chore: add current provisioning state before migration
This commit is contained in:
parent
a9703b4748
commit
50745b0f22
660 changed files with 88126 additions and 0 deletions
4
taskservs/rook-ceph/default/bin/check.sh
Executable file
4
taskservs/rook-ceph/default/bin/check.sh
Executable file
|
|
@ -0,0 +1,4 @@
|
|||
export ROOK_CLUSTER_NAMESPACE=rook-ceph
|
||||
#kubectl -n $ROOK_CLUSTER_NAMESPACE get deployment -l rook_cluster=$ROOK_CLUSTER_NAMESPACE -o jsonpath='{range .items[*]}{"ceph-version="}{.metadata.labels.ceph-version}{"\n"}{end}' | sort | uniq
|
||||
kubectl -n $ROOK_CLUSTER_NAMESPACE get deployment -l rook_cluster=$ROOK_CLUSTER_NAMESPACE -o jsonpath='{range .items[*]}{"ceph-version="}{.metadata.labels.ceph-version} {.metadata.name}{"\n"}{end}' | sort
|
||||
|
||||
10
taskservs/rook-ceph/default/bin/container-versions.sh
Normal file
10
taskservs/rook-ceph/default/bin/container-versions.sh
Normal file
|
|
@ -0,0 +1,10 @@
|
|||
#!/bin/bash
|
||||
ROOK_CLUSTER_NAMESPACE=rook-ceph
|
||||
|
||||
POD_NAME=$(kubectl -n $ROOK_CLUSTER_NAMESPACE get pod -o custom-columns=name:.metadata.name --no-headers | grep rook-ceph-mon-b)
|
||||
kubectl -n $ROOK_CLUSTER_NAMESPACE get pod ${POD_NAME} -o jsonpath='{.spec.containers[0].image}'
|
||||
|
||||
kubectl -n $ROOK_CLUSTER_NAMESPACE get deployments -o jsonpath='{range .items[*]}{.metadata.name}{" \treq/upd/avl: "}{.spec.replicas}{"/"}{.status.updatedReplicas}{"/"}{.status.readyReplicas}{" \trook-version="}{.metadata.labels.rook-version}{"\n"}{end}'
|
||||
|
||||
kubectl -n $ROOK_CLUSTER_NAMESPACE get jobs -o jsonpath='{range .items[*]}{.metadata.name}{" \tsucceeded: "}{.status.succeeded}{" \trook-version="}{.metadata.labels.rook-version}{"\n"}{end}'
|
||||
|
||||
3
taskservs/rook-ceph/default/bin/get_images.sh
Executable file
3
taskservs/rook-ceph/default/bin/get_images.sh
Executable file
|
|
@ -0,0 +1,3 @@
|
|||
#!/bin/bash
|
||||
|
||||
fgrep " image:" * 2>/dev/null | egrep -v "# " | egrep -v "^_" | grep "/" | awk '{print $1" "$3}' | sort -u
|
||||
6
taskservs/rook-ceph/default/bin/get_tags.sh
Executable file
6
taskservs/rook-ceph/default/bin/get_tags.sh
Executable file
|
|
@ -0,0 +1,6 @@
|
|||
#!/bin/bash
|
||||
URL="https://quay.io/api/v1/repository/ceph/ceph/tag/?onlyActiveTags=false&limit=10"
|
||||
|
||||
TAG=v16
|
||||
|
||||
curl -s "$URL" | jq '.tags | sort_by(.last_modified) | reverse | [.[] | select(.name | contains("'$TAG'"))] '
|
||||
3
taskservs/rook-ceph/default/bin/init.sh
Executable file
3
taskservs/rook-ceph/default/bin/init.sh
Executable file
|
|
@ -0,0 +1,3 @@
|
|||
|
||||
kubectl create -f crds.yaml -f common.yaml -f operator.yaml
|
||||
kubectl -n rook-ceph get pod
|
||||
6
taskservs/rook-ceph/default/bin/kill-ceph.sh
Normal file
6
taskservs/rook-ceph/default/bin/kill-ceph.sh
Normal file
|
|
@ -0,0 +1,6 @@
|
|||
|
||||
echo '
|
||||
RUN kubectl get namespace rook-ceph -o json > rook-ceph.json
|
||||
Remove "finalizers in spec"
|
||||
RUN: kubectl replace --raw "/api/v1/namespaces/rook-ceph/finalize" -f rook-ceph.json
|
||||
'
|
||||
3
taskservs/rook-ceph/default/bin/list_images.sh
Executable file
3
taskservs/rook-ceph/default/bin/list_images.sh
Executable file
|
|
@ -0,0 +1,3 @@
|
|||
#!/bin/bash
|
||||
|
||||
kubectl -n rook-ceph describe pods | grep -e "^Name: " -e "Image: "
|
||||
4
taskservs/rook-ceph/default/bin/try.sh
Normal file
4
taskservs/rook-ceph/default/bin/try.sh
Normal file
|
|
@ -0,0 +1,4 @@
|
|||
ROOK_CLUSTER_NAMESPACE=rook-ceph
|
||||
NEW_CEPH_IMAGE='quay.io/ceph/ceph:v17.2.6-20230410'
|
||||
kubectl -n $ROOK_CLUSTER_NAMESPACE patch CephCluster $ROOK_CLUSTER_NAMESPACE --type=merge -p "{\"spec\": {\"cephVersion\": {\"image\": \"$NEW_CEPH_IMAGE\"}}}"
|
||||
|
||||
51
taskservs/rook-ceph/default/bin/update_cluster.sh
Executable file
51
taskservs/rook-ceph/default/bin/update_cluster.sh
Executable file
|
|
@ -0,0 +1,51 @@
|
|||
#!/bin/bash
|
||||
#
|
||||
# https://quay.io/repository/ceph/ceph?tab=tags
|
||||
#
|
||||
#NEW_CEPH_IMAGE="ceph/ceph:v14.2.2-20190722"
|
||||
#NEW_CEPH_IMAGE="ceph/ceph:v14.2.8-20200305"
|
||||
#NEW_CEPH_IMAGE="ceph/ceph:v15.2.0-20200324"
|
||||
#NEW_CEPH_IMAGE="ceph/ceph:v15.2.1-20200410"
|
||||
#NEW_CEPH_IMAGE="ceph/ceph:v15.2.2-20200519"
|
||||
#NEW_CEPH_IMAGE="ceph/ceph:v15.2.3-20200530"
|
||||
#NEW_CEPH_IMAGE="ceph/ceph:v15.2.4-20200630"
|
||||
#NEW_CEPH_IMAGE="ceph/ceph:v15.2.5-20200916"
|
||||
##NEW_CEPH_IMAGE="quay.io/ceph/ceph:v16.2.4-20210514"
|
||||
#NEW_CEPH_IMAGE="quay.io/ceph/ceph:v16.2.5-20210708"
|
||||
#NEW_CEPH_IMAGE="quay.io/ceph/ceph:v16.2.6-20210926"
|
||||
#NEW_CEPH_IMAGE="quay.io/ceph/ceph:v16.2.6-20210927"
|
||||
#NEW_CEPH_IMAGE="quay.io/ceph/ceph:v16.2.7"
|
||||
#NEW_CEPH_IMAGE="quay.io/ceph/ceph:v16.2.7-20220303"
|
||||
#NEW_CEPH_IMAGE="quay.io/ceph/ceph:v16.2.7-20220317"
|
||||
#NEW_CEPH_IMAGE="quay.io/ceph/ceph:v17.1.0-20220317"
|
||||
# cluster.yaml
|
||||
# Whether to allow unsupported versions of Ceph. Currently `octopus` and `pacific` are supported.
|
||||
# Future versions such as `pacific` would require this to be set to `true`.
|
||||
# Do not set to true in production.
|
||||
# allowUnsupported: false
|
||||
# NEW_CEPH_IMAGE="quay.io/ceph/ceph:v16.2.7-20220317"
|
||||
#NEW_CEPH_IMAGE="quay.io/ceph/ceph:v16.2.10"
|
||||
#NEW_CEPH_IMAGE="quay.io/ceph/ceph:v17.2.6-20230410"
|
||||
NEW_CEPH_IMAGE="quay.io/ceph/ceph:v18.2.0-20230912"
|
||||
|
||||
export ROOK_SYSTEM_NAMESPACE="rook-ceph-system"
|
||||
export ROOK_SYSTEM_NAMESPACE="rook-ceph"
|
||||
export ROOK_NAMESPACE="rook-ceph"
|
||||
CLUSTER_NAME="$ROOK_NAMESPACE" # change if your cluster name is not the Rook namespace
|
||||
|
||||
RUNNER=""
|
||||
[ "$1" == "-w" ] && RUNNER="watch" && shift
|
||||
if [ "$1" == "update" ] ; then
|
||||
[ -z "$RUNNER" ] && RUNNER="watch"
|
||||
kubectl -n $ROOK_NAMESPACE patch CephCluster $CLUSTER_NAME --type=merge \
|
||||
-p "{\"spec\": {\"cephVersion\": {\"image\": \"$NEW_CEPH_IMAGE\"}}}"
|
||||
fi
|
||||
|
||||
CMD='kubectl -n $ROOK_NAMESPACE describe pods | grep "Image:.*ceph/ceph" | sort | uniq -c'
|
||||
#CMD='kubectl -n $ROOK_NAMESPACE describe pods | grep "Image:.*ceph/ceph" '
|
||||
|
||||
if [ -z "$RUNNER" ] ; then
|
||||
eval $CMD
|
||||
else
|
||||
$RUNNER $CMD
|
||||
fi
|
||||
2
taskservs/rook-ceph/default/bin/update_operator.sh
Executable file
2
taskservs/rook-ceph/default/bin/update_operator.sh
Executable file
|
|
@ -0,0 +1,2 @@
|
|||
#kubectl -n rook-ceph-system set image deploy/rook-ceph-operator rook-ceph-operator=rook/ceph:v1.1.8
|
||||
#kubectl -n $ROOK_SYSTEM_NAMESPACE set image deploy/rook-ceph-operator rook-ceph-operator=rook/ceph:v1.0.4
|
||||
3
taskservs/rook-ceph/default/bin/view_upgrade.sh
Executable file
3
taskservs/rook-ceph/default/bin/view_upgrade.sh
Executable file
|
|
@ -0,0 +1,3 @@
|
|||
export ROOK_CLUSTER_NAMESPACE=rook-ceph
|
||||
watch --exec kubectl -n $ROOK_CLUSTER_NAMESPACE get deployments -l rook_cluster=$ROOK_CLUSTER_NAMESPACE -o jsonpath='{range .items[*]}{.metadata.name}{" \treq/upd/avl: "}{.spec.replicas}{"/"}{.status.updatedReplicas}{"/"}{.status.readyReplicas}{" \trook-version="}{.metadata.labels.rook-version}{"\n"}{end}' -o wide
|
||||
|
||||
1
taskservs/rook-ceph/default/bin/watch.sh
Executable file
1
taskservs/rook-ceph/default/bin/watch.sh
Executable file
|
|
@ -0,0 +1 @@
|
|||
watch -n 2 "kubectl get pods -n rook-ceph"
|
||||
12
taskservs/rook-ceph/default/env-rook-ceph.j2
Normal file
12
taskservs/rook-ceph/default/env-rook-ceph.j2
Normal file
|
|
@ -0,0 +1,12 @@
|
|||
{%- if taskserv.name == "rook-ceph" %}
|
||||
|
||||
NAMESPACE="{{taskserv.namespace}}"
|
||||
|
||||
dataDirHostPath="{{taskserv.dataDirHostPath}}"
|
||||
|
||||
{% set target_taskserv = server.taskservs | filter(attribute="name", value=taskserv.name) | first %}
|
||||
TARGET_SAVE_PATH="{{target_taskserv.target_save_path | default(value = "")}}"
|
||||
|
||||
{%- endif %}
|
||||
|
||||
|
||||
65
taskservs/rook-ceph/default/install-rook-ceph.sh
Executable file
65
taskservs/rook-ceph/default/install-rook-ceph.sh
Executable file
|
|
@ -0,0 +1,65 @@
|
|||
#!/bin/bash
|
||||
# Info: Script to install/create/delete/update rook-ceph from file settings
|
||||
# Author: JesusPerezLorenzo
|
||||
# Release: 1.0
|
||||
# Date: 15-12-2023
|
||||
|
||||
USAGE="install-rook-ceph.sh full-path-settings-file [ -m controlplane (hostname -cp-) | worker] [*install | update | makejoin | remove | fullremove]"
|
||||
|
||||
[ "$1" == "-h" ] && echo "$USAGE" && exit 1
|
||||
|
||||
[[ "$1" == *setting* ]] && [ -r "$1" ] && . $1 && shift
|
||||
[[ "$1" == env-* ]] && [ -r "$1" ] && . $1 && shift
|
||||
[ -r "env-rook-ceph" ] && . env-rook-ceph
|
||||
|
||||
|
||||
has_rook_operator=$(kubectl get pods -n ${NAMESPACE} 2>/dev/null | grep operator)
|
||||
|
||||
INSTALL_NAME="root-cepth"
|
||||
|
||||
if [ ! -d "rook-ceph" ] ; then
|
||||
echo "Error: rook-cepth path not found"
|
||||
exit 1
|
||||
fi
|
||||
|
||||
_save_target() {
|
||||
[ -z "$TARGET_SAVE_PATH" ] && return
|
||||
local file_path=$1
|
||||
mkdir -p "$TARGET_SAVE_PATH"
|
||||
if cp "$file_path" "$TARGET_SAVE_PATH" ; then
|
||||
echo "$file_path saved in $TARGET_SAVE_PATH"
|
||||
fi
|
||||
}
|
||||
_kubectl() {
|
||||
local mode=$1
|
||||
local yaml=$2
|
||||
[ ! -r "$yaml" ] && return
|
||||
case $mode in
|
||||
"create") if ! kubectl create -f "$yaml" ; then
|
||||
echo "Error: $INSTALL_NAME $yaml"
|
||||
fi
|
||||
;;
|
||||
"apply") if ! kubectl apply -f "$yaml" ; then
|
||||
echo "Error: $INSTALL_NAME $yaml"
|
||||
fi
|
||||
;;
|
||||
esac
|
||||
_save_target "$yaml"
|
||||
}
|
||||
|
||||
cd rook-ceph || exit 1
|
||||
|
||||
_kubectl create crds.yaml
|
||||
_kubectl apply common.yaml
|
||||
_kubectl apply operator.yaml
|
||||
_kubectl apply cluster.yaml
|
||||
_kubectl apply object.yaml
|
||||
_kubectl apply object-user.yaml
|
||||
_kubectl apply pool.yaml
|
||||
_kubectl apply storageclass-csi.yaml
|
||||
_kubectl apply storageclass-rdb.yaml
|
||||
_kubectl apply filesystem.yaml
|
||||
_kubectl apply rgw-external.yaml
|
||||
_kubectl apply dashboard-external-https.yaml
|
||||
#_kubectl apply nfs.yaml
|
||||
_kubectl apply toolbox.yaml
|
||||
343
taskservs/rook-ceph/default/rook-ceph/cluster.yaml.j2
Normal file
343
taskservs/rook-ceph/default/rook-ceph/cluster.yaml.j2
Normal file
|
|
@ -0,0 +1,343 @@
|
|||
#################################################################################################################
