]> git.proxmox.com Git - ovs.git/blob - utilities/ovs-vsctl.8.in
Fix renaming: libopenvswitch-2.14.so.0.0.90 -> libopenvswitch-2.15.so.0.0.0
[ovs.git] / utilities / ovs-vsctl.8.in
1 .\" -*- nroff -*-
2 .so lib/ovs.tmac
3 .TH ovs\-vsctl 8 "@VERSION@" "Open vSwitch" "Open vSwitch Manual"
4 .\" This program's name:
5 .ds PN ovs\-vsctl
6 .
7 .SH NAME
8 ovs\-vsctl \- utility for querying and configuring \fBovs\-vswitchd\fR
9 .
10 .SH SYNOPSIS
11 \fBovs\-vsctl\fR [\fIoptions\fR] \fB\-\-\fR [\fIoptions\fR] \fIcommand
12 \fR[\fIargs\fR] [\fB\-\-\fR [\fIoptions\fR] \fIcommand \fR[\fIargs\fR]]...
13 .
14 .SH DESCRIPTION
15 The \fBovs\-vsctl\fR program configures \fBovs\-vswitchd\fR(8) by
16 providing a high\-level interface to its configuration database.
17 See \fBovs\-vswitchd.conf.db\fR(5) for comprehensive documentation of
18 the database schema.
19 .PP
20 \fBovs\-vsctl\fR connects to an \fBovsdb\-server\fR process that
21 maintains an Open vSwitch configuration database. Using this
22 connection, it queries and possibly applies changes to the database,
23 depending on the supplied commands. Then, if it applied any changes,
24 by default it waits until \fBovs\-vswitchd\fR has finished
25 reconfiguring itself before it exits. (If you use \fBovs\-vsctl\fR
26 when \fBovs\-vswitchd\fR is not running, use \fB\-\-no\-wait\fR.)
27 .PP
28 \fBovs\-vsctl\fR can perform any number of commands in a single run,
29 implemented as a single atomic transaction against the database.
30 .PP
31 The \fBovs\-vsctl\fR command line begins with global options (see
32 \fBOPTIONS\fR below for details). The global options are followed by
33 one or more commands. Each command should begin with \fB\-\-\fR by
34 itself as a command-line argument, to separate it from the following
35 commands. (The \fB\-\-\fR before the first command is optional.) The
36 command
37 itself starts with command-specific options, if any, followed by the
38 command name and any arguments. See \fBEXAMPLES\fR below for syntax
39 examples.
40 .
41 .SS "Linux VLAN Bridging Compatibility"
42 The \fBovs\-vsctl\fR program supports the model of a bridge
43 implemented by Open vSwitch, in which a single bridge supports ports
44 on multiple VLANs. In this model, each port on a bridge is either a
45 trunk port that potentially passes packets tagged with 802.1Q headers
46 that designate VLANs or it is assigned a single implicit VLAN that is
47 never tagged with an 802.1Q header.
48 .PP
49 For compatibility with software designed for the Linux bridge,
50 \fBovs\-vsctl\fR also supports a model in which traffic associated
51 with a given 802.1Q VLAN is segregated into a separate bridge. A
52 special form of the \fBadd\-br\fR command (see below) creates a ``fake
53 bridge'' within an Open vSwitch bridge to simulate this behavior.
54 When such a ``fake bridge'' is active, \fBovs\-vsctl\fR will treat it
55 much like a bridge separate from its ``parent bridge,'' but the actual
56 implementation in Open vSwitch uses only a single bridge, with ports on
57 the fake bridge assigned the implicit VLAN of the fake bridge of which
58 they are members. (A fake bridge for VLAN 0 receives packets that
59 have no 802.1Q tag or a tag with VLAN 0.)
60 .
61 .SH OPTIONS
62 .
63 The following options affect the behavior \fBovs\-vsctl\fR as a whole.
64 Some individual commands also accept their own options, which are
65 given just before the command name. If the first command on the
66 command line has options, then those options must be separated from
67 the global options by \fB\-\-\fR.
68 .
69 .IP "\fB\-\-db=\fIserver\fR"
70 Sets \fIserver\fR as the database server that \fBovs\-vsctl\fR
71 contacts to query or modify configuration. \fIserver\fR may be an
72 OVSDB active or passive connection method, as described in
73 \fBovsdb\fR(7). The default is \fBunix:@RUNDIR@/db.sock\fR.
74 .IP "\fB\-\-no\-wait\fR"
75 Prevents \fBovs\-vsctl\fR from waiting for \fBovs\-vswitchd\fR to
76 reconfigure itself according to the modified database. This
77 option should be used if \fBovs\-vswitchd\fR is not running;
78 otherwise, \fBovs\-vsctl\fR will not exit until \fBovs\-vswitchd\fR
79 starts.
80 .IP
81 This option has no effect if the commands specified do not change the
82 database.
83 .
84 .IP "\fB\-\-no\-syslog\fR"
85 By default, \fBovs\-vsctl\fR logs its arguments and the details of any
86 changes that it makes to the system log. This option disables this
87 logging.
88 .IP
89 This option is equivalent to \fB\-\-verbose=vsctl:syslog:warn\fR.
90 .
91 .IP "\fB\-\-oneline\fR"
92 Modifies the output format so that the output for each command is printed
93 on a single line. New-line characters that would otherwise separate
94 lines are printed as \fB\\n\fR, and any instances of \fB\\\fR that
95 would otherwise appear in the output are doubled.
96 Prints a blank line for each command that has no output.
97 This option does not affect the formatting of output from the
98 \fBlist\fR or \fBfind\fR commands; see \fBTable Formatting Options\fR
99 below.
100 .
101 .IP "\fB\-\-dry\-run\fR"
102 Prevents \fBovs\-vsctl\fR from actually modifying the database.
103 .
