618 .PP
619 Remove the mirror created above from \fBbr0\fR, which also destroys
620 the Mirror record (since it is now unreferenced):
621 .IP
622 .B "ovs\-vsctl \-\- \-\-id=@rec get Mirror mymirror \(rs"
623 .IP
624 .B "\-\- remove Bridge br0 mirrors @rec"
625 .PP
626 The following simpler command also works:
627 .IP
628 .B "ovs\-vsctl clear Bridge br0 mirrors"
629 .SS "Quality of Service (QoS)"
630 .PP
631 Create a \fBlinux\-htb\fR QoS record that points to a few queues and
632 use it on \fBeth0\fR and \fBeth1\fR:
633 .IP
634 .B "ovs\-vsctl \-\- set Port eth0 qos=@newqos \(rs"
635 .IP
636 .B "\-\- set Port eth1 qos=@newqos \(rs"
637 .IP
638 .B "\-\- \-\-id=@newqos create QoS type=linux\-htb other\-config:max\-rate=1000000000 queues=0=@q0,1=@q1 \(rs"
639 .IP
640 .B "\-\- \-\-id=@q0 create Queue other\-config:min\-rate=100000000 other\-config:max\-rate=100000000 \(rs"
641 .IP
642 .B "\-\- \-\-id=@q1 create Queue other\-config:min\-rate=500000000"
643 .PP
644 Deconfigure the QoS record above from \fBeth1\fR only:
645 .IP
646 .B "ovs\-vsctl clear Port eth1 qos"
647 .PP
648 To deconfigure the QoS record from both \fBeth0\fR and \fBeth1\fR and
649 then delete the QoS record (which must be done explicitly because
650 unreferenced QoS records are not automatically destroyed):
651 .IP
652 .B "ovs\-vsctl \-\- destroy QoS eth0 \-\- clear Port eth0 qos \-\- clear Port eth1 qos"
653 .PP
654 (This command will leave two unreferenced Queue records in the
655 database. To delete them, use "\fBovs\-vsctl list Queue\fR" to find
656 their UUIDs, then "\fBovs\-vsctl destroy Queue \fIuuid1\fR
657 \fIuuid2\fR" to destroy each of them or use
658 "\fBovs\-vsctl -- --all destroy Queue\fR" to delete all records.)
659 .SS "Connectivity Monitoring"
660 .PP
661 Monitor connectivity to a remote maintenance point on eth0.
662 .IP
663 .B "ovs\-vsctl set Interface eth0 cfm_mpid=1"
664 .PP
665 Deconfigure connectivity monitoring from above:
666 .IP
667 .B "ovs\-vsctl clear Interface eth0 cfm_mpid"
668 .SS "NetFlow"
669 .PP
670 Configure bridge \fBbr0\fR to send NetFlow records to UDP port 5566 on
671 host 192.168.0.34, with an active timeout of 30 seconds:
672 .IP
673 .B "ovs\-vsctl \-\- set Bridge br0 netflow=@nf \(rs"
674 .IP
675 .B "\-\- \-\-id=@nf create NetFlow targets=\(rs\(dq192.168.0.34:5566\(rs\(dq active\-timeout=30"
676 .PP
677 Update the NetFlow configuration created by the previous command to
678 instead use an active timeout of 60 seconds:
679 .IP
680 .B "ovs\-vsctl set NetFlow br0 active_timeout=60"
681 .PP
682 Deconfigure the NetFlow settings from \fBbr0\fR, which also destroys
683 the NetFlow record (since it is now unreferenced):
684 .IP
685 .B "ovs\-vsctl clear Bridge br0 netflow"
686 .SS "sFlow"
687 .PP
688 Configure bridge \fBbr0\fR to send sFlow records to a collector on
689 10.0.0.1 at port 6343, using \fBeth1\fR\'s IP address as the source,
690 with specific sampling parameters:
691 .IP
692 .B "ovs\-vsctl \-\- \-\-id=@s create sFlow agent=eth1 target=\(rs\(dq10.0.0.1:6343\(rs\(dq header=128 sampling=64 polling=10 \(rs"
693 .IP
694 .B "\-\- set Bridge br0 sflow=@s"
695 .PP
696 Deconfigure sFlow from \fBbr0\fR, which also destroys the sFlow record
697 (since it is now unreferenced):
698 .IP
699 .B "ovs\-vsctl \-\- clear Bridge br0 sflow"
700 .SS "IPFIX"
701 .PP
702 Configure bridge \fBbr0\fR to send one IPFIX flow record per packet
703 sample to UDP port 4739 on host 192.168.0.34, with Observation Domain
704 ID 123 and Observation Point ID 456, a flow cache active timeout of 1
705 minute (60 seconds), maximum flow cache size of 13 flows, and flows
706 sampled on output port with tunnel info(sampling on input and output
707 port is enabled by default if not disabled) :
708 .IP
709 .B "ovs\-vsctl \-\- set Bridge br0 ipfix=@i \(rs"