|
||||
# Define the settings for the rook-ceph cluster with common settings for a production cluster.
|
||||
# All nodes with available raw devices will be used for the Ceph cluster. At least three nodes are required
|
||||
# in this example. See the documentation for more details on storage settings available.
|
||||
|
||||
# For example, to create the cluster:
|
||||
# kubectl create -f crds.yaml -f common.yaml -f operator.yaml
|
||||
# kubectl create -f cluster.yaml
|
||||
#################################################################################################################
|
||||
|
||||
apiVersion: ceph.rook.io/v1
|
||||
kind: CephCluster
|
||||
metadata:
|
||||
name: {{taskserv.clustertname | default(value="rook-ceph")}}
|
||||
namespace: {{taskserv.namespace | default (value="rook-ceph")}} # namespace:cluster
|
||||
spec:
|
||||
cephVersion:
|
||||
# The container image used to launch the Ceph daemon pods (mon, mgr, osd, mds, rgw).
|
||||
# v17 is Quincy, v18 is Reef.
|
||||
# RECOMMENDATION: In production, use a specific version tag instead of the general v17 flag, which pulls the latest release and could result in different
|
||||
# versions running within the cluster. See tags available at https://hub.docker.com/r/ceph/ceph/tags/.
|
||||
# If you want to be more precise, you can always use a timestamp tag such as quay.io/ceph/ceph:v18.2.2-20240311
|
||||
# This tag might not contain a new Ceph version, just security fixes from the underlying operating system, which will reduce vulnerabilities
|
||||
image: {{taskserv.ceph_image}}
|
||||
# Whether to allow unsupported versions of Ceph. Currently `quincy` and `reef` are supported.
|
||||
# Future versions such as `squid` (v19) would require this to be set to `true`.
|
||||
# Do not set to true in production.
|
||||
allowUnsupported: false
|
||||
# The path on the host where configuration files will be persisted. Must be specified.
|
||||
# Important: if you reinstall the cluster, make sure you delete this directory from each host or else the mons will fail to start on the new cluster.
|
||||
# In Minikube, the '/data' directory is configured to persist across reboots. Use "/data/rook" in Minikube environment.
|
||||
dataDirHostPath: {{taskserv.dataDirHostPath | default (value="/var/lib/rook")}}
|
||||
# Whether or not upgrade should continue even if a check fails
|
||||
# This means Ceph's status could be degraded and we don't recommend upgrading but you might decide otherwise
|
||||
# Use at your OWN risk
|
||||
# To understand Rook's upgrade process of Ceph, read https://rook.io/docs/rook/latest/ceph-upgrade.html#ceph-version-upgrades
|
||||
skipUpgradeChecks: false
|
||||
# Whether or not continue if PGs are not clean during an upgrade
|
||||
continueUpgradeAfterChecksEvenIfNotHealthy: false
|
||||
# WaitTimeoutForHealthyOSDInMinutes defines the time (in minutes) the operator would wait before an OSD can be stopped for upgrade or restart.
|
||||
# If the timeout exceeds and OSD is not ok to stop, then the operator would skip upgrade for the current OSD and proceed with the next one
|
||||
# if `continueUpgradeAfterChecksEvenIfNotHealthy` is `false`. If `continueUpgradeAfterChecksEvenIfNotHealthy` is `true`, then operator would
|
||||
# continue with the upgrade of an OSD even if its not ok to stop after the timeout. This timeout won't be applied if `skipUpgradeChecks` is `true`.
|
||||
# The default wait timeout is 10 minutes.
|
||||
waitTimeoutForHealthyOSDInMinutes: 10
|
||||
# Whether or not requires PGs are clean before an OSD upgrade. If set to `true` OSD upgrade process won't start until PGs are healthy.
|
||||
# This configuration will be ignored if `skipUpgradeChecks` is `true`.
|
||||
# Default is false.
|
||||
upgradeOSDRequiresHealthyPGs: false
|
||||
mon:
|
||||
# Set the number of mons to be started. Generally recommended to be 3.
|
||||
# For highest availability, an odd number of mons should be specified.
|
||||
count: 3
|
||||
# The mons should be on unique nodes. For production, at least 3 nodes are recommended for this reason.
|
||||
# Mons should only be allowed on the same node for test environments where data loss is acceptable.
|
||||
allowMultiplePerNode: false
|
||||
mgr:
|
||||
# When higher availability of the mgr is needed, increase the count to 2.
|
||||
# In that case, one mgr will be active and one in standby. When Ceph updates which
|
||||
# mgr is active, Rook will update the mgr services to match the active mgr.
|
||||
count: 2
|
||||
allowMultiplePerNode: false
|
||||
modules:
|
||||
# List of modules to optionally enable or disable.
|
||||
# Note the "dashboard" and "monitoring" modules are already configured by other settings in the cluster CR.
|
||||
- name: rook
|
||||
enabled: true
|
||||
# enable the ceph dashboard for viewing cluster status
|
||||
dashboard:
|
||||
enabled: true
|
||||
# serve the dashboard under a subpath (useful when you are accessing the dashboard via a reverse proxy)
|
||||
# urlPrefix: /ceph-dashboard
|
||||
# serve the dashboard at the given port.
|
||||
# port: 8443
|
||||
# serve the dashboard using SSL
|
||||
ssl: true
|
||||
# The url of the Prometheus instance
|
||||
# prometheusEndpoint: <protocol>://<prometheus-host>:<port>
|
||||
# Whether SSL should be verified if the Prometheus server is using https
|
||||
# prometheusEndpointSSLVerify: false
|
||||
# enable prometheus alerting for cluster
|
||||
monitoring:
|
||||
# requires Prometheus to be pre-installed
|
||||
enabled: false
|
||||
# Whether to disable the metrics reported by Ceph. If false, the prometheus mgr module and Ceph exporter are enabled.
|
||||
# If true, the prometheus mgr module and Ceph exporter are both disabled. Default is false.
|
||||
metricsDisabled: false
|
||||
network:
|
||||
connections:
|
||||
# Whether to encrypt the data in transit across the wire to prevent eavesdropping the data on the network.
|
||||
# The default is false. When encryption is enabled, all communication between clients and Ceph daemons, or between Ceph daemons will be encrypted.
|
||||
# When encryption is not enabled, clients still establish a strong initial authentication and data integrity is still validated with a crc check.
|
||||
# IMPORTANT: Encryption requires the 5.11 kernel for the latest nbd and cephfs drivers. Alternatively for testing only,
|
||||
# you can set the "mounter: rbd-nbd" in the rbd storage class, or "mounter: fuse" in the cephfs storage class.
|
||||
# The nbd and fuse drivers are *not* recommended in production since restarting the csi driver pod will disconnect the volumes.
|
||||
encryption:
|
||||
enabled: false
|
||||
# Whether to compress the data in transit across the wire. The default is false.
|
||||
# See the kernel requirements above for encryption.
|
||||
compression:
|
||||
enabled: false
|
||||
# Whether to require communication over msgr2. If true, the msgr v1 port (6789) will be disabled
|
||||
# and clients will be required to connect to the Ceph cluster with the v2 port (3300).
|
||||
# Requires a kernel that supports msgr v2 (kernel 5.11 or CentOS 8.4 or newer).
|
||||
requireMsgr2: false
|
||||
# enable host networking
|
||||
#provider: host
|
||||
# enable the Multus network provider
|
||||
#provider: multus
|
||||
#selectors:
|
||||
# The selector keys are required to be `public` and `cluster`.
|
||||
# Based on the configuration, the operator will do the following:
|
||||
# 1. if only the `public` selector key is specified both public_network and cluster_network Ceph settings will listen on that interface
|
||||
# 2. if both `public` and `cluster` selector keys are specified the first one will point to 'public_network' flag and the second one to 'cluster_network'
|
||||
#
|
||||
# In order to work, each selector value must match a NetworkAttachmentDefinition object in Multus
|
||||
#
|
||||
# public: public-conf --> NetworkAttachmentDefinition object name in Multus
|
||||
# cluster: cluster-conf --> NetworkAttachmentDefinition object name in Multus
|
||||
# Provide internet protocol version. IPv6, IPv4 or empty string are valid options. Empty string would mean IPv4
|
||||
#ipFamily: "IPv6"
|
||||
# Ceph daemons to listen on both IPv4 and Ipv6 networks
|
||||
#dualStack: false
|
||||
# Enable multiClusterService to export the mon and OSD services to peer cluster.
|
||||
# This is useful to support RBD mirroring between two clusters having overlapping CIDRs.
|
||||
# Ensure that peer clusters are connected using an MCS API compatible application, like Globalnet Submariner.
|
||||
#multiClusterService:
|
||||
# enabled: false
|
||||
|
||||
# enable the crash collector for ceph daemon crash collection
|
||||
crashCollector:
|
||||
disable: false
|
||||
# Uncomment daysToRetain to prune ceph crash entries older than the
|
||||
# specified number of days.
|
||||
#daysToRetain: 30
|
||||
# enable log collector, daemons will log on files and rotate
|
||||
logCollector:
|
||||
enabled: true
|
||||
periodicity: daily # one of: hourly, daily, weekly, monthly
|
||||
maxLogSize: 500M # SUFFIX may be 'M' or 'G'. Must be at least 1M.
|
||||
# automate [data cleanup process](https://github.com/rook/rook/blob/master/Documentation/Storage-Configuration/ceph-teardown.md#delete-the-data-on-hosts) in cluster destruction.
