Re: Problem with attaching rbd device in qemu-kvm

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Ehhh too long with this :) I forget to load acpiphp.

Thanks for everything, now its working beautifully. After 10h of
iozone on rbd devices, and no hang, or problem.

2011/12/20 Josh Durgin <josh.durgin@xxxxxxxxxxxxx>:
> On 12/19/2011 07:37 AM, Sławomir Skowron wrote:
>>
>> Hi,
>>
>> Actual setup:
>>
>> ii  libvirt-bin                      0.9.2-4ubuntu15.1
>>       the programs for the libvirt library
>> ii  libvirt0                         0.9.2-4ubuntu15.1
>>       library for interfacing with different virtualization systems
>> ii  qemu-kvm                         1.0.0+dfsg+rc2-1~oneiric1
>>       Full virtualization on i386 and amd64 hardware
>>
>> I change many thing in system, and successfully attached rbd drives via
>> libvirt:
>>
>> virsh attach-device one-888 kvm-ceph.xml
>> Device attached successfully
>>
>> A new set of disks, appears in libvirt vm xml, but not in vm machine.
>> After reboot, all new rbd drives appear in VM.
>>
>> Is there any chance to hotadd rbd device to working VM without reboot ??
>
>
> Hotplugging should work, but it does require guest support. Does your guest
> kernel have hotplugging enabled? Does hotplugging work with a raw image file
> using the same configuration?
>
>
>>
>> 2011/12/16 Sławomir Skowron<szibis@xxxxxxxxx>:
>>>
>>> 2011/12/13 Josh Durgin<josh.durgin@xxxxxxxxxxxxx>:
>>>>
>>>> On 12/13/2011 04:56 AM, Sławomir Skowron wrote:
>>>>>
>>>>>
>>>>> Finally, i manage the problem with rbd with kvm 1.0, and libvirt
>>>>> 0.9.8, or i think i manage :), but i get stuck with one thing after.
>>>>>
>>>>> 2011-12-13 12:13:31.173+0000: 21512: error :
>>>>> qemuMonitorJSONCheckError:318 : internal error unable to execute QEMU
>>>>> command 'device_add': Bus 'pci.0' does not support hotplugging
>>>>> 2011-12-13 12:13:31.173+0000: 21512: warning :
>>>>> qemuDomainAttachPciDiskDevice:244 : qemuMonitorAddDevice failed on
>>>>>
>>>>>
>>>>> file=rbd:rbd/testdysk:id=admin:key=AQANeNFOiIx9DhAAv76MRXZjWNKn2sSSTQeJog==:auth_supported=cephx
>>>>>
>>>>> none:mon_host=10.177.64.4\:6789,if=none,id=drive-virtio-disk2,format=raw
>>>>>
>>>>>
>>>>> (virtio-blk-pci,bus=pci.0,addr=0x7,drive=drive-virtio-disk2,id=virtio-disk2)
>>>>> 2011-12-13 12:13:31.173+0000: 21512: error :
>>>>> virSecurityDACRestoreSecurityFileLabel:143 : cannot resolve symlink
>>>>> rbd/testdysk: No such file or directory2011-12-13 12:13:31.173+0000:
>>>>> 21512: warning : qemuDomainAttachPciDiskDevice:287 : Unable to restore
>>>>> security label on rbd/testdysk
>>>>> and i can't find any info about that.
