Statistiques
| Révision :

root / trunk / shell / templates / etc / xen / xend-config.sxp @ 23

Historique | Voir | Annoter | Télécharger (10,13 ko)

1
# -*- sh -*-
2

    
3
#
4
# Xend configuration file.
5
#
6

    
7
# This example configuration is appropriate for an installation that 
8
# utilizes a bridged network configuration. Access to xend via http
9
# is disabled.  
10

    
11
# Commented out entries show the default for that entry, unless otherwise
12
# specified.
13

    
14
#(logfile /var/log/xen/xend.log)
15
#(loglevel DEBUG)
16

    
17
# Uncomment the line below.  Set the value to flask, acm, or dummy to 
18
# select a security module.
19

    
20
#(xsm_module_name dummy)
21

    
22
# The Xen-API server configuration.
23
#
24
# This value configures the ports, interfaces, and access controls for the
25
# Xen-API server.  Each entry in the list starts with either unix, a port
26
# number, or an address:port pair.  If this is "unix", then a UDP socket is
27
# opened, and this entry applies to that.  If it is a port, then Xend will
28
# listen on all interfaces on that TCP port, and if it is an address:port
29
# pair, then Xend will listen on the specified port, using the interface with
30
# the specified address.
31
#
32
# The subsequent string configures the user-based access control for the
33
# listener in question.  This can be one of "none" or "pam", indicating either
34
# that users should be allowed access unconditionally, or that the local
35
# Pluggable Authentication Modules configuration should be used.  If this
36
# string is missing or empty, then "pam" is used.
37
#
38
# The final string gives the host-based access control for that listener. If
39
# this is missing or empty, then all connections are accepted.  Otherwise,
40
# this should be a space-separated sequence of regular expressions; any host
41
# with a fully-qualified domain name or an IP address that matches one of
42
# these regular expressions will be accepted.
43
#
44
# Example: listen on TCP port 9363 on all interfaces, accepting connections
45
# only from machines in example.com or localhost, and allow access through
46
# the unix domain socket unconditionally:
47
#
48
#   (xen-api-server ((9363 pam '^localhost$ example\\.com$')
49
#                    (unix none)))
50
#
51
# Optionally, the TCP Xen-API server can use SSL by specifying the private
52
# key and certificate location:
53
#
54
#                    (9367 pam '' xen-api.key xen-api.crt)
55
#
56
# Default:
57
#   (xen-api-server ((unix)))
58

    
59

    
60
#(xend-http-server no)
61
#(xend-unix-server no)
62
#(xend-tcp-xmlrpc-server no)
63
#(xend-unix-xmlrpc-server yes)
64
#(xend-relocation-server no)
65
#(xend-relocation-ssl-server no)
66
#(xend-udev-event-server no)
67

    
68
#(xend-unix-path /var/lib/xend/xend-socket)
69

    
70

    
71
# Address and port xend should use for the legacy TCP XMLRPC interface, 
72
# if xend-tcp-xmlrpc-server is set.
73
#(xend-tcp-xmlrpc-server-address 'localhost')
74
#(xend-tcp-xmlrpc-server-port 8006)
75

    
76
# SSL key and certificate to use for the legacy TCP XMLRPC interface.
77
# Setting these will mean that this port serves only SSL connections as
78
# opposed to plaintext ones.
79
#(xend-tcp-xmlrpc-server-ssl-key-file  xmlrpc.key)
80
#(xend-tcp-xmlrpc-server-ssl-cert-file xmlrpc.crt)
81

    
82

    
83
# Port xend should use for the HTTP interface, if xend-http-server is set.
84
#(xend-port            8000)
85

    
86
# Port xend should use for the relocation interface, if xend-relocation-server
87
# is set.
88
#(xend-relocation-port 8002)
89

    
90
# Port xend should use for the ssl relocation interface, if
91
# xend-relocation-ssl-server is set.
92
#(xend-relocation-ssl-port 8003)
93