|
||||
cleanupPolicy:
|
||||
# Since cluster cleanup is destructive to data, confirmation is required.
|
||||
# To destroy all Rook data on hosts during uninstall, confirmation must be set to "yes-really-destroy-data".
|
||||
# This value should only be set when the cluster is about to be deleted. After the confirmation is set,
|
||||
# Rook will immediately stop configuring the cluster and only wait for the delete command.
|
||||
# If the empty string is set, Rook will not destroy any data on hosts during uninstall.
|
||||
confirmation: ""
|
||||
# sanitizeDisks represents settings for sanitizing OSD disks on cluster deletion
|
||||
sanitizeDisks:
|
||||
# method indicates if the entire disk should be sanitized or simply ceph's metadata
|
||||
# in both case, re-install is possible
|
||||
# possible choices are 'complete' or 'quick' (default)
|
||||
method: quick
|
||||
# dataSource indicate where to get random bytes from to write on the disk
|
||||
# possible choices are 'zero' (default) or 'random'
|
||||
# using random sources will consume entropy from the system and will take much more time then the zero source
|
||||
dataSource: zero
|
||||
# iteration overwrite N times instead of the default (1)
|
||||
# takes an integer value
|
||||
iteration: 1
|
||||
# allowUninstallWithVolumes defines how the uninstall should be performed
|
||||
# If set to true, cephCluster deletion does not wait for the PVs to be deleted.
|
||||
allowUninstallWithVolumes: false
|
||||
# To control where various services will be scheduled by kubernetes, use the placement configuration sections below.
|
||||
# The example under 'all' would have all services scheduled on kubernetes nodes labeled with 'role=storage-node' and
|
||||
# tolerate taints with a key of 'storage-node'.
|
||||
# placement:
|
||||
# all:
|
||||
# nodeAffinity:
|
||||
# requiredDuringSchedulingIgnoredDuringExecution:
|
||||
# nodeSelectorTerms:
|
||||
# - matchExpressions:
|
||||
# - key: role
|
||||
# operator: In
|
||||
# values:
|
||||
# - storage-node
|
||||
# podAffinity:
|
||||
# podAntiAffinity:
|
||||
# topologySpreadConstraints:
|
||||
# tolerations:
|
||||
# - key: storage-node
|
||||
# operator: Exists
|
||||
# The above placement information can also be specified for mon, osd, and mgr components
|
||||
# mon:
|
||||
# Monitor deployments may contain an anti-affinity rule for avoiding monitor
|
||||
# collocation on the same node. This is a required rule when host network is used
|
||||
# or when AllowMultiplePerNode is false. Otherwise this anti-affinity rule is a
|
||||
# preferred rule with weight: 50.
|
||||
# osd:
|
||||
# prepareosd:
|
||||
# mgr:
|
||||
# cleanup:
|
||||
annotations:
|
||||
# all:
|
||||
# mon:
|
||||
# osd:
|
||||
# cleanup:
|
||||
# prepareosd:
|
||||
# clusterMetadata annotations will be applied to only `rook-ceph-mon-endpoints` configmap and the `rook-ceph-mon` and `rook-ceph-admin-keyring` secrets.
|
||||
# And clusterMetadata annotations will not be merged with `all` annotations.
|
||||
# clusterMetadata:
|
||||
# kubed.appscode.com/sync: "true"
|
||||
# If no mgr annotations are set, prometheus scrape annotations will be set by default.
|
||||
# mgr:
|
||||
labels:
|
||||
# all:
|
||||
# mon:
|
||||
# osd:
|
||||
# cleanup:
|
||||
# mgr:
|
||||
# prepareosd:
|
||||
# These labels are applied to ceph-exporter servicemonitor only
|
||||
# exporter:
|
||||
# monitoring is a list of key-value pairs. It is injected into all the monitoring resources created by operator.
|
||||
# These labels can be passed as LabelSelector to Prometheus
|
||||
# monitoring:
|
||||
# crashcollector:
|
||||
resources:
|
||||
#The requests and limits set here, allow the mgr pod to use half of one CPU core and 1 gigabyte of memory
|
||||
# mgr:
|
||||
# limits:
|
||||
# memory: "1024Mi"
|
||||
# requests:
|
||||
# cpu: "500m"
|
||||
# memory: "1024Mi"
|
||||
# The above example requests/limits can also be added to the other components
|
||||
# mon:
|
||||
# osd:
|
||||
# For OSD it also is a possible to specify requests/limits based on device class
|
||||
# osd-hdd:
|
||||
# osd-ssd:
|
||||
# osd-nvme:
|
||||
# prepareosd:
|
||||
# mgr-sidecar:
|
||||
# crashcollector:
|
||||
# logcollector:
|
||||
# cleanup:
|
||||
# exporter:
|
||||
# The option to automatically remove OSDs that are out and are safe to destroy.
|
||||
removeOSDsIfOutAndSafeToRemove: false
|
||||
priorityClassNames:
|
||||
#all: rook-ceph-default-priority-class
|
||||
mon: system-node-critical
|
||||
osd: system-node-critical
|
||||
mgr: system-cluster-critical
|
||||
#crashcollector: rook-ceph-crashcollector-priority-class
|
||||
storage: # cluster level storage configuration and selection
|
||||
useAllNodes: true
|
||||
useAllDevices: true
|
||||
#deviceFilter:
|
||||
config:
|
||||
# crushRoot: "custom-root" # specify a non-default root label for the CRUSH map
|
||||
# metadataDevice: "md0" # specify a non-rotational storage so ceph-volume will use it as block db device of bluestore.
|
||||
# databaseSizeMB: "1024" # uncomment if the disks are smaller than 100 GB
|
||||
# osdsPerDevice: "1" # this value can be overridden at the node or device level
|
||||
# encryptedDevice: "true" # the default value for this option is "false"
|
||||
# Individual nodes and their config can be specified as well, but 'useAllNodes' above must be set to false. Then, only the named
|
||||
# nodes below will be used as storage resources. Each node's 'name' field should match their 'kubernetes.io/hostname' label.
|
||||
# nodes:
|
||||
# - name: "172.17.4.201"
|
||||
# devices: # specific devices to use for storage can be specified for each node
|
||||
# - name: "sdb"
|
||||
# - name: "nvme01" # multiple osds can be created on high performance devices
|
||||
# config:
|
||||
# osdsPerDevice: "5"
|
||||
# - name: "/dev/disk/by-id/ata-ST4000DM004-XXXX" # devices can be specified using full udev paths
|
||||
# config: # configuration can be specified at the node level which overrides the cluster level config
|
||||
# - name: "172.17.4.301"
|
||||
# deviceFilter: "^sd."
|
||||
#{%- if taskserv.nodes and taskserv.nodes[0] %}
|
||||
#nodes:
|
||||
# {%- for node in taskserv.nodes %}
|
||||
# - name: {{node.name}}
|
||||
# devices:
|
||||
# {%- for dev in node.devices %}
|
||||
# - name: {{dev}}
|
||||
# {%- endfor -%}
|
||||
# {% endfor %}
|
||||
#{% endif -%}
|
||||
# when onlyApplyOSDPlacement is false, will merge both placement.All() and placement.osd
|
||||
onlyApplyOSDPlacement: false
|
||||
# Time for which an OSD pod will sleep before restarting, if it stopped due to flapping
|
||||
# flappingRestartIntervalHours: 24
|
||||
# The section for configuring management of daemon disruptions during upgrade or fencing.
|
||||
disruptionManagement:
|
||||
# If true, the operator will create and manage PodDisruptionBudgets for OSD, Mon, RGW, and MDS daemons. OSD PDBs are managed dynamically
|
||||
# via the strategy outlined in the [design](https://github.com/rook/rook/blob/master/design/ceph/ceph-managed-disruptionbudgets.md). The operator will
|
||||
# block eviction of OSDs by default and unblock them safely when drains are detected.
|
||||
managePodBudgets: true
|
||||
# A duration in minutes that determines how long an entire failureDomain like `region/zone/host` will be held in `noout` (in addition to the
|
||||
# default DOWN/OUT interval) when it is draining. This is only relevant when `managePodBudgets` is `true`. The default value is `30` minutes.
|
||||
osdMaintenanceTimeout: 30
|
||||
# A duration in minutes that the operator will wait for the placement groups to become healthy (active+clean) after a drain was completed and OSDs came back up.
|
||||
# Operator will continue with the next drain if the timeout exceeds. It only works if `managePodBudgets` is `true`.
|
||||
# No values or 0 means that the operator will wait until the placement groups are healthy before unblocking the next drain.
|
||||
pgHealthCheckTimeout: 0
|
||||
|
||||
# csi defines CSI Driver settings applied per cluster.
|
||||
csi:
|
||||
readAffinity:
|
||||
# Enable read affinity to enable clients to optimize reads from an OSD in the same topology.
|
||||
# Enabling the read affinity may cause the OSDs to consume some extra memory.
|
||||
# For more details see this doc:
|
||||
# https://rook.io/docs/rook/latest/Storage-Configuration/Ceph-CSI/ceph-csi-drivers/#enable-read-affinity-for-rbd-volumes
|
||||
enabled: false
|
||||
|
||||
# cephfs driver specific settings.
|
||||
cephfs:
|
||||
# Set CephFS Kernel mount options to use https://docs.ceph.com/en/latest/man/8/mount.ceph/#options.
|
||||
# kernelMountOptions: ""
|
||||
# Set CephFS Fuse mount options to use https://docs.ceph.com/en/quincy/man/8/ceph-fuse/#options.
|
||||
# fuseMountOptions: ""
|
||||
|
||||
# healthChecks
|
||||
# Valid values for daemons are 'mon', 'osd', 'status'
|
||||
healthCheck:
|
||||
daemonHealth:
|
||||
mon:
|
||||
disabled: false
|
||||
interval: 45s
|
||||
osd:
|
||||
disabled: false
|
||||
interval: 60s
|
||||
status:
|
||||
disabled: false
|
||||
interval: 60s
|
||||
# Change pod liveness probe timing or threshold values. Works for all mon,mgr,osd daemons.
|
||||
livenessProbe:
|
||||
mon:
|
||||
disabled: false
|
||||
mgr:
|
||||
disabled: false
|
||||
osd:
|
||||
disabled: false
|
||||
# Change pod startup probe timing or threshold values. Works for all mon,mgr,osd daemons.
|
||||
startupProbe:
|
||||
mon:
|
||||
disabled: false
|
||||
mgr:
|
||||
disabled: false
|
||||
osd:
|
||||
disabled: false
|
||||
1251
taskservs/rook-ceph/default/rook-ceph/common.yaml.j2
Normal file
1251
taskservs/rook-ceph/default/rook-ceph/common.yaml.j2
Normal file
File diff suppressed because it is too large
Load diff
13158
taskservs/rook-ceph/default/rook-ceph/crds.yaml
Normal file
13158
taskservs/rook-ceph/default/rook-ceph/crds.yaml
Normal file
File diff suppressed because it is too large
Load diff
|
|
@ -0,0 +1,20 @@
|
|||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
name: rook-ceph-mgr-dashboard-external-https
|
||||
namespace: {{taskserv.namespace | default (value="rook-ceph")}} # namespace:cluster
|
||||
labels:
|
||||
app: rook-ceph-mgr
|
||||
rook_cluster: {{taskserv.clustertname | default(value="rook-ceph")}} # namespace:cluster
|
||||
spec:
|
||||
ports:
|
||||
- name: dashboard
|
||||
port: 8443
|
||||
protocol: TCP
|
||||
targetPort: 8443
|
||||
selector:
|
||||
app: rook-ceph-mgr
|
||||
mgr_role: active
|
||||
rook_cluster: {{taskserv.clustertname | default(value="rook-ceph")}} # namespace:cluster
|
||||
sessionAffinity: None
|
||||
type: NodePort
|
||||
71
taskservs/rook-ceph/default/rook-ceph/direct-mount.yaml.j2
Normal file
71
taskservs/rook-ceph/default/rook-ceph/direct-mount.yaml.j2
Normal file
|
|
@ -0,0 +1,71 @@
|
|||
apiVersion: apps/v1
|
||||
kind: Deployment
|
||||
metadata:
|
||||
name: rook-direct-mount
|
||||
namespace: {{taskserv.namespace | default (value="rook-ceph")}} # namespace:cluster
|
||||
labels:
|
||||
app: rook-direct-mount
|
||||
spec:
|
||||
replicas: 1
|
||||
selector:
|
||||
matchLabels:
|
||||
app: rook-direct-mount
|
||||
template:
|
||||
metadata:
|
||||
labels:
|
||||
app: rook-direct-mount
|
||||
spec:
|
||||
dnsPolicy: ClusterFirstWithHostNet
|
||||
serviceAccountName: rook-ceph-default
|
||||
containers:
|
||||
- name: rook-direct-mount
|
||||
image: {{taskserv.rookCeph_image}}
|
||||
command: ["/bin/bash"]
|
||||
args: ["-m", "-c", "/usr/local/bin/toolbox.sh"]
|
||||
imagePullPolicy: IfNotPresent
|
||||
tty: true
|
||||
env:
|
||||
- name: ROOK_CEPH_USERNAME
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
name: rook-ceph-mon
|
||||
key: ceph-username
|
||||
securityContext:
|
||||
privileged: true
|
||||
runAsUser: 0
|
||||
volumeMounts:
|
||||
- mountPath: /dev
|
||||
name: dev
|
||||
- mountPath: /sys/bus
|
||||
name: sysbus
|
||||
- mountPath: /lib/modules
|
||||
name: libmodules
|
||||
- name: mon-endpoint-volume
|
||||
mountPath: /etc/rook
|
||||
- name: ceph-admin-secret
|
||||
mountPath: /var/lib/rook-ceph-mon
|
||||
# if hostNetwork: false, the "rbd map" command hangs, see https://github.com/rook/rook/issues/2021
|
||||
hostNetwork: true
|
||||
volumes:
|
||||
- name: ceph-admin-secret
|
||||
secret:
|
||||
secretName: rook-ceph-mon
|
||||
optional: false
|
||||
items:
|
||||
- key: ceph-secret
|
||||
path: secret.keyring
|
||||
- name: dev
|
||||
hostPath:
|
||||
path: /dev
|
||||
- name: sysbus
|
||||
hostPath:
|
||||
path: /sys/bus
|
||||
- name: libmodules
|
||||
hostPath:
|
||||
path: /lib/modules
|
||||
- name: mon-endpoint-volume
|
||||
configMap:
|
||||
name: rook-ceph-mon-endpoints
|
||||
items:
|
||||
- key: data
|
||||
path: mon-endpoints
|
||||
157
taskservs/rook-ceph/default/rook-ceph/filesystem.yaml.j2
Normal file
157
taskservs/rook-ceph/default/rook-ceph/filesystem.yaml.j2
Normal file
|
|
@ -0,0 +1,157 @@
|
|||
#################################################################################################################