>>>>>
>>>>> my kvm.xml inject file:
>>>>>
>>>>> <disk type="network" device="disk">
>>>>>          <driver name="qemu" type="raw"/>
>>>>>          <auth username="admin">
>>>>>                  <secret type="ceph"
>>>>> uuid="0a81f5b2-8403-7b23-c8d6-21ccc2f80d6f"/>
>>>>>          </auth>
>>>>>          <source protocol="rbd" name="rbd/testdysk">
>>>>>                  <host name="10.177.64.4" port="6789"/>
>>>>>          </source>
>>>>>          <target dev="sdc" bus="virtio"/>
>>>>> </disk>
>>>>>
>>>>> secret:
>>>>>
>>>>> cat /tmp/secret.xml
>>>>> <secret ephemeral='no' private='no'>
>>>>>      <uuid>0a81f5b2-8403-7b23-c8d6-21ccc2f80d6f</uuid>
>>>>>      <usage type='ceph'>
>>>>>              <domain>rbd/admin</domain>
>>>>>              <name>admin</name>
>>>>>      </usage>
>>>>> </secret>
>>>>>
>>>>> virsh secret-define /tmp/secret.xml
>>>>> Secret 0a81f5b2-8403-7b23-c8d6-21ccc2f80d6f created
>>>>>
>>>>> virsh secret-set-value 0a81f5b2-8403-7b23-c8d6-21ccc2f80d6f
>>>>> AQANeNFOiIx9DhAAv76MRXZjWNKn2sSSTQeJog==
>>>>> Secret value set
>>>>>
>>>>
>>>> Your xml and configuration are all fine, you're hitting the libvirt bug
>>>> that
>>>> I mentioned before. The fix isn't in any stable release yet, and 0.9.8
>>>> was
>>>> just released yesterday, so I guess you'll have to compile it yourself
>>>> or
>>>> disable the libvirt security driver.
>>>
>>>
>>> Yes libvirt 0.9.8 with this patch solved problem with rbd, now it's
>>> clean. Thanks for that.
>>>
>>> But, a second problem appear.
>>>
>>> error: Failed to attach device from /root/kvm-ceph.xml
>>> error: internal error unable to execute QEMU command 'device_add':
>>> Property 'virtio-blk-pci.drive' can't find value 'drive-virtio-disk3'
>>>
>>> /var/log/libvirt/libvirtd.log
>>> 2011-12-16 12:03:04.950+0000: 1070: error :
>>> qemuMonitorJSONCheckError:318 : internal error unable to execute QEMU
>>> command 'device_add': Property 'virtio-blk-pci.drive' can't find value
>>> 'drive-virtio-disk3'
>>> 2011-12-16 12:03:04.950+0000: 1070: warning :
>>> qemuDomainAttachPciDiskDevice:244 : qemuMonitorAddDevice failed on
>>>
>>> file=rbd:rbd/testdysk:rbd_writeback_window=8000000:id=admin:key=AQANeNFOiIx9DhAAv76MRXZjWNKn2sSSTQeJog==:auth_supported=cephx
>>> none:mon_host=10.177.64.4\:6789,if=none,id=drive-virtio-disk3,format=raw
>>>
>>> (virtio-blk-pci,bus=pci.0,addr=0xd,drive=drive-virtio-disk3,id=virtio-disk3)
>>>
>>> if i attach a scsi device from img file everything is OK.
>>>
>>> Anyone have, any concept with this ??
>>>
>>>>
>>>>
>>>>> 2011/12/12 Josh Durgin<josh.durgin@xxxxxxxxxxxxx>:
>>>>>>
>>>>>>
>>>>>> On 12/09/2011 04:48 AM, Sławomir Skowron wrote:
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> Sorry, for my lag, but i was sick.
>>>>>>>
>>>>>>> I handled problem with apparmor before and now it's not a problem,
>>>>>>> even when i send mail before, it was solved.
>>>>>>>
>>>>>>> Ok when i create image from qemu-img it's looks like that, and works
>>>>>>> perfect, (attachment with log of this opperation.)
>>>>>>>
>>>>>>> But when i use virsh, it's still a problem. Just like he don't know
>>>>>>> what user is going to be auth.
>>>>>>>
>>>>>>> I try, as client.admin (default i hope :)) only with id=admin in
>>>>>>> kvm.xml, or client=admin, and other combinations - like client.rbd
>>>>>>> etc., Still nothing.
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>> admin is the default, and the correct option for client.admin is
>>>>>> id=admin,
>>>>>> or id=foo for client.foo.
