Provided by: ovn-common_24.03.2-0ubuntu0.24.04.1_amd64 bug

NAME

       ovn-controller-vtep - Open Virtual Network local controller for vtep enabled physical switches.

SYNOPSIS

       ovn-controller-vtep [options] [--vtep-db=vtep-database] [--ovnsb-db=ovnsb-database]

DESCRIPTION

       ovn-controller-vtep  is  the  local  controller daemon in OVN, the Open Virtual Network, for VTEP enabled
       physical switches. It connects up to the OVN Southbound database (see ovn-sb(5)) over the OVSDB protocol,
       and down to the VTEP database (see vtep(5)) over the OVSDB protocol.

   PKI Options
       PKI  configuration  is  required  in  order  to  use  SSL  for the connections to the VTEP and Southbound
       databases.

              -p privkey.pem
              --private-key=privkey.pem
                   Specifies a  PEM  file  containing  the  private  key  used  as  identity  for  outgoing  SSL
                   connections.

              -c cert.pem
              --certificate=cert.pem
                   Specifies  a PEM file containing a certificate that certifies the private key specified on -p
                   or --private-key to be trustworthy.  The  certificate  must  be  signed  by  the  certificate
                   authority (CA) that the peer in SSL connections will use to verify it.

              -C cacert.pem
              --ca-cert=cacert.pem
                   Specifies  a  PEM  file containing the CA certificate for verifying certificates presented to
                   this program by SSL peers. (This may be the same certificate that SSL peers use to verify the
                   certificate  specified on -c or --certificate, or it may be a different one, depending on the
                   PKI design in use.)

              -C none
              --ca-cert=none
                   Disables verification of certificates presented by SSL  peers.  This  introduces  a  security
                   risk,  because  it  means  that  certificates cannot be verified to be those of known trusted
                   hosts.

              --bootstrap-ca-cert=cacert.pem
                     When cacert.pem exists, this option has the same effect as -C or --ca-cert. If it does  not
                     exist,  then  the executable will attempt to obtain the CA certificate from the SSL peer on
                     its first SSL connection and save it to the named PEM file. If it is  successful,  it  will
                     immediately drop the connection and reconnect, and from then on all SSL connections must be
                     authenticated by a certificate signed by the CA certificate thus obtained.

                     This option exposes the SSL connection to a man-in-the-middle attack obtaining the  initial
                     CA certificate, but it may be useful for bootstrapping.

                     This  option  is  only  useful  if the SSL peer sends its CA certificate as part of the SSL
                     certificate chain. The SSL protocol does not require the server to send the CA certificate.

                     This option is mutually exclusive with -C and --ca-cert.

              --peer-ca-cert=peer-cacert.pem
                     Specifies a PEM file that contains one or more  additional  certificates  to  send  to  SSL
                     peers.  peer-cacert.pem  should  be  the  CA  certificate  used  to  sign the program’s own
                     certificate, that is, the certificate specified on -c or --certificate.  If  the  program’s
                     certificate  is  self-signed, then --certificate and --peer-ca-cert should specify the same
                     file.

                     This option is not useful in normal operation, because the SSL peer must already  have  the
                     CA certificate for the peer to have any confidence in the program’s identity. However, this
                     offers a way for a new installation to bootstrap  the  CA  certificate  on  its  first  SSL
                     connection.

CONFIGURATION

       ovn-controller-vtep retrieves its configuration information from both the ovnsb and the vtep database. If
       the database locations are not given from command line, the default is the db.sock in local OVSDB’s ’run’
       directory. The database location must take one of the following forms:

              •      ssl:host:port

                     The  specified  SSL  port  on  the give host, which can either be a DNS name (if built with
                     unbound library) or an IP address (IPv4 or IPv6). If host is an  IPv6  address,  then  wrap
                     host  with  square  brackets,  e.g.:  ssl:[::1]:6640.  The --private-key, --certificate and
                     either of --ca-cert or --bootstrap-ca-cert options are mandatory when this form is used.

              •      tcp:host:port

                     Connect to the given TCP port on host, where host can be a DNS name (if built with  unbound
                     library)  or  IP  address  (IPv4  or IPv6). If host is an IPv6 address, then wrap host with
                     square brackets, e.g.: tcp:[::1]:6640.

              •      unix:file

                     On POSIX, connect to the Unix domain server socket named file.

                     On Windows, connect to a localhost TCP port whose value is written in file.

       ovn-controller-vtep assumes it gets configuration information from the following keys in the Global table
       of the connected hardware_vtep database:

              other_config:ovn-match-northd-version
                     The  boolean  flag  indicates  if ovn-controller-vtep needs to check ovn-northd version. If
                     this flag is set to true and the ovn-northd’s version (reported in the Southbound database)
                     doesn’t match with the ovn-controller-vtep’s internal version, then it will stop processing
                     the  southbound  and  connected  hardware_vtep  database  changes.  The  default  value  is
                     considered false if this option is not defined.

              other_config:ovn-remote-probe-interval
                     The  inactivity  probe  interval  of  the  connection  to  the  OVN Southbound database, in
                     milliseconds. If the value is zero, it disables the connection keepalive feature.

                     If the value is nonzero, then it will be forced to a value of at least 1000 ms.