|
||||
# Create a filesystem with settings with replication enabled for a production environment.
|
||||
# A minimum of 3 OSDs on different nodes are required in this example.
|
||||
# If one mds daemon per node is too restrictive, see the podAntiAffinity below.
|
||||
# kubectl create -f filesystem.yaml
|
||||
#################################################################################################################
|
||||
|
||||
apiVersion: ceph.rook.io/v1
|
||||
kind: CephFilesystem
|
||||
metadata:
|
||||
name: {{taskserv.storage_fsName}}
|
||||
namespace: {{taskserv.namespace | default (value="rook-ceph")}} # namespace:cluster
|
||||
spec:
|
||||
# The metadata pool spec. Must use replication.
|
||||
metadataPool:
|
||||
replicated:
|
||||
size: 3
|
||||
requireSafeReplicaSize: true
|
||||
parameters:
|
||||
# Inline compression mode for the data pool
|
||||
# Further reference: https://docs.ceph.com/docs/master/rados/configuration/bluestore-config-ref/#inline-compression
|
||||
compression_mode:
|
||||
none
|
||||
# gives a hint (%) to Ceph in terms of expected consumption of the total cluster capacity of a given pool
|
||||
# for more info: https://docs.ceph.com/docs/master/rados/operations/placement-groups/#specifying-expected-pool-size
|
||||
#target_size_ratio: ".5"
|
||||
# The list of data pool specs. Can use replication or erasure coding.
|
||||
dataPools:
|
||||
- name: replicated
|
||||
failureDomain: host
|
||||
replicated:
|
||||
size: 3
|
||||
# Disallow setting pool with replica 1, this could lead to data loss without recovery.
|
||||
# Make sure you're *ABSOLUTELY CERTAIN* that is what you want
|
||||
requireSafeReplicaSize: true
|
||||
parameters:
|
||||
# Inline compression mode for the data pool
|
||||
# Further reference: https://docs.ceph.com/docs/master/rados/configuration/bluestore-config-ref/#inline-compression
|
||||
compression_mode:
|
||||
none
|
||||
# gives a hint (%) to Ceph in terms of expected consumption of the total cluster capacity of a given pool
|
||||
# for more info: https://docs.ceph.com/docs/master/rados/operations/placement-groups/#specifying-expected-pool-size
|
||||
#target_size_ratio: ".5"
|
||||
# Whether to preserve filesystem after CephFilesystem CRD deletion
|
||||
preserveFilesystemOnDelete: true
|
||||
# The metadata service (mds) configuration
|
||||
metadataServer:
|
||||
# The number of active MDS instances
|
||||
activeCount: 1
|
||||
# Whether each active MDS instance will have an active standby with a warm metadata cache for faster failover.
|
||||
# If false, standbys will be available, but will not have a warm cache.
|
||||
activeStandby: true
|
||||
# The affinity rules to apply to the mds deployment
|
||||
placement:
|
||||
# nodeAffinity:
|
||||
# requiredDuringSchedulingIgnoredDuringExecution:
|
||||
# nodeSelectorTerms:
|
||||
# - matchExpressions:
|
||||
# - key: role
|
||||
# operator: In
|
||||
# values:
|
||||
# - mds-node
|
||||
# topologySpreadConstraints:
|
||||
# tolerations:
|
||||
# - key: mds-node
|
||||
# operator: Exists
|
||||
# podAffinity:
|
||||
podAntiAffinity:
|
||||
requiredDuringSchedulingIgnoredDuringExecution:
|
||||
- labelSelector:
|
||||
matchExpressions:
|
||||
- key: app
|
||||
operator: In
|
||||
values:
|
||||
- rook-ceph-mds
|
||||
## Add this if you want to allow mds daemons for different filesystems to run on one
|
||||
## node. The value in "values" must match .metadata.name.
|
||||
# - key: rook_file_system
|
||||
# operator: In
|
||||
# values:
|
||||
# - {{taskserv.storage_fsName}}
|
||||
# topologyKey: kubernetes.io/hostname will place MDS across different hosts
|
||||
topologyKey: kubernetes.io/hostname
|
||||
preferredDuringSchedulingIgnoredDuringExecution:
|
||||
- weight: 100
|
||||
podAffinityTerm:
|
||||
labelSelector:
|
||||
matchExpressions:
|
||||
- key: app
|
||||
operator: In
|
||||
values:
|
||||
- rook-ceph-mds
|
||||
# topologyKey: */zone can be used to spread MDS across different AZ
|
||||
# Use <topologyKey: failure-domain.beta.kubernetes.io/zone> in k8s cluster if your cluster is v1.16 or lower
|
||||
# Use <topologyKey: topology.kubernetes.io/zone> in k8s cluster is v1.17 or upper
|
||||
topologyKey: topology.kubernetes.io/zone
|
||||
# A key/value list of annotations
|
||||
# annotations:
|
||||
# key: value
|
||||
# A key/value list of labels
|
||||
# labels:
|
||||
# key: value
|
||||
# resources:
|
||||
# The requests and limits set here, allow the filesystem MDS Pod(s) to use half of one CPU core and 1 gigabyte of memory
|
||||
# limits:
|
||||
# memory: "1024Mi"
|
||||
# requests:
|
||||
# cpu: "500m"
|
||||
# memory: "1024Mi"
|
||||
priorityClassName: system-cluster-critical
|
||||
livenessProbe:
|
||||
disabled: false
|
||||
startupProbe:
|
||||
disabled: false
|
||||
# Filesystem mirroring settings
|
||||
# mirroring:
|
||||
# enabled: true
|
||||
# # list of Kubernetes Secrets containing the peer token
|
||||
# # for more details see: https://docs.ceph.com/en/latest/dev/cephfs-mirroring/#bootstrap-peers
|
||||
# # Add the secret name if it already exists else specify the empty list here.
|
||||
# peers:
|
||||
# secretNames:
|
||||
# - secondary-cluster-peer
|
||||
# # specify the schedule(s) on which snapshots should be taken
|
||||
# # see the official syntax here https://docs.ceph.com/en/latest/cephfs/snap-schedule/#add-and-remove-schedules
|
||||
# snapshotSchedules:
|
||||
# - path: /
|
||||
# interval: 24h # daily snapshots
|
||||
# # The startTime should be mentioned in the format YYYY-MM-DDTHH:MM:SS
|
||||
# # If startTime is not specified, then by default the start time is considered as midnight UTC.
|
||||
# # see usage here https://docs.ceph.com/en/latest/cephfs/snap-schedule/#usage
|
||||
# # startTime: 2022-07-15T11:55:00
|
||||
# # manage retention policies
|
||||
# # see syntax duration here https://docs.ceph.com/en/latest/cephfs/snap-schedule/#add-and-remove-retention-policies
|
||||
# snapshotRetention:
|
||||
# - path: /
|
||||
# duration: "h 24"
|
||||
---
|
||||
# create default csi subvolume group
|
||||
apiVersion: ceph.rook.io/v1
|
||||
kind: CephFilesystemSubVolumeGroup
|
||||
metadata:
|
||||
name: {{taskserv.storage_fsName}}-csi # lets keep the svg crd name same as `filesystem name + csi` for the default csi svg
|
||||
namespace: {{taskserv.namespace | default (value="rook-ceph")}} # namespace:cluster
|
||||
spec:
|
||||
# The name of the subvolume group. If not set, the default is the name of the subvolumeGroup CR.
|
||||
name: csi
|
||||
# filesystemName is the metadata name of the CephFilesystem CR where the subvolume group will be created
|
||||
filesystemName: {{taskserv.storage_fsName}}
|
||||
# reference https://docs.ceph.com/en/latest/cephfs/fs-volumes/#pinning-subvolumes-and-subvolume-groups
|
||||
# only one out of (export, distributed, random) can be set at a time
|
||||
# by default pinning is set with value: distributed=1
|
||||
# for disabling default values set (distributed=0)
|
||||
pinning:
|
||||
distributed: 1 # distributed=<0, 1> (disabled=0)
|
||||
# export: # export=<0-256> (disabled=-1)
|
||||
# random: # random=[0.0, 1.0](disabled=0.0)
|
||||
11
taskservs/rook-ceph/default/rook-ceph/images.txt
Normal file
11
taskservs/rook-ceph/default/rook-ceph/images.txt
Normal file
|
|
@ -0,0 +1,11 @@
|
|||
gcr.io/k8s-staging-sig-storage/objectstorage-sidecar/objectstorage-sidecar:v20230130-v0.1.0-24-gc0cf995
|
||||
quay.io/ceph/ceph:v18.2.2
|
||||
quay.io/ceph/cosi:v0.1.1
|
||||
quay.io/cephcsi/cephcsi:v3.11.0
|
||||
quay.io/csiaddons/k8s-sidecar:v0.8.0
|
||||
registry.k8s.io/sig-storage/csi-attacher:v4.5.0
|
||||
registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.10.0
|
||||
registry.k8s.io/sig-storage/csi-provisioner:v4.0.0
|
||||
registry.k8s.io/sig-storage/csi-resizer:v1.10.0
|
||||
registry.k8s.io/sig-storage/csi-snapshotter:v7.0.1
|
||||
rook/ceph:v1.14.2
|
||||
|
|
@ -0,0 +1,19 @@
|
|||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
name: rook-ceph-nfs-my-nfs-load-balancer
|
||||
namespace: {{taskserv.namespace | default (value="rook-ceph")}} # namespace:cluster
|
||||
spec:
|
||||
ports:
|
||||
- name: nfs
|
||||
port: 2049
|
||||
type: LoadBalancer
|
||||
externalTrafficPolicy: Local
|
||||
selector:
|
||||
app: rook-ceph-nfs
|
||||
|
||||
# Use the name of the CephNFS here
|
||||
ceph_nfs: my-nfs
|
||||
|
||||
# It is safest to send clients to a single NFS server instance. Instance "a" always exists.
|
||||
instance: a
|
||||
26
taskservs/rook-ceph/default/rook-ceph/nfs-test.yaml.j2
Normal file
26
taskservs/rook-ceph/default/rook-ceph/nfs-test.yaml.j2
Normal file
|
|
@ -0,0 +1,26 @@
|
|||
# This example is for Ceph v16 and above only. If you are using Ceph v15, see Rook v1.8 examples
|
||||
# from the 'release-1.8' branch
|
||||
|
||||
apiVersion: ceph.rook.io/v1
|
||||
kind: CephNFS
|
||||
metadata:
|
||||
name: my-nfs
|
||||
namespace: {{taskserv.namespace | default (value="rook-ceph")}} # namespace:cluster
|
||||
spec:
|
||||
# Settings for the NFS server
|
||||
server:
|
||||
active: 1
|
||||
logLevel: NIV_DEBUG
|
||||
security: {}
|
||||
---
|
||||
apiVersion: ceph.rook.io/v1
|
||||
kind: CephBlockPool
|
||||
metadata:
|
||||
name: builtin-nfs
|
||||
namespace: {{taskserv.namespace | default (value="rook-ceph")}} # namespace:cluster
|
||||
spec:
|
||||
name: .nfs
|
||||
failureDomain: osd
|
||||
replicated:
|
||||
size: 1
|
||||
requireSafeReplicaSize: false
|
||||
203
taskservs/rook-ceph/default/rook-ceph/nfs.yaml.j2
Normal file
203
taskservs/rook-ceph/default/rook-ceph/nfs.yaml.j2
Normal file
|
|
@ -0,0 +1,203 @@
|
|||
#################################################################################################################