104 .IP "\fB\-t \fIsecs\fR"
105 .IQ "\fB\-\-timeout=\fIsecs\fR"
106 By default, or with a \fIsecs\fR of \fB0\fR, \fBovs\-vsctl\fR waits
107 forever for a response from the database. This option limits runtime
108 to approximately \fIsecs\fR seconds. If the timeout expires,
109 \fBovs\-vsctl\fR will exit with a \fBSIGALRM\fR signal. (A timeout
110 would normally happen only if the database cannot be contacted, or if
111 the system is overloaded.)
112 .
113 .IP "\fB\-\-retry\fR"
114 Without this option, if \fBovs\-vsctl\fR connects outward to the
115 database server (the default) then \fBovs\-vsctl\fR will try to
116 connect once and exit with an error if the connection fails (which
117 usually means that \fBovsdb\-server\fR is not running).
118 .IP
119 With this option, or if \fB\-\-db\fR specifies that \fBovs\-vsctl\fR
120 should listen for an incoming connection from the database server,
121 then \fBovs\-vsctl\fR will wait for a connection to the database
122 forever.
123 .IP
124 Regardless of this setting, \fB\-\-timeout\fR always limits how long
125 \fBovs\-vsctl\fR will wait.
126 .
127 .SS "Table Formatting Options"
128 These options control the format of output from the \fBlist\fR and
129 \fBfind\fR commands.
130 .so lib/table.man
131 .
132 .SS "Public Key Infrastructure Options"
133 .so lib/ssl.man
134 .so lib/ssl-bootstrap.man
135 .so lib/ssl-peer-ca-cert.man
136 .so lib/vlog.man
137 .so lib/common.man
138 .
139 .SH COMMANDS
140 The commands implemented by \fBovs\-vsctl\fR are described in the
141 sections below.
142 .SS "Open vSwitch Commands"
143 These commands work with an Open vSwitch as a whole.
144 .
145 .IP "\fBinit\fR"
146 Initializes the Open vSwitch database, if it is empty. If the
147 database has already been initialized, this command has no effect.
148 .IP
149 Any successful \fBovs\-vsctl\fR command automatically initializes the
150 Open vSwitch database if it is empty. This command is provided to
151 initialize the database without executing any other command.
152 .
153 .IP "\fBshow\fR"
154 Prints a brief overview of the database contents.
155 .
156 .IP "\fBemer\-reset\fR"
157 Reset the configuration into a clean state. It deconfigures OpenFlow
158 controllers, OVSDB servers, and SSL, and deletes port mirroring,
159 \fBfail_mode\fR, NetFlow, sFlow, and IPFIX configuration. This
160 command also removes all \fBother\-config\fR keys from all database
161 records, except that \fBother\-config:hwaddr\fR is preserved if it is
162 present in a Bridge record. Other networking configuration is left
163 as-is.
164 .
165 .SS "Bridge Commands"
166 These commands examine and manipulate Open vSwitch bridges.
167 .
168 .IP "[\fB\-\-may\-exist\fR] \fBadd\-br \fIbridge\fR"
169 Creates a new bridge named \fIbridge\fR. Initially the bridge will
170 have no ports (other than \fIbridge\fR itself).
171 .IP
172 Without \fB\-\-may\-exist\fR, attempting to create a bridge that
173 exists is an error. With \fB\-\-may\-exist\fR, this command does
174 nothing if \fIbridge\fR already exists as a real bridge.
175 .
176 .IP "[\fB\-\-may\-exist\fR] \fBadd\-br \fIbridge parent vlan\fR"
177 Creates a ``fake bridge'' named \fIbridge\fR within the existing Open
178 vSwitch bridge \fIparent\fR, which must already exist and must not
179 itself be a fake bridge. The new fake bridge will be on 802.1Q VLAN
180 \fIvlan\fR, which must be an integer between 0 and 4095. The parent
181 bridge must not already have a fake bridge for \fIvlan\fR. Initially
182 \fIbridge\fR will have no ports (other than \fIbridge\fR itself).
183 .IP
184 Without \fB\-\-may\-exist\fR, attempting to create a bridge that
185 exists is an error. With \fB\-\-may\-exist\fR, this command does
186 nothing if \fIbridge\fR already exists as a VLAN bridge under
187 \fIparent\fR for \fIvlan\fR.
188 .
189 .IP "[\fB\-\-if\-exists\fR] \fBdel\-br \fIbridge\fR"
190 Deletes \fIbridge\fR and all of its ports. If \fIbridge\fR is a real
191 bridge, this command also deletes any fake bridges that were created
192 with \fIbridge\fR as parent, including all of their ports.
193 .IP
194 Without \fB\-\-if\-exists\fR, attempting to delete a bridge that does
195 not exist is an error. With \fB\-\-if\-exists\fR, attempting to
196 delete a bridge that does not exist has no effect.
197 .
198 .IP "[\fB\-\-real\fR|\fB\-\-fake\fR] \fBlist\-br\fR"
199 Lists all existing real and fake bridges on standard output, one per
200 line. With \fB\-\-real\fR or \fB\-\-fake\fR, only bridges of that type
201 are returned.
202 .
203 .IP "\fBbr\-exists \fIbridge\fR"
204 Tests whether \fIbridge\fR exists as a real or fake bridge. If so,
205 \fBovs\-vsctl\fR exits successfully with exit code 0. If not,
206 \fBovs\-vsctl\fR exits unsuccessfully with exit code 2.
207 .
208 .IP "\fBbr\-to\-vlan \fIbridge\fR"
209 If \fIbridge\fR is a fake bridge, prints the bridge's 802.1Q VLAN as a
210 decimal integer. If \fIbridge\fR is a real bridge, prints 0.
211 .
212 .IP "\fBbr\-to\-parent \fIbridge\fR"
213 If \fIbridge\fR is a fake bridge, prints the name of its parent
214 bridge. If \fIbridge\fR is a real bridge, print \fIbridge\fR.
215 .
