Provided by: ovn-central_2.9.8-0ubuntu0.18.04.5_amd64 bug

NAME

       ovn-sb - OVN_Southbound database schema

       This  database  holds  logical  and  physical configuration and state for the Open Virtual
       Network (OVN) system to support virtual network abstraction. For an introduction  to  OVN,
       please see ovn-architecture(7).

       The  OVN  Southbound  database  sits  at the center of the OVN architecture. It is the one
       component that speaks both southbound directly to all the hypervisors  and  gateways,  via
       ovn-controller/ovn-controller-vtep,  and  northbound  to  the Cloud Management System, via
       ovn-northd:

   Database Structure
       The OVN Southbound database  contains  classes  of  data  with  different  properties,  as
       described in the sections below.

     Physical network

       Physical  network  tables  contain information about the chassis nodes in the system. This
       contains all the information  necessary  to  wire  the  overlay,  such  as  IP  addresses,
       supported tunnel types, and security keys.

       The  amount  of  physical  network  data  is  small (O(n) in the number of chassis) and it
       changes infrequently, so it can be replicated to every chassis.

       The Chassis and Encap tables are the physical network tables.

     Logical Network

       Logical network tables contain  the  topology  of  logical  switches  and  routers,  ACLs,
       firewall  rules, and everything needed to describe how packets traverse a logical network,
       represented as logical datapath flows (see Logical Datapath Flows, below).

       Logical network data may be large (O(n) in the number of logical ports, ACL rules,  etc.).
       Thus,  to  improve  scaling,  each  chassis  should  receive  only data related to logical
       networks in which that chassis participates.

       The logical network data is ultimately controlled by the  cloud  management  system  (CMS)
       running  northbound  of  OVN. That CMS determines the entire OVN logical configuration and
       therefore the logical network data at any given time is a deterministic  function  of  the
       CMS’s  configuration, although that happens indirectly via the OVN_Northbound database and
       ovn-northd.

       Logical network data is likely to change more quickly than physical network data. This  is
       especially true in a container environment where containers are created and destroyed (and
       therefore added to and deleted from logical switches) quickly.

       The Logical_Flow, Multicast_Group, Address_Group, DHCP_Options,  DHCPv6_Options,  and  DNS
       tables contain logical network data.

     Logical-physical bindings

       These  tables  link  logical  and  physical components. They show the current placement of
       logical components (such as VMs and VIFs) onto chassis, and map logical  entities  to  the
       values that represent them in tunnel encapsulations.

       These  tables  change  frequently, at least every time a VM powers up or down or migrates,
       and especially quickly in a container environment. The amount of data per VM (or  VIF)  is
       small.

       Each  chassis  is authoritative about the VMs and VIFs that it hosts at any given time and
       can efficiently flood that state to a central  location,  so  the  consistency  needs  are
       minimal.

       The Port_Binding and Datapath_Binding tables contain binding data.

     MAC bindings

       The MAC_Binding table tracks the bindings from IP addresses to Ethernet addresses that are
       dynamically discovered using ARP (for IPv4) and neighbor discovery  (for  IPv6).  Usually,
       IP-to-MAC  bindings  for  virtual  machines are statically populated into the Port_Binding
       table, so MAC_Binding is primarily used to discover bindings on physical networks.

   Common Columns
       Some tables contain a special column named external_ids. This column has the same form and
       purpose each place that it appears, so we describe it here to save space later.

              external_ids: map of string-string pairs
                     Key-value  pairs  for  use  by  the software that manages the OVN Southbound
                     database rather than by ovn-controller/ovn-controller-vtep.  In  particular,
                     ovn-northd  can use key-value pairs in this column to relate entities in the
                     southbound database to higher-level entities (such as entities  in  the  OVN
                     Northbound  database).  Individual  key-value  pairs  in  this column may be
                     documented in some cases to aid in understanding  and  troubleshooting,  but
                     the reader should not mistake such documentation as comprehensive.

TABLE SUMMARY

       The  following  list  summarizes  the  purpose of each of the tables in the OVN_Southbound
       database.  Each table is described in more detail on a later page.

       Table     Purpose
       SB_Global Southbound configuration
       Chassis   Physical Network Hypervisor and Gateway Information
       Encap     Encapsulation Types
       Address_Set
                 Address Sets
       Logical_Flow
                 Logical Network Flows
       Multicast_Group
                 Logical Port Multicast Groups
       Datapath_Binding
                 Physical-Logical Datapath Bindings
       Port_Binding
                 Physical-Logical Port Bindings
       MAC_Binding
                 IP to MAC bindings
       DHCP_Options
                 DHCP Options supported by native OVN DHCP
       DHCPv6_Options
                 DHCPv6 Options supported by native OVN DHCPv6
       Connection
                 OVSDB client connections.
       SSL       SSL configuration.
       DNS       Native DNS resolution
       RBAC_Role RBAC_Role configuration.
       RBAC_Permission
                 RBAC_Permission configuration.
       Gateway_Chassis
                 Gateway_Chassis configuration.

SB_Global TABLE

       Southbound configuration for an OVN system. This table must have exactly one row.

   Summary:
       Status:
         nb_cfg                      integer
       Common Columns:
         external_ids                map of string-string pairs
       Connection Options:
         connections                 set of Connections
         ssl                         optional SSL

   Details:
     Status:

       This column allow a client to track the overall configuration state of the system.

       nb_cfg: integer
              Sequence number for  the  configuration.  When  a  CMS  or  ovn-nbctl  updates  the
              northbound  database, it increments the nb_cfg column in the NB_Global table in the
              northbound database. In turn, when ovn-northd updates the  southbound  database  to
              bring it up to date with these changes, it updates this column to the same value.

     Common Columns:

       external_ids: map of string-string pairs
              See External IDs at the beginning of this document.

     Connection Options:

       connections: set of Connections
              Database  clients  to  which  the Open vSwitch database server should connect or on
              which it should listen, along with options for  how  these  connections  should  be
              configured. See the Connection table for more information.

       ssl: optional SSL
              Global SSL configuration.

Chassis TABLE

       Each  row  in  this  table  represents a hypervisor or gateway (a chassis) in the physical
       network. Each chassis, via ovn-controller/ovn-controller-vtep, adds and  updates  its  own
       row, and keeps a copy of the remaining rows to determine how to reach other hypervisors.

       When  a chassis shuts down gracefully, it should remove its own row. (This is not critical
       because resources hosted on the chassis are equally unreachable regardless of whether  the
       row  is  present.) If a chassis shuts down permanently without removing its row, some kind
       of manual or automatic cleanup is eventually needed; we can devise a process for  that  as
       necessary.

   Summary:
       name                          string (must be unique within table)
       hostname                      string
       nb_cfg                        integer
       external_ids : ovn-bridge-mappings
                                     optional string
       external_ids : datapath-type  optional string
       external_ids : iface-types    optional string
       external_ids : ovn-cms-options
                                     optional string
       Common Columns:
         external_ids                map of string-string pairs
       Encapsulation Configuration:
         encaps                      set of 1 or more Encaps
       Gateway Configuration:
         vtep_logical_switches       set of strings

   Details:
       name: string (must be unique within table)
              OVN  does  not  prescribe  a  particular  format  for chassis names. ovn-controller
              populates this column using external_ids:system-id in the  Open_vSwitch  database’s
              Open_vSwitch  table.  ovn-controller-vtep  populates  this  column with name in the
              hardware_vtep database’s Physical_Switch table.

       hostname: string
              The hostname of the chassis,  if  applicable.  ovn-controller  will  populate  this
              column  with  the  hostname  of the host it is running on. ovn-controller-vtep will
              leave this column empty.

       nb_cfg: integer
              Sequence  number  for  the   configuration.   When   ovn-controller   updates   the
              configuration  of a chassis from the contents of the southbound database, it copies
              nb_cfg from the SB_Global table into this column.

       external_ids : ovn-bridge-mappings: optional string
              ovn-controller populates this key with the set  of  bridge  mappings  it  has  been
              configured  to  use.  Other  applications  should  treat this key as read-only. See
              ovn-controller(8) for more information.

       external_ids : datapath-type: optional string
              ovn-controller populates  this  key  with  the  datapath  type  configured  in  the
              datapath_type   column   of   the   Open_vSwitch  database’s  Bridge  table.  Other
              applications should treat this key as read-only.  See  ovn-controller(8)  for  more
              information.

       external_ids : iface-types: optional string
              ovn-controller  populates  this  key  with  the  interface  types configured in the
              iface_types  column  of  the  Open_vSwitch  database’s  Open_vSwitch  table.  Other
              applications  should  treat  this  key as read-only. See ovn-controller(8) for more
              information.

       external_ids : ovn-cms-options: optional string
              ovn-controller populates this key  with  the  set  of  options  configured  in  the
              external_ids:ovn-cms-options  column  of  the  Open_vSwitch database’s Open_vSwitch
              table. See ovn-controller(8) for more information.

     Common Columns:

       The overall purpose of these columns is described under Common Columns at the beginning of
       this document.

       external_ids: map of string-string pairs

     Encapsulation Configuration:

       OVN uses encapsulation to transmit logical dataplane packets between chassis.

       encaps: set of 1 or more Encaps
              Points  to  supported  encapsulation  configurations  to transmit logical dataplane
              packets to  this  chassis.  Each  entry  is  a  Encap  record  that  describes  the
              configuration.

     Gateway Configuration:

       A  gateway  is  a  chassis that forwards traffic between the OVN-managed part of a logical
       network and a physical VLAN, extending a tunnel-based  logical  network  into  a  physical
       network.  Gateways  are  typically  dedicated  nodes  that  do  not  host  VMs and will be
       controlled by ovn-controller-vtep.

       vtep_logical_switches: set of strings
              Stores all VTEP logical  switch  names  connected  by  this  gateway  chassis.  The
              Port_Binding  table entry with options:vtep-physical-switch equal Chassis name, and
              options:vtep-logical-switch  value  in  Chassis  vtep_logical_switches,   will   be
              associated with this Chassis.

Encap TABLE

       The  encaps  column  in the Chassis table refers to rows in this table to identify how OVN
       may  transmit  logical  dataplane   packets   to   this   chassis.   Each   chassis,   via
       ovn-controller(8)  or  ovn-controller-vtep(8),  adds  and updates its own rows and keeps a
       copy of the remaining rows to determine how to reach other chassis.

   Summary:
       type                          string, one of geneve, stt, or vxlan
       options                       map of string-string pairs
       ip                            string
       chassis_name                  string

   Details:
       type: string, one of geneve, stt, or vxlan
              The encapsulation to use to transmit packets to this chassis. Hypervisors must  use
              either geneve or stt. Gateways may use vxlan, geneve, or stt.

       options: map of string-string pairs
              Options for configuring the encapsulation. Currently, the only option that has been
              defined is csum.

              csum indicates that encapsulation checksums can be transmitted  and  received  with
              reasonable  performance.  It is a hint to senders transmitting data to this chassis
              that they should use checksums to protect OVN  metadata.  ovn-controller  populates
              this  key  with  the  value  defined  in  external_ids:ovn-encap-csum column of the
              Open_vSwitch database’s Open_vSwitch table. Other applications  should  treat  this
              key as read-only. See ovn-controller(8) for more information.

