write to a subdirectory on the RBD. so
if it is not mounted, the directory will be missing, and you get a
no such file error.
Ronny Aasen
On 25.08.2017 18:04, David Turner wrote:
Additionally, solely testing if you can write to
the path could give a false sense of security if the path is
writable when the RBD is not mounted. It would write a file to
the system drive and you would see it as successful.
If you are
monitoring to ensure that it is mounted and active, a simple
check_disk on the mountpoint should work. If the mount is not
present, or the filesystem is non-responsive then this should
pick it up. A second check to perhaps test you can actually
write files to the file system would not go astray either.
Other than that I don't think there is much point checking
anything else like rbd mapped output.
> -----Original Message-----
> From: ceph-users [mailto:ceph-users-bounces@xxxxxxxxxxxxxx] On
Behalf Of
> Hauke Homburg
> Sent: Friday, 25 August 2017 1:35 PM
> To: ceph-users <ceph-users@xxxxxxxx>
> Subject: Monitoring a rbd map rbd connection
>
> Hallo,
>
> Ich want to monitor the mapped Connection between a rbd
map rbdimage
> an a /dev/rbd device.
>
> This i want to do with icinga.
>
> Has anyone a Idea how i can do this?
>
> My first Idea is to touch and remove a File in the mount
point. I am not sure
> that this is the the only thing i have to do
>
>
> Thanks for Help
>
> Hauke
>
> --
> www.w3-creative.de
>
> www.westchat.de
>
> _______________________________________________
> ceph-users mailing list
> ceph-users@xxxxxxxxxxxxxx
> http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com
Confidentiality: This email and any attachments are
confidential and may be subject to copyright, legal or some
other professional privilege. They are intended solely for the
attention and use of the named addressee(s). They may only be
copied, distributed or disclosed with the consent of the
copyright owner. If you have received this email by mistake or
by breach of the confidentiality clause, please notify the
sender immediately by return email and delete or destroy all
copies of the email. Any confidentiality, privilege or
copyright is not waived or lost because this email has been
sent to you by mistake.
_______________________________________________
ceph-users mailing list
ceph-users@xxxxxxxxxxxxxx
http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com
_______________________________________________
ceph-users mailing list
ceph-users@xxxxxxxxxxxxxx
http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com
|
_______________________________________________
ceph-users mailing list
ceph-users@xxxxxxxxxxxxxx
http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com