    
94
# SSL key and certificate to use for the ssl relocation interface, if
95
# xend-relocation-ssl-server is set.
96
#(xend-relocation-server-ssl-key-file   xmlrpc.key)
97
#(xend-relocation-server-ssl-cert-file  xmlrpc.crt)
98

    
99
# Whether to use ssl as default when relocating.
100
#(xend-relocation-ssl no)
101

    
102
# Address xend should listen on for HTTP connections, if xend-http-server is
103
# set.
104
# Specifying 'localhost' prevents remote connections.
105
# Specifying the empty string '' (the default) allows all connections.
106
#(xend-address '')
107
#(xend-address localhost)
108

    
109
# Address xend should listen on for relocation-socket connections, if
110
# xend-relocation-server is set.
111
# Meaning and default as for xend-address above.
112
#(xend-relocation-address '')
113

    
114
# The hosts allowed to talk to the relocation port.  If this is empty (the
115
# default), then all connections are allowed (assuming that the connection
116
# arrives on a port and interface on which we are listening; see
117
# xend-relocation-port and xend-relocation-address above).  Otherwise, this
118
# should be a space-separated sequence of regular expressions.  Any host with
119
# a fully-qualified domain name or an IP address that matches one of these
120
# regular expressions will be accepted.
121
#
122
# For example:
123
#  (xend-relocation-hosts-allow '^localhost$ ^.*\\.example\\.org$')
124
#
125
#(xend-relocation-hosts-allow '')
126

    
127
# The limit (in kilobytes) on the size of the console buffer
128
#(console-limit 1024)
129

    
130
##
131
# NOTE:
132
# Please read /usr/share/doc/xen-utils-common/README.Debian for Debian specific
133
# informations about the network setup.
134

    
135
##
136
# To bridge network traffic, like this:
137
#
138
# dom0: ----------------- bridge -> real eth0 -> the network
139
#                            |
140
# domU: fake eth0 -> vifN.0 -+
141
#
142
# use
143
#
144
# (network-script network-bridge)
145
# Use a modified script to create an internal bridge. ST-2012-03-06.
146
__CLUSTER_BRIDGE_STANZA__
147
# Your default ethernet device is used as the outgoing interface, by default. 
148
# To use a different one (e.g. eth1) use
149
#
150
# (network-script 'network-bridge netdev=eth1')
151
#
152
# The bridge is named xenbr0, by default.  To rename the bridge, use
153
#
154
# (network-script 'network-bridge bridge=<name>')
155
#
156
# It is possible to use the network-bridge script in more complicated
157
# scenarios, such as having two outgoing interfaces, with two bridges, and
158
# two fake interfaces per guest domain.  To do things like this, write
159
# yourself a wrapper script, and call network-bridge from it, as appropriate.
160
#
161

    
162
# The script used to control virtual interfaces.  This can be overridden on a
163
# per-vif basis when creating a domain or a configuring a new vif.  The
164
# vif-bridge script is designed for use with the network-bridge script, or
165
# similar configurations.
166
#
167
# If you have overridden the bridge name using
168
# (network-script 'network-bridge bridge=<name>') then you may wish to do the
169
# same here.  The bridge name can also be set when creating a domain or
170
# configuring a new vif, but a value specified here would act as a default.
171
#
172
# If you are using only one bridge, the vif-bridge script will discover that,
173
# so there is no need to specify it explicitly.
174
#
175
(vif-script vif-bridge)
176

    
177

    
178
## Use the following if network traffic is routed, as an alternative to the
179
# settings for bridged networking given above.
180
#(network-script network-route)
181
#(vif-script     vif-route)
182

    
183

    
184
## Use the following if network traffic is routed with NAT, as an alternative
185
# to the settings for bridged networking given above.
186
#(network-script network-nat)
187
#(vif-script     vif-nat)
188

    
189
# dom0-min-mem is the lowest permissible memory level (in MB) for dom0.
190
# This is a minimum both for auto-ballooning (as enabled by
191
# enable-dom0-ballooning below) and for xm mem-set when applied to dom0.
192
(dom0-min-mem 1024)
193