              In  terms  of performance, this actually significantly increases throughput in most
              common  cases  when  running  on  Linux  based  hosts   without   NICs   supporting
              encapsulation  hardware  offload  (around 60% for bulk traffic). The reason is that
              generally all NICs are capable  of  offloading  transmitted  and  received  TCP/UDP
              checksums  (viewed  as ordinary data packets and not as tunnels). The benefit comes
              on the receive side where the validated outer checksum can be used to  additionally
              validate  an  inner  checksum  (such  as  TCP), which in turn allows aggregation of
              packets to be more efficiently handled by the rest of the stack.

              Not all devices see such a benefit. The most notable exception is  hardware  VTEPs.
              These  devices are designed to not buffer entire packets in their switching engines
              and are therefore unable to efficiently compute or validate full packet  checksums.
              In  addition  certain  versions  of  the  Linux  kernel  are not able to fully take
              advantage of encapsulation NIC offloads in the  presence  of  checksums.  (This  is
              actually  a  pretty  narrow  corner  case  though - earlier versions of Linux don’t
              support encapsulation offloads at all and later versions support both offloads  and
              checksums well.)

              csum defaults to false for hardware VTEPs and true for all other cases.

       ip: string
              The IPv4 address of the encapsulation tunnel endpoint.

       chassis_name: string
              The name of the chassis that created this encap.

Address_Set TABLE

       See  the  documentation  for  the  Address_Set  table  in  the OVN_Northbound database for
       details.

   Summary:
       name                          string (must be unique within table)
       addresses                     set of strings

   Details:
       name: string (must be unique within table)

       addresses: set of strings

Logical_Flow TABLE

       Each row in this table represents one logical flow. ovn-northd populates this  table  with
       logical  flows  that  implement  the  L2 and L3 topologies specified in the OVN_Northbound
       database. Each hypervisor, via ovn-controller, translates the logical flows into  OpenFlow
       flows specific to its hypervisor and installs them into Open vSwitch.

       Logical  flows are expressed in an OVN-specific format, described here. A logical datapath
       flow is much like an OpenFlow flow, except that the flows are written in terms of  logical
       ports  and logical datapaths instead of physical ports and physical datapaths. Translation
       between logical and physical flows helps to ensure isolation  between  logical  datapaths.
       (The  logical flow abstraction also allows the OVN centralized components to do less work,
       since they do not have to separately compute and push out physical flows to each chassis.)

       The default action when no flow matches is to drop packets.

       Architectural Logical Life Cycle of a Packet

       This following description focuses on the  life  cycle  of  a  packet  through  a  logical
       datapath,  ignoring  physical details of the implementation. Please refer to Architectural
       Physical Life Cycle of a Packet in ovn-architecture(7) for the physical information.

       The description here is written as if OVN itself executes these steps,  but  in  fact  OVN
       (that  is,  ovn-controller) programs Open vSwitch, via OpenFlow and OVSDB, to execute them
       on its behalf.

       At a high level, OVN passes each packet through the  logical  datapath’s  logical  ingress
       pipeline,  which  may  output  the packet to one or more logical port or logical multicast
       groups. For each such logical output port, OVN passes the packet  through  the  datapath’s
       logical  egress  pipeline,  which  may  either  drop  the  packet  or  deliver  it  to the
       destination. Between the two pipelines, outputs to logical multicast groups  are  expanded
       into  logical  ports,  so  that the egress pipeline only processes a single logical output
       port at a time. Between the two pipelines is also where, when necessary, OVN  encapsulates
       a packet in a tunnel (or tunnels) to transmit to remote hypervisors.

       In  more  detail,  to  start,  OVN  searches the Logical_Flow table for a row with correct
       logical_datapath, a pipeline of ingress, a table_id of 0, and a match that is true for the
       packet. If none is found, OVN drops the packet. If OVN finds more than one, it chooses the
       match with the highest priority. Then OVN executes each of the actions  specified  in  the
       row’s actions column, in the order specified. Some actions, such as those to modify packet
       headers, require no further details. The next and output actions are special.

       The next action causes the above process to  be  repeated  recursively,  except  that  OVN
       searches for table_id of 1 instead of 0. Similarly, any next action in a row found in that
       table would cause a further search for  a  table_id  of  2,  and  so  on.  When  recursive
       processing completes, flow control returns to the action following next.

       The  output  action  also introduces recursion. Its effect depends on the current value of
       the outport field. Suppose outport designates a logical port. First, OVN  compares  inport
       to  outport;  if they are equal, it treats the output as a no-op by default. In the common
       case, where they are different, the packet enters the egress pipeline. This transition  to
       the  egress  pipeline  discards  register data, e.g. reg0 ... reg9 and connection tracking
       state, to achieve uniform behavior regardless of whether  the  egress  pipeline  is  on  a
       different hypervisor (because registers aren’t preserve across tunnel encapsulation).

       To  execute  the egress pipeline, OVN again searches the Logical_Flow table for a row with
       correct logical_datapath, a table_id of 0, a match that is true for the  packet,  but  now
       looking for a pipeline of egress. If no matching row is found, the output becomes a no-op.
       Otherwise, OVN executes the actions for the matching flow (which is chosen from  multiple,
       if necessary, as already described).

       In  the  egress  pipeline,  the  next action acts as already described, except that it, of
       course, searches for egress flows. The output action, however, now  directly  outputs  the
       packet  to  the  output  port (which is now fixed, because outport is read-only within the
       egress pipeline).

       The description earlier assumed that outport referred to a logical  port.  If  it  instead
       designates  a  logical multicast group, then the description above still applies, with the
       addition of fan-out from the logical multicast group to each logical port  in  the  group.
       For  each  member  of  the group, OVN executes the logical pipeline as described, with the
       logical output port replaced by the group member.

       Pipeline Stages

       ovn-northd populates the Logical_Flow table with the logical flows described in detail  in
       ovn-northd(8).

   Summary:
       logical_datapath              Datapath_Binding
       pipeline                      string, either egress or ingress
       table_id                      integer, in range 0 to 23
       priority                      integer, in range 0 to 65,535
       match                         string
       actions                       string
       external_ids : stage-name     optional string
       external_ids : stage-hint     optional string, containing an uuid
       external_ids : source         optional string
       Common Columns:
         external_ids                map of string-string pairs

   Details:
       logical_datapath: Datapath_Binding
              The logical datapath to which the logical flow belongs.

       pipeline: string, either egress or ingress
              The  primary  flows  used  for  deciding  on a packet’s destination are the ingress
              flows. The egress flows implement ACLs. See Logical Life Cycle of a Packet,  above,
              for details.

       table_id: integer, in range 0 to 23
              The stage in the logical pipeline, analogous to an OpenFlow table number.

       priority: integer, in range 0 to 65,535
              The  flow’s  priority.  Flows with numerically higher priority take precedence over
              those with lower. If two logical datapath flows with the same priority both  match,
              then the one actually applied to the packet is undefined.

       match: string
              A  matching  expression. OVN provides a superset of OpenFlow matching capabilities,
              using a syntax similar to Boolean expressions in a programming language.

              The most important components of match expression are comparisons  between  symbols
              and constants, e.g. ip4.dst == 192.168.0.1, ip.proto == 6, arp.op == 1, eth.type ==
              0x800. The logical  AND  operator  &&  and  logical  OR  operator  ||  can  combine
              comparisons into a larger expression.

              Matching  expressions also support parentheses for grouping, the logical NOT prefix
              operator !, and literals 0 and 1 to express ``false’’  or  ``true,’’  respectively.
              The latter is useful by itself as a catch-all expression that matches every packet.

              Match  expressions  also support a kind of function syntax. The following functions
              are supported:

              is_chassis_resident(lport)
                     Evaluates to true on a chassis on which logical port lport (a quoted string)
                     resides, and to false elsewhere. This function was introduced in OVN 2.7.

              Symbols

              Type. Symbols have integer or string type. Integer symbols have a width in bits.

              Kinds. There are three kinds of symbols:

              •      Fields.  A  field  symbol  represents a packet header or metadata field. For
                     example, a field named vlan.tci might represent the  VLAN  TCI  field  in  a
                     packet.

                     A  field  symbol  can  have  integer  or  string type. Integer fields can be
                     nominal or ordinal (see Level of Measurement, below).

              •      Subfields. A subfield represents a subset of bits from a larger  field.  For
                     example,  a field vlan.vid might be defined as an alias for vlan.tci[0..11].
                     Subfields are provided for  syntactic  convenience,  because  it  is  always
                     possible to instead refer to a subset of bits from a field directly.

                     Only  ordinal  fields  (see Level of Measurement, below) may have subfields.
                     Subfields are always ordinal.

              •      Predicates. A predicate is shorthand for a  Boolean  expression.  Predicates
                     may  be  used  much  like  1-bit  fields.  For  example, ip4 might expand to
                     eth.type ==  0x800.  Predicates  are  provided  for  syntactic  convenience,
                     because  it  is always possible to instead specify the underlying expression
                     directly.

                     A predicate whose expansion refers to any nominal field  or  predicate  (see
                     Level of Measurement, below) is nominal; other predicates have Boolean level
                     of measurement.

              Level of Measurement. See http://en.wikipedia.org/wiki/Level_of_measurement for the
              statistical concept on which this classification is based. There are three levels:

              •      Ordinal.  In  statistics,  ordinal  values  can  be  ordered on a scale. OVN
                     considers a field (or subfield) to be ordinal if its bits  can  be  examined
                     individually.  This  is  true  for the OpenFlow fields that OpenFlow or Open
                     vSwitch makes ``maskable.’’

                     Any use of a ordinal field may specify a single bit or a range of bits, e.g.
                     vlan.tci[13..15]   refers  to  the  PCP  field  within  the  VLAN  TCI,  and
                     eth.dst[40] refers to the multicast bit in the Ethernet destination address.

                     OVN supports all the usual arithmetic relations (==, !=, <, <=, >,  and  >=)
                     on  ordinal  fields  and their subfields, because OVN can implement these in
                     OpenFlow and Open vSwitch as collections of bitwise tests.

              •      Nominal. In statistics, nominal values cannot be  usefully  compared  except
                     for  equality. This is true of OpenFlow port numbers, Ethernet types, and IP
                     protocols  are  examples:  all  of  these  are  just  identifiers   assigned
                     arbitrarily  with  no  deeper meaning. In OpenFlow and Open vSwitch, bits in
                     these fields generally aren’t individually addressable.