>>>>>>
>>>>>>
>>>>>>>
>>>>>>> I try, improve a keyring file, adding client rbd into keyring on
>>>>>>> machine with kvm hypervisor in /etc/ceph/keyring.bin
>>>>>>>
>>>>>>> [client.rbd]
>>>>>>>         key = AAAAAAAAAAAAAAAA
>>>>>>>         auid = 18446744073709551615
>>>>>>>         caps mds = "allow"
>>>>>>>         caps mon = "allow r"
>>>>>>>         caps osd = "allow rw pool=kvmtest"
>>>>>>>
>>>>>>> and on cluster site like above. I was added, a section [client.rbd]
>>>>>>> with keyring path, and it's still a problem.
>>>>>>>
>>>>>>
>>>>>> Did you run 'ceph auth add -i /etc/ceph/keyring.bin'?
>>>>>> Make sure 'ceph auth list' shows client.rbd with the right key.
>>>>>
>>>>>
>>>>>
>>>>> Overall i want to use admin id, and i think now it's correctly used in
>>>>> xml.
>>>>>
>>>>>>
>>>>>>
>>>>>>> 2011-12-09 13:29:11.519096 7fe616b59700 mon.0@0(leader) e1
>>>>>>> ms_verify_authorizer 10.177.32.66:0/58020608 client protocol 0
>>>>>>> root@s3-10-177-64-4:~# tail -n10000 /var/log/ceph/mon.0.log | grep
>>>>>>> 13:29:11.
>>>>>>> 2011-12-09 13:29:11.519096 7fe616b59700 mon.0@0(leader) e1
>>>>>>> ms_verify_authorizer 10.177.32.66:0/58020608 client protocol 0
>>>>>>> 2011-12-09 13:29:11.519624 7fe61b090700 -- 10.177.64.4:6789/0<==
>>>>>>> client.? 10.177.32.66:0/58020608 1 ==== auth(proto 0 21 bytes) v1
>>>>>>> ====
>>>>>>> 47+0+0 (3310669357 0 0) 0x17f2e00 con 0x19d2c80
>>>>>>> 2011-12-09 13:29:11.519645 7fe61b090700 mon.0@0(leader) e1 have
>>>>>>> connection
>>>>>>> 2011-12-09 13:29:11.519655 7fe61b090700 mon.0@0(leader) e1 do not
>>>>>>> have
>>>>>>> session, making new one
>>>>>>> 2011-12-09 13:29:11.519668 7fe61b090700 mon.0@0(leader) e1
>>>>>>> ms_dispatch
>>>>>>> new session MonSession: client.? 10.177.32.66:0/58020608 is open for
>>>>>>> client.? 10.177.32.66:0/58020608
>>>>>>> 2011-12-09 13:29:11.519674 7fe61b090700 mon.0@0(leader) e1 setting
>>>>>>> timeout on session
>>>>>>> 2011-12-09 13:29:11.519680 7fe61b090700 mon.0@0(leader) e1  caps
>>>>>>> 2011-12-09 13:29:11.519688 7fe61b090700 mon.0@0(leader).auth v353
>>>>>>> AuthMonitor::update_from_paxos()
>>>>>>> 2011-12-09 13:29:11.519697 7fe61b090700 mon.0@0(leader).auth v353
>>>>>>> preprocess_query auth(proto 0 21 bytes) v1 from client.?