216 .IP "\fBbr\-set\-external\-id \fIbridge key\fR [\fIvalue\fR]"
217 Sets or clears an ``external ID'' value on \fIbridge\fR. These values
218 are intended to identify entities external to Open vSwitch with which
219 \fIbridge\fR is associated, e.g. the bridge's identifier in a
220 virtualization management platform. The Open vSwitch database schema
221 specifies well-known \fIkey\fR values, but \fIkey\fR and \fIvalue\fR
222 are otherwise arbitrary strings.
223 .IP
224 If \fIvalue\fR is specified, then \fIkey\fR is set to \fIvalue\fR for
225 \fIbridge\fR, overwriting any previous value. If \fIvalue\fR is
226 omitted, then \fIkey\fR is removed from \fIbridge\fR's set of external
227 IDs (if it was present).
228 .IP
229 For real bridges, the effect of this command is similar to that of a
230 \fBset\fR or \fBremove\fR command in the \fBexternal\-ids\fR column of
231 the \fBBridge\fR table. For fake bridges, it actually modifies keys
232 with names prefixed by \fBfake\-bridge\-\fR in the \fBPort\fR table.
233 .
234 .IP "\fBbr\-get\-external\-id \fIbridge\fR [\fIkey\fR]"
235 Queries the external IDs on \fIbridge\fR. If \fIkey\fR is specified,
236 the output is the value for that \fIkey\fR or the empty string if
237 \fIkey\fR is unset. If \fIkey\fR is omitted, the output is
238 \fIkey\fB=\fIvalue\fR, one per line, for each key-value pair.
239 .IP
240 For real bridges, the effect of this command is similar to that of a
241 \fBget\fR command in the \fBexternal\-ids\fR column of the
242 \fBBridge\fR table. For fake bridges, it queries keys with names
243 prefixed by \fBfake\-bridge\-\fR in the \fBPort\fR table.
244 .
245 .SS "Port Commands"
246 .
247 These commands examine and manipulate Open vSwitch ports. These
248 commands treat a bonded port as a single entity.
249 .
250 .IP "\fBlist\-ports \fIbridge\fR"
251 Lists all of the ports within \fIbridge\fR on standard output, one per
252 line. The local port \fIbridge\fR is not included in the list.
253 .
254 .IP "[\fB\-\-may\-exist\fR] \fBadd\-port \fIbridge port \fR[\fIcolumn\fR[\fB:\fIkey\fR]\fR=\fIvalue\fR]\&...\fR"
255 Creates on \fIbridge\fR a new port named \fIport\fR from the network
256 device of the same name.
257 .IP
258 Optional arguments set values of column in the Port record created by
259 the command. For example, \fBtag=9\fR would make the port an access
260 port for VLAN 9. The syntax is the same as that for the \fBset\fR
261 command (see \fBDatabase Commands\fR below).
262 .IP
263 Without \fB\-\-may\-exist\fR, attempting to create a port that exists
264 is an error. With \fB\-\-may\-exist\fR, this command does nothing if
265 \fIport\fR already exists on \fIbridge\fR and is not a bonded port.
266 .
267 .IP "[\fB\-\-if\-exists\fR] \fBdel\-port \fR[\fIbridge\fR] \fIport\fR"
268 Deletes \fIport\fR. If \fIbridge\fR is omitted, \fIport\fR is removed
269 from whatever bridge contains it; if \fIbridge\fR is specified, it
270 must be the real or fake bridge that contains \fIport\fR.
271 .IP
272 Without \fB\-\-if\-exists\fR, attempting to delete a port that does
273 not exist is an error. With \fB\-\-if\-exists\fR, attempting to
274 delete a port that does not exist has no effect.
275 .
276 .IP "[\fB\-\-if\-exists\fR] \fB\-\-with\-iface del\-port \fR[\fIbridge\fR] \fIiface\fR"
277 Deletes the port named \fIiface\fR or that has an interface named
278 \fIiface\fR. If \fIbridge\fR is omitted, the port is removed from
279 whatever bridge contains it; if \fIbridge\fR is specified, it must be
280 the real or fake bridge that contains the port.
281 .IP
282 Without \fB\-\-if\-exists\fR, attempting to delete the port for an
283 interface that does not exist is an error. With \fB\-\-if\-exists\fR,
284 attempting to delete the port for an interface that does not exist has
285 no effect.
286 .
287 .IP "\fBport\-to\-br \fIport\fR"
288 Prints the name of the bridge that contains \fIport\fR on standard
289 output.
290 .
291 .SS "Bond Commands"
292 .
293 These commands work with ports that have more than one interface,
294 which Open vSwitch calls ``bonds.''
295 .
296 .IP "[\fB\-\-fake\-iface\fR] \fBadd\-bond \fIbridge port iface\fR\&... [\fIcolumn\fR[\fB:\fIkey\fR]\fR=\fIvalue\fR]\&...\fR"
297 Creates on \fIbridge\fR a new port named \fIport\fR that bonds
298 together the network devices given as each \fIiface\fR. At least two
299 interfaces must be named. If the interfaces are DPDK enabled then
300 the transaction will need to include operations to explicitly set the
301 interface type to 'dpdk'.
302 .IP
303 Optional arguments set values of column in the Port record created by
304 the command. The syntax is the same as that for the \fBset\fR command
305 (see \fBDatabase Commands\fR below).
306 .IP
307 With \fB\-\-fake\-iface\fR, a fake interface with the name \fIport\fR is
308 created. This should only be used for compatibility with legacy
309 software that requires it.
310 .IP
311 Without \fB\-\-may\-exist\fR, attempting to create a port that exists
312 is an error. With \fB\-\-may\-exist\fR, this command does nothing if
313 \fIport\fR already exists on \fIbridge\fR and bonds together exactly
314 the specified interfaces.
315 .
316 .IP "[\fB\-\-may\-exist\fR] \fBadd\-bond\-iface \fIbond iface\fR"
317 Adds \fIiface\fR as a new bond interface to the existing port
318 \fIbond\fR. If \fIbond\fR previously had only one port, this
319 transforms it into a bond.
