Feature #13682
closedIt would be cool if calamari_setup keyrings are also placed into /etc/ceph/ceph.keyring
0%
Updated by Anonymous over 8 years ago
- Subject changed from It would be cool if calamiari_setup keyrings are also placed into /etc/ceph/ceph.keyring to It would be cool if calamari_setup keyrings are also placed into /etc/ceph/ceph.keyring
- Source changed from other to Q/A
Run teuthology using the following yaml file:
roles: - [mon.a, mon.c, osd.0, osd.1, osd.2, client.0] - [mon.b, osd.3, osd.4, osd.5, client.1] machine_type: vps overrides: ceph: log-whitelist: - wrongly marked me down tasks: - ssh_keys: - calamari_setup: test_image: http://file.rdu.redhat.com/~kdreyer/download.inktank.com/enterprise/1.2.3/rhceph-1.2.3-ubuntu-14.04-x86_64.iso email: wusui@redhat.com - install.ship_utilities: null - interactive: - workunit: clients: all: - rados/load-gen-mostlyread.sh targets: vpm049.front.sepia.ceph.com: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCz9GfRQpdIgPXEwA6R4QxC/B4h0mOc3F+uizZKSiesUA451n2KpoUHr+0YgkrJSJTh2LpbyQg93MK8UCWgGfo3BPAOEfbCIa2im5/CwayaYafqOlJ7wvifinKjDnGJzD7Mj90T8rVk+KK/+zyYU7qwhQpEQAOzVwdsPDKc3iNZSILAvJE7QlO851b2WMZRoDKC3vtgJOssWnLHLEcjfiN79AkRTjN2eSUijTME6PvVElnWKOBGZbY69cIXjZ0iTh0IR6ZsOFicjOB4P7tDnbjhy3N2I42ZWfHgSnjmrlLLB6qkUNpOUQK7p3jhkh04KcoEQbZMXNC/bUvixHposRAl vpm140.front.sepia.ceph.com: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDsnEduKlpjUC9M/uTlPL2/J5PCzuiVQ9hmwd2B2j17Kowd5cTeFZ73GgzKSjTRekFEPK+/7D8RnbmftOvKo9iUTdAftSXeYNjzcdAAZ/dlDkHwUOwtLlOk8huHFwElpIsrQryr9ZyyK4A2HwDravb5R7+W+gazW0wi2v54WxQj4/hqBZRurp8SWJNsnr2qcCK84iejw5EHJvrAYYjwzOsFHWFqxiKbPv7rkeLxmFTwMT0PD0bRYBaaUnF7sswmMCGZaXw8le1dmCAPxT4dlymgWLmc5PA3YhbZD7Qu06FVEGCkOiTrWmCl3Pp0hJsvQAjAyYk3BF1mPCtCGL/vsTYZ
This currently fails to run with:
2015-11-03T17:36:01.072 INFO:tasks.workunit.client.1.vpm140.stderr:2015-11-04 01:36:01.058663 7fbcb19f07c0 -1 monclient(hunting): ERROR: missing keyring, cannot use cephx for authentication
I noticed that ceph.bootstrap-mds.keyring ceph.bootstrap-osd.keyring ceph.client.admin.keyring and ceph.mon.keyring are all left sitting around in the local directory after the calamari-setup runs.
So at the interactive point in the above script, I did:
cat *.keyring > /etc/ceph/ceph.keyring
and copied that keyring to /etc/ceph/ceph.keyring on all monitor sites.
Then after continuing from the interactive prompt, the test ran to completion.
This problem is the keyring issue referred to in tracker bug 13676.
Updated by Anonymous over 8 years ago
- Status changed from New to Fix Under Review
- Assignee set to Anonymous
A fix for this is in wip-calamari_setup_other-wusui
Updated by Anonymous over 8 years ago
Scratch the previous comment. I am still working on this.
Updated by Anonymous over 8 years ago
It appears that the ceph-qa-suite/tasks/ceph.py code creates and sets the keyring values in the cluster routine. I believe that something similar is needed for ceph installations. I have trie ceph-deploy admin command but that did not seem to do the trick. We may have to do something similar to what the ceph.py cluster code does.
Note that doing this exactly the same may not work because the keys have already been created.
Updated by Anonymous over 8 years ago
- Status changed from Fix Under Review to Closed
The lastest versions of teuthology and ceph-qa-suite tasks do not have this problem.