>>>>>>> 10.177.32.66:0/58020608
>>>>>>> 2011-12-09 13:29:11.519703 7fe61b090700 mon.0@0(leader).auth v353
>>>>>>> prep_auth() blob_size=21
>>>>>>> 2011-12-09 13:29:11.519735 7fe61b090700 -- 10.177.64.4:6789/0 -->
>>>>>>> 10.177.32.66:0/58020608 -- auth_reply(proto 0 -95 Operation not
>>>>>>> supported) v1 -- ?+0 0x1246200 con 0x19d2c80
>>>>>>>
>>>>>>> from libvirt.log
>>>>>>>
>>>>>>> 23:20:56.689: 1309: error :
>>>>>>> virSecurityDACRestoreSecurityFileLabel:143
>>>>>>> : cannot resolve symlink rbd:kvmtest/kvmtest1:name=admin: No such
>>>>>>> file
>>>>>>> or directory
>>>>>>> 23:20:56.882: 1309: warning : qemuDomainAttachPciDiskDevice:250 :
>>>>>>> Unable to restore security label on rbd:kvmtest/kvmtest1:name=admin
>>>>>>> 23:21:09.172: 1309: error : qemuMonitorTextAddDrive:2418 : operation
>>>>>>> failed: open disk image file failed
>>>>>>> 23:21:09.172: 1309: error :
>>>>>>> virSecurityDACRestoreSecurityFileLabel:143
>>>>>>> : cannot resolve symlink rbd:kvmtest/kvmtest1:name=admin: No such
>>>>>>> file
>>>>>>> or directory
>>>>>>> 23:21:09.364: 1309: warning : qemuDomainAttachPciDiskDevice:250 :
>>>>>>> Unable to restore security label on rbd:kvmtest/kvmtest1:name=admin
>>>>>>> 23:21:49.645: 1309: error : qemuMonitorTextAddDrive:2418 : operation
>>>>>>> failed: open disk image file failed
>>>>>>> 23:21:49.645: 1309: error :
>>>>>>> virSecurityDACRestoreSecurityFileLabel:143
>>>>>>> : cannot resolve symlink rbd:kvmtest/kvmtest1:id=admin: No such file
>>>>>>> or directory
>>>>>>> 23:21:49.853: 1309: warning : qemuDomainAttachPciDiskDevice:250 :
>>>>>>> Unable to restore security label on rbd:kvmtest/kvmtest1:id=admin
>>>>>>> 13:08:08.924: 1309: error : qemuMonitorTextAddDrive:2418 : operation
>>>>>>> failed: open disk image file failed
>>>>>>> 13:08:08.924: 1309: error :
>>>>>>> virSecurityDACRestoreSecurityFileLabel:143
>>>>>>> : cannot resolve symlink rbd:kvmtest/kvmtest1: No such file or
>>>>>>> directory
>>>>>>> 13:08:09.117: 1309: warning : qemuDomainAttachPciDiskDevice:250 :
>>>>>>> Unable to restore security label on rbd:kvmtest/kvmtest1
>>>>>>> 13:09:45.402: 1309: error : qemuMonitorTextAddDrive:2418 : operation
>>>>>>> failed: open disk image file failed
>>>>>>> 13:29:05.554: 1310: error : qemuMonitorTextAddDrive:2418 : operation
>>>>>>> failed: open disk image file failed
>>>>>>> 13:29:05.554: 1310: error :
>>>>>>> virSecurityDACRestoreSecurityFileLabel:143
>>>>>>> : cannot resolve symlink kvmtest/kvmtest1: No such file or directory
>>>>>>> 13:29:05.751: 1310: warning : qemuDomainAttachPciDiskDevice:250 :
>>>>>>> Unable to restore security label on kvmtest/kvmtest1
>>>>>>> 13:29:05.751: 1310: warning : virEventPollUpdateHandle:147 : Ignoring
>>>>>>> invalid update watch -1
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>> This is libvirt mistakenly trying to treat the rbd disk as a file -
>>>>>> fixed
>>>>>> in
>>>>>> 20e1233c31e3150d259073c523077acdccb5d419 to libvirt. If you don't want
>>>>>> to
>>>>>> upgrade libvirt, someone on IRC last week reported that installing
>>>>>> libapparmor1 fixed this problem for them, since libvirt no longer fell
>>>>>> back
>>>>>> to it's own DAC implementation.
>>>>>
>>>>>
>>>>>
>>>>> hmm is this commited to any stable version now ?? i have installed
>>>>> libapparmor1,
>>>>>
>>>>> ri  libapparmor1                    2.7.0~beta1+bzr1774-1ubuntu2
>>>>>         changehat AppArmor library
>>>>>
>>>>> and i use newest stable libvirt 0.9.8.
>>>>>
>>>>>>
>>>>>>
>>>>>>> 2011/12/1 Josh Durgin<josh.durgin@xxxxxxxxxxxxx>:
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>> On 12/01/2011 11:37 AM, Sławomir Skowron wrote:
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> I have some problems. Can you help me ??
>>>>>>>>>
>>>>>>>>> ceph cluster:
>>>>>>>>> ceph 0.38, oneiric, kernel 3.0.0 x86_64 - now only one machine.
