mirror of https://github.com/ceph/ceph-ansible.git
69 lines
2.3 KiB
YAML
69 lines
2.3 KiB
YAML
---
|
|
###########
|
|
# GENERAL #
|
|
###########
|
|
|
|
# Even though Client nodes should not have the admin key
|
|
# at their disposal, some people might want to have it
|
|
# distributed on Client nodes. Setting 'copy_admin_key' to 'true'
|
|
# will copy the admin key to the /etc/ceph/ directory
|
|
copy_admin_key: false
|
|
|
|
user_config: false
|
|
# When pg_autoscale_mode is set to True, you must add the target_size_ratio key with a correct value
|
|
# `pg_num` and `pgp_num` keys will be ignored, even if specified.
|
|
# eg:
|
|
# test:
|
|
# name: "test"
|
|
# pg_num: "{{ osd_pool_default_pg_num }}"
|
|
# pgp_num: "{{ osd_pool_default_pg_num }}"
|
|
# rule_name: "replicated_rule"
|
|
# application: "rbd"
|
|
# type: 1
|
|
# erasure_profile: ""
|
|
# expected_num_objects: ""
|
|
# size: "{{ osd_pool_default_size }}"
|
|
# min_size: "{{ osd_pool_default_min_size }}"
|
|
# pg_autoscale_mode: False
|
|
# target_size_ratio: 0.2
|
|
test:
|
|
name: "test"
|
|
pg_num: "{{ osd_pool_default_pg_num }}"
|
|
pgp_num: "{{ osd_pool_default_pg_num }}"
|
|
rule_name: "replicated_rule"
|
|
application: "rbd"
|
|
type: 1
|
|
erasure_profile: ""
|
|
expected_num_objects: ""
|
|
size: "{{ osd_pool_default_size }}"
|
|
min_size: "{{ osd_pool_default_min_size }}"
|
|
pg_autoscale_mode: False
|
|
test2:
|
|
name: "test2"
|
|
pg_num: "{{ osd_pool_default_pg_num }}"
|
|
pgp_num: "{{ osd_pool_default_pg_num }}"
|
|
rule_name: "replicated_rule"
|
|
application: "rbd"
|
|
type: 1
|
|
erasure_profile: ""
|
|
expected_num_objects: ""
|
|
size: "{{ osd_pool_default_size }}"
|
|
min_size: "{{ osd_pool_default_min_size }}"
|
|
pg_autoscale_mode: False
|
|
pools:
|
|
- "{{ test }}"
|
|
- "{{ test2 }}"
|
|
|
|
# Generate a keyring using ceph-authtool CLI or python.
|
|
# Eg:
|
|
# $ ceph-authtool --gen-print-key
|
|
# or
|
|
# $ python2 -c "import os ; import struct ; import time; import base64 ; key = os.urandom(16) ; header = struct.pack('<hiih',1,int(time.time()),0,len(key)) ; print(base64.b64encode(header + key))"
|
|
#
|
|
# To use a particular secret, you have to add 'key' to the dict below, so something like:
|
|
# - { name: client.test, key: "AQAin8tUMICVFBAALRHNrV0Z4MXupRw4v9JQ6Q==" ...
|
|
|
|
keys:
|
|
- { name: client.test, caps: { mon: "profile rbd", osd: "allow class-read object_prefix rbd_children, profile rbd pool=test" }, mode: "{{ ceph_keyring_permissions }}" }
|
|
- { name: client.test2, caps: { mon: "profile rbd", osd: "allow class-read object_prefix rbd_children, profile rbd pool=test2" }, mode: "{{ ceph_keyring_permissions }}" }
|