|
||||
# Create a Ceph pool with settings for replication in production environments. A minimum of 3 OSDs on
|
||||
# different hosts are required in this example.
|
||||
# kubectl create -f nfs.yaml
|
||||
#
|
||||
# This example is for Ceph v16 and above only. If you are using Ceph v15, see Rook v1.8 examples
|
||||
# from the 'release-1.8' branch
|
||||
#################################################################################################################
|
||||
|
||||
apiVersion: ceph.rook.io/v1
|
||||
kind: CephNFS
|
||||
metadata:
|
||||
name: my-nfs
|
||||
namespace: {{taskserv.namespace | default (value="rook-ceph")}} # namespace:cluster
|
||||
spec:
|
||||
# Settings for the NFS server
|
||||
server:
|
||||
# The number of active NFS servers
|
||||
# Rook supports creating more than one active NFS server, but cannot guarantee high availability
|
||||
active: 1
|
||||
|
||||
# where to run the NFS server
|
||||
placement:
|
||||
# nodeAffinity:
|
||||
# requiredDuringSchedulingIgnoredDuringExecution:
|
||||
# nodeSelectorTerms:
|
||||
# - matchExpressions:
|
||||
# - key: role
|
||||
# operator: In
|
||||
# values:
|
||||
# - nfs-node
|
||||
# topologySpreadConstraints:
|
||||
# tolerations:
|
||||
# - key: nfs-node
|
||||
# operator: Exists
|
||||
# podAffinity:
|
||||
# podAntiAffinity:
|
||||
|
||||
# A key/value list of annotations to apply to NFS server pods
|
||||
annotations:
|
||||
# key: value
|
||||
|
||||
# A key/value list of labels to apply to NFS server pods
|
||||
labels:
|
||||
# key: value
|
||||
|
||||
# Resource requests and limits to apply to NFS server pods
|
||||
resources:
|
||||
# limits:
|
||||
# memory: "8Gi"
|
||||
# requests:
|
||||
# cpu: "3"
|
||||
# memory: "8Gi"
|
||||
|
||||
# Set priority class to set to influence the scheduler's pod preemption
|
||||
# priorityClassName:
|
||||
|
||||
# The logging levels: NIV_NULL | NIV_FATAL | NIV_MAJ | NIV_CRIT | NIV_WARN | NIV_EVENT | NIV_INFO | NIV_DEBUG | NIV_MID_DEBUG |NIV_FULL_DEBUG |NB_LOG_LEVEL
|
||||
logLevel: NIV_INFO
|
||||
|
||||
# Allow liveness-probe via pod's nfs port (TCP 2049)
|
||||
# livenessProbe:
|
||||
# disabled: false
|
||||
|
||||
# Configure security options for the NFS cluster. See docs for more information:
|
||||
# https://rook.github.io/docs/rook/latest/Storage-Configuration/NFS/nfs-security/
|
||||
security:
|
||||
# kerberos:
|
||||
# principalName: "nfs"
|
||||
# configFiles:
|
||||
# volumeSource:
|
||||
# configMap:
|
||||
# name: krb5-conf
|
||||
# defaultMode: 0644 # required?
|
||||
# keytabFile:
|
||||
# volumeSource:
|
||||
# secret:
|
||||
# secretName: keytab
|
||||
# defaultMode: 0600 # required
|
||||
#
|
||||
# sssd:
|
||||
# sidecar:
|
||||
# image: registry.access.redhat.com/rhel7/sssd:latest
|
||||
# sssdConfigFile:
|
||||
# volumeSource:
|
||||
# configMap:
|
||||
# name: my-nfs-sssd-config
|
||||
# defaultMode: 0600 # mode must be 0600
|
||||
# additionalFiles:
|
||||
# - subPath: ca-certs
|
||||
# volumeSource:
|
||||
# secret:
|
||||
# secretName: sssd-tls-certificates
|
||||
# defaultMode: 0600 # mode must be 0600 for TLS certs
|
||||
# - subPath: kerberos.crt
|
||||
# volumeSource:
|
||||
# hostPath:
|
||||
# path: /etc/pki/kerberos.crt
|
||||
# type: File
|
||||
# # debugLevel: 6
|
||||
# resources:
|
||||
# limits:
|
||||
# memory: "1Gi"
|
||||
# requests:
|
||||
# cpu: "2"
|
||||
# memory: "1Gi"
|
||||
# ---
|
||||
# # The built-in Ceph pool ".nfs" is used for storing configuration for all CephNFS clusters. If this
|
||||
# # shared pool needs to be configured with alternate settings, create this pool (once) with any of
|
||||
# # the pool properties. Create this pool before creating any CephNFSes, or else some properties may
|
||||
# # not be applied when the pool is created by default. This pool must be replicated.
|
||||
# apiVersion: ceph.rook.io/v1
|
||||
# kind: CephBlockPool
|
||||
# metadata:
|
||||
# name: builtin-nfs
|
||||
# namespace: {{taskserv.namespace | default (value="rook-ceph")}} # namespace:cluster
|
||||
# spec:
|
||||
# # The required pool name ".nfs" cannot be specified as a K8s resource name, thus we override
|
||||
# # the pool name created in Ceph with this name property
|
||||
# name: .nfs
|
||||
# failureDomain: host
|
||||
# replicated:
|
||||
# size: 3
|
||||
# requireSafeReplicaSize: true
|
||||
|
||||
# ---
|
||||
# # Example configmap for providing sssd.conf file to the SSSD sidecar
|
||||
# # Note that this example uses an obfuscated password that may still not be as secure as desired
|
||||
# apiVersion: v1
|
||||
# kind: ConfigMap
|
||||
# metadata:
|
||||
# name: my-nfs-sssd-config
|
||||
# namespace: {{taskserv.namespace | default (value="rook-ceph")}} # namespace:cluster
|
||||
# data:
|
||||
# sssd.conf: |
|
||||
# [sssd]
|
||||
# # Only the nss service is required for the SSSD sidecar.
|
||||
# services = nss
|
||||
# domains = default
|
||||
# config_file_version = 2
|
||||
#
|
||||
# [nss]
|
||||
# filter_users = root
|
||||
#
|
||||
# [domain/default]
|
||||
# id_provider = ldap
|
||||
# ldap_uri = ldap://server.address
|
||||
# ldap_search_base = dc=example,dc=net
|
||||
# ldap_default_bind_dn = cn=admin,dc=example,dc=net
|
||||
# ldap_default_authtok_type = obfuscated_password
|
||||
# ldap_default_authtok = some-obfuscated-password
|
||||
# ldap_user_search_base = ou=users,dc=example,dc=net
|
||||
# ldap_group_search_base = ou=groups,dc=example,dc=net
|
||||
# ldap_access_filter = memberOf=cn=rook,ou=groups,dc=example,dc=net
|
||||
# # recommended options for speeding up LDAP lookups:
|
||||
# enumerate = false
|
||||
# ignore_group_members = true
|
||||
#
|
||||
# this can reference /etc/sssd/rook-additional/certs/ca.crt from the secret below if
|
||||
# sssd.sidecar.additionalFiles uses the example below
|
||||
# ---
|
||||
# # Example secret containing a ca.crt added to SSSD additional files
|
||||
# apiVersion: v1
|
||||
# kind: Secret
|
||||
# metadata:
|
||||
# name: sssd-tls-certificates
|
||||
# namespace: rook-ceph
|
||||
# data:
|
||||
# ca.crt: aSBhbSBhIGNlcnQK
|
||||
|
||||
# # Example secret and configmap providing krb5.keytab and krb5 config files
|
||||
# ---
|
||||
# apiVersion: v1
|
||||
# kind: Secret
|
||||
# metadata:
|
||||
# name: keytab
|
||||
# namespace: rook-ceph
|
||||
# data:
|
||||
# # e.g., Keytab containing principal nfs/rook-ceph-my-nfs@EXAMPLE.NET
|
||||
# krb5.keytab: # your keytab here
|
||||
# ---
|
||||
# # suggest not putting [logging] section in here
|
||||
# apiVersion: v1
|
||||
# kind: ConfigMap
|
||||
# metadata:
|
||||
# name: krb5-conf
|
||||
# namespace: rook-ceph
|
||||
# data:
|
||||
# example-net.conf: |
|
||||
# [libdefaults]
|
||||
# default_realm = EXAMPLE.NET
|
||||
#
|
||||
# [realms]
|
||||
# EXAMPLE.NET = {
|
||||
# kdc = kerberos-server.default.svc:88
|
||||
# admin_server = kerberos-server.default.svc:749
|
||||
# }
|
||||
#
|
||||
# [domain_realm]
|
||||
# .example.net = EXAMPLE.NET
|
||||
# example.net = EXAMPLE.NET
|
||||
# kerberos-server.default.svc = EXAMPLE.NET # e.g., kerberos server with a k8s service endpoint
|
||||
# kerberos-server = EXAMPLE.NET
|
||||
90
taskservs/rook-ceph/default/rook-ceph/object-ec.yaml.j2
Normal file
90
taskservs/rook-ceph/default/rook-ceph/object-ec.yaml.j2
Normal file
|
|
@ -0,0 +1,90 @@
|
|||
#################################################################################################################
|
||||
# Create an object store with settings for erasure coding for the data pool. A minimum of 3 nodes with OSDs are
|
||||
# required in this example since failureDomain is host.
|
||||
# kubectl create -f object-ec.yaml
|
||||
#################################################################################################################
|
||||
|
||||
apiVersion: ceph.rook.io/v1
|
||||
kind: CephObjectStore
|
||||
metadata:
|
||||
name: {{taskserv.object_storename}}
|
||||
namespace: {{taskserv.namespace | default (value="rook-ceph")}} # namespace:cluster
|
||||
spec:
|
||||
# The pool spec used to create the metadata pools. Must use replication.
|
||||
metadataPool:
|
||||
failureDomain: host
|
||||
replicated:
|
||||
size: 3
|
||||
# Disallow setting pool with replica 1, this could lead to data loss without recovery.
|
||||
# Make sure you're *ABSOLUTELY CERTAIN* that is what you want
|
||||
requireSafeReplicaSize: true
|
||||
parameters:
|
||||
# Inline compression mode for the data pool
|
||||
# Further reference: https://docs.ceph.com/docs/master/rados/configuration/bluestore-config-ref/#inline-compression
|
||||
compression_mode: none
|
||||
# gives a hint (%) to Ceph in terms of expected consumption of the total cluster capacity of a given pool
|
||||
# for more info: https://docs.ceph.com/docs/master/rados/operations/placement-groups/#specifying-expected-pool-size
|
||||
#target_size_ratio: ".5"
|
||||
# The pool spec used to create the data pool. Can use replication or erasure coding.
|
||||
dataPool:
|
||||
failureDomain: host
|
||||
erasureCoded:
|
||||
dataChunks: 2
|
||||
codingChunks: 1
|
||||
parameters:
|
||||
# Inline compression mode for the data pool
|
||||
# Further reference: https://docs.ceph.com/docs/master/rados/configuration/bluestore-config-ref/#inline-compression
|
||||
compression_mode: none
|
||||
# gives a hint (%) to Ceph in terms of expected consumption of the total cluster capacity of a given pool
|
||||
# for more info: https://docs.ceph.com/docs/master/rados/operations/placement-groups/#specifying-expected-pool-size
|
||||
#target_size_ratio: ".5"
|
||||
# Whether to preserve metadata and data pools on object store deletion
|
||||
preservePoolsOnDelete: true
|
||||
# The gateway service configuration
|
||||
gateway:
|
||||
# A reference to the secret in the rook namespace where the ssl certificate is stored
|
||||
sslCertificateRef:
|
||||
# The port that RGW pods will listen on (http)
|
||||
port: 80
|
||||
# The port that RGW pods will listen on (https). An ssl certificate is required.
|
||||
# securePort: 443
|
||||
# The number of pods in the rgw deployment
|
||||
instances: 1
|
||||
# The affinity rules to apply to the rgw deployment or daemonset.
|
||||
placement:
|
||||
# nodeAffinity:
|
||||
# requiredDuringSchedulingIgnoredDuringExecution:
|
||||
# nodeSelectorTerms:
|
||||
# - matchExpressions:
|
||||
# - key: role
|
||||
# operator: In
|
||||
# values:
|
||||
# - rgw-node
|
||||
# tolerations:
|
||||
# - key: rgw-node
|
||||
# operator: Exists
|
||||
# podAffinity:
|
||||
# podAntiAffinity:
|
||||
# A key/value list of annotations
|
||||
annotations:
|
||||
# key: value
|
||||
# A key/value list of labels
|
||||
labels:
|
||||
# key: value
|
||||
resources:
|
||||
# The requests and limits set here, allow the object store gateway Pod(s) to use half of one CPU core and 1 gigabyte of memory
|
||||
# limits:
|
||||
# memory: "1024Mi"
|
||||
# requests:
|
||||
# cpu: "500m"
|
||||
# memory: "1024Mi"
|
||||
# priorityClassName: my-priority-class
|
||||
#zone:
|
||||
#name: zone-a
|
||||
# service endpoint healthcheck
|
||||
healthCheck:
|
||||
# Configure the pod probes for the rgw daemon
|
||||
startupProbe:
|
||||
disabled: false
|
||||
readinessProbe:
|
||||
disabled: false
|
||||
29
taskservs/rook-ceph/default/rook-ceph/object-user.yaml.j2
Normal file
29
taskservs/rook-ceph/default/rook-ceph/object-user.yaml.j2
Normal file
|
|
@ -0,0 +1,29 @@
|
|||
#################################################################################################################