>>>>>>>>>
>>>>>>>>> kvm hypervisor:
>>>>>>>>> kvm version 1.0-rc4 (0.15.92), libvirt 0.9.2, kernel 3.0.0, Ubuntu
>>>>>>>>> oneiric x86_64.
>>>>>>>>>
>>>>>>>>> I create image from qemu-img on machine with kvm VM's, and it works
>>>>>>>>> very
>>>>>>>>> well:
>>>>>>>>>
>>>>>>>>> qemu-img create -f rbd rbd:kvmtest/kvmtest1 10G
>>>>>>>>> Formatting 'rbd:kvmtest/kvmtest1', fmt=rbd size=10737418240
>>>>>>>>> cluster_size=0
>>>>>>>>>
>>>>>>>>> in ceph cluster machines:
>>>>>>>>>
>>>>>>>>> rados -p kvmtest ls
>>>>>>>>> kvmtest1.rbd
>>>>>>>>> rbd_directory
>>>>>>>>> rbd_info
>>>>>>>>>
>>>>>>>>> But when i try to attach new device to kvm VM like this:
>>>>>>>>>
>>>>>>>>> virsh attach-device one-10 /tmp/kvm.xml
>>>>>>>>>
>>>>>>>>> with kvm.xml like this:
>>>>>>>>>
>>>>>>>>> <disk type='network' device='disk'>
>>>>>>>>>         <driver name='qemu' type='raw' cache='writeback'/>
>>>>>>>>>         <source protocol='rbd' name='rbd:kvmtest/kvmtest1'>
>>>>>>>>>                 <host name='10.177.64.4' port='6789'/>
>>>>>>>>>         </source>
>>>>>>>>>         <target dev='vdc' bus='virtio'/>
>>>>>>>>> </disk>
>>>>>>>>>
>>>>>>>>> output of virsh:
>>>>>>>>>
>>>>>>>>> error: Failed to attach device from /tmp/kvm.xml
>>>>>>>>> error: cannot resolve symlink rbd:kvmtest/kvmtest1: No such file or
>>>>>>>>> directory
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>>  From the monitor output below, I'm assuming this is just a bad
>>>>>>>> error
>>>>>>>> message
>>>>>>>> from libvirt.
>>>>>>>>
>>>>>>>>
>>>>>>>>> and mon.0 log in ceph cluster.
>>>>>>>>>
>>>>>>>>> 2011-12-01 20:18:17.142595 7fe02dd04700 mon.0@0(leader) e1
>>>>>>>>> ms_verify_authorizer 10.177.32.66:0/25020608 client protocol 0
>>>>>>>>> 2011-12-01 20:18:17.143041 7fe03223b700 -- 10.177.64.4:6789/0<==
>>>>>>>>> client.? 10.177.32.66:0/25020608 1 ==== auth(proto 0 21 bytes) v1
>>>>>>>>> ====
>>>>>>>>> 47+0+0 (3310669357 0 0) 0x29f6a00 con 0x297adc0
>>>>>>>>> 2011-12-01 20:18:17.143095 7fe03223b700 mon.0@0(leader) e1
>>>>>>>>> ms_dispatch
>>>>>>>>> new session MonSession: client.? 10.177.32.66:0/25020608 is open
>>>>>>>>> for
>>>>>>>>> client.? 10.177.32.66:0/25020608
>>>>>>>>> 2011-12-01 20:18:17.143125 7fe03223b700 mon.0@0(leader).auth v146
>>>>>>>>> preprocess_query auth(proto 0 21 bytes) v1 from client.?
