Project

General

Profile

Actions

Feature #13682

closed

It would be cool if calamari_setup keyrings are also placed into /etc/ceph/ceph.keyring

Added by Anonymous over 8 years ago. Updated over 8 years ago.

Status:
Closed
Priority:
Normal
Assignee:
-
Category:
-
% Done:

0%

Source:
Q/A
Tags:
Backport:
Reviewed:
Affected Versions:
Actions #1

Updated by Anonymous over 8 years ago

  • Subject changed from It would be cool if calamiari_setup keyrings are also placed into /etc/ceph/ceph.keyring to It would be cool if calamari_setup keyrings are also placed into /etc/ceph/ceph.keyring
  • Source changed from other to Q/A

Run teuthology using the following yaml file:

roles:
- [mon.a, mon.c, osd.0, osd.1, osd.2, client.0]
- [mon.b, osd.3, osd.4, osd.5, client.1]
machine_type: vps
overrides:
  ceph:
    log-whitelist:
    - wrongly marked me down
tasks:
- ssh_keys:
- calamari_setup:
    test_image: http://file.rdu.redhat.com/~kdreyer/download.inktank.com/enterprise/1.2.3/rhceph-1.2.3-ubuntu-14.04-x86_64.iso
    email: wusui@redhat.com
- install.ship_utilities: null
- interactive:
- workunit:
    clients:
      all:
        - rados/load-gen-mostlyread.sh
targets:
  vpm049.front.sepia.ceph.com: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCz9GfRQpdIgPXEwA6R4QxC/B4h0mOc3F+uizZKSiesUA451n2KpoUHr+0YgkrJSJTh2LpbyQg93MK8UCWgGfo3BPAOEfbCIa2im5/CwayaYafqOlJ7wvifinKjDnGJzD7Mj90T8rVk+KK/+zyYU7qwhQpEQAOzVwdsPDKc3iNZSILAvJE7QlO851b2WMZRoDKC3vtgJOssWnLHLEcjfiN79AkRTjN2eSUijTME6PvVElnWKOBGZbY69cIXjZ0iTh0IR6ZsOFicjOB4P7tDnbjhy3N2I42ZWfHgSnjmrlLLB6qkUNpOUQK7p3jhkh04KcoEQbZMXNC/bUvixHposRAl
  vpm140.front.sepia.ceph.com: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDsnEduKlpjUC9M/uTlPL2/J5PCzuiVQ9hmwd2B2j17Kowd5cTeFZ73GgzKSjTRekFEPK+/7D8RnbmftOvKo9iUTdAftSXeYNjzcdAAZ/dlDkHwUOwtLlOk8huHFwElpIsrQryr9ZyyK4A2HwDravb5R7+W+gazW0wi2v54WxQj4/hqBZRurp8SWJNsnr2qcCK84iejw5EHJvrAYYjwzOsFHWFqxiKbPv7rkeLxmFTwMT0PD0bRYBaaUnF7sswmMCGZaXw8le1dmCAPxT4dlymgWLmc5PA3YhbZD7Qu06FVEGCkOiTrWmCl3Pp0hJsvQAjAyYk3BF1mPCtCGL/vsTYZ

This currently fails to run with:

2015-11-03T17:36:01.072 INFO:tasks.workunit.client.1.vpm140.stderr:2015-11-04 01:36:01.058663 7fbcb19f07c0 -1 monclient(hunting): ERROR: missing keyring, cannot use cephx for authentication

I noticed that ceph.bootstrap-mds.keyring ceph.bootstrap-osd.keyring ceph.client.admin.keyring and ceph.mon.keyring are all left sitting around in the local directory after the calamari-setup runs.

So at the interactive point in the above script, I did:

cat *.keyring > /etc/ceph/ceph.keyring

and copied that keyring to /etc/ceph/ceph.keyring on all monitor sites.

Then after continuing from the interactive prompt, the test ran to completion.

This problem is the keyring issue referred to in tracker bug 13676.

Actions #2

Updated by Anonymous over 8 years ago

  • Status changed from New to Fix Under Review
  • Assignee set to Anonymous

A fix for this is in wip-calamari_setup_other-wusui

Actions #3

Updated by Anonymous over 8 years ago

Scratch the previous comment. I am still working on this.

Actions #4

Updated by Anonymous over 8 years ago

It appears that the ceph-qa-suite/tasks/ceph.py code creates and sets the keyring values in the cluster routine. I believe that something similar is needed for ceph installations. I have trie ceph-deploy admin command but that did not seem to do the trick. We may have to do something similar to what the ceph.py cluster code does.

Note that doing this exactly the same may not work because the keys have already been created.

Actions #5

Updated by Anonymous over 8 years ago

  • Status changed from Fix Under Review to Closed

The lastest versions of teuthology and ceph-qa-suite tasks do not have this problem.

Actions

Also available in: Atom PDF