Skip to content

Commit

Permalink
Merge pull request #1092 from stackhpc/2023.1-ceph-docs
Browse files Browse the repository at this point in the history
2023.1: Improvements to Ceph docs & more examples
  • Loading branch information
markgoddard committed Jun 26, 2024
2 parents 7dbec39 + 595e916 commit d18dbe4
Show file tree
Hide file tree
Showing 2 changed files with 27 additions and 14 deletions.
35 changes: 27 additions & 8 deletions doc/source/configuration/cephadm.rst
Original file line number Diff line number Diff line change
@@ -1,9 +1,9 @@
================
Cephadm & Kayobe
================
====
Ceph
====

This section describes how to use the Cephadm integration included in StackHPC
Kayobe configuration since Xena to deploy Ceph.
Kayobe configuration to deploy Ceph.

The Cephadm integration takes the form of custom playbooks that wrap
around the Ansible `stackhpc.cephadm collection
Expand All @@ -19,10 +19,10 @@ create or modify Ceph cluster deployments. Supported features are:
Resources
=========

- https://docs.ceph.com/en/pacific/cephadm/index.html
- https://docs.ceph.com/en/pacific/
- https://docs.ceph.com/en/quincy/cephadm/index.html
- https://docs.ceph.com/en/quincy/
- https://docs.ceph.com/en/reef/cephadm/index.html
- https://docs.ceph.com/en/reef/
- https://github.com/stackhpc/ansible-collection-cephadm

Configuration
Expand Down Expand Up @@ -107,7 +107,7 @@ OSD specification
~~~~~~~~~~~~~~~~~

The following example is a basic OSD spec that adds OSDs for all
available disks:
available disks with encryption at rest:

.. code:: yaml
Expand All @@ -118,9 +118,10 @@ available disks:
host_pattern: "*"
data_devices:
all: true
encrypted: true
More information about OSD service placement is available
`here <https://docs.ceph.com/en/pacific/cephadm/services/osd/#advanced-osd-service-specifications>`__.
`here <https://docs.ceph.com/en/quincy/cephadm/services/osd/#advanced-osd-service-specifications>`__.

Container image
~~~~~~~~~~~~~~~
Expand Down Expand Up @@ -264,6 +265,24 @@ post-deployment configuration is applied. Commands in the
``cephadm_commands_post`` list are executed after the rest of the Ceph
post-deployment configuration is applied.

Messenger v2 encryption in transit
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Messenger v2 is the default on-wire protocol since the Nautilus release. It
supports `encryption of data in transit
<https://docs.ceph.com/en/quincy/rados/configuration/msgr2/#connection-mode-configuration-options>`_,
but this is not used by default. It may be enabled as follows:

.. code:: yaml
# A list of commands to pass to cephadm shell -- ceph. See stackhpc.cephadm.commands
# for format.
cephadm_commands_pre:
# Enable messenger v2 encryption in transit.
- "config set global ms_cluster_mode secure"
- "config set global ms_service_mode secure"
- "config set global ms_client_mode secure"
Manila & CephFS
~~~~~~~~~~~~~~~

Expand Down
6 changes: 0 additions & 6 deletions etc/kayobe/environments/ci-multinode/cephadm.yml
Original file line number Diff line number Diff line change
Expand Up @@ -2,12 +2,6 @@
###############################################################################
# Cephadm deployment configuration.

# Ceph release name.
cephadm_ceph_release: "{{ 'quincy' if (ansible_facts['distribution_release'] == 'jammy' or ansible_facts.distribution_major_version == '9') else 'pacific' }}"

# Ceph container image tag.
cephadm_image_tag: "{{ 'v17.2.7' if cephadm_ceph_release == 'quincy' else 'v16.2.14' }}"

# Ceph OSD specification.
cephadm_osd_spec:
service_type: osd
Expand Down

0 comments on commit d18dbe4

Please sign in to comment.