710 .IP
711 .B "\-\- \-\-id=@i create IPFIX targets=\(rs\(dq192.168.0.34:4739\(rs\(dq obs_domain_id=123 obs_point_id=456 cache_active_timeout=60 cache_max_flows=13 \(rs"
712 .IP
713 .B "other_config:enable-input-sampling=false other_config:enable-tunnel-sampling=true"
714 .PP
715 Deconfigure the IPFIX settings from \fBbr0\fR, which also destroys the
716 IPFIX record (since it is now unreferenced):
717 .IP
718 .B "ovs\-vsctl clear Bridge br0 ipfix"
719 .SS "802.1D Spanning Tree Protocol (STP)"
720 .PP
721 Configure bridge \fBbr0\fR to participate in an 802.1D spanning tree:
722 .IP
723 .B "ovs\-vsctl set Bridge br0 stp_enable=true"
724 .PP
725 Set the bridge priority of \fBbr0\fR to 0x7800:
726 .IP
727 .B "ovs\-vsctl set Bridge br0 other_config:stp-priority=0x7800"
728 .PP
729 Set the path cost of port \fBeth0\fR to 10:
730 .IP
731 .B "ovs\-vsctl set Port eth0 other_config:stp-path-cost=10"
732 .PP
733 Deconfigure STP from above:
734 .IP
735 .B "ovs\-vsctl set Bridge br0 stp_enable=false"
736 .PP
737 .SS "Multicast Snooping"
738 .PP
739 Configure bridge \fBbr0\fR to enable multicast snooping:
740 .IP
741 .B "ovs\-vsctl set Bridge br0 mcast_snooping_enable=true"
742 .PP
743 Set the multicast snooping aging time \fBbr0\fR to 300 seconds:
744 .IP
745 .B "ovs\-vsctl set Bridge br0 other_config:mcast-snooping-aging-time=300"
746 .PP
747 Set the multicast snooping table size \fBbr0\fR to 2048 entries:
748 .IP
749 .B "ovs\-vsctl set Bridge br0 other_config:mcast-snooping-table-size=2048"
750 .PP
751 Disable flooding of unregistered multicast packets to all ports. When
752 set to \fBtrue\fR, the switch will send unregistered multicast packets only
753 to ports connected to multicast routers. When it is set to \fBfalse\fR, the
754 switch will send them to all ports. This command disables the flood of
755 unregistered packets on bridge \fBbr0\fR.
756 .IP
757 .B "ovs\-vsctl set Bridge br0 other_config:mcast-snooping-disable-flood-unregistered=true"
758 .PP
759 Enable flooding of multicast packets (except Reports) on a specific port.
760 .IP
761 .B "ovs\-vsctl set Port eth1 other_config:mcast-snooping-flood=true"
762 .PP
763 Enable flooding of Reports on a specific port.
764 .IP
765 .B "ovs\-vsctl set Port eth1 other_config:mcast-snooping-flood-reports=true"
766 .PP
767 Deconfigure multicasting snooping from above:
768 .IP
769 .B "ovs\-vsctl set Bridge br0 mcast_snooping_enable=false"
770 .PP
771 .SS "802.1D-2004 Rapid Spanning Tree Protocol (RSTP)"
772 .PP
773 Configure bridge \fBbr0\fR to participate in an 802.1D-2004 Rapid Spanning Tree:
774 .IP
775 .B "ovs\-vsctl set Bridge br0 rstp_enable=true"
776 .PP
777 Set the bridge address of \fBbr0\fR to 00:aa:aa:aa:aa:aa :
778 .IP
779 .B "ovs\-vsctl set Bridge br0 other_config:rstp-address=00:aa:aa:aa:aa:aa"
780 .PP
781 Set the bridge priority of \fBbr0\fR to 0x7000. The value must be specified in
782 decimal notation and should be a multiple of 4096 (if not, it is rounded down to
783 the nearest multiple of 4096). The default priority value is 0x800 (32768).
784 .IP
785 .B "ovs\-vsctl set Bridge br0 other_config:rstp-priority=28672"
786 .PP
787 Set the bridge ageing time of \fBbr0\fR to 1000 s. The ageing time value should be
788 between 10 s and 1000000 s. The default value is 300 s.
789 .IP
790 .B "ovs\-vsctl set Bridge br0 other_config:rstp-ageing-time=1000"
791 .PP
792 Set the bridge force protocol version of \fBbr0\fR to 0. The force protocol version
793 has two acceptable values: 0 (STP compatibility mode) and 2 (normal operation).
794 .IP
795 .B "ovs\-vsctl set Bridge br0 other_config:rstp-force-protocol-version=0"
796 .PP
797 Set the bridge max age of \fBbr0\fR to 10 s. The max age value should be between 6 s
798 and 40 s. The default value is 20 s.