                     OVN only supports arithmetic tests for equality on nominal  fields,  because
                     OpenFlow and Open vSwitch provide no way for a flow to efficiently implement
                     other comparisons on them. (A test for inequality can be sort of  built  out
                     of  two flows with different priorities, but OVN matching expressions always
                     generate flows with a single priority.)

                     String fields are always nominal.

              •      Boolean. A nominal field that has only two values,  0  and  1,  is  somewhat
                     exceptional,  since it is easy to support both equality and inequality tests
                     on such a field: either one can be implemented as a test for 0 or 1.

                     Only predicates (see above) have a Boolean level of measurement.

                     This isn’t a standard level of measurement.

              Prerequisites. Any symbol can have prerequisites, which  are  additional  condition
              implied by the use of the symbol. For example, For example, icmp4.type symbol might
              have prerequisite icmp4, which would cause an expression  icmp4.type  ==  0  to  be
              interpreted  as  icmp4.type == 0 && icmp4, which would in turn expand to icmp4.type
              == 0 && eth.type == 0x800 && ip4.proto == 1 (assuming icmp4 is a predicate  defined
              as suggested under Types above).

              Relational operators

              All  of  the  standard relational operators ==, !=, <, <=, >, and >= are supported.
              Nominal fields support only == and !=, and only in a positive sense  when  outer  !
              are  taken  into  account,  e.g.  given  string  field inport, inport == "eth0" and
              !(inport != "eth0") are acceptable, but not inport != "eth0".

              The implementation of == (or != when it is negated), is more efficient than that of
              the other relational operators.

              Constants

              Integer  constants  may  be expressed in decimal, hexadecimal prefixed by 0x, or as
              dotted-quad IPv4 addresses, IPv6 addresses in their  standard  forms,  or  Ethernet
              addresses  as  colon-separated  hex digits. A constant in any of these forms may be
              followed by a slash and a second constant (the mask) in the same form,  to  form  a
              masked  constant.  IPv4  and  IPv6  masks may be given as integers, to express CIDR
              prefixes.

              String constants have the same syntax as quoted strings in  JSON  (thus,  they  are
              Unicode strings).

              Some  operators  support  sets  of  constants  written inside curly braces { ... }.
              Commas between elements of a set, and after the last elements, are  optional.  With
              ==,  ``field  ==  { constant1, constant2, ... }’’ is syntactic sugar for ``field ==
              constant1 || field  ==  constant2  ||  ....  Similarly,  ``field  !=  {  constant1,
              constant2,  ...  }’’ is equivalent to ``field != constant1 && field != constant2 &&
              ...’’.

              You may refer to a set of IPv4, IPv6, or MAC addresses stored  in  the  Address_Set
              table by its name. An Address_Set with a name of set1 can be referred to as $set1.

              Miscellaneous

              Comparisons may name the symbol or the constant first, e.g. tcp.src == 80 and 80 ==
              tcp.src are both acceptable.

              Tests for a range may be expressed using a syntax like 1024 <=  tcp.src  <=  49151,
              which is equivalent to 1024 <= tcp.src && tcp.src <= 49151.

              For  a one-bit field or predicate, a mention of its name is equivalent to symobl ==
              1, e.g. vlan.present is equivalent to vlan.present == 1. The same is true for  one-
              bit  subfields, e.g. vlan.tci[12]. There is no technical limitation to implementing
              the same for ordinal fields of all widths,  but  the  implementation  is  expensive
              enough  that the syntax parser requires writing an explicit comparison against zero
              to make mistakes less likely, e.g. in tcp.src != 0  the  comparison  against  0  is
              required.

              Operator  precedence  is  as  shown  below,  from  highest to lowest. There are two
              exceptions where parentheses are required even though the table would suggest  that
              they  are  not:  &&  and  || require parentheses when used together, and ! requires
              parentheses when applied to a relational expression. Thus, in (eth.type == 0x800 ||
              eth.type  ==  0x86dd)  &&  ip.proto  ==  6  or  !(arp.op == 1), the parentheses are
              mandatory.

              •      ()==   !=   <   <=   >   >=!&&   ||

              Comments may be introduced by //, which extends  to  the  next  new-line.  Comments
              within a line may be bracketed by /* and */. Multiline comments are not supported.

              Symbols

              Most  of  the  symbols below have integer type. Only inport and outport have string
              type. inport names a logical port. Thus, its value is a logical_port name from  the
              Port_Binding  table.  outport  may  name  a  logical  port, as inport, or a logical
              multicast group defined in the Multicast_Group table. For both symbols, only  names
              within the flow’s logical datapath may be used.

              The  regX  symbols  are  32-bit  integers. The xxregX symbols are 128-bit integers,
              which overlay four of the 32-bit registers: xxreg0 overlays reg0 through reg3, with
              reg0  supplying  the most-significant bits of xxreg0 and reg3 the least-signficant.
              xxreg1 similarly overlays reg4 through reg7.

              •      reg0...reg9xxreg0 xxreg1inport outportflags.loopbacketh.src eth.dst eth.typevlan.tci vlan.vid vlan.pcp vlan.presentip.proto ip.dscp ip.ecn ip.ttl ip.fragip4.src ip4.dstip6.src ip6.dst ip6.labelarp.op arp.spa arp.tpa arp.sha arp.thatcp.src tcp.dst tcp.flagsudp.src udp.dstsctp.src sctp.dsticmp4.type icmp4.codeicmp6.type icmp6.codend.target nd.sll nd.tllct_mark ct_labelct_state,  which  has  several  Boolean  subfields.   The   ct_next   action
                     initializes the following subfields:

                     •      ct.trk:  Always  set  to  true by ct_next to indicate that connection
                            tracking has taken place. All other ct subfields  have  ct.trk  as  a
                            prerequisite.

                     •      ct.new: True for a new flow

                     •      ct.est: True for an established flow

                     •      ct.rel: True for a related flow

                     •      ct.rpl: True for a reply flow

                     •      ct.inv: True for a connection entry in a bad state

                     The ct_dnat, ct_snat, and ct_lb actions initialize the following subfields:

                     •      ct.dnat:  True  for  a  packet  whose destination IP address has been
                            changed.

                     •      ct.snat: True for a packet whose source IP address has been changed.

              The following predicates are supported:

              •      eth.bcast expands to eth.dst == ff:ff:ff:ff:ff:ffeth.mcast expands to eth.dst[40]vlan.present expands to vlan.tci[12]ip4 expands to eth.type == 0x800ip4.mcast expands to ip4.dst[28..31] == 0xeip6 expands to eth.type == 0x86ddip expands to ip4 || ip6icmp4 expands to ip4 && ip.proto == 1icmp6 expands to ip6 && ip.proto == 58icmp expands to icmp4 || icmp6ip.is_frag expands to ip.frag[0]ip.later_frag expands to ip.frag[1]ip.first_frag expands to ip.is_frag && !ip.later_fragarp expands to eth.type == 0x806nd expands to icmp6.type == {135, 136} && icmp6.code == 0 && ip.ttl == 255nd_ns expands to icmp6.type == 135 && icmp6.code == 0 && ip.ttl == 255nd_na expands to icmp6.type == 136 && icmp6.code == 0 && ip.ttl == 255nd_rs expands to icmp6.type == 133 && icmp6.code == 0 && ip.ttl == 255nd_ra expands to icmp6.type == 134 && icmp6.code == 0 && ip.ttl == 255tcp expands to ip.proto == 6udp expands to ip.proto == 17sctp expands to ip.proto == 132

       actions: string
              Logical datapath actions, to be executed when the logical flow represented by  this
              row is the highest-priority match.

              Actions share lexical syntax with the match column. An empty set of actions (or one
              that contains just white space or comments), or a set of actions that  consists  of
              just  drop;, causes the matched packets to be dropped. Otherwise, the column should
              contain a sequence of actions, each terminated by a semicolon.

              The following actions are defined:

              output;
                     In the ingress pipeline, this action  executes  the  egress  pipeline  as  a
                     subroutine.  If  outport  names a logical port, the egress pipeline executes
                     once; if it is a multicast group, the egress pipeline  runs  once  for  each
                     logical port in the group.

                     In  the  egress  pipeline,  this  action  performs  the actual output to the
                     outport logical port.  (In  the  egress  pipeline,  outport  never  names  a
                     multicast group.)

                     By  default, output to the input port is implicitly dropped, that is, output
                     becomes a no-op if outport == inport.  Occasionally  it  may  be  useful  to
                     override  this  behavior, e.g. to send an ARP reply to an ARP request; to do
                     so, use flags.loopback = 1 to allow the packet to  "hair-pin"  back  to  the
                     input port.

              next;
              next(table);
              next(pipeline=pipeline, table=table);
                   Executes  the  given  logical  datapath table in pipeline as a subroutine. The
                   default table is just after the current one. If pipeline is specified, it  may
                   be  ingress  or  egress;  the default pipeline is the one currently executing.
                   Actions in the ingress pipeline may not use  next  to  jump  into  the  egress
                   pipeline  (use  the output instead), but transitions in the opposite direction
                   are allowed.

              field = constant;
                   Sets data or metadata field field to constant value constant, e.g.  outport  =
                   "vif0";  to  set  the  logical  output port. To set only a subset of bits in a
                   field, specify a subfield for field or a masked constant,  e.g.  one  may  use
                   vlan.pcp[2] = 1; or vlan.pcp = 4/4; to set the most sigificant bit of the VLAN
                   PCP.

                   Assigning to a field with prerequisites implicitly adds those prerequisites to
                   match;  thus, for example, a flow that sets tcp.dst applies only to TCP flows,
                   regardless of whether its match mentions any TCP field.

                   Not all fields are modifiable (e.g. eth.type and ip.proto are read-only),  and
                   not all modifiable fields may be partially modified (e.g. ip.ttl must assigned
                   as a whole). The outport field is modifiable in the ingress pipeline  but  not
                   in the egress pipeline.

              field1 = field2;
                   Sets  data  or  metadata  field  field1 to the value of data or metadata field
                   field2, e.g. reg0 = ip4.src; copies ip4.src into reg0. To modify only a subset
                   of  a  field’s  bits,  specify  a  subfield for field1 or field2 or both, e.g.
                   vlan.pcp = reg0[0..2]; copies the least-significant bits of reg0 into the VLAN
                   PCP.

                   field1  and  field2  must be the same type, either both string or both integer
                   fields. If they are both integer fields, they must have the same width.

                   If field1 or field2 has prerequisites, they are added implicitly to match.  It
                   is  possible  to write an assignment with contradictory prerequisites, such as
                   ip4.src = ip6.src[0..31];, but the contradiction means  that  a  logical  flow
                   with such an assignment will never be matched.

              field1 <-> field2;
                   Similar  to  field1 = field2; except that the two values are exchanged instead
                   of copied. Both field1 and field2 must modifiable.

              ip.ttl--;
                   Decrements the IPv4 or IPv6 TTL. If this would make the TTL zero or  negative,
                   then  processing  of  the  packet halts; no further actions are processed. (To
                   properly handle such cases, a higher-priority flow should match on  ip.ttl  ==
                   {0, 1};.)