320 .IP
321 Without \fB\-\-may\-exist\fR, attempting to add an \fIiface\fR that is
322 already part of \fIbond\fR is an error. With \fB\-\-may\-exist\fR,
323 this command does nothing if \fIiface\fR is already part of
324 \fIbond\fR. (It is still an error if \fIiface\fR is an interface of
325 some other port or bond.)
326 .
327 .IP "[\fB\-\-if\-exists\fR] \fBdel\-bond\-iface\fR [\fIbond\fR] \fIiface\fR"
328 Removes \fIiface\fR from its port. If \fIbond\fR is omitted,
329 \fIiface\fR is removed from whatever port contains it; if \fIbond\fR
330 is specified, it must be the port that contains \fIbond\fR.
331 .IP
332 If removing \fIiface\fR causes its port to have only a single
333 interface, then that port transforms from a bond into an ordinary
334 port. It is an error if \fIiface\fR is the only interface in its
335 port.
336 .IP
337 Without \fB\-\-if\-exists\fR, attempting to delete an interface that
338 does not exist is an error. With \fB\-\-if\-exists\fR, attempting to
339 delete an interface that does not exist has no effect.
340 .
341 .SS "Interface Commands"
342 .
343 These commands examine the interfaces attached to an Open vSwitch
344 bridge. These commands treat a bonded port as a collection of two or
345 more interfaces, rather than as a single port.
346 .
347 .IP "\fBlist\-ifaces \fIbridge\fR"
348 Lists all of the interfaces within \fIbridge\fR on standard output,
349 one per line. The local port \fIbridge\fR is not included in the
350 list.
351 .
352 .IP "\fBiface\-to\-br \fIiface\fR"
353 Prints the name of the bridge that contains \fIiface\fR on standard
354 output.
355 .
356 .SS "Conntrack Zone Commands"
357 These commands query and modify datapath CT zones and Timeout Policies.
358 .
359 .IP "[\fB\-\-may\-exist\fR] \fBadd\-zone\-tp \fIdatapath \fBzone=\fIzone_id \fIpolicies\fR"
360 Creates a conntrack zone timeout policy with \fIzone_id\fR in
361 \fIdatapath\fR. The \fIpolicies\fR consist of \fIkey\fB=\fIvalue\fR
362 pairs, separated by spaces. For example, \fBicmp_first=30
363 icmp_reply=60\fR specifies a 30-second timeout policy for the first ICMP
364 packet and a 60-second policy for ICMP reply packets. See the
365 \fBCT_Timeout_Policy\fR table in \fBovs-vswitchd.conf.db\fR(5) for the
366 supported keys.
367 .IP
368 Without \fB\-\-may\-exist\fR, attempting to add a \fIzone_id\fR that
369 already exists is an error. With \fB\-\-may\-exist\fR,
370 this command does nothing if \fIzone_id\fR already exists.
371 .
372 .IP "[\fB\-\-if\-exists\fR] \fBdel\-zone\-tp \fIdatapath \fBzone=\fIzone_id\fR"
373 Delete the timeout policy associated with \fIzone_id\fR from \fIdatapath\fR.
374 .IP
375 Without \fB\-\-if\-exists\fR, attempting to delete a zone that
376 does not exist is an error. With \fB\-\-if\-exists\fR, attempting to
377 delete a zone that does not exist has no effect.
378 .
379 .IP "\fBlist\-zone\-tp \fIdatapath\fR"
380 Prints the timeout policies of all zones in \fIdatapath\fR.
381 .
382 .SS "Datapath Capabilities Command"
383 The command query datapath capabilities.
384 .
385 .IP "\fBlist\-dp\-cap \fIdatapath\fR"
386 Prints the datapath's capabilities.
387 .
388 .SS "OpenFlow Controller Connectivity"
389 .
390 \fBovs\-vswitchd\fR can perform all configured bridging and switching
391 locally, or it can be configured to communicate with one or more
392 external OpenFlow controllers. The switch is typically configured to
393 connect to a primary controller that takes charge of the bridge's flow
394 table to implement a network policy. In addition, the switch can be
395 configured to listen to connections from service controllers. Service
396 controllers are typically used for occasional support and maintenance,
397 e.g. with \fBovs\-ofctl\fR.
398 .
399 .IP "\fBget\-controller\fR \fIbridge\fR"
400 Prints the configured controller target.
401 .
402 .IP "\fBdel\-controller\fR \fIbridge\fR"
403 Deletes the configured controller target.
404 .
405 .IP "\fBset\-controller\fR \fIbridge\fR \fItarget\fR\&..."
406 Sets the configured controller target or targets. Each \fItarget\fR may
407 use any of the following forms:
408 .
409 .RS
410 .so lib/vconn-active.man
411 .so lib/vconn-passive.man
412 .RE
413 .
414 .ST "Controller Failure Settings"
415 .PP
416 When a controller is configured, it is, ordinarily, responsible for
417 setting up all flows on the switch. Thus, if the connection to
418 the controller fails, no new network connections can be set up. If
419 the connection to the controller stays down long enough, no packets
420 can pass through the switch at all.
421 .PP
422 If the value is \fBstandalone\fR, or if neither of these settings
423 is set, \fBovs\-vswitchd\fR will take over
424 responsibility for setting up
425 flows when no message has been received from the controller for three
426 times the inactivity probe interval. In this mode,
427 \fBovs\-vswitchd\fR causes the datapath to act like an ordinary
428 MAC-learning switch. \fBovs\-vswitchd\fR will continue to retry connecting
429 to the controller in the background and, when the connection succeeds,
430 it discontinues its standalone behavior.
431 .PP
432 If this option is set to \fBsecure\fR, \fBovs\-vswitchd\fR will not
433 set up flows on its own when the controller connection fails.
434 .
435 .IP "\fBget\-fail\-mode\fR \fIbridge\fR"
436 Prints the configured failure mode.
437 .
438 .IP "\fBdel\-fail\-mode\fR \fIbridge\fR"
439 Deletes the configured failure mode.
440 .
