# # Author:: Kyle Bader # Cookbook Name:: ceph # Recipe:: osd # # Copyright 2011, DreamHost Web Hosting # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # this recipe allows bootstrapping new osds, with help from mon # Sample environment: # #knife node edit ceph1 #"osd_devices": [ # { # "device": "/dev/sdc" # }, # { # "device": "/dev/sdd", # "dmcrypt": true, # "journal": "/dev/sdd" # } #] include_recipe "ceph::default" include_recipe "ceph::conf" package 'gdisk' do action :upgrade end if !search(:node,"hostname:#{node['hostname']} AND dmcrypt:true").empty? package 'cryptsetup' do action :upgrade end end service "ceph-osd-all" do provider Chef::Provider::Service::Upstart service_name "ceph-osd-all" supports :restart => true action :enable end mons = get_mon_nodes("ceph_bootstrap_osd_key:*") if mons.empty? then puts "No ceph-mon found." else directory "/var/lib/ceph/bootstrap-osd" do owner "root" group "root" mode "0755" end # TODO cluster name cluster = 'ceph' file "/var/lib/ceph/bootstrap-osd/#{cluster}.keyring.raw" do owner "root" group "root" mode "0440" content mons[0]["ceph_bootstrap_osd_key"] end execute "format as keyring" do command <<-EOH set -e # TODO don't put the key in "ps" output, stdout read KEY <'/var/lib/ceph/bootstrap-osd/#{cluster}.keyring.raw' ceph-authtool '/var/lib/ceph/bootstrap-osd/#{cluster}.keyring' --create-keyring --name=client.bootstrap-osd --add-key="$KEY" rm -f '/var/lib/ceph/bootstrap-osd/#{cluster}.keyring.raw' EOH end if is_crowbar? ruby_block "select new disks for ceph osd" do block do do_trigger = false node["crowbar"]["disks"].each do |disk, data| if node["crowbar"]["disks"][disk]["usage"] == "Storage" puts "Disk: #{disk} should be used for ceph" system 'ceph-disk-prepare', \ "/dev/#{disk}" raise 'ceph-disk-prepare failed' unless $?.exitstatus == 0 do_trigger = true node["crowbar"]["disks"][disk]["usage"] = "ceph-osd" node.save end end if do_trigger system 'udevadm', \ "trigger", \ "--subsystem-match=block", \ "--action=add" raise 'udevadm trigger failed' unless $?.exitstatus == 0 end end end else # Calling ceph-disk-prepare is sufficient for deploying an OSD # After ceph-disk-prepare finishes, the new device will be caught # by udev which will run ceph-disk-activate on it (udev will map # the devices if dm-crypt is used). # IMPORTANT: # - Always use the default path for OSD (i.e. /var/lib/ceph/ # osd/$cluster-$id) # - $cluster should always be ceph # - The --dmcrypt option will be available starting w/ Cuttlefish node["ceph"]["osd_devices"].each_with_index do |osd_device,index| dmcrypt = "" if osd_device["encrypted"] == true dmcrypt = "--dmcrypt" end execute "Creating Ceph OSD on #{osd_device['device']}" do command "ceph-disk-prepare #{dmcrypt} #{osd_device['device']}" action :run notifies :start, "service[ceph-osd-all]", :immediately end # we add this status to the node env # so that we can implement recreate # and/or delete functionalities in the # future. node.normal["ceph"]["osd_devices"][index]["status"] == "deployed" node.save end end end