                   Prerequisite: ip

              ct_next;
                   Apply  connection  tracking to the flow, initializing ct_state for matching in
                   later tables. Automatically moves on to the next  table,  as  if  followed  by
                   next.

                   As  a  side  effect,  IP  fragments  will  be  reassembled  for matching. If a
                   fragmented packet is output,  then  it  will  be  sent  with  any  overlapping
                   fragments  squashed.  The  connection  tracking state is scoped by the logical
                   port when the action is used in a flow for a logical  switch,  so  overlapping
                   addresses  may  be used. To allow traffic related to the matched flow, execute
                   ct_commit . Connection tracking state is scoped by the logical  topology  when
                   the action is used in a flow for a router.

                   It  is  possible to have actions follow ct_next, but they will not have access
                   to any of its side-effects and is not generally useful.

              ct_commit;
              ct_commit(ct_mark=value[/mask]);
              ct_commit(ct_label=value[/mask]);
              ct_commit(ct_mark=value[/mask], ct_label=value[/mask]);
                   Commit the flow to the connection tracking  entry  associated  with  it  by  a
                   previous     call     to    ct_next.    When    ct_mark=value[/mask]    and/or
                   ct_label=value[/mask] are supplied, ct_mark and/or ct_label will be set to the
                   values  indicated by value[/mask] on the connection tracking entry. ct_mark is
                   a 32-bit field. ct_label is  a  128-bit  field.  The  value[/mask]  should  be
                   specified in hex string if more than 64bits are to be used.

                   Note  that  if  you  want  processing  to continue in the next table, you must
                   execute the next action after ct_commit. You may also  leave  out  next  which
                   will commit connection tracking state, and then drop the packet. This could be
                   useful for setting ct_mark on a connection tracking entry  before  dropping  a
                   packet, for example.

              ct_dnat;
              ct_dnat(IP);
                   ct_dnat sends the packet through the DNAT zone in connection tracking table to
                   unDNAT any packet that was DNATed in the opposite  direction.  The  packet  is
                   then  automatically sent to to the next tables as if followed by next; action.
                   The next tables will see the changes in the packet caused  by  the  connection
                   tracker.

                   ct_dnat(IP)  sends  the packet through the DNAT zone to change the destination
                   IP address of the packet to  the  one  provided  inside  the  parentheses  and
                   commits  the  connection.  The  packet  is then automatically sent to the next
                   tables as if followed by next; action. The next tables will see the changes in
                   the packet caused by the connection tracker.

              ct_snat;
              ct_snat(IP);
                   ct_snat  sends  the packet through the SNAT zone to unSNAT any packet that was
                   SNATed in the opposite direction. The packet is automatically sent to the next
                   tables  as  if  followed  by  the  next;  action. The next tables will see the
                   changes in the packet caused by the connection tracker.

                   ct_snat(IP) sends the packet through the SNAT zone to  change  the  source  IP
                   address  of  the packet to the one provided inside the parenthesis and commits
                   the connection. The packet is then automatically sent to the next tables as if
                   followed  by  next; action. The next tables will see the changes in the packet
                   caused by the connection tracker.

              ct_clear;
                   Clears connection tracking state.

              clone { action; ... };
                   Makes a copy of the packet being processed and executes  each  action  on  the
                   copy.  Actions  following  the  clone  action,  if any, apply to the original,
                   unmodified packet. This can be used as a  way  to  ``save  and  restore’’  the
                   packet around a set of actions that may modify it and should not persist.

              arp { action; ... };
                   Temporarily  replaces  the  IPv4  packet  being processed by an ARP packet and
                   executes each nested action on the  ARP  packet.  Actions  following  the  arp
                   action, if any, apply to the original, unmodified packet.

                   The  ARP  packet that this action operates on is initialized based on the IPv4
                   packet being processed, as follows. These are default values that  the  nested
                   actions will probably want to change:

                   •      eth.src unchanged

                   •      eth.dst unchanged

                   •      eth.type = 0x0806arp.op = 1 (ARP request)

                   •      arp.sha copied from eth.srcarp.spa copied from ip4.srcarp.tha = 00:00:00:00:00:00arp.tpa copied from ip4.dst

                   The ARP packet has the same VLAN header, if any, as the IP packet it replaces.

                   Prerequisite: ip4

              get_arp(P, A);
                   Parameters: logical port string field P, 32-bit IP address field A.

                   Looks up A in P’s mac binding table. If an entry is found, stores its Ethernet
                   address in eth.dst, otherwise stores 00:00:00:00:00:00 in eth.dst.

                   Example: get_arp(outport, ip4.dst);

              put_arp(P, A, E);
                   Parameters: logical port string field P, 32-bit IP  address  field  A,  48-bit
                   Ethernet address field E.

                   Adds  or  updates  the  entry for IP address A in logical port P’s mac binding
                   table, setting its Ethernet address to E.

                   Example: put_arp(inport, arp.spa, arp.sha);

              nd_ns { action; ... };
                   Temporarily replaces the IPv6 packet  being  processed  by  an  IPv6  Neighbor
                   Solicitation  packet  and  executes  each nested action on the IPv6 NS packet.
                   Actions following the nd_ns action, if any, apply to the original,  unmodified
                   packet.

                   The  IPv6  NS  packet that this action operates on is initialized based on the
                   IPv6 packet being processed, as follows. These are  default  values  that  the
                   nested actions will probably want to change:

                   •      eth.src unchanged

                   •      eth.dst set to IPv6 multicast MAC address

                   •      eth.type = 0x86ddip6.src copied from ip6.srcip6.dst set to IPv6 Solicited-Node multicast address

                   •      icmp6.type = 135 (Neighbor Solicitation)

                   •      nd.target copied from ip6.dst

                   The  IPv6  NS  packet  has  the  same VLAN header, if any, as the IP packet it
                   replaces.

                   Prerequisite: ip6

              nd_na { action; ... };
                   Temporarily replaces the IPv6 neighbor solicitation packet being processed  by
                   an  IPv6 neighbor advertisement (NA) packet and executes each nested action on
                   the NA packet. Actions following the  nd_na  action,  if  any,  apply  to  the
                   original, unmodified packet.

                   The  NA  packet  that this action operates on is initialized based on the IPv6
                   packet being processed, as follows. These are default values that  the  nested
                   actions will probably want to change:

                   •      eth.dst exchanged with eth.srceth.type = 0x86ddip6.dst copied from ip6.srcip6.src copied from nd.targeticmp6.type = 136 (Neighbor Advertisement)

                   •      nd.target unchanged

                   •      nd.sll = 00:00:00:00:00:00nd.tll copied from eth.dst

                   The  ND  packet  has  the  same  VLAN  header,  if  any, as the IPv6 packet it
                   replaces.

                   Prerequisite: nd_ns

              nd_na_router { action; ... };
                   Temporarily replaces the IPv6 neighbor solicitation packet being processed  by
                   an  IPv6  neighbor  advertisement  (NA)  packet, sets ND_NSO_ROUTER in the RSO
                   flags and executes each nested action on the NA packet. Actions following  the
                   nd_na_router action, if any, apply to the original, unmodified packet.

                   The  NA  packet  that this action operates on is initialized based on the IPv6
                   packet being processed, as follows. These are default values that  the  nested
                   actions will probably want to change:

                   •      eth.dst exchanged with eth.srceth.type = 0x86ddip6.dst copied from ip6.srcip6.src copied from nd.targeticmp6.type = 136 (Neighbor Advertisement)

                   •      nd.target unchanged

                   •      nd.sll = 00:00:00:00:00:00nd.tll copied from eth.dst

                   The  ND  packet  has  the  same  VLAN  header,  if  any, as the IPv6 packet it
                   replaces.

                   Prerequisite: nd_ns

              get_nd(P, A);
                   Parameters: logical port string field P, 128-bit IPv6 address field A.

                   Looks up A in P’s mac binding table. If an entry is found, stores its Ethernet
                   address in eth.dst, otherwise stores 00:00:00:00:00:00 in eth.dst.

                   Example: get_nd(outport, ip6.dst);

              put_nd(P, A, E);
                   Parameters:  logical port string field P, 128-bit IPv6 address field A, 48-bit
                   Ethernet address field E.

                   Adds or updates the entry for IPv6 address A in logical port P’s  mac  binding
                   table, setting its Ethernet address to E.

                   Example: put_nd(inport, nd.target, nd.tll);

              R = put_dhcp_opts(D1 = V1, D2 = V2, ..., Dn = Vn);
                   Parameters: one or more DHCP option/value pairs, which must include an offerip
                   option (with code 0).

                   Result: stored to a 1-bit subfield R.

                   Valid only in the ingress pipeline.

                   When this action  is  applied  to  a  DHCP  request  packet  (DHCPDISCOVER  or
                   DHCPREQUEST),  it  changes the packet into a DHCP reply (DHCPOFFER or DHCPACK,
                   respectively), replaces the options by  those  specified  as  parameters,  and
                   stores 1 in R.

                   When  this action is applied to a non-DHCP packet or a DHCP packet that is not
                   DHCPDISCOVER or DHCPREQUEST, it leaves the packet unchanged and stores 0 in R.

                   The contents of the DHCP_Option table control the DHCP option names and values
                   that this action supports.

                   Example:  reg0[0]  =  put_dhcp_opts(offerip  =  10.0.0.2,  router  = 10.0.0.1,
                   netmask = 255.255.255.0, dns_server = {8.8.8.8, 7.7.7.7});

              R = put_dhcpv6_opts(D1 = V1, D2 = V2, ..., Dn = Vn);
                   Parameters: one or more DHCPv6 option/value pairs.

                   Result: stored to a 1-bit subfield R.

                   Valid only in the ingress pipeline.

                   When this action is applied to a DHCPv6 request packet, it changes the  packet
                   into  a  DHCPv6  reply, replaces the options by those specified as parameters,
                   and stores 1 in R.

                   When this action is applied to  a  non-DHCPv6  packet  or  an  invalid  DHCPv6
                   request packet , it leaves the packet unchanged and stores 0 in R.

                   The  contents  of the DHCPv6_Options table control the DHCPv6 option names and
                   values that this action supports.

                   Example:  reg0[3]   =   put_dhcpv6_opts(ia_addr   =   aef0::4,   server_id   =
                   00:00:00:00:10:02, dns_server={ae70::1,ae70::2});

              set_queue(queue_number);
                   Parameters: Queue number queue_number, in the range 0 to 61440.