441 .IP "\fBset\-fail\-mode\fR \fIbridge\fR \fBstandalone\fR|\fBsecure\fR"
442 Sets the configured failure mode.
443 .
444 .SS "Manager Connectivity"
445 .
446 These commands manipulate the \fBmanager_options\fR column in the
447 \fBOpen_vSwitch\fR table and rows in the \fBManagers\fR table. When
448 \fBovsdb\-server\fR is configured to use the \fBmanager_options\fR column for
449 OVSDB connections (as described in the startup scripts provided with
450 Open vSwitch; the corresponding \fBovsdb\-server\fR command option is
451 \fB--remote=db:Open_vSwitch,Open_vSwitch,manager_options\fR), this allows the
452 administrator to use \fBovs\-vsctl\fR to configure database connections.
453 .
454 .IP "\fBget\-manager\fR"
455 Prints the configured manager(s).
456 .
457 .IP "\fBdel\-manager\fR"
458 Deletes the configured manager(s).
459 .
460 .IP "\fBset\-manager\fR \fItarget\fR\&..."
461 Sets the configured manager target or targets.
462 Each \fItarget\fR may be an OVSDB active or passive connection method,
463 e.g. \fBpssl:6640\fR, as described in \fBovsdb\fR(7).
464 .
465 .SS "SSL Configuration"
466 When \fBovs\-vswitchd\fR is configured to connect over SSL for management or
467 controller connectivity, the following parameters are required:
468 .TP
469 \fIprivate-key\fR
470 Specifies a PEM file containing the private key used as the virtual
471 switch's identity for SSL connections to the controller.
472 .TP
473 \fIcertificate\fR
474 Specifies a PEM file containing a certificate, signed by the
475 certificate authority (CA) used by the controller and manager, that
476 certifies the virtual switch's private key, identifying a trustworthy
477 switch.
478 .TP
479 \fIca-cert\fR
480 Specifies a PEM file containing the CA certificate used to verify that
481 the virtual switch is connected to a trustworthy controller.
482 .PP
483 These files are read only once, at \fBovs\-vswitchd\fR startup time. If
484 their contents change, \fBovs\-vswitchd\fR must be killed and restarted.
485 .PP
486 These SSL settings apply to all SSL connections made by the virtual
487 switch.
488 .
489 .IP "\fBget\-ssl\fR"
490 Prints the SSL configuration.
491 .
492 .IP "\fBdel\-ssl\fR"
493 Deletes the current SSL configuration.
494 .
495 .IP "[\fB\-\-bootstrap\fR] \fBset\-ssl\fR \fIprivate-key\fR \fIcertificate\fR \fIca-cert\fR"
496 Sets the SSL configuration. The \fB\-\-bootstrap\fR option is described
497 below.
498 .
499 .ST "CA Certificate Bootstrap"
500 .PP
501 Ordinarily, all of the files named in the SSL configuration must exist
502 when \fBovs\-vswitchd\fR starts. However, if the \fIca-cert\fR file
503 does not exist and the \fB\-\-bootstrap\fR
504 option is given, then \fBovs\-vswitchd\fR will attempt to obtain the
505 CA certificate from the controller on its first SSL connection and
506 save it to the named PEM file. If it is successful, it will
507 immediately drop the connection and reconnect, and from then on all
508 SSL connections must be authenticated by a certificate signed by the
509 CA certificate thus obtained.
510 .PP
511 \fBThis option exposes the SSL connection to a man-in-the-middle
512 attack obtaining the initial CA certificate\fR, but it may be useful
513 for bootstrapping.
514 .PP
515 This option is only useful if the controller sends its CA certificate
516 as part of the SSL certificate chain. The SSL protocol does not
517 require the controller to send the CA certificate.
518 .
519 .SS "Auto-Attach Commands"
520 .
521 The IETF Auto-Attach SPBM draft standard describes a compact method of using
522 IEEE 802.1AB Link Layer Discovery Protocol (LLDP) together with a IEEE 802.1aq
523 Shortest Path Bridging (SPB) network to automatically attach network devices to
524 individual services in a SPB network. The intent here is to allow network
525 applications and devices using OVS to be able to easily take advantage of
526 features offered by industry standard SPB networks. A fundamental element of
527 the Auto-Attach feature is to map traditional VLANs onto SPB I_SIDs. These
528 commands manage the Auto-Attach I-SID/VLAN mappings.
529 .
530 .IP "\fBadd\-aa\-mapping \fIbridge i-sid vlan\fR"
531 Creates a new Auto-Attach mapping on \fIbridge\fR for \fIi-sid\fR
532 and \fIvlan\fR.
533 .
534 .IP "\fBdel\-aa\-mapping \fIbridge i-sid vlan\fR"
535 Deletes an Auto-Attach mapping on \fIbridge\fR for \fIi-sid\fR
536 and \fIvlan\fR.
537 .IP "\fBget\-aa\-mapping \fIbridge\fR"
538 Lists all of the Auto-Attach mappings within \fIbridge\fR on standard output.
539 .
540 .SS "Database Commands"
541 .
542 These commands query and modify the contents of \fBovsdb\fR tables.
543 They are a slight abstraction of the \fBovsdb\fR interface and as such
544 they operate at a lower level than other \fBovs\-vsctl\fR commands.
545 .PP
546 .ST "Identifying Tables, Records, and Columns"
547 .PP
548 Each of these commands has a \fItable\fR parameter to identify a table
549 within the database. Many of them also take a \fIrecord\fR parameter
550 that identifies a particular record within a table. The \fIrecord\fR
551 parameter may be the UUID for a record, and many tables offer
552 additional ways to identify records. Some commands also take
553 \fIcolumn\fR parameters that identify a particular field within the
554 records in a table.
555 .PP
556 For a list of tables and their columns, see \fBovs-vswitchd.conf.db\fR(5) or
557 see the table listing from the \fB--help\fR option.
558 .PP
559 Record names must be specified in full and with correct
560 capitalization, except that UUIDs may be abbreviated to their first 4
561 (or more) hex digits, as long as that is unique within the table.