>>>>>>>>> 10.177.32.66:0/25020608
>>>>>>>>> 2011-12-01 20:18:17.143168 7fe03223b700 -- 10.177.64.4:6789/0 -->
>>>>>>>>> 10.177.32.66:0/25020608 -- auth_reply(proto 0 -95 Operation not
>>>>>>>>> supported) v1 -- ?+0 0x2f30600 con 0x297adc0
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>> Here you can see qemu isn't authenticating correctly, probably
>>>>>>>> because
>>>>>>>> the
>>>>>>>> rados user isn't being set by libvirt. With your libvirt version,
>>>>>>>> you'll
>>>>>>>> need to change:
>>>>>>>>
>>>>>>>>
>>>>>>>>   <source protocol='rbd' name='rbd:kvmtest/kvmtest1'>
>>>>>>>>
>>>>>>>> to
>>>>>>>>
>>>>>>>>   <source protocol='rbd' name='rbd:kvmtest/kvmtest1:id=foo'>
>>>>>>>>
>>>>>>>> to authenticate as client.foo. Any ceph config option can be set
>>>>>>>> like
>>>>>>>> that,
>>>>>>>> separated by colons.
>>>>>>>>
>>>>>>>> If this still doesn't work, I'd suggest setting
>>>>>>>> debug_rbd=20:debug_monc=20:debug_auth=20:log_to_stderr=2 to get more
>>>>>>>> info
>>>>>>>> in
>>>>>>>> the libvirt instance log (usually
>>>>>>>> /var/log/libvirt/qemu/instance_name.log).
>>>>>>>> There may be apparmour restrictions preventing qemu from reading the
>>>>>>>> keyring
>>>>>>>> or ceph config files.
>>>>>>>>
>>>>>>>>
>>>>>>>>> ceph.conf, and keyring.bin exists on server, and machine with
>>>>>>>>> qemu-kvm
>>>>>>>>> in same directory:
>>>>>>>>> ; global
>>>>>>>>> [global]
>>>>>>>>>         ; enable secure authentication
>>>>>>>>>
>>>>>>>>>         auth supported = cephx
>>>>>>>>>         keyring = /etc/ceph/keyring.bin
>>>>>>>>>
>>>>>>>>>         debug rgw = 1
>>>>>>>>>
>>>>>>>>>         rgw print continue = false
>>>>>>>>>         rgw socket path = /var/run/radosgw.sock
>>>>>>>>>
>>>>>>>>> ; monitors
>>>>>>>>> ;  You need at least one.  You need at least three if you want to
>>>>>>>>> ;  tolerate any node failures.  Always create an odd number.
>>>>>>>>> [mon]
>>>>>>>>>         mon data = /vol0/data/mon.$id
>>>>>>>>>
>>>>>>>>>         ; some minimal logging (just message traffic) to aid
>>>>>>>>> debugging
>>>>>>>>>
>>>>>>>>>         debug ms = 1     ; see message traffic
>>>>>>>>>         debug mon = 0   ; monitor
>>>>>>>>>         debug paxos = 0 ; monitor replication
>>>>>>>>>         debug auth = 0  ;
>>>>>>>>>
>>>>>>>>>         mon allowed clock drift = 2
>>>>>>>>>
>>>>>>>>> [mon.0]
>>>>>>>>>         host = 10-177-64-4
>>>>>>>>>         mon addr = 10.177.64.4:6789
>>>>>>>>>
>>>>>>>>> ; radosgw client list
>>>>>>>>> [client.radosgw.10-177-64-4]
>>>>>>>>>
>>>>>>>>>         host = 10-177-64-4
>>>>>>>>>         log file = /var/log/ceph/$name.log
>>>>>>>>>         debug rgw = 1
>>>>>>>>>         debug ms = 1
>>>>>>>>>
>>>>>>>>> ; osd
>>>>>>>>> ;  You need at least one.  Two if you want data to be replicated.
>>>>>>>>> ;  Define as many as you like.
>>>>>>>>> [osd]
>>>>>>>>>         ; This is where the btrfs volume will be mounted.
>>>>>>>>>
>>>>>>>>>         osd data = /vol0/data/osd.$id
>>>>>>>>>
>>>>>>>>>         ; Ideally, make this a separate disk or partition.  A few
>>>>>>>>> GB
>>>>>>>>>         ; is usually enough; more if you have fast disks.  You can
>>>>>>>>> use
>>>>>>>>>         ; a file under the osd data dir if need be
>>>>>>>>>         ; (e.g. /data/osd$id/journal), but it will be slower than a
>>>>>>>>>         ; separate disk or partition.