                   This  is  a  logical  equivalent  of the OpenFlow set_queue action. It affects
                   packets that egress a hypervisor through a  physical  interface.  For  nonzero
                   queue_number,  it  configures  packet queuing to match the settings configured
                   for the Port_Binding with options:qdisc_queue_id matching  queue_number.  When
                   queue_number is zero, it resets queuing to the default strategy.

                   Example: set_queue(10);

              ct_lb;
              ct_lb(ip[:port]...);
                   With  one  or  more  arguments,  ct_lb  commits  the  packet to the connection
                   tracking table and DNATs the packet’s destination IP address (and port) to the
                   IP  address  or  addresses  (and  optional  ports) specified in the string. If
                   multiple comma-separated IP addresses  are  specified,  each  is  given  equal
                   weight  for picking the DNAT address. Processing automatically moves on to the
                   next table, as if next; were specified, and later tables act on the packet  as
                   modified by the connection tracker. Connection tracking state is scoped by the
                   logical port when the action is used in  a  flow  for  a  logical  switch,  so
                   overlapping  addresses may be used. Connection tracking state is scoped by the
                   logical topology when the action is used in a flow for a router.

                   Without arguments, ct_lb sends the packet to the connection tracking table  to
                   NAT  the  packets. If the packet is part of an established connection that was
                   previously committed  to  the  connection  tracker  via  ct_lb(...),  it  will
                   automatically  get  DNATed  to the same IP address as the first packet in that
                   connection.

              R = dns_lookup();
                   Parameters: No parameters.

                   Result: stored to a 1-bit subfield R.

                   Valid only in the ingress pipeline.

                   When this action is applied to a valid DNS request  (a  UDP  packet  typically
                   directed  to  port 53), it attempts to resolve the query using the contents of
                   the DNS table. If it is successful, it changes the packet into a DNS reply and
                   stores  1  in  R. If the action is applied to a non-DNS packet, an invalid DNS
                   request packet, or a valid DNS request for which the DNS table does not supply
                   an answer, it leaves the packet unchanged and stores 0 in R.

                   Regardless of success, the action does not make any of the changes to the flow
                   that are necessary to direct the packet back to  the  requester.  The  logical
                   pipeline can implement this behavior with matches and actions in later tables.

                   Example: reg0[3] = dns_lookup();

                   Prerequisite: udp

              R = put_nd_ra_opts(D1 = V1, D2 = V2, ..., Dn = Vn);
                   Parameters:  The  following IPv6 ND Router Advertisement option/value pairs as
                   defined in RFC 4861.

                   •      addr_mode

                          Mandatory parameter which specifies the address mode flag to be set  in
                          the RA flag options field. The value of this option is a string and the
                          following values  can  be  defined  -  "slaac",  "dhcpv6_stateful"  and
                          "dhcpv6_stateless".

                   •      slla

                          Mandatory  parameter  which  specifies  the  link-layer  address of the
                          interface from which the Router Advertisement is sent.

                   •      mtu

                          Optional parameter which specifies the MTU.

                   •      prefix

                          Optional parameter which  should  be  specified  if  the  addr_mode  is
                          "slaac" or "dhcpv6_stateless". The value should be an IPv6 prefix which
                          will be used for stateless IPv6 address configuration. This option  can
                          be defined multiple times.

                   Result: stored to a 1-bit subfield R.

                   Valid only in the ingress pipeline.

                   When  this action is applied to an IPv6 Router solicitation request packet, it
                   changes the packet into an  IPv6  Router  Advertisement  reply  and  adds  the
                   options specified in the parameters, and stores 1 in R.

                   When  this  action  is  applied to a non-IPv6 Router solicitation packet or an
                   invalid IPv6 request packet , it leaves the packet unchanged and stores  0  in
                   R.

                   Example:    reg0[3]    =    put_nd_ra_opts(addr_mode   =   "slaac",   slla   =
                   00:00:00:00:10:02, prefix = aef0::/64, mtu = 1450);

              set_meter(rate);
              set_meter(rate, burst);
                   Parameters: rate limit int field rate in kbps, burst  rate  limits  int  field
                   burst in kbps.

                   This action sets the rate limit for a flow.

                   Example: set_meter(100, 1000);

              log(key=value, ...);
                     Causes  ovn-controller  to  log the packet on the chassis that processes it.
                     Packet logging currently uses the  same  logging  mechanism  as  other  Open
                     vSwitch  and  OVN  messages, which means that whether and where log messages
                     appear depends on the local logging configuration  that  can  be  configured
                     with ovs-appctl, etc.

                     The  log action takes zero or more of the following key-value pair arguments
                     that control what is logged:

                     name=string
                            An optional name for the ACL. The string is currently limited  to  64
                            bytes.

                     severity=level
                            Indicates  the  severity  of the event. The level is one of following
                            (from more to less serious): alert, warning, notice, info, or  debug.
                            If a severity is not provided, the default is info.

                     verdict=value
                            The  verdict  for packets matching the flow. The value must be one of
                            allow, deny, or reject.

              The following actions will likely be useful later, but they have not  been  thought
              out carefully.

              icmp4 { action; ... };
                     Temporarily replaces the IPv4 packet being processed by an ICMPv4 packet and
                     executes each nested action on the  ICMPv4  packet.  Actions  following  the
                     icmp4 action, if any, apply to the original, unmodified packet.

                     The  ICMPv4  packet that this action operates on is initialized based on the
                     IPv4 packet being processed, as follows. These are default values  that  the
                     nested  actions  will  probably want to change. Ethernet and IPv4 fields not
                     listed here are not changed:

                     •      ip.proto = 1 (ICMPv4)

                     •      ip.frag = 0 (not a fragment)

                     •      icmp4.type = 3 (destination unreachable)

                     •      icmp4.code = 1 (host unreachable)

                     Details TBD.

                     Prerequisite: ip4

              tcp_reset;
                     This action transforms the current TCP packet  according  to  the  following
                     pseudocode:

                     if (tcp.ack) {
                             tcp.seq = tcp.ack;
                     } else {
                             tcp.ack = tcp.seq + length(tcp.payload);
                             tcp.seq = 0;
                     }
                     tcp.flags = RST;

                     Then, the action drops all TCP options and payload data, and updates the TCP
                     checksum.

                     Details TBD.

                     Prerequisite: tcp

       external_ids : stage-name: optional string
              Human-readable name for this flow’s stage in the pipeline.

       external_ids : stage-hint: optional string, containing an uuid
              UUID of a OVN_Northbound record that  caused  this  logical  flow  to  be  created.
              Currently used only for attribute of logical flows to northbound ACL records.

       external_ids : source: optional string
              Source file and line number of the code that added this flow to the pipeline.

     Common Columns:

       The overall purpose of these columns is described under Common Columns at the beginning of
       this document.

       external_ids: map of string-string pairs

Multicast_Group TABLE

       The rows in this table define multicast groups of logical ports. Multicast groups allow  a
       single packet transmitted over a tunnel to a hypervisor to be delivered to multiple VMs on
       that hypervisor, which uses bandwidth more efficiently.

       Each row in this table defines  a  logical  multicast  group  numbered  tunnel_key  within
       datapath, whose logical ports are listed in the ports column.

   Summary:
       datapath                      Datapath_Binding
       tunnel_key                    integer, in range 32,768 to 65,535
       name                          string
       ports                         set of 1 or more weak reference to Port_Bindings

   Details:
       datapath: Datapath_Binding
              The logical datapath in which the multicast group resides.

       tunnel_key: integer, in range 32,768 to 65,535
              The  value  used to designate this logical egress port in tunnel encapsulations. An
              index forces the key to be unique within the datapath. The  unusual  range  ensures
              that multicast group IDs do not overlap with logical port IDs.

       name: string
              The  logical  multicast  group’s name. An index forces the name to be unique within
              the datapath. Logical flows in the ingress pipeline may output to the group just as
              for  individual  logical  ports,  by  assigning  the  group’s  name  to outport and
              executing an output action.

              Multicast group names and logical port names share  a  single  namespace  and  thus
              should  not  overlap (but the database schema cannot enforce this). To try to avoid
              conflicts, ovn-northd uses names that begin with _MC_.

       ports: set of 1 or more weak reference to Port_Bindings
              The logical ports included in the multicast group. All of these ports  must  be  in
              the datapath logical datapath (but the database schema cannot enforce this).

Datapath_Binding TABLE

       Each  row in this table represents a logical datapath, which implements a logical pipeline
       among the ports in the Port_Binding table associated with it. In practice, the pipeline in
       a given logical datapath implements either a logical switch or a logical router.

       The  main  purpose  of  a  row  in  this table is provide a physical binding for a logical
       datapath. A logical datapath does not have a physical location, so  its  physical  binding
       information  is  limited:  just  tunnel_key.  The  rest of the data in this table does not
       affect packet forwarding.

   Summary:
       tunnel_key                    integer, in range 1 to 16,777,215  (must  be  unique  within
                                     table)
       OVN_Northbound Relationship:
         external_ids : logical-switch
                                     optional string, containing an uuid
         external_ids : logical-router
                                     optional string, containing an uuid
         Naming:
            external_ids : name      optional string
            external_ids : name2     optional string
       Common Columns:
         external_ids                map of string-string pairs

   Details:
       tunnel_key: integer, in range 1 to 16,777,215 (must be unique within table)
              The  tunnel  key  value  to  which  the  logical  datapath  is  bound.  The  Tunnel
              Encapsulation  section  in  ovn-architecture(7)  describes  how  tunnel  keys   are
              constructed for each supported encapsulation.

     OVN_Northbound Relationship:

       Each  row  in  Datapath_Binding  is associated with some logical datapath. ovn-northd uses
       these keys  to  track  the  association  of  a  logical  datapath  with  concepts  in  the
       OVN_Northbound database.

       external_ids : logical-switch: optional string, containing an uuid
              For  a logical datapath that represents a logical switch, ovn-northd stores in this
              key the  UUID  of  the  corresponding  Logical_Switch  row  in  the  OVN_Northbound
              database.

       external_ids : logical-router: optional string, containing an uuid
              For  a logical datapath that represents a logical router, ovn-northd stores in this
              key the  UUID  of  the  corresponding  Logical_Router  row  in  the  OVN_Northbound
              database.

     Naming:

       ovn-northd  copies  these from the name fields in the OVN_Northbound database, either from
       name and external_ids:neutron:router_name in the Logical_Router table  or  from  name  and
       external_ids:neutron:network_name in the Logical_Switch table.

       external_ids : name: optional string
              A name for the logical datapath.

       external_ids : name2: optional string
              Another name for the logical datapath.

     Common Columns:

       The overall purpose of these columns is described under Common Columns at the beginning of
       this document.

       external_ids: map of string-string pairs

Port_Binding TABLE

       Each row in this table binds a logical port to a realization. For most logical ports, this
       means  binding  to  some physical location, for example by binding a logical port to a VIF
       that belongs to a VM running on a particular hypervisor.  Other  logical  ports,  such  as
       logical  patch  ports,  can  be  realized  without a specific physical location, but their
       bindings are still expressed through rows in this table.