562 Names of tables and columns are not case-sensitive, and \fB\-\fR and
563 \fB_\fR are treated interchangeably. Unique abbreviations of table
564 and column names are acceptable, e.g. \fBnet\fR or \fBn\fR is
565 sufficient to identify the \fBNetFlow\fR table.
566 .
567 .so lib/db-ctl-base.man
568 .SH "EXAMPLES"
569 Create a new bridge named br0 and add port eth0 to it:
570 .IP
571 .B "ovs\-vsctl add\-br br0"
572 .br
573 .B "ovs\-vsctl add\-port br0 eth0"
574 .PP
575 Alternatively, perform both operations in a single atomic transaction:
576 .IP
577 .B "ovs\-vsctl add\-br br0 \-\- add\-port br0 eth0"
578 .PP
579 Delete bridge \fBbr0\fR, reporting an error if it does not exist:
580 .IP
581 .B "ovs\-vsctl del\-br br0"
582 .PP
583 Delete bridge \fBbr0\fR if it exists:
584 .IP
585 .B "ovs\-vsctl \-\-if\-exists del\-br br0"
586 .PP
587 Set the \fBqos\fR column of the \fBPort\fR record for \fBeth0\fR to
588 point to a new \fBQoS\fR record, which in turn points with its queue 0
589 to a new \fBQueue\fR record:
590 .IP
591 .B "ovs\-vsctl \-\- set port eth0 qos=@newqos \-\- \-\-id=@newqos create qos type=linux\-htb other\-config:max\-rate=1000000 queues:0=@newqueue \-\- \-\-id=@newqueue create queue other\-config:min\-rate=1000000 other\-config:max\-rate=1000000"
592 .SH "CONFIGURATION COOKBOOK"
593 .SS "Port Configuration"
594 .PP
595 Add an ``internal port'' \fBvlan10\fR to bridge \fBbr0\fR as a VLAN
596 access port for VLAN 10, and configure it with an IP address:
597 .IP
598 .B "ovs\-vsctl add\-port br0 vlan10 tag=10 \-\- set Interface vlan10 type=internal"
599 .IP
600 .B "ip addr add 192.168.0.123/24 dev vlan10"
601 .
602 .PP
603 Add a GRE tunnel port \fBgre0\fR to remote IP address 1.2.3.4 to
604 bridge \fBbr0\fR:
605 .IP
606 .B "ovs\-vsctl add\-port br0 gre0 \-\- set Interface gre0 type=gre options:remote_ip=1.2.3.4"
607 .
608 .SS "Port Mirroring"
609 .PP
610 Mirror all packets received or sent on \fBeth0\fR or \fBeth1\fR onto
611 \fBeth2\fR, assuming that all of those ports exist on bridge \fBbr0\fR
612 (as a side-effect this causes any packets received on \fBeth2\fR to be
613 ignored):
614 .IP
615 .B "ovs\-vsctl \-\- set Bridge br0 mirrors=@m \(rs"
616 .IP
617 .B "\-\- \-\-id=@eth0 get Port eth0 \(rs"
618 .IP
619 .B "\-\- \-\-id=@eth1 get Port eth1 \(rs"
620 .IP
621 .B "\-\- \-\-id=@eth2 get Port eth2 \(rs"
622 .IP
623 .B "\-\- \-\-id=@m create Mirror name=mymirror select-dst-port=@eth0,@eth1 select-src-port=@eth0,@eth1 output-port=@eth2"
624 .PP
625 Remove the mirror created above from \fBbr0\fR, which also destroys
626 the Mirror record (since it is now unreferenced):
627 .IP
628 .B "ovs\-vsctl \-\- \-\-id=@rec get Mirror mymirror \(rs"
629 .IP
630 .B "\-\- remove Bridge br0 mirrors @rec"
631 .PP
632 The following simpler command also works:
633 .IP
634 .B "ovs\-vsctl clear Bridge br0 mirrors"
635 .SS "Quality of Service (QoS)"
636 .PP
637 Create a \fBlinux\-htb\fR QoS record that points to a few queues and
638 use it on \fBeth0\fR and \fBeth1\fR:
639 .IP
640 .B "ovs\-vsctl \-\- set Port eth0 qos=@newqos \(rs"
641 .IP
642 .B "\-\- set Port eth1 qos=@newqos \(rs"
643 .IP
644 .B "\-\- \-\-id=@newqos create QoS type=linux\-htb other\-config:max\-rate=1000000000 queues=0=@q0,1=@q1 \(rs"
645 .IP
646 .B "\-\- \-\-id=@q0 create Queue other\-config:min\-rate=100000000 other\-config:max\-rate=100000000 \(rs"
647 .IP
648 .B "\-\- \-\-id=@q1 create Queue other\-config:min\-rate=500000000"
649 .PP
650 Deconfigure the QoS record above from \fBeth1\fR only:
651 .IP
652 .B "ovs\-vsctl clear Port eth1 qos"
653 .PP
654 To deconfigure the QoS record from both \fBeth0\fR and \fBeth1\fR and
655 then delete the QoS record (which must be done explicitly because
656 unreferenced QoS records are not automatically destroyed):
657 .IP
658 .B "ovs\-vsctl \-\- destroy QoS eth0 \-\- clear Port eth0 qos \-\- clear Port eth1 qos"
659 .PP
660 (This command will leave two unreferenced Queue records in the
661 database. To delete them, use "\fBovs\-vsctl list Queue\fR" to find
662 their UUIDs, then "\fBovs\-vsctl destroy Queue \fIuuid1\fR
663 \fIuuid2\fR" to destroy each of them or use
664 "\fBovs\-vsctl -- --all destroy Queue\fR" to delete all records.)