|
||||
# Create an object store user for access to the s3 endpoint.
|
||||
# kubectl create -f object-user.yaml
|
||||
#################################################################################################################
|
||||
|
||||
apiVersion: ceph.rook.io/v1
|
||||
kind: CephObjectStoreUser
|
||||
metadata:
|
||||
name: {{taskserv.object_user}}
|
||||
namespace: {{taskserv.namespace | default (value="rook-ceph")}} # namespace:cluster
|
||||
spec:
|
||||
store: {{taskserv.object_storename}}
|
||||
displayName: "{{taskserv.object_displayname}}"
|
||||
# Quotas set on the user
|
||||
# quotas:
|
||||
# maxBuckets: 100
|
||||
# maxSize: 10G
|
||||
# maxObjects: 10000
|
||||
# Additional permissions given to the user
|
||||
# capabilities:
|
||||
# user: "*"
|
||||
# bucket: "*"
|
||||
# metadata: "*"
|
||||
# usage: "*"
|
||||
# zone: "*"
|
||||
# If the CephObjectStoreUser is created in a namespace other than the Rook cluster namespace,
|
||||
# specify the namespace where the cluster and object store are found.
|
||||
# "allowUsersInNamespaces" must include this namespace to enable this feature.
|
||||
# clusterNamespace: rook-ceph
|
||||
153
taskservs/rook-ceph/default/rook-ceph/object.yaml.j2
Normal file
153
taskservs/rook-ceph/default/rook-ceph/object.yaml.j2
Normal file
|
|
@ -0,0 +1,153 @@
|
|||
#################################################################################################################
|
||||
# Create an object store with settings for replication in a production environment. A minimum of 3 hosts with
|
||||
# OSDs are required in this example.
|
||||
# kubectl create -f object.yaml
|
||||
#################################################################################################################
|
||||
|
||||
apiVersion: ceph.rook.io/v1
|
||||
kind: CephObjectStore
|
||||
metadata:
|
||||
name: {{taskserv.object_storename}}
|
||||
namespace: {{taskserv.namespace | default (value="rook-ceph")}} # namespace:cluster
|
||||
spec:
|
||||
# The pool spec used to create the metadata pools. Must use replication.
|
||||
metadataPool:
|
||||
failureDomain: host
|
||||
replicated:
|
||||
size: 3
|
||||
# Disallow setting pool with replica 1, this could lead to data loss without recovery.
|
||||
# Make sure you're *ABSOLUTELY CERTAIN* that is what you want
|
||||
requireSafeReplicaSize: true
|
||||
parameters:
|
||||
# Inline compression mode for the data pool
|
||||
# Further reference: https://docs.ceph.com/docs/master/rados/configuration/bluestore-config-ref/#inline-compression
|
||||
compression_mode: none
|
||||
# gives a hint (%) to Ceph in terms of expected consumption of the total cluster capacity of a given pool
|
||||
# for more info: https://docs.ceph.com/docs/master/rados/operations/placement-groups/#specifying-expected-pool-size
|
||||
#target_size_ratio: ".5"
|
||||
# The pool spec used to create the data pool. Can use replication or erasure coding.
|
||||
dataPool:
|
||||
failureDomain: host
|
||||
replicated:
|
||||
size: 3
|
||||
# Disallow setting pool with replica 1, this could lead to data loss without recovery.
|
||||
# Make sure you're *ABSOLUTELY CERTAIN* that is what you want
|
||||
requireSafeReplicaSize: true
|
||||
parameters:
|
||||
# Inline compression mode for the data pool
|
||||
# Further reference: https://docs.ceph.com/docs/master/rados/configuration/bluestore-config-ref/#inline-compression
|
||||
compression_mode: none
|
||||
# gives a hint (%) to Ceph in terms of expected consumption of the total cluster capacity of a given pool
|
||||
# for more info: https://docs.ceph.com/docs/master/rados/operations/placement-groups/#specifying-expected-pool-size
|
||||
#target_size_ratio: ".5"
|
||||
# Whether to preserve metadata and data pools on object store deletion
|
||||
preservePoolsOnDelete: false
|
||||
# The gateway service configuration
|
||||
gateway:
|
||||
# A reference to the secret in the rook namespace where the ssl certificate is stored
|
||||
# sslCertificateRef:
|
||||
# A reference to the secret in the rook namespace where the ca bundle is stored
|
||||
# caBundleRef:
|
||||
# The port that RGW pods will listen on (http)
|
||||
port: 80
|
||||
# The port that RGW pods will listen on (https). An ssl certificate is required.
|
||||
# securePort: 443
|
||||
# The number of pods in the rgw deployment
|
||||
instances: 1
|
||||
# The affinity rules to apply to the rgw deployment.
|
||||
placement:
|
||||
podAntiAffinity:
|
||||
preferredDuringSchedulingIgnoredDuringExecution:
|
||||
- weight: 100
|
||||
podAffinityTerm:
|
||||
labelSelector:
|
||||
matchExpressions:
|
||||
- key: app
|
||||
operator: In
|
||||
values:
|
||||
- rook-ceph-rgw
|
||||
# topologyKey: */zone can be used to spread RGW across different AZ
|
||||
# Use <topologyKey: failure-domain.beta.kubernetes.io/zone> in k8s cluster if your cluster is v1.16 or lower
|
||||
# Use <topologyKey: topology.kubernetes.io/zone> in k8s cluster is v1.17 or upper
|
||||
topologyKey: kubernetes.io/hostname
|
||||
# A key/value list of annotations
|
||||
# nodeAffinity:
|
||||
# requiredDuringSchedulingIgnoredDuringExecution:
|
||||
# nodeSelectorTerms:
|
||||
# - matchExpressions:
|
||||
# - key: role
|
||||
# operator: In
|
||||
# values:
|
||||
# - rgw-node
|
||||
# topologySpreadConstraints:
|
||||
# tolerations:
|
||||
# - key: rgw-node
|
||||
# operator: Exists
|
||||
# podAffinity:
|
||||
# podAntiAffinity:
|
||||
# A key/value list of annotations
|
||||
annotations:
|
||||
# key: value
|
||||
# A key/value list of labels
|
||||
labels:
|
||||
# key: value
|
||||
resources:
|
||||
# The requests and limits set here, allow the object store gateway Pod(s) to use half of one CPU core and 1 gigabyte of memory
|
||||
# limits:
|
||||
# memory: "1024Mi"
|
||||
# requests:
|
||||
# cpu: "500m"
|
||||
# memory: "1024Mi"
|
||||
priorityClassName: system-cluster-critical
|
||||
#zone:
|
||||
#name: zone-a
|
||||
# service endpoint healthcheck
|
||||
healthCheck:
|
||||
# Configure the pod probes for the rgw daemon
|
||||
startupProbe:
|
||||
disabled: false
|
||||
readinessProbe:
|
||||
disabled: false
|
||||
# hosting:
|
||||
# The list of subdomain names for virtual hosting of buckets.
|
||||
# dnsNames:
|
||||
# - "mystore.example.com"
|
||||
|
||||
# If a CephObjectStoreUser is created in a namespace other than the Rook cluster namespace,
|
||||
# the namespace must be added to the list of allowed namespaces, or specify "*" to allow all namespaces.
|
||||
# allowUsersInNamespaces:
|
||||
# - other-namespace
|
||||
# security oriented settings
|
||||
# security:
|
||||
# To enable the Server Side Encryption configuration properly don't forget to uncomment the Secret at the end of the file
|
||||
# kms: # configures RGW with AWS-SSE:KMS
|
||||
# # name of the config map containing all the kms connection details
|
||||
# connectionDetails:
|
||||
# KMS_PROVIDER: "vault"
|
||||
# VAULT_ADDR: VAULT_ADDR_CHANGE_ME # e,g: http://vault.my-domain.com:8200
|
||||
# VAULT_BACKEND_PATH: "rook"
|
||||
# VAULT_SECRET_ENGINE: "kv"
|
||||
# VAULT_BACKEND: v2
|
||||
# # name of the secret containing the kms authentication token
|
||||
# tokenSecretName: rook-vault-token
|
||||
# s3: # configures RGW with AWS-SSE:S3
|
||||
# # name of the config map containing all the kms connection details
|
||||
# connectionDetails:
|
||||
# KMS_PROVIDER: "vault"
|
||||
# VAULT_ADDR: VAULT_ADDR_CHANGE_ME # e,g: http://vault.my-domain.com:8200
|
||||
# VAULT_BACKEND_PATH: "rook"
|
||||
# VAULT_SECRET_ENGINE: "transit"
|
||||
# # name of the secret containing the kms authentication token
|
||||
# tokenSecretName: rook-vault-token
|
||||
# # UNCOMMENT THIS TO ENABLE A KMS CONNECTION
|
||||
# # Also, do not forget to replace both:
|
||||
# # * ROOK_TOKEN_CHANGE_ME: with a base64 encoded value of the token to use
|
||||
# # * VAULT_ADDR_CHANGE_ME: with the Vault address
|
||||
# ---
|
||||
# apiVersion: v1
|
||||
# kind: Secret
|
||||
# metadata:
|
||||
# name: rook-vault-token
|
||||
# namespace: {{taskserv.namespace | default (value="rook-ceph")}} # namespace:cluster
|
||||
# data:
|
||||
# token: ROOK_TOKEN_CHANGE_ME
|
||||
674
taskservs/rook-ceph/default/rook-ceph/operator.yaml.j2
Normal file
674
taskservs/rook-ceph/default/rook-ceph/operator.yaml.j2
Normal file
|
|
@ -0,0 +1,674 @@
|
|||
#################################################################################################################
|
||||
# The deployment for the rook operator
|
||||
# Contains the common settings for most Kubernetes deployments.
|
||||
# For example, to create the rook-ceph cluster:
|
||||
# kubectl create -f crds.yaml -f common.yaml -f operator.yaml
|
||||
# kubectl create -f cluster.yaml
|
||||
#
|
||||
# Also see other operator sample files for variations of operator.yaml:
|
||||
# - operator-openshift.yaml: Common settings for running in OpenShift
|
||||
###############################################################################################################
|
||||
|
||||
# Rook Ceph Operator Config ConfigMap
|
||||
# Use this ConfigMap to override Rook-Ceph Operator configurations.
|
||||
# NOTE! Precedence will be given to this config if the same Env Var config also exists in the
|
||||
# Operator Deployment.
|
||||
# To move a configuration(s) from the Operator Deployment to this ConfigMap, add the config
|
||||
# here. It is recommended to then remove it from the Deployment to eliminate any future confusion.
|
||||
kind: ConfigMap
|
||||
apiVersion: v1
|
||||
metadata:
|
||||
name: rook-ceph-operator-config
|
||||
# should be in the namespace of the operator
|
||||
namespace: {{taskserv.namespace | default (value="rook-ceph")}} # namespace:operator
|
||||
data:
|
||||
# The logging level for the operator: ERROR | WARNING | INFO | DEBUG
|
||||
ROOK_LOG_LEVEL: "INFO"
|
||||
|
||||
# Allow using loop devices for osds in test clusters.
|
||||
ROOK_CEPH_ALLOW_LOOP_DEVICES: "false"
|
||||
|
||||
# Enable the CSI driver.
|
||||
# To run the non-default version of the CSI driver, see the override-able image properties in operator.yaml
|
||||
ROOK_CSI_ENABLE_CEPHFS: "true"
|
||||
# Enable the default version of the CSI RBD driver. To start another version of the CSI driver, see image properties below.