799 .IP
800 .B "ovs\-vsctl set Bridge br0 other_config:rstp-max-age=10"
801 .PP
802 Set the bridge forward delay of \fBbr0\fR to 15 s.
803 This value should be between 4 s and 30 s. The default value is 15 s.
804 .IP
805 .B "ovs\-vsctl set Bridge br0 other_config:rstp-forward-delay=15"
806 .PP
807 Set the bridge transmit hold count of \fBbr0\fR to 7 s. This value should be between
808 1 s and 10 s. The default value is 6 s.
809 .IP
810 .B "ovs\-vsctl set Bridge br0 other_config:rstp-transmit-hold-count=7"
811 .PP
812 Enable RSTP on the Port \fBeth0\fR:
813 .IP
814 .B "ovs\-vsctl set Port eth0 other_config:rstp-enable=true"
815 .PP
816 Disable RSTP on the Port \fBeth0\fR:
817 .IP
818 .B "ovs\-vsctl set Port eth0 other_config:rstp-enable=false"
819 .PP
820 Set the priority of port \fBeth0\fR to 32. The value must be specified in
821 decimal notation and should be a multiple of 16 (if not, it is rounded down to the
822 nearest multiple of 16). The default priority value is 0x80 (128).
823 .IP
824 .B "ovs\-vsctl set Port eth0 other_config:rstp-port-priority=32"
825 .PP
826 Set the port number of port \fBeth0\fR to 3:
827 .IP
828 .B "ovs\-vsctl set Port eth0 other_config:rstp-port-num=3"
829 .PP
830 Set the path cost of port \fBeth0\fR to 150:
831 .IP
832 .B "ovs\-vsctl set Port eth0 other_config:rstp-path-cost=150"
833 .PP
834 Set the admin edge value of port \fBeth0\fR:
835 .IP
836 .B "ovs\-vsctl set Port eth0 other_config:rstp-port-admin-edge=true"
837 .PP
838 Set the auto edge value of port \fBeth0\fR:
839 .IP
840 .B "ovs\-vsctl set Port eth0 other_config:rstp-port-auto-edge=true"
841 .PP
842 Set the admin point to point MAC value of port \fBeth0\fR. Acceptable
843 values are \fB0\fR (not point-to-point), \fB1\fR (point-to-point, the
844 default value) or \fB2\fR (automatic detection). The auto-detection
845 mode is not currently implemented, and the value \fB2\fR has the same
846 effect of \fB0\fR (not point-to-point).
847 .IP
848 .B "ovs\-vsctl set Port eth0 other_config:rstp-admin-p2p-mac=1"
849 .PP
850 Set the admin port state value of port \fBeth0\fR. \fBtrue\fR is the
851 default value.
852 .IP
853 .B "ovs\-vsctl set Port eth0 other_config:rstp-admin-port-state=false"
854 .PP
855 Set the mcheck value of port \fBeth0\fR:
856 .IP
857 .B "ovs\-vsctl set Port eth0 other_config:rstp-port-mcheck=true"
858 .PP
859 Deconfigure RSTP from above:
860 .IP
861 .B "ovs\-vsctl set Bridge br0 rstp_enable=false"
862 .PP
863 .SS "OpenFlow Version"
864 .PP
865 Configure bridge \fBbr0\fR to support OpenFlow versions 1.0, 1.2, and
866 1.3:
867 .IP
868 .B "ovs\-vsctl set bridge br0 protocols=OpenFlow10,OpenFlow12,OpenFlow13"
869 .
870 .SS "Flow Table Configuration"
871 Make flow table 0 on bridge br0 refuse to accept more than 100 flows:
872 .IP
873 .B "ovs\-vsctl \-\- \-\-id=@ft create Flow_Table flow_limit=100 overflow_policy=refuse \-\- set Bridge br0 flow_tables=0=@ft"
874 .
875 .PP
876 Make flow table 0 on bridge br0 evict flows, with fairness based on
877 the matched ingress port, when there are more than 100:
878 .
879 .IP
880 .B "ovs\-vsctl \-\- \-\-id=@ft create Flow_Table flow_limit=100 overflow_policy=evict groups='\(dqNXM_OF_IN_PORT[]\(dq' \-\- set Bridge br0 flow_tables:0=@ft"
881 .SH "EXIT STATUS"
882 .IP "0"
883 Successful program execution.
884 .IP "1"
885 Usage, syntax, or configuration file error.
886 .IP "2"
887 The \fIbridge\fR argument to \fBbr\-exists\fR specified the name of a
888 bridge that does not exist.
889 .SH "SEE ALSO"
890 .
891 .BR ovsdb\-server (1),
892 .BR ovs\-vswitchd (8),
893 .BR ovs\-vswitchd.conf.db (5).