665 .SS "Connectivity Monitoring"
666 .PP
667 Monitor connectivity to a remote maintenance point on eth0.
668 .IP
669 .B "ovs\-vsctl set Interface eth0 cfm_mpid=1"
670 .PP
671 Deconfigure connectivity monitoring from above:
672 .IP
673 .B "ovs\-vsctl clear Interface eth0 cfm_mpid"
674 .SS "NetFlow"
675 .PP
676 Configure bridge \fBbr0\fR to send NetFlow records to UDP port 5566 on
677 host 192.168.0.34, with an active timeout of 30 seconds:
678 .IP
679 .B "ovs\-vsctl \-\- set Bridge br0 netflow=@nf \(rs"
680 .IP
681 .B "\-\- \-\-id=@nf create NetFlow targets=\(rs\(dq192.168.0.34:5566\(rs\(dq active\-timeout=30"
682 .PP
683 Update the NetFlow configuration created by the previous command to
684 instead use an active timeout of 60 seconds:
685 .IP
686 .B "ovs\-vsctl set NetFlow br0 active_timeout=60"
687 .PP
688 Deconfigure the NetFlow settings from \fBbr0\fR, which also destroys
689 the NetFlow record (since it is now unreferenced):
690 .IP
691 .B "ovs\-vsctl clear Bridge br0 netflow"
692 .SS "sFlow"
693 .PP
694 Configure bridge \fBbr0\fR to send sFlow records to a collector on
695 10.0.0.1 at port 6343, using \fBeth1\fR\'s IP address as the source,
696 with specific sampling parameters:
697 .IP
698 .B "ovs\-vsctl \-\- \-\-id=@s create sFlow agent=eth1 target=\(rs\(dq10.0.0.1:6343\(rs\(dq header=128 sampling=64 polling=10 \(rs"
699 .IP
700 .B "\-\- set Bridge br0 sflow=@s"
701 .PP
702 Deconfigure sFlow from \fBbr0\fR, which also destroys the sFlow record
703 (since it is now unreferenced):
704 .IP
705 .B "ovs\-vsctl \-\- clear Bridge br0 sflow"
706 .SS "IPFIX"
707 .PP
708 Configure bridge \fBbr0\fR to send one IPFIX flow record per packet
709 sample to UDP port 4739 on host 192.168.0.34, with Observation Domain
710 ID 123 and Observation Point ID 456, a flow cache active timeout of 1
711 minute (60 seconds), maximum flow cache size of 13 flows, and flows
712 sampled on output port with tunnel info(sampling on input and output
713 port is enabled by default if not disabled) :
714 .IP
715 .B "ovs\-vsctl \-\- set Bridge br0 ipfix=@i \(rs"
716 .IP
717 .B "\-\- \-\-id=@i create IPFIX targets=\(rs\(dq192.168.0.34:4739\(rs\(dq obs_domain_id=123 obs_point_id=456 cache_active_timeout=60 cache_max_flows=13 \(rs"
718 .IP
719 .B "other_config:enable-input-sampling=false other_config:enable-tunnel-sampling=true"
720 .PP
721 Deconfigure the IPFIX settings from \fBbr0\fR, which also destroys the
722 IPFIX record (since it is now unreferenced):
723 .IP
724 .B "ovs\-vsctl clear Bridge br0 ipfix"
725 .SS "802.1D Spanning Tree Protocol (STP)"
726 .PP
727 Configure bridge \fBbr0\fR to participate in an 802.1D spanning tree:
728 .IP
729 .B "ovs\-vsctl set Bridge br0 stp_enable=true"
730 .PP
731 Set the bridge priority of \fBbr0\fR to 0x7800:
732 .IP
733 .B "ovs\-vsctl set Bridge br0 other_config:stp-priority=0x7800"
734 .PP
735 Set the path cost of port \fBeth0\fR to 10:
736 .IP
737 .B "ovs\-vsctl set Port eth0 other_config:stp-path-cost=10"
738 .PP
739 Deconfigure STP from above:
740 .IP
741 .B "ovs\-vsctl set Bridge br0 stp_enable=false"
742 .PP
743 .SS "Multicast Snooping"
744 .PP
745 Configure bridge \fBbr0\fR to enable multicast snooping:
746 .IP
747 .B "ovs\-vsctl set Bridge br0 mcast_snooping_enable=true"
748 .PP
749 Set the multicast snooping aging time \fBbr0\fR to 300 seconds:
750 .IP
751 .B "ovs\-vsctl set Bridge br0 other_config:mcast-snooping-aging-time=300"
752 .PP
753 Set the multicast snooping table size \fBbr0\fR to 2048 entries:
754 .IP
755 .B "ovs\-vsctl set Bridge br0 other_config:mcast-snooping-table-size=2048"
756 .PP
757 Disable flooding of unregistered multicast packets to all ports. When
758 set to \fBtrue\fR, the switch will send unregistered multicast packets only
759 to ports connected to multicast routers. When it is set to \fBfalse\fR, the
760 switch will send them to all ports. This command disables the flood of
761 unregistered packets on bridge \fBbr0\fR.
762 .IP
763 .B "ovs\-vsctl set Bridge br0 other_config:mcast-snooping-disable-flood-unregistered=true"
764 .PP
765 Enable flooding of multicast packets (except Reports) on a specific port.
766 .IP
767 .B "ovs\-vsctl set Port eth1 other_config:mcast-snooping-flood=true"
768 .PP
769 Enable flooding of Reports on a specific port.
770 .IP
771 .B "ovs\-vsctl set Port eth1 other_config:mcast-snooping-flood-reports=true"
772 .PP
773 Deconfigure multicasting snooping from above:
774 .IP
775 .B "ovs\-vsctl set Bridge br0 mcast_snooping_enable=false"
776 .PP
777 .SS "802.1D-2004 Rapid Spanning Tree Protocol (RSTP)"
778 .PP
779 Configure bridge \fBbr0\fR to participate in an 802.1D-2004 Rapid Spanning Tree:
780 .IP
781 .B "ovs\-vsctl set Bridge br0 rstp_enable=true"
782 .PP
783 Set the bridge address of \fBbr0\fR to 00:aa:aa:aa:aa:aa :
784 .IP
785 .B "ovs\-vsctl set Bridge br0 other_config:rstp-address=00:aa:aa:aa:aa:aa"
786 .PP
787 Set the bridge priority of \fBbr0\fR to 0x7000. The value must be specified in
788 decimal notation and should be a multiple of 4096 (if not, it is rounded down to
789 the nearest multiple of 4096). The default priority value is 0x800 (32768).