|
||||
ROOK_CSI_ENABLE_RBD: "true"
|
||||
# Enable the CSI NFS driver. To start another version of the CSI driver, see image properties below.
|
||||
ROOK_CSI_ENABLE_NFS: "false"
|
||||
# Disable the CSI driver.
|
||||
ROOK_CSI_DISABLE_DRIVER: "false"
|
||||
|
||||
# Set to true to enable Ceph CSI pvc encryption support.
|
||||
CSI_ENABLE_ENCRYPTION: "false"
|
||||
|
||||
# Set to true to enable host networking for CSI CephFS and RBD nodeplugins. This may be necessary
|
||||
# in some network configurations where the SDN does not provide access to an external cluster or
|
||||
# there is significant drop in read/write performance.
|
||||
# CSI_ENABLE_HOST_NETWORK: "true"
|
||||
|
||||
# Deprecation note: Rook uses "holder" pods to allow CSI to connect to the multus public network
|
||||
# without needing hosts to the network. Holder pods are being removed. See issue for details:
|
||||
# https://github.com/rook/rook/issues/13055. New Rook deployments should set this to "true".
|
||||
CSI_DISABLE_HOLDER_PODS: "true"
|
||||
|
||||
# Set to true to enable adding volume metadata on the CephFS subvolume and RBD images.
|
||||
# Not all users might be interested in getting volume/snapshot details as metadata on CephFS subvolume and RBD images.
|
||||
# Hence enable metadata is false by default.
|
||||
# CSI_ENABLE_METADATA: "true"
|
||||
|
||||
# cluster name identifier to set as metadata on the CephFS subvolume and RBD images. This will be useful in cases
|
||||
# like for example, when two container orchestrator clusters (Kubernetes/OCP) are using a single ceph cluster.
|
||||
# CSI_CLUSTER_NAME: "my-prod-cluster"
|
||||
|
||||
# Set logging level for cephCSI containers maintained by the cephCSI.
|
||||
# Supported values from 0 to 5. 0 for general useful logs, 5 for trace level verbosity.
|
||||
# CSI_LOG_LEVEL: "0"
|
||||
|
||||
# Set logging level for Kubernetes-csi sidecar containers.
|
||||
# Supported values from 0 to 5. 0 for general useful logs (the default), 5 for trace level verbosity.
|
||||
# CSI_SIDECAR_LOG_LEVEL: "0"
|
||||
|
||||
# csi driver name prefix for cephfs, rbd and nfs. if not specified, default
|
||||
# will be the namespace name where rook-ceph operator is deployed.
|
||||
# search for `# csi-provisioner-name` in the storageclass and
|
||||
# volumesnashotclass and update the name accordingly.
|
||||
# CSI_DRIVER_NAME_PREFIX: "rook-ceph"
|
||||
|
||||
# Set replicas for csi provisioner deployment.
|
||||
CSI_PROVISIONER_REPLICAS: "2"
|
||||
|
||||
# OMAP generator will generate the omap mapping between the PV name and the RBD image.
|
||||
# CSI_ENABLE_OMAP_GENERATOR need to be enabled when we are using rbd mirroring feature.
|
||||
# By default OMAP generator sidecar is deployed with CSI provisioner pod, to disable
|
||||
# it set it to false.
|
||||
# CSI_ENABLE_OMAP_GENERATOR: "false"
|
||||
|
||||
# set to false to disable deployment of snapshotter container in CephFS provisioner pod.
|
||||
CSI_ENABLE_CEPHFS_SNAPSHOTTER: "true"
|
||||
|
||||
# set to false to disable deployment of snapshotter container in NFS provisioner pod.
|
||||
CSI_ENABLE_NFS_SNAPSHOTTER: "true"
|
||||
|
||||
# set to false to disable deployment of snapshotter container in RBD provisioner pod.
|
||||
CSI_ENABLE_RBD_SNAPSHOTTER: "true"
|
||||
|
||||
# set to false to disable volume group snapshot feature. This feature is
|
||||
# enabled by default as long as the necessary CRDs are available in the cluster.
|
||||
CSI_ENABLE_VOLUME_GROUP_SNAPSHOT: "true"
|
||||
# Enable cephfs kernel driver instead of ceph-fuse.
|
||||
# If you disable the kernel client, your application may be disrupted during upgrade.
|
||||
# See the upgrade guide: https://rook.io/docs/rook/latest/ceph-upgrade.html
|
||||
# NOTE! cephfs quota is not supported in kernel version < 4.17
|
||||
CSI_FORCE_CEPHFS_KERNEL_CLIENT: "true"
|
||||
|
||||
# (Optional) policy for modifying a volume's ownership or permissions when the RBD PVC is being mounted.
|
||||
# supported values are documented at https://kubernetes-csi.github.io/docs/support-fsgroup.html
|
||||
CSI_RBD_FSGROUPPOLICY: "File"
|
||||
|
||||
# (Optional) policy for modifying a volume's ownership or permissions when the CephFS PVC is being mounted.
|
||||
# supported values are documented at https://kubernetes-csi.github.io/docs/support-fsgroup.html
|
||||
CSI_CEPHFS_FSGROUPPOLICY: "File"
|
||||
|
||||
# (Optional) policy for modifying a volume's ownership or permissions when the NFS PVC is being mounted.
|
||||
# supported values are documented at https://kubernetes-csi.github.io/docs/support-fsgroup.html
|
||||
CSI_NFS_FSGROUPPOLICY: "File"
|
||||
|
||||
# (Optional) Allow starting unsupported ceph-csi image
|
||||
ROOK_CSI_ALLOW_UNSUPPORTED_VERSION: "false"
|
||||
|
||||
# (Optional) control the host mount of /etc/selinux for csi plugin pods.
|
||||
CSI_PLUGIN_ENABLE_SELINUX_HOST_MOUNT: "false"
|
||||
|
||||
# The default version of CSI supported by Rook will be started. To change the version
|
||||
# of the CSI driver to something other than what is officially supported, change
|
||||
# these images to the desired release of the CSI driver.
|
||||
# ROOK_CSI_CEPH_IMAGE: "quay.io/cephcsi/cephcsi:v3.11.0"
|
||||
# ROOK_CSI_REGISTRAR_IMAGE: "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.10.0"
|
||||
# ROOK_CSI_RESIZER_IMAGE: "registry.k8s.io/sig-storage/csi-resizer:v1.10.0"
|
||||
# ROOK_CSI_PROVISIONER_IMAGE: "registry.k8s.io/sig-storage/csi-provisioner:v4.0.0"
|
||||
# ROOK_CSI_SNAPSHOTTER_IMAGE: "registry.k8s.io/sig-storage/csi-snapshotter:v7.0.1"
|
||||
# ROOK_CSI_ATTACHER_IMAGE: "registry.k8s.io/sig-storage/csi-attacher:v4.5.0"
|
||||
|
||||
# To indicate the image pull policy to be applied to all the containers in the csi driver pods.
|
||||
# ROOK_CSI_IMAGE_PULL_POLICY: "IfNotPresent"
|
||||
|
||||
# (Optional) set user created priorityclassName for csi plugin pods.
|
||||
CSI_PLUGIN_PRIORITY_CLASSNAME: "system-node-critical"
|
||||
|
||||
# (Optional) set user created priorityclassName for csi provisioner pods.
|
||||
CSI_PROVISIONER_PRIORITY_CLASSNAME: "system-cluster-critical"