>>>>>>>>>
>>>>>>>>>         osd journal = /vol0/data/osd.$id/journal
>>>>>>>>>
>>>>>>>>>         ; If the OSD journal is a file, you need to specify the
>>>>>>>>> size.
>>>>>>>>> This is specified in MB.
>>>>>>>>>
>>>>>>>>>         osd journal size = 512
>>>>>>>>>
>>>>>>>>>         filestore journal writeahead = 1
>>>>>>>>>         osd heartbeat grace = 5
>>>>>>>>>
>>>>>>>>>         debug ms = 0         ; message traffic
>>>>>>>>>         debug osd = 0
>>>>>>>>>         debug filestore = 0 ; local object storage
>>>>>>>>>         debug journal = 0   ; local journaling
>>>>>>>>>         debug monc = 0
>>>>>>>>>         debug rados = 1
>>>>>>>>>
>>>>>>>>> [osd.0]
>>>>>>>>>         host = 10-177-64-4
>>>>>>>>>         osd data = /vol0/data/osd.0
>>>>>>>>>         keyring = /vol0/data/osd.0/keyring
>>>>>>>>>
>>>>>>>>> [osd.1]
>>>>>>>>>         host = 10-177-64-4
>>>>>>>>>         osd data = /vol0/data/osd.1
>>>>>>>>>         keyring = /vol0/data/osd.1/keyring
>>>>>>>>>
>>>>>>>>> [osd.2]
>>>>>>>>>         host = 10-177-64-4
>>>>>>>>>         osd data = /vol0/data/osd.2
>>>>>>>>>         keyring = /vol0/data/osd.2/keyring
>>>>>>>>>
>>>>>>>>> [osd.3]
>>>>>>>>>         host = 10-177-64-4
>>>>>>>>>         osd data = /vol0/data/osd.3
>>>>>>>>>         keyring = /vol0/data/osd.3/keyring
>>>>>>>>>
>>>>>>>>> [osd.4]
>>>>>>>>>         host = 10-177-64-4
>>>>>>>>>         osd data = /vol0/data/osd.4
>>>>>>>>>         keyring = /vol0/data/osd.4/keyring
>>>>>>>>>
>>>>>>>>> [osd.5]
>>>>>>>>>         host = 10-177-64-4
>>>>>>>>>         osd data = /vol0/data/osd.5
>>>>>>>>>         keyring = /vol0/data/osd.5/keyring
>>>>>>>>>
>>>>>>>>> [osd.6]
>>>>>>>>>         host = 10-177-64-4
>>>>>>>>>         osd data = /vol0/data/osd.6
>>>>>>>>>         keyring = /vol0/data/osd.6/keyring
>>>>>>>>>
>>>>>>>>> [osd.7]
>>>>>>>>>         host = 10-177-64-4
>>>>>>>>>         osd data = /vol0/data/osd.7
>>>>>>>>>         keyring = /vol0/data/osd.7/keyring
>>>>>>>>>
>>>>>>>>> [osd.8]
>>>>>>>>>         host = 10-177-64-4
>>>>>>>>>         osd data = /vol0/data/osd.8
>>>>>>>>>         keyring = /vol0/data/osd.8/keyring
>>>>>>>>>
>>>>>>>>> [osd.9]
>>>>>>>>>         host = 10-177-64-4
>>>>>>>>>         osd data = /vol0/data/osd.9
>>>>>>>>>         keyring = /vol0/data/osd.9/keyring
>>>>>>>>>
>>>>>>>>> [osd.10]
>>>>>>>>>         host = 10-177-64-4
>>>>>>>>>         osd data = /vol0/data/osd.10
>>>>>>>>>         keyring = /vol0/data/osd.10/keyring
>>>>>>>>>
>>>>>>>>> [osd.11]
>>>>>>>>>         host = 10-177-64-4
>>>>>>>>>         osd data = /vol0/data/osd.11
>>>>>>>>>         keyring = /vol0/data/osd.11/keyring
>>>>>>>>>
>>>>>>>>> [osd.12]
>>>>>>>>>         host = 10-177-64-4
>>>>>>>>>         osd data = /vol0/data/osd.12