790 .IP
791 .B "ovs\-vsctl set Bridge br0 other_config:rstp-priority=28672"
792 .PP
793 Set the bridge ageing time of \fBbr0\fR to 1000 s. The ageing time value should be
794 between 10 s and 1000000 s. The default value is 300 s.
795 .IP
796 .B "ovs\-vsctl set Bridge br0 other_config:rstp-ageing-time=1000"
797 .PP
798 Set the bridge force protocol version of \fBbr0\fR to 0. The force protocol version
799 has two acceptable values: 0 (STP compatibility mode) and 2 (normal operation).
800 .IP
801 .B "ovs\-vsctl set Bridge br0 other_config:rstp-force-protocol-version=0"
802 .PP
803 Set the bridge max age of \fBbr0\fR to 10 s. The max age value should be between 6 s
804 and 40 s. The default value is 20 s.
805 .IP
806 .B "ovs\-vsctl set Bridge br0 other_config:rstp-max-age=10"
807 .PP
808 Set the bridge forward delay of \fBbr0\fR to 15 s.
809 This value should be between 4 s and 30 s. The default value is 15 s.
810 .IP
811 .B "ovs\-vsctl set Bridge br0 other_config:rstp-forward-delay=15"
812 .PP
813 Set the bridge transmit hold count of \fBbr0\fR to 7 s. This value should be between
814 1 s and 10 s. The default value is 6 s.
815 .IP
816 .B "ovs\-vsctl set Bridge br0 other_config:rstp-transmit-hold-count=7"
817 .PP
818 Enable RSTP on the Port \fBeth0\fR:
819 .IP
820 .B "ovs\-vsctl set Port eth0 other_config:rstp-enable=true"
821 .PP
822 Disable RSTP on the Port \fBeth0\fR:
823 .IP
824 .B "ovs\-vsctl set Port eth0 other_config:rstp-enable=false"
825 .PP
826 Set the priority of port \fBeth0\fR to 32. The value must be specified in
827 decimal notation and should be a multiple of 16 (if not, it is rounded down to the
828 nearest multiple of 16). The default priority value is 0x80 (128).
829 .IP
830 .B "ovs\-vsctl set Port eth0 other_config:rstp-port-priority=32"
831 .PP
832 Set the port number of port \fBeth0\fR to 3:
833 .IP
834 .B "ovs\-vsctl set Port eth0 other_config:rstp-port-num=3"
835 .PP
836 Set the path cost of port \fBeth0\fR to 150:
837 .IP
838 .B "ovs\-vsctl set Port eth0 other_config:rstp-path-cost=150"
839 .PP
840 Set the admin edge value of port \fBeth0\fR:
841 .IP
842 .B "ovs\-vsctl set Port eth0 other_config:rstp-port-admin-edge=true"
843 .PP
844 Set the auto edge value of port \fBeth0\fR:
845 .IP
846 .B "ovs\-vsctl set Port eth0 other_config:rstp-port-auto-edge=true"
847 .PP
848 Set the admin point to point MAC value of port \fBeth0\fR. Acceptable
849 values are \fB0\fR (not point-to-point), \fB1\fR (point-to-point, the
850 default value) or \fB2\fR (automatic detection). The auto-detection
851 mode is not currently implemented, and the value \fB2\fR has the same
852 effect of \fB0\fR (not point-to-point).
853 .IP
854 .B "ovs\-vsctl set Port eth0 other_config:rstp-admin-p2p-mac=1"
855 .PP
856 Set the admin port state value of port \fBeth0\fR. \fBtrue\fR is the
857 default value.
858 .IP
859 .B "ovs\-vsctl set Port eth0 other_config:rstp-admin-port-state=false"
860 .PP
861 Set the mcheck value of port \fBeth0\fR:
862 .IP
863 .B "ovs\-vsctl set Port eth0 other_config:rstp-port-mcheck=true"
864 .PP
865 Deconfigure RSTP from above:
866 .IP
867 .B "ovs\-vsctl set Bridge br0 rstp_enable=false"
868 .PP
869 .SS "OpenFlow Version"
870 .PP
871 Configure bridge \fBbr0\fR to support OpenFlow versions 1.0, 1.2, and
872 1.3:
873 .IP
874 .B "ovs\-vsctl set bridge br0 protocols=OpenFlow10,OpenFlow12,OpenFlow13"
875 .
876 .SS "Flow Table Configuration"
877 Make flow table 0 on bridge br0 refuse to accept more than 100 flows:
878 .IP
879 .B "ovs\-vsctl \-\- \-\-id=@ft create Flow_Table flow_limit=100 overflow_policy=refuse \-\- set Bridge br0 flow_tables=0=@ft"
880 .
881 .PP
882 Make flow table 0 on bridge br0 evict flows, with fairness based on
883 the matched ingress port, when there are more than 100:
884 .
885 .IP
886 .B "ovs\-vsctl \-\- \-\-id=@ft create Flow_Table flow_limit=100 overflow_policy=evict groups='\(dqNXM_OF_IN_PORT[]\(dq' \-\- set Bridge br0 flow_tables:0=@ft"
887 .SH "EXIT STATUS"
888 .IP "0"
889 Successful program execution.
890 .IP "1"
891 Usage, syntax, or configuration file error.
892 .IP "2"
893 The \fIbridge\fR argument to \fBbr\-exists\fR specified the name of a
894 bridge that does not exist.
895 .SH "SEE ALSO"
896 .
897 .BR ovsdb\-server (1),
898 .BR ovs\-vswitchd (8),
899 .BR ovs\-vswitchd.conf.db (5).