       For every Logical_Switch_Port record in  OVN_Northbound  database,  ovn-northd  creates  a
       record  in  this table. ovn-northd populates and maintains every column except the chassis
       column, which it leaves empty in new records.

       ovn-controller/ovn-controller-vtep populates the  chassis  column  for  the  records  that
       identify   the   logical   ports   that  are  located  on  its  hypervisor/gateway,  which
       ovn-controller/ovn-controller-vtep in turn finds out by monitoring the local  hypervisor’s
       Open_vSwitch  database,  which  identifies  logical ports via the conventions described in
       IntegrationGuide.rst. (The exceptions are for Port_Binding records with type of l3gateway,
       whose  locations  are identified by ovn-northd via the options:l3gateway-chassis column in
       this table. ovn-controller is still responsible to populate the chassis column.)

       When a chassis shuts down gracefully, it should  clean  up  the  chassis  column  that  it
       previously  had  populated.  (This is not critical because resources hosted on the chassis
       are equally unreachable regardless of whether their rows are present.) To handle the  case
       where a VM is shut down abruptly on one chassis, then brought up again on a different one,
       ovn-controller/ovn-controller-vtep must overwrite the chassis column with new information.

   Summary:
       Core Features:
         datapath                    Datapath_Binding
         logical_port                string (must be unique within table)
         chassis                     optional weak reference to Chassis
         gateway_chassis             set of Gateway_Chassiss
         tunnel_key                  integer, in range 1 to 32,767
         mac                         set of strings
         type                        string
       Patch Options:
         options : peer              optional string
         nat_addresses               set of strings
       L3 Gateway Options:
         options : peer              optional string
         options : l3gateway-chassis
                                     optional string
         options : nat-addresses     optional string
         nat_addresses               set of strings
       Localnet Options:
         options : network_name      optional string
         tag                         optional integer, in range 1 to 4,095
       L2 Gateway Options:
         options : network_name      optional string
         options : l2gateway-chassis
                                     optional string
         tag                         optional integer, in range 1 to 4,095
       VTEP Options:
         options : vtep-physical-switch
                                     optional string
         options : vtep-logical-switch
                                     optional string
       VMI (or VIF) Options:
         options : requested-chassis
                                     optional string
         options : qos_max_rate      optional string
         options : qos_burst         optional string
         options : qdisc_queue_id    optional string, containing an integer, in range 1 to 61,440
       Chassis Redirect Options:
         options : distributed-port  optional string
         options : redirect-chassis  optional string
       Nested Containers:
         parent_port                 optional string
         tag                         optional integer, in range 1 to 4,095
       Naming:
         external_ids : name         optional string
       Common Columns:
         external_ids                map of string-string pairs

   Details:
     Core Features:

       datapath: Datapath_Binding
              The logical datapath to which the logical port belongs.

       logical_port: string (must be unique within table)
              A   logical   port,   taken   from   name   in   the   OVN_Northbound    database’s
              Logical_Switch_Port  table.  OVN  does  not  prescribe  a particular format for the
              logical port ID.

       chassis: optional weak reference to Chassis
              The meaning of this column depends on the value of the type  column.  This  is  the
              meaning for each type

              (empty string)
                     The  physical  location  of  the  logical  port.  To successfully identify a
                     chassis, this column  must  be  a  Chassis  record.  This  is  populated  by
                     ovn-controller.

              vtep   The physical location of the hardware_vtep gateway. To successfully identify
                     a chassis, this column must be  a  Chassis  record.  This  is  populated  by
                     ovn-controller-vtep.

              localnet
                     Always  empty.  A  localnet  port  is  realized  on  every  chassis that has
                     connectivity to the corresponding physical network.

              localport
                     Always empty. A localport port is present on every chassis.

              l3gateway
                     The physical location of the L3 gateway. To successfully identify a chassis,
                     this  column  must  be a Chassis record. This is populated by ovn-controller
                     based on the value of the options:l3gateway-chassis column in this table.

              l2gateway
                     The physical location  of  this  L2  gateway.  To  successfully  identify  a
                     chassis,  this  column  must  be  a  Chassis  record.  This  is populated by
                     ovn-controller based on the value of the options:l2gateway-chassis column in
                     this table.

       gateway_chassis: set of Gateway_Chassiss
              A list of Gateway_Chassis.

              This  should  only  be  populated  for ports with type set to chassisredirect. This
              column defines the  list  of  chassis  used  as  gateways  where  traffic  will  be
              redirected through.

       tunnel_key: integer, in range 1 to 32,767
              A  number  that represents the logical port in the key (e.g. STT key or Geneve TLV)
              field carried within tunnel protocol packets.

              The tunnel ID must be unique within the scope of a logical datapath.

       mac: set of strings
              The Ethernet address or addresses used as a source address  on  the  logical  port,
              each  in the form xx:xx:xx:xx:xx:xx. The string unknown is also allowed to indicate
              that the logical port has an unknown set of (additional) source addresses.

              A VM interface would ordinarily have a single  Ethernet  address.  A  gateway  port
              might  initially  only  have  unknown,  and then add MAC addresses to the set as it
              learns new source addresses.

       type: string
              A type for this logical port. Logical ports can be used to  model  other  types  of
              connectivity into an OVN logical switch. The following types are defined:

              (empty string)
                     VM (or VIF) interface.

              patch  One  of  a  pair of logical ports that act as if connected by a patch cable.
                     Useful for connecting two logical  datapaths,  e.g.  to  connect  a  logical
                     router to a logical switch or to another logical router.

              l3gateway
                     One  of  a  pair  of logical ports that act as if connected by a patch cable
                     across multiple chassis. Useful for  connecting  a  logical  switch  with  a
                     Gateway router (which is only resident on a particular chassis).

              localnet
                     A  connection  to  a  locally  accessible  network  from each ovn-controller
                     instance. A logical switch can only have a single  localnet  port  attached.
                     This is used to model direct connectivity to an existing network.

              localport
                     A  connection  to  a local VIF. Traffic that arrives on a localport is never
                     forwarded over a tunnel to another chassis. These ports are present on every
                     chassis  and  have  the  same  address in all of them. This is used to model
                     connectivity to local services that run on every hypervisor.

              l2gateway
                     An L2 connection to a physical network. The  chassis  this  Port_Binding  is
                     bound   to   will   serve   as  an  L2  gateway  to  the  network  named  by
                     options:network_name.

              vtep   A port to a logical switch on a VTEP gateway chassis. In order to  get  this
                     port     correctly     recognized     by    the    OVN    controller,    the
                     options:vtep-physical-switch and options:vtep-logical-switch  must  also  be
                     defined.

              chassisredirect
                     A  logical  port  that represents a particular instance, bound to a specific
                     chassis, of an otherwise distributed parent port (e.g.  of  type  patch).  A
                     chassisredirect  port  should  never  be  used as an inport. When an ingress
                     pipeline sets the outport, it may set the value to a logical  port  of  type
                     chassisredirect.  This  will  cause  the packet to be directed to a specific
                     chassis to carry out the egress pipeline. At the  beginning  of  the  egress
                     pipeline, the outport will be reset to the value of the distributed port.

     Patch Options:

       These options apply to logical ports with type of patch.

       options : peer: optional string
              The  logical_port  in  the Port_Binding record for the other side of the patch. The
              named logical_port must specify this logical_port in its own peer option. That  is,
              the two patch logical ports must have reversed logical_port and peer values.

       nat_addresses: set of strings
              MAC  address followed by a list of SNAT and DNAT external IP addresses, followed by
              is_chassis_resident("lport"), where lport is the name of a logical port on the same
              chassis  where  the  corresponding  NAT  rules  are  applied.  This is used to send
              gratuitous ARPs for SNAT and DNAT external IP  addresses  via  localnet,  from  the
              chassis  where  lport resides. Example: 80:fa:5b:06:72:b7 158.36.44.22 158.36.44.24
              is_chassis_resident("foo1"). This would result in generation of gratuitous ARPs for
              IP  addresses 158.36.44.22 and 158.36.44.24 with a MAC address of 80:fa:5b:06:72:b7
              from the chassis where the logical port "foo1" resides.

     L3 Gateway Options:

       These options apply to logical ports with type of l3gateway.

       options : peer: optional string
              The logical_port in the Port_Binding record for the other side of  the  ’l3gateway’
              port. The named logical_port must specify this logical_port in its own peer option.
              That is, the two ’l3gateway’ logical ports must have reversed logical_port and peer
              values.

       options : l3gateway-chassis: optional string
              The chassis in which the port resides.

       options : nat-addresses: optional string
              MAC  address  of the l3gateway port followed by a list of SNAT and DNAT external IP
              addresses. This is used to send gratuitous ARPs  for  SNAT  and  DNAT  external  IP
              addresses  via localnet. Example: 80:fa:5b:06:72:b7 158.36.44.22 158.36.44.24. This
              would result in generation of gratuitous ARPs for  IP  addresses  158.36.44.22  and
              158.36.44.24  with a MAC address of 80:fa:5b:06:72:b7. This is used in OVS versions
              prior to 2.8.

       nat_addresses: set of strings
              MAC address of the l3gateway port followed by a list of SNAT and DNAT  external  IP
              addresses.  This  is  used  to  send  gratuitous ARPs for SNAT and DNAT external IP
              addresses via localnet. Example: 80:fa:5b:06:72:b7 158.36.44.22 158.36.44.24.  This
              would  result  in  generation  of gratuitous ARPs for IP addresses 158.36.44.22 and
              158.36.44.24 with a MAC address of 80:fa:5b:06:72:b7. This is used in  OVS  version
              2.8 and later versions.

     Localnet Options:

       These options apply to logical ports with type of localnet.

       options : network_name: optional string
              Required.  ovn-controller  uses  the  configuration  entry  ovn-bridge-mappings  to
              determine how to connect to this network. ovn-bridge-mappings is a list of  network
              names mapped to a local OVS bridge that provides access to that network. An example
              of configuring ovn-bridge-mappings would be: .IP
              $ ovs-vsctl set open . external-ids:ovn-bridge-mappings=physnet1:br-eth0,physnet2:br-eth1

              When a logical switch has a localnet port attached, every chassis that may  have  a
              local  vif attached to that logical switch must have a bridge mapping configured to
              reach that localnet. Traffic that arrives on a localnet  port  is  never  forwarded
              over a tunnel to another chassis.

       tag: optional integer, in range 1 to 4,095
              If  set,  indicates  that  the port represents a connection to a specific VLAN on a
              locally accessible network. The VLAN ID is used to match incoming  traffic  and  is
              also added to outgoing traffic.