    
194
# Whether to enable auto-ballooning of dom0 to allow domUs to be created.
195
# If enable-dom0-ballooning = no, dom0 will never balloon out.
196
# ST 2012-03-06: ballooning is disabled since memory of dom0 is set
197
# in GRUB.
198
(enable-dom0-ballooning no)
199

    
200
# 32-bit paravirtual domains can only consume physical
201
# memory below 168GB. On systems with memory beyond that address,
202
# they'll be confined to memory below 128GB.
203
# Using total_available_memory (in GB) to specify the amount of memory reserved
204
# in the memory pool exclusively for 32-bit paravirtual domains.
205
# Additionally you should use dom0_mem = <-Value> as a parameter in 
206
# xen kernel to reserve the memory for 32-bit paravirtual domains, default 
207
# is "0" (0GB).  
208
(total_available_memory 0) 
209

    
210
# In SMP system, dom0 will use dom0-cpus # of CPUS
211
# If dom0-cpus = 0, dom0 will take all cpus available
212
__DOM0_CPUS_CLAUSE__
213

    
214
# Whether to enable core-dumps when domains crash.
215
#(enable-dump no)
216

    
217
# The tool used for initiating virtual TPM migration
218
#(external-migration-tool '')
219

    
220
# The interface for VNC servers to listen on. Defaults
221
# to 127.0.0.1  To restore old 'listen everywhere' behaviour
222
# set this to 0.0.0.0
223
#(vnc-listen '127.0.0.1')
224

    
225
# The default password for VNC console on HVM domain.
226
# Empty string is no authentication.
227
(vncpasswd '')
228

    
229
# The VNC server can be told to negotiate a TLS session
230
# to encryption all traffic, and provide x509 cert to
231
# clients enabling them to verify server identity. The
232
# GTK-VNC widget, virt-viewer, virt-manager and VeNCrypt
233
# all support the VNC extension for TLS used in QEMU. The
234
# TightVNC/RealVNC/UltraVNC clients do not.
235
#
236
# To enable this create x509 certificates / keys in the
237
# directory ${XEN_CONFIG_DIR} + vnc
238
#
239
#  ca-cert.pem       - The CA certificate
240
#  server-cert.pem   - The Server certificate signed by the CA
241
#  server-key.pem    - The server private key
242
#
243
# and then uncomment this next line
244
# (vnc-tls 1)
245

    
246
# The certificate dir can be pointed elsewhere..
247
#
248
# (vnc-x509-cert-dir vnc)
249

    
250
# The server can be told to request & validate an x509
251
# certificate from the client. Only clients with a cert
252
# signed by the trusted CA will be able to connect. This
253
# is more secure the password auth alone. Passwd auth can
254
# used at the same time if desired. To enable client cert
255
# checking uncomment this:
256
#
257
# (vnc-x509-verify 1)
258

    
259
# The default keymap to use for the VM's virtual keyboard
260
# when not specififed in VM's configuration
261
#(keymap 'en-us')
262

    
263
# Script to run when the label of a resource has changed.
264
#(resource-label-change-script '')
265

    
266
# Rotation count of qemu-dm log file.
267
#(qemu-dm-logrotate-count 10)
268

    
269
# Path where persistent domain configuration is stored.
270
# Default is /var/lib/xend/domains/
271
#(xend-domains-path /var/lib/xend/domains)
272

    
273
# Number of seconds xend will wait for device creation and
274
# destruction
275
#(device-create-timeout 100)
276
#(device-destroy-timeout 100)
277

    
278
# When assigning device to HVM guest, we use the strict check for HVM guest by
279
# default. (For PV guest, we use loose check automatically if necessary.)
280
# When we assign device to HVM guest, if we meet with the co-assignment
281
# issues or the ACS issue, we could try changing the option to 'no' -- however,
282
# we have to realize this may incur security issue and we can't make sure the
283
# device assignment could really work properly even after we do this.
284
#(pci-passthrough-strict-check yes)