>>>>>>>>>         keyring = /vol0/data/osd.12/keyring
>>>>>>>>>
>>>>>>>>> [osd.13]
>>>>>>>>>         host = 10-177-64-4
>>>>>>>>>         osd data = /vol0/data/osd.13
>>>>>>>>>         keyring = /vol0/data/osd.13/keyring
>>>>>>>>>
>>>>>>>>> [osd.14]
>>>>>>>>>         host = 10-177-64-4
>>>>>>>>>         osd data = /vol0/data/osd.14
>>>>>>>>>         keyring = /vol0/data/osd.14/keyring
>>>>>>>>>
>>>>>>>>> [osd.15]
>>>>>>>>>         host = 10-177-64-4
>>>>>>>>>         osd data = /vol0/data/osd.15
>>>>>>>>>         keyring = /vol0/data/osd.15/keyring
>>>>>>>>>
>>>>>>>>> [osd.16]
>>>>>>>>>         host = 10-177-64-4
>>>>>>>>>         osd data = /vol0/data/osd.16
>>>>>>>>>         keyring = /vol0/data/osd.16/keyring
>>>>>>>>>
>>>>>>>>> [osd.17]
>>>>>>>>>         host = 10-177-64-4
>>>>>>>>>         osd data = /vol0/data/osd.17
>>>>>>>>>         keyring = /vol0/data/osd.17/keyring
>>>>>>>>>
>>>>>>>>> [osd.18]
>>>>>>>>>         host = 10-177-64-4
>>>>>>>>>         osd data = /vol0/data/osd.18
>>>>>>>>>         keyring = /vol0/data/osd.18/keyring
>>>>>>>>>
>>>>>>>>> [osd.19]
>>>>>>>>>         host = 10-177-64-4
>>>>>>>>>         osd data = /vol0/data/osd.19
>>>>>>>>>         keyring = /vol0/data/osd.19/keyring
>>>>>>>>>
>>>>>>>>> [osd.20]
>>>>>>>>>         host = 10-177-64-4
>>>>>>>>>         osd data = /vol0/data/osd.20
>>>>>>>>>         keyring = /vol0/data/osd.20/keyring
>>>>>>>>>
>>>>>>>>> [osd.21]
>>>>>>>>>         host = 10-177-64-4
>>>>>>>>>         osd data = /vol0/data/osd.21
>>>>>>>>>         keyring = /vol0/data/osd.21/keyring
>>>>>>>>>
>>>>>>>>> [osd.22]
>>>>>>>>>         host = 10-177-64-4
>>>>>>>>>         osd data = /vol0/data/osd.22
>>>>>>>>>         keyring = /vol0/data/osd.22/keyring
>>>>>>>>>
>>>>>>>>> [osd.23]
>>>>>>>>>         host = 10-177-64-4
>>>>>>>>>         osd data = /vol0/data/osd.23
>>>>>>>>>         keyring = /vol0/data/osd.23/keyring
>>>>>>>>>
>>>>>>>>> [osd.24]
>>>>>>>>>         host = 10-177-64-4
>>>>>>>>>         osd data = /vol0/data/osd.24
>>>>>>>>>         keyring = /vol0/data/osd.24/keyring
>>>>>>>>>
>>>>>>>>> [osd.25]
>>>>>>>>>         host = 10-177-64-4
>>>>>>>>>         osd data = /vol0/data/osd.25
>>>>>>>>>         keyring = /vol0/data/osd.25/keyring
>>>>>>>>>
>>>>>>>>>
>>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>
>>>>>
>>>>>
>>>>>
>>>>
>>>
>>>
>>>
>>> --
>>> -----
>>> Pozdrawiam
>>>
>>> Sławek "sZiBis" Skowron
>>
>>
>>
>>
>



-- 
-----
Pozdrawiam

Sławek "sZiBis" Skowron
--
To unsubscribe from this list: send the line "unsubscribe ceph-devel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [CEPH Users]     [Ceph Large]     [Information on CEPH]     [Linux BTRFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]
  Powered by Linux