     L2 Gateway Options:

       These options apply to logical ports with type of l2gateway.

       options : network_name: optional string
              Required.  ovn-controller  uses  the  configuration  entry  ovn-bridge-mappings  to
              determine how to connect to this network. ovn-bridge-mappings is a list of  network
              names mapped to a local OVS bridge that provides access to that network. An example
              of configuring ovn-bridge-mappings would be: .IP
              $ ovs-vsctl set open . external-ids:ovn-bridge-mappings=physnet1:br-eth0,physnet2:br-eth1

              When a logical switch has a l2gateway port attached, the chassis that the l2gateway
              port  is  bound  to  must  have  a  bridge  mapping configured to reach the network
              identified by network_name.

       options : l2gateway-chassis: optional string
              Required. The chassis in which the port resides.

       tag: optional integer, in range 1 to 4,095
              If set, indicates that the gateway is connected to a specific VLAN on the  physical
              network.  The  VLAN  ID  is  used  to  match  incoming traffic and is also added to
              outgoing traffic.

     VTEP Options:

       These options apply to logical ports with type of vtep.

       options : vtep-physical-switch: optional string
              Required. The name of the VTEP gateway.

       options : vtep-logical-switch: optional string
              Required. A logical switch name connected by the VTEP gateway.  Must  be  set  when
              type is vtep.

     VMI (or VIF) Options:

       These options apply to logical ports with type having (empty string)

       options : requested-chassis: optional string
              If set, identifies a specific chassis (by name or hostname) that is allowed to bind
              this port. Using this option will prevent thrashing between two chassis  trying  to
              bind  the  same port during a live migration. It can also prevent similar thrashing
              due to a mis-configuration, if a port is accidentally  created  on  more  than  one
              chassis.

       options : qos_max_rate: optional string
              If set, indicates the maximum rate for data sent from this interface, in bit/s. The
              traffic will be shaped according to this limit.

       options : qos_burst: optional string
              If set, indicates the maximum burst size for data  sent  from  this  interface,  in
              bits.

       options : qdisc_queue_id: optional string, containing an integer, in range 1 to 61,440
              Indicates  the  queue  number  on the physical device. This is same as the queue_id
              used in OpenFlow in struct ofp_action_enqueue.

     Chassis Redirect Options:

       These options apply to logical ports with type of chassisredirect.

       options : distributed-port: optional string
              The name of the distributed port for which this chassisredirect port  represents  a
              particular instance.

       options : redirect-chassis: optional string
              The  chassis  that  this  chassisredirect  port  is  bound  to.  This is taken from
              options:redirect-chassis  in  the  OVN_Northbound  database’s   Logical_Router_Port
              table.

     Nested Containers:

       These columns support containers nested within a VM. Specifically, they are used when type
       is empty and logical_port identifies the interface of a container  spawned  inside  a  VM.
       They are empty for containers or VMs that run directly on a hypervisor.

       parent_port: optional string
              This is taken from parent_name in the OVN_Northbound database’s Logical_Switch_Port
              table.

       tag: optional integer, in range 1 to 4,095
              Identifies the VLAN tag in the network traffic  associated  with  that  container’s
              network interface.

              This  column  is  used  for a different purpose when type is localnet (see Localnet
              Options, above) or l2gateway (see L2 Gateway Options, above).

     Naming:

       external_ids : name: optional string
              For    a    logical    switch     port,     ovn-northd     copies     this     from
              external_ids:neutron:port_name    in   the   Logical_Switch_Port   table   in   the
              OVN_Northbound database, if it is a nonempty string.

              For a logical switch port, ovn-northd does not currently set this key.

     Common Columns:

       external_ids: map of string-string pairs
              See External IDs at the beginning of this document.

              The ovn-northd program populates this column with all entries into the external_ids
              column of the Logical_Switch_Port table of the OVN_Northbound database.

MAC_Binding TABLE

       Each  row in this table specifies a binding from an IP address to an Ethernet address that
       has been discovered through ARP (for IPv4) or neighbor discovery (for IPv6). This table is
       primarily  used  to discover bindings on physical networks, because IP-to-MAC bindings for
       virtual machines are usually populated statically into the Port_Binding table.

       This table expresses a functional relationship: MAC_Binding(logical_port, ip) = mac.

       In outline, the lifetime of a logical router’s MAC binding looks like this:

              1.
                On hypervisor 1, a logical router determines that a packet should be forwarded to
                IP  address  A  on  one  of  its  router ports. It uses its logical flow table to
                determine that A lacks a static IP-to-MAC  binding  and  the  get_arp  action  to
                determine that it lacks a dynamic IP-to-MAC binding.

              2.
                Using  an  OVN  logical  arp  action,  the  logical  router generates and sends a
                broadcast ARP request to the router port. It drops the IP packet.

              3.
                The logical switch attached to the router port delivers the ARP request to all of
                its  ports.  (It might make sense to deliver it only to ports that have no static
                IP-to-MAC bindings, but this could also be surprising behavior.)

              4.
                A host or VM on hypervisor 2 (which might be the same as hypervisor  1)  attached
                to  the  logical switch owns the IP address in question. It composes an ARP reply
                and unicasts it to the logical router port’s Ethernet address.

              5.
                The logical switch delivers the ARP reply to the logical router port.

              6.
                The logical router flow table executes a put_arp action. To record the  IP-to-MAC
                binding, ovn-controller adds a row to the MAC_Binding table.

              7.
                On  hypervisor  1, ovn-controller receives the updated MAC_Binding table from the
                OVN southbound database. The next packet destined to A through the logical router
                is sent directly to the bound Ethernet address.

   Summary:
       logical_port                  string
       ip                            string
       mac                           string
       datapath                      Datapath_Binding

   Details:
       logical_port: string
              The logical port on which the binding was discovered.

       ip: string
              The bound IP address.

       mac: string
              The Ethernet address to which the IP is bound.

       datapath: Datapath_Binding
              The logical datapath to which the logical port belongs.

DHCP_Options TABLE

       Each  row  in  this table stores the DHCP Options supported by native OVN DHCP. ovn-northd
       populates this table with the supported DHCP options. ovn-controller looks up  this  table
       to  get  the  DHCP codes of the DHCP options defined in the "put_dhcp_opts" action. Please
       refer to the RFC 2132 "https://tools.ietf.org/html/rfc2132" for the possible list of  DHCP
       options that can be defined here.

   Summary:
       name                          string
       code                          integer, in range 0 to 254
       type                          string,  one  of  bool,  ipv4,  static_routes,  str, uint16,
                                     uint32, or uint8

   Details:
       name: string
              Name of the DHCP option.

              Example. name="router"

       code: integer, in range 0 to 254
              DHCP option code for the DHCP option as defined in the RFC 2132.

              Example. code=3

       type: string, one of bool, ipv4, static_routes, str, uint16, uint32, or uint8
              Data type of the DHCP option code.

              value: bool
                     This indicates that the value of the DHCP option is a bool.

                     Example. "name=ip_forward_enable", "code=19", "type=bool".

                     put_dhcp_opts(..., ip_forward_enable = 1,...)

              value: uint8
                     This indicates that the value of the DHCP option  is  an  unsigned  int8  (8
                     bits)

                     Example. "name=default_ttl", "code=23", "type=uint8".

                     put_dhcp_opts(..., default_ttl = 50,...)

              value: uint16
                     This  indicates  that  the value of the DHCP option is an unsigned int16 (16
                     bits).

                     Example. "name=mtu", "code=26", "type=uint16".

                     put_dhcp_opts(..., mtu = 1450,...)

              value: uint32
                     This indicates that the value of the DHCP option is an  unsigned  int32  (32
                     bits).

                     Example. "name=lease_time", "code=51", "type=uint32".

                     put_dhcp_opts(..., lease_time = 86400,...)

              value: ipv4
                     This  indicates  that  the  value  of  the DHCP option is an IPv4 address or
                     addresses.

                     Example. "name=router", "code=3", "type=ipv4".

                     put_dhcp_opts(..., router = 10.0.0.1,...)

                     Example. "name=dns_server", "code=6", "type=ipv4".

                     put_dhcp_opts(..., dns_server = {8.8.8.8 7.7.7.7},...)

              value: static_routes
                     This indicates that the value of the DHCP option contains  a  pair  of  IPv4
                     route and next hop addresses.

                     Example. "name=classless_static_route", "code=121", "type=static_routes".

                     put_dhcp_opts(...,                  classless_static_route                 =
                     {30.0.0.0/24,10.0.0.4,0.0.0.0/0,10.0.0.1}...)

              value: str
                     This indicates that the value of the DHCP option is a string.

                     Example. "name=host_name", "code=12", "type=str".

DHCPv6_Options TABLE

       Each row in this  table  stores  the  DHCPv6  Options  supported  by  native  OVN  DHCPv6.
       ovn-northd populates this table with the supported DHCPv6 options. ovn-controller looks up
       this table to get the DHCPv6 codes of the DHCPv6 options defined  in  the  put_dhcpv6_opts
       action.  Please  refer to RFC 3315 and RFC 3646 for the list of DHCPv6 options that can be
       defined here.

   Summary:
       name                          string
       code                          integer, in range 0 to 254
       type                          string, one of ipv6, mac, or str

   Details:
       name: string
              Name of the DHCPv6 option.

              Example. name="ia_addr"

       code: integer, in range 0 to 254
              DHCPv6 option code for the DHCPv6 option as defined in the appropriate RFC.

              Example. code=3

       type: string, one of ipv6, mac, or str
              Data type of the DHCPv6 option code.

              value: ipv6
                     This indicates that the value of the DHCPv6 option is an IPv6 address(es).

                     Example. "name=ia_addr", "code=5", "type=ipv6".

                     put_dhcpv6_opts(..., ia_addr = ae70::4,...)

              value: str
                     This indicates that the value of the DHCPv6 option is a string.

                     Example. "name=domain_search", "code=24", "type=str".

                     put_dhcpv6_opts(..., domain_search = ovn.domain,...)

              value: mac
                     This indicates that the value of the DHCPv6 option is a MAC address.

                     Example. "name=server_id", "code=2", "type=mac".

                     put_dhcpv6_opts(..., server_id = 01:02:03:04L05:06,...)

Connection TABLE

       Configuration for a database connection to an Open vSwitch database (OVSDB) client.

       This table primarily configures the Open vSwitch database server (ovsdb-server).

       The Open vSwitch database server can initiate and maintain active  connections  to  remote
       clients. It can also listen for database connections.

   Summary:
       Core Features:
         target                      string (must be unique within table)
         read_only                   boolean
         role                        string
       Client Failure Detection and Handling:
         max_backoff                 optional integer, at least 1,000
         inactivity_probe            optional integer
       Status:
         is_connected                boolean
         status : last_error         optional string
         status : state              optional  string,  one of ACTIVE, BACKOFF, CONNECTING, IDLE,
                                     or VOID
         status : sec_since_connect  optional string, containing an integer, at least 0
         status : sec_since_disconnect
                                     optional string, containing an integer, at least 0
         status : locks_held         optional string
         status : locks_waiting      optional string
         status : locks_lost         optional string
         status : n_connections      optional string, containing an integer, at least 2
         status : bound_port         optional string, containing an integer
       Common Columns:
         external_ids                map of string-string pairs
         other_config                map of string-string pairs

   Details:
     Core Features:

       target: string (must be unique within table)
              Connection methods for clients.

              The following connection methods are currently supported:

              ssl:ip[:port]
                     The specified SSL port on the host at the given ip, which must be  expressed
                     as  an  IP  address  (not  a  DNS  name).  A valid SSL configuration must be
                     provided when this form is used, this configuration  can  be  specified  via
                     command-line options or the SSL table.

                     If port is not specified, it defaults to 6640.

                     SSL  support is an optional feature that is not always built as part of Open
                     vSwitch.

              tcp:ip[:port]
                     The specified TCP port on the host at the given ip, which must be  expressed
                     as  an IP address (not a DNS name), where ip can be IPv4 or IPv6 address. If
                     ip is an IPv6 address, wrap it in square brackets, e.g. tcp:[::1]:6640.

                     If port is not specified, it defaults to 6640.

              pssl:[port][:ip]
                     Listens for SSL connections on the specified TCP port. Specify 0 for port to
                     have the kernel automatically choose an available port. If ip, which must be
                     expressed as an IP address (not a DNS name), is specified, then  connections
                     are  restricted  to  the  specified  local  IP  address (either IPv4 or IPv6
                     address).  If  ip  is  an  IPv6  address,  wrap  in  square  brackets,  e.g.
                     pssl:6640:[::1].  If  ip  is not specified then it listens only on IPv4 (but
                     not IPv6) addresses. A valid SSL configuration must be  provided  when  this
                     form  is  used, this can be specified either via command-line options or the
                     SSL table.

                     If port is not specified, it defaults to 6640.

                     SSL support is an optional feature that is not always built as part of  Open
                     vSwitch.

              ptcp:[port][:ip]
                     Listens  for  connections  on  the specified TCP port. Specify 0 for port to
                     have the kernel automatically choose an available port. If ip, which must be
                     expressed  as an IP address (not a DNS name), is specified, then connections
                     are restricted to the specified  local  IP  address  (either  IPv4  or  IPv6
                     address).  If  ip  is  an  IPv6  address,  wrap  it in square brackets, e.g.
                     ptcp:6640:[::1]. If ip is  not  specified  then  it  listens  only  on  IPv4
                     addresses.

                     If port is not specified, it defaults to 6640.

              When  multiple  clients are configured, the target values must be unique. Duplicate
              target values yield unspecified results.

       read_only: boolean
              true to restrict these connections to read-only transactions, false to  allow  them
              to modify the database.

       role: string
              String containing role name for this connection entry.

     Client Failure Detection and Handling:

       max_backoff: optional integer, at least 1,000
              Maximum  number  of  milliseconds  to  wait between connection attempts. Default is
              implementation-specific.

       inactivity_probe: optional integer
              Maximum number of milliseconds of idle time on  connection  to  the  client  before
              sending  an inactivity probe message. If Open vSwitch does not communicate with the
              client for the specified number of seconds, it will send a probe. If a response  is
              not  received  for  the  same  additional  amount of time, Open vSwitch assumes the
              connection has been broken and attempts to reconnect.  Default  is  implementation-
              specific. A value of 0 disables inactivity probes.

     Status:

       Key-value  pair  of  is_connected  is  always updated. Other key-value pairs in the status
       columns may be updated depends on the target type.

       When target specifies a connection method that listens for inbound connections (e.g. ptcp:
       or  punix:),  both  n_connections and is_connected may also be updated while the remaining
       key-value pairs are omitted.

       On the other hand, when target specifies an outbound connection, all key-value  pairs  may
       be  updated,  except  the  above-mentioned  two  key-value  pairs  associated with inbound
       connection targets. They are omitted.

       is_connected: boolean
              true if currently connected to this client, false otherwise.

       status : last_error: optional string
              A human-readable description of the last error on the connection  to  the  manager;
              i.e. strerror(errno). This key will exist only if an error has occurred.

       status : state: optional string, one of ACTIVE, BACKOFF, CONNECTING, IDLE, or VOID
              The state of the connection to the manager:

              VOID   Connection is disabled.

              BACKOFF
                     Attempting to reconnect at an increasing period.

              CONNECTING
                     Attempting to connect.

              ACTIVE Connected, remote host responsive.

              IDLE   Connection is idle. Waiting for response to keep-alive.

              These  values  may  change  in  the  future.  They  are  provided  only  for  human
              consumption.

       status : sec_since_connect: optional string, containing an integer, at least 0
              The amount of time since this client last successfully connected  to  the  database
              (in seconds). Value is empty if client has never successfully been connected.

       status : sec_since_disconnect: optional string, containing an integer, at least 0
              The  amount  of  time  since  this  client  last disconnected from the database (in
              seconds). Value is empty if client has never disconnected.

       status : locks_held: optional string
              Space-separated list of the names of OVSDB locks that the connection holds. Omitted
              if the connection does not hold any locks.

       status : locks_waiting: optional string
              Space-separated  list  of the names of OVSDB locks that the connection is currently
              waiting to acquire. Omitted if the connection is not waiting for any locks.

       status : locks_lost: optional string
              Space-separated list of the names of OVSDB locks that the connection has had stolen
              by another OVSDB client. Omitted if no locks have been stolen from this connection.

       status : n_connections: optional string, containing an integer, at least 2
              When  target  specifies  a  connection  method that listens for inbound connections
              (e.g. ptcp: or pssl:) and more than one connection is actually active, the value is
              the number of active connections. Otherwise, this key-value pair is omitted.

       status : bound_port: optional string, containing an integer
              When  target  is  ptcp: or pssl:, this is the TCP port on which the OVSDB server is
              listening. (This is particularly useful when target specifies a port of 0, allowing
              the kernel to choose any available port.)

     Common Columns:

       The overall purpose of these columns is described under Common Columns at the beginning of
       this document.

       external_ids: map of string-string pairs

       other_config: map of string-string pairs

SSL TABLE

       SSL configuration for ovn-sb database access.

   Summary:
       private_key                   string
       certificate                   string
       ca_cert                       string
       bootstrap_ca_cert             boolean
       ssl_protocols                 string
       ssl_ciphers                   string
       Common Columns:
         external_ids                map of string-string pairs

   Details:
       private_key: string
              Name of a PEM file containing the private key used as the switch’s identity for SSL
              connections to the controller.

       certificate: string
              Name  of  a  PEM file containing a certificate, signed by the certificate authority
              (CA) used by the controller and manager, that certifies the switch’s  private  key,
              identifying a trustworthy switch.

       ca_cert: string
              Name  of a PEM file containing the CA certificate used to verify that the switch is
              connected to a trustworthy controller.

       bootstrap_ca_cert: boolean
              If set to true, then Open vSwitch will attempt to obtain the  CA  certificate  from
              the controller on its first SSL connection and save it to the named PEM file. If it
              is successful, it will immediately drop the connection and reconnect, and from then
              on  all  SSL  connections  must  be authenticated by a certificate signed by the CA
              certificate  thus  obtained.  This  option  exposes  the  SSL   connection   to   a
              man-in-the-middle  attack  obtaining  the  initial  CA certificate. It may still be
              useful for bootstrapping.

       ssl_protocols: string
              List of SSL protocols to be enabled for SSL  connections.  The  default  when  this
              option is omitted is TLSv1,TLSv1.1,TLSv1.2.

       ssl_ciphers: string
              List  of  ciphers  (in  OpenSSL  cipher  string  format)  to  be  supported for SSL
              connections. The default when this option is omitted is HIGH:!aNULL:!MD5.

     Common Columns:

       The overall purpose of these columns is described under Common Columns at the beginning of
       this document.

       external_ids: map of string-string pairs

DNS TABLE

       Each  row  in this table stores the DNS records. The OVN action dns_lookup uses this table
       for DNS resolution.

   Summary:
       records                       map of string-string pairs
       datapaths                     set of 1 or more Datapath_Bindings
       Common Columns:
         external_ids                map of string-string pairs

   Details:
       records: map of string-string pairs
              Key-value pair of DNS records with DNS query name as the key and  a  string  of  IP
              address(es) separated by comma or space as the value.

              Example:  "vm1.ovn.org" = "10.0.0.4 aef0::4"

       datapaths: set of 1 or more Datapath_Bindings
              The  DNS  records  defined  in  the  column records will be applied only to the DNS
              queries originating from the datapaths defined in this column.

     Common Columns:

       external_ids: map of string-string pairs
              See External IDs at the beginning of this document.

RBAC_Role TABLE

       Role table for role-based access controls.

   Summary:
       name                          string
       permissions                   map of string-weak reference to RBAC_Permission pairs

   Details:
       name: string
              The role name, corresponding to the role column in the Connection table.

       permissions: map of string-weak reference to RBAC_Permission pairs
              A mapping of table names to rows in the RBAC_Permission table.

RBAC_Permission TABLE

       Permissions table for role-based access controls.

   Summary:
       table                         string
       authorization                 set of strings
       insert_delete                 boolean
       update                        set of strings

   Details:
       table: string
              Name of table to which this row applies.

       authorization: set of strings
              Set of strings identifying columns and column:key pairs to be compared with  client
              ID.  At least one match is required in order to be authorized. A zero-length string
              is treated  as  a  special  value  indicating  all  clients  should  be  considered
              authorized.

       insert_delete: boolean
              When "true", row insertions and authorized row deletions are permitted.

       update: set of strings
              Set of strings identifying columns and column:key pairs that authorized clients are
              allowed to modify.

Gateway_Chassis TABLE

       Association of Port_Binding rows of type chassisredirect to a Chassis. The  traffic  going
       out  through  a specific chassisredirect port will be redirected to a chassis, or a set of
       them in high availability configurations.

   Summary:
       name                          string (must be unique within table)
       chassis                       optional weak reference to Chassis
       priority                      integer, in range 0 to 32,767
       options                       map of string-string pairs
       Common Columns:
         external_ids                map of string-string pairs

   Details:
       name: string (must be unique within table)
              Name of the Gateway_Chassis.

              A suggested, but not required naming convention is ${port_name}_${chassis_name}.

       chassis: optional weak reference to Chassis
              The Chassis to which we send the traffic.

       priority: integer, in range 0 to 32,767
              This is the priority the specific Chassis among all  Gateway_Chassis  belonging  to
              the same Port_Binding.

       options: map of string-string pairs
              Reserved for future use.

     Common Columns:

       The overall purpose of these columns is described under Common Columns at the beginning of
       this document.

       external_ids: map of string-string pairs