|
||||
|
||||
# CSI CephFS plugin daemonset update strategy, supported values are OnDelete and RollingUpdate.
|
||||
# Default value is RollingUpdate.
|
||||
# CSI_CEPHFS_PLUGIN_UPDATE_STRATEGY: "OnDelete"
|
||||
# A maxUnavailable parameter of CSI cephFS plugin daemonset update strategy.
|
||||
# Default value is 1.
|
||||
# CSI_CEPHFS_PLUGIN_UPDATE_STRATEGY_MAX_UNAVAILABLE: "1"
|
||||
# CSI RBD plugin daemonset update strategy, supported values are OnDelete and RollingUpdate.
|
||||
# Default value is RollingUpdate.
|
||||
# CSI_RBD_PLUGIN_UPDATE_STRATEGY: "OnDelete"
|
||||
# A maxUnavailable parameter of CSI RBD plugin daemonset update strategy.
|
||||
# Default value is 1.
|
||||
# CSI_RBD_PLUGIN_UPDATE_STRATEGY_MAX_UNAVAILABLE: "1"
|
||||
|
||||
# CSI NFS plugin daemonset update strategy, supported values are OnDelete and RollingUpdate.
|
||||
# Default value is RollingUpdate.
|
||||
# CSI_NFS_PLUGIN_UPDATE_STRATEGY: "OnDelete"
|
||||
|
||||
# kubelet directory path, if kubelet configured to use other than /var/lib/kubelet path.
|
||||
# ROOK_CSI_KUBELET_DIR_PATH: "/var/lib/kubelet"
|
||||
|
||||
# Labels to add to the CSI CephFS Deployments and DaemonSets Pods.
|
||||
# ROOK_CSI_CEPHFS_POD_LABELS: "key1=value1,key2=value2"
|
||||
# Labels to add to the CSI RBD Deployments and DaemonSets Pods.
|
||||
# ROOK_CSI_RBD_POD_LABELS: "key1=value1,key2=value2"
|
||||
# Labels to add to the CSI NFS Deployments and DaemonSets Pods.
|
||||
# ROOK_CSI_NFS_POD_LABELS: "key1=value1,key2=value2"
|
||||
|
||||
# (Optional) CephCSI CephFS plugin Volumes
|
||||
# CSI_CEPHFS_PLUGIN_VOLUME: |
|
||||
# - name: lib-modules
|
||||
# hostPath:
|
||||
# path: /run/current-system/kernel-modules/lib/modules/
|
||||
# - name: host-nix
|
||||
# hostPath:
|
||||
# path: /nix
|
||||
|
||||
# (Optional) CephCSI CephFS plugin Volume mounts
|
||||
# CSI_CEPHFS_PLUGIN_VOLUME_MOUNT: |
|
||||
# - name: host-nix
|
||||
# mountPath: /nix
|
||||
# readOnly: true
|
||||
|
||||
# (Optional) CephCSI RBD plugin Volumes
|
||||
# CSI_RBD_PLUGIN_VOLUME: |
|
||||
# - name: lib-modules
|
||||
# hostPath:
|
||||
# path: /run/current-system/kernel-modules/lib/modules/
|
||||
# - name: host-nix
|
||||
# hostPath:
|
||||
# path: /nix
|
||||
|
||||
# (Optional) CephCSI RBD plugin Volume mounts
|
||||
# CSI_RBD_PLUGIN_VOLUME_MOUNT: |
|
||||
# - name: host-nix
|
||||
# mountPath: /nix
|
||||
# readOnly: true
|
||||
|
||||
# (Optional) CephCSI provisioner NodeAffinity (applied to both CephFS and RBD provisioner).
|
||||
# CSI_PROVISIONER_NODE_AFFINITY: "role=storage-node; storage=rook, ceph"
|
||||
# (Optional) CephCSI provisioner tolerations list(applied to both CephFS and RBD provisioner).
|
||||
# Put here list of taints you want to tolerate in YAML format.
|
||||
# CSI provisioner would be best to start on the same nodes as other ceph daemons.
|
||||
# CSI_PROVISIONER_TOLERATIONS: |
|
||||
# - effect: NoSchedule
|
||||
# key: node-role.kubernetes.io/control-plane
|
||||
# operator: Exists
|
||||
# - effect: NoExecute
|
||||
# key: node-role.kubernetes.io/etcd
|
||||
# operator: Exists
|
||||
# (Optional) CephCSI plugin NodeAffinity (applied to both CephFS and RBD plugin).
|
||||
# CSI_PLUGIN_NODE_AFFINITY: "role=storage-node; storage=rook, ceph"
|
||||
# (Optional) CephCSI plugin tolerations list(applied to both CephFS and RBD plugin).
|
||||
# Put here list of taints you want to tolerate in YAML format.
|
||||
# CSI plugins need to be started on all the nodes where the clients need to mount the storage.
|
||||
# CSI_PLUGIN_TOLERATIONS: |
|
||||
# - effect: NoSchedule
|
||||
# key: node-role.kubernetes.io/control-plane
|
||||
# operator: Exists
|
||||
# - effect: NoExecute
|
||||
# key: node-role.kubernetes.io/etcd
|
||||
# operator: Exists
|
||||
|
||||
# (Optional) CephCSI RBD provisioner NodeAffinity (if specified, overrides CSI_PROVISIONER_NODE_AFFINITY).
|
||||
# CSI_RBD_PROVISIONER_NODE_AFFINITY: "role=rbd-node"
|
||||
# (Optional) CephCSI RBD provisioner tolerations list(if specified, overrides CSI_PROVISIONER_TOLERATIONS).
|
||||
# Put here list of taints you want to tolerate in YAML format.
|
||||
# CSI provisioner would be best to start on the same nodes as other ceph daemons.
|
||||
# CSI_RBD_PROVISIONER_TOLERATIONS: |
|
||||
# - key: node.rook.io/rbd
|
||||
# operator: Exists
|
||||
# (Optional) CephCSI RBD plugin NodeAffinity (if specified, overrides CSI_PLUGIN_NODE_AFFINITY).
|
||||
# CSI_RBD_PLUGIN_NODE_AFFINITY: "role=rbd-node"
|
||||
# (Optional) CephCSI RBD plugin tolerations list(if specified, overrides CSI_PLUGIN_TOLERATIONS).
|
||||
# Put here list of taints you want to tolerate in YAML format.
|
||||
# CSI plugins need to be started on all the nodes where the clients need to mount the storage.
|
||||
# CSI_RBD_PLUGIN_TOLERATIONS: |
|
||||
# - key: node.rook.io/rbd
|
||||
# operator: Exists
|
||||
|
||||
# (Optional) CephCSI CephFS provisioner NodeAffinity (if specified, overrides CSI_PROVISIONER_NODE_AFFINITY).
|
||||
# CSI_CEPHFS_PROVISIONER_NODE_AFFINITY: "role=cephfs-node"
|
||||
# (Optional) CephCSI CephFS provisioner tolerations list(if specified, overrides CSI_PROVISIONER_TOLERATIONS).
|
||||
# Put here list of taints you want to tolerate in YAML format.
|
||||
# CSI provisioner would be best to start on the same nodes as other ceph daemons.
|
||||
# CSI_CEPHFS_PROVISIONER_TOLERATIONS: |
|
||||
# - key: node.rook.io/cephfs
|
||||
# operator: Exists
|
||||
# (Optional) CephCSI CephFS plugin NodeAffinity (if specified, overrides CSI_PLUGIN_NODE_AFFINITY).
|
||||
# CSI_CEPHFS_PLUGIN_NODE_AFFINITY: "role=cephfs-node"
|
||||
# NOTE: Support for defining NodeAffinity for operators other than "In" and "Exists" requires the user to input a
|
||||
# valid v1.NodeAffinity JSON or YAML string. For example, the following is valid YAML v1.NodeAffinity:
|
||||
# CSI_CEPHFS_PLUGIN_NODE_AFFINITY: |
|
||||
# requiredDuringSchedulingIgnoredDuringExecution:
|
||||
# nodeSelectorTerms:
|
||||
# - matchExpressions:
|
||||
# - key: myKey
|
||||
# operator: DoesNotExist
|
||||
# (Optional) CephCSI CephFS plugin tolerations list(if specified, overrides CSI_PLUGIN_TOLERATIONS).
|
||||
# Put here list of taints you want to tolerate in YAML format.
|
||||
# CSI plugins need to be started on all the nodes where the clients need to mount the storage.
|
||||
# CSI_CEPHFS_PLUGIN_TOLERATIONS: |
|
||||
# - key: node.rook.io/cephfs
|
||||
# operator: Exists
|
||||
|
||||
# (Optional) CephCSI NFS provisioner NodeAffinity (overrides CSI_PROVISIONER_NODE_AFFINITY).
|
||||
# CSI_NFS_PROVISIONER_NODE_AFFINITY: "role=nfs-node"
|
||||
# (Optional) CephCSI NFS provisioner tolerations list (overrides CSI_PROVISIONER_TOLERATIONS).
|
||||
# Put here list of taints you want to tolerate in YAML format.
|
||||
# CSI provisioner would be best to start on the same nodes as other ceph daemons.
|
||||
# CSI_NFS_PROVISIONER_TOLERATIONS: |
|
||||
# - key: node.rook.io/nfs
|
||||
# operator: Exists
|
||||
# (Optional) CephCSI NFS plugin NodeAffinity (overrides CSI_PLUGIN_NODE_AFFINITY).
|
||||
# CSI_NFS_PLUGIN_NODE_AFFINITY: "role=nfs-node"
|
||||
# (Optional) CephCSI NFS plugin tolerations list (overrides CSI_PLUGIN_TOLERATIONS).
|
||||
# Put here list of taints you want to tolerate in YAML format.
|
||||
# CSI plugins need to be started on all the nodes where the clients need to mount the storage.
|
||||
# CSI_NFS_PLUGIN_TOLERATIONS: |
|
||||
# - key: node.rook.io/nfs
|
||||
# operator: Exists
|
||||
|
||||
# (Optional) CEPH CSI RBD provisioner resource requirement list, Put here list of resource
|
||||
# requests and limits you want to apply for provisioner pod
|
||||
#CSI_RBD_PROVISIONER_RESOURCE: |
|
||||
# - name : csi-provisioner
|
||||
# resource:
|
||||
# requests:
|
||||
# memory: 128Mi
|
||||
# cpu: 100m
|
||||
# limits:
|
||||
# memory: 256Mi
|
||||
# - name : csi-resizer
|
||||
# resource:
|
||||
# requests:
|
||||
# memory: 128Mi
|
||||
# cpu: 100m
|
||||
# limits:
|
||||
# memory: 256Mi
|
||||
# - name : csi-attacher
|
||||
# resource:
|
||||
# requests:
|
||||
# memory: 128Mi
|
||||
# cpu: 100m
|
||||
# limits:
|
||||
# memory: 256Mi
|
||||
# - name : csi-snapshotter
|
||||
# resource:
|
||||
# requests:
|
||||
# memory: 128Mi
|
||||
# cpu: 100m
|
||||
# limits:
|
||||
# memory: 256Mi
|
||||
# - name : csi-rbdplugin
|
||||
# resource:
|
||||
# requests:
|
||||
# memory: 512Mi
|
||||
# cpu: 250m
|
||||
# limits:
|
||||
# memory: 1Gi
|
||||
# - name : csi-omap-generator
|
||||
# resource:
|
||||
# requests:
|
||||
# memory: 512Mi
|
||||
# cpu: 250m
|
||||
# limits:
|
||||
# memory: 1Gi
|
||||
# - name : liveness-prometheus
|
||||
# resource:
|
||||
# requests:
|
||||
# memory: 128Mi
|
||||
# cpu: 50m
|
||||
# limits:
|
||||
# memory: 256Mi
|
||||
# (Optional) CEPH CSI RBD plugin resource requirement list, Put here list of resource
|
||||
# requests and limits you want to apply for plugin pod
|
||||
#CSI_RBD_PLUGIN_RESOURCE: |
|
||||
# - name : driver-registrar
|
||||
# resource:
|
||||
# requests:
|
||||
# memory: 128Mi
|
||||
# cpu: 50m
|
||||
# limits:
|
||||
# memory: 256Mi
|
||||
# - name : csi-rbdplugin
|
||||
# resource:
|
||||
# requests:
|
||||
# memory: 512Mi
|
||||
# cpu: 250m
|
||||
# limits:
|
||||
# memory: 1Gi
|
||||
# - name : liveness-prometheus
|
||||
# resource:
|
||||
# requests:
|
||||
# memory: 128Mi
|
||||
# cpu: 50m
|
||||
# limits:
|
||||
# memory: 256Mi
|
||||
# (Optional) CEPH CSI CephFS provisioner resource requirement list, Put here list of resource
|
||||
# requests and limits you want to apply for provisioner pod
|
||||
#CSI_CEPHFS_PROVISIONER_RESOURCE: |
|
||||
# - name : csi-provisioner
|
||||
# resource:
|
||||
# requests:
|
||||
# memory: 128Mi
|
||||
# cpu: 100m
|
||||
# limits:
|
||||
# memory: 256Mi
|
||||
# - name : csi-resizer
|
||||
# resource:
|
||||
# requests:
|
||||
# memory: 128Mi
|
||||
# cpu: 100m
|
||||
# limits:
|
||||
# memory: 256Mi
|
||||
# - name : csi-attacher
|
||||
# resource:
|
||||
# requests:
|
||||
# memory: 128Mi
|
||||
# cpu: 100m
|
||||
# limits:
|
||||
# memory: 256Mi
|
||||
# - name : csi-snapshotter
|
||||
# resource:
|
||||
# requests:
|
||||
# memory: 128Mi
|
||||
# cpu: 100m
|
||||
# limits:
|
||||
# memory: 256Mi
|
||||
# - name : csi-cephfsplugin
|
||||
# resource:
|
||||
# requests:
|
||||
# memory: 512Mi
|
||||
# cpu: 250m
|
||||
# limits:
|
||||
# memory: 1Gi
|
||||
# - name : liveness-prometheus
|
||||
# resource:
|
||||
# requests:
|
||||
# memory: 128Mi
|
||||
# cpu: 50m
|
||||
# limits:
|
||||
# memory: 256Mi
|
||||
# (Optional) CEPH CSI CephFS plugin resource requirement list, Put here list of resource
|
||||
# requests and limits you want to apply for plugin pod
|
||||
#CSI_CEPHFS_PLUGIN_RESOURCE: |
|
||||
# - name : driver-registrar
|
||||
# resource:
|
||||
# requests:
|
||||
# memory: 128Mi
|
||||
# cpu: 50m
|
||||
# limits:
|
||||
# memory: 256Mi
|
||||
# - name : csi-cephfsplugin
|
||||
# resource:
|
||||
# requests:
|
||||
# memory: 512Mi
|
||||
# cpu: 250m
|
||||
# limits:
|
||||
# memory: 1Gi
|
||||
# - name : liveness-prometheus
|
||||
# resource:
|
||||
# requests:
|
||||
# memory: 128Mi
|
||||
# cpu: 50m
|
||||
# limits:
|
||||
# memory: 256Mi
|
||||
|
||||
# (Optional) CEPH CSI NFS provisioner resource requirement list, Put here list of resource
|
||||
# requests and limits you want to apply for provisioner pod
|
||||
# CSI_NFS_PROVISIONER_RESOURCE: |
|
||||
# - name : csi-provisioner
|
||||
# resource:
|
||||
# requests:
|
||||
# memory: 128Mi
|
||||
# cpu: 100m
|
||||
# limits:
|
||||
# memory: 256Mi
|
||||
# - name : csi-nfsplugin
|
||||
# resource:
|
||||
# requests:
|
||||
# memory: 512Mi
|
||||
# cpu: 250m
|
||||
# limits:
|
||||
# memory: 1Gi
|
||||
# - name : csi-attacher
|
||||
# resource:
|
||||
# requests:
|
||||
# memory: 128Mi
|
||||
# cpu: 100m
|
||||
# limits:
|
||||
# memory: 256Mi
|
||||
# (Optional) CEPH CSI NFS plugin resource requirement list, Put here list of resource
|
||||
# requests and limits you want to apply for plugin pod
|
||||
# CSI_NFS_PLUGIN_RESOURCE: |
|
||||
# - name : driver-registrar
|
||||
# resource:
|
||||
# requests:
|
||||
# memory: 128Mi
|
||||
# cpu: 50m
|
||||
# limits:
|
||||
# memory: 256Mi
|
||||
# - name : csi-nfsplugin
|
||||
# resource:
|
||||
# requests:
|
||||
# memory: 512Mi
|
||||
# cpu: 250m
|
||||
# limits:
|
||||
# memory: 1Gi
|
||||
|
||||
# Configure CSI CephFS liveness metrics port
|
||||
# Set to true to enable Ceph CSI liveness container.
|
||||
CSI_ENABLE_LIVENESS: "false"
|
||||
# CSI_CEPHFS_LIVENESS_METRICS_PORT: "9081"
|
||||
# Configure CSI RBD liveness metrics port
|
||||
# CSI_RBD_LIVENESS_METRICS_PORT: "9080"
|
||||
# CSIADDONS_PORT: "9070"
|
||||
|
||||
# Set CephFS Kernel mount options to use https://docs.ceph.com/en/latest/man/8/mount.ceph/#options
|
||||
# Set to "ms_mode=secure" when connections.encrypted is enabled in CephCluster CR
|
||||
# CSI_CEPHFS_KERNEL_MOUNT_OPTIONS: "ms_mode=secure"
|
||||
|
||||
# (Optional) Duration in seconds that non-leader candidates will wait to force acquire leadership. Default to 137 seconds.
|
||||
# CSI_LEADER_ELECTION_LEASE_DURATION: "137s"
|
||||
|
||||
# (Optional) Deadline in seconds that the acting leader will retry refreshing leadership before giving up. Defaults to 107 seconds.
|
||||
# CSI_LEADER_ELECTION_RENEW_DEADLINE: "107s"
|
||||
|
||||
# (Optional) Retry Period in seconds the LeaderElector clients should wait between tries of actions. Defaults to 26 seconds.
|
||||
# CSI_LEADER_ELECTION_RETRY_PERIOD: "26s"
|
||||
|
||||
# Whether the OBC provisioner should watch on the ceph cluster namespace or not, if not default provisioner value is set
|
||||
ROOK_OBC_WATCH_OPERATOR_NAMESPACE: "true"
|
||||
|
||||
# Custom prefix value for the OBC provisioner instead of ceph cluster namespace, do not set on existing cluster
|
||||
# ROOK_OBC_PROVISIONER_NAME_PREFIX: "custom-prefix"
|
||||
|
||||
# Whether to start the discovery daemon to watch for raw storage devices on nodes in the cluster.
|
||||
# This daemon does not need to run if you are only going to create your OSDs based on StorageClassDeviceSets with PVCs.
|
||||
ROOK_ENABLE_DISCOVERY_DAEMON: "false"
|
||||
# The timeout value (in seconds) of Ceph commands. It should be >= 1. If this variable is not set or is an invalid value, it's default to 15.
|
||||
ROOK_CEPH_COMMANDS_TIMEOUT_SECONDS: "15"
|
||||
# Enable the csi addons sidecar.
|
||||
CSI_ENABLE_CSIADDONS: "false"
|
||||
# Enable watch for faster recovery from rbd rwo node loss
|
||||
ROOK_WATCH_FOR_NODE_FAILURE: "true"
|
||||
# ROOK_CSIADDONS_IMAGE: "quay.io/csiaddons/k8s-sidecar:v0.8.0"
|
||||
# The CSI GRPC timeout value (in seconds). It should be >= 120. If this variable is not set or is an invalid value, it's default to 150.
|
||||
CSI_GRPC_TIMEOUT_SECONDS: "150"
|
||||
|
||||
# Enable topology based provisioning.
|
||||
CSI_ENABLE_TOPOLOGY: "false"
|
||||
# Domain labels define which node labels to use as domains
|
||||
# for CSI nodeplugins to advertise their domains
|
||||
# NOTE: the value here serves as an example and needs to be
|
||||
# updated with node labels that define domains of interest
|
||||
# CSI_TOPOLOGY_DOMAIN_LABELS: "kubernetes.io/hostname,topology.kubernetes.io/zone,topology.rook.io/rack"
|
||||
|
||||
# Whether to skip any attach operation altogether for CephCSI PVCs.
|
||||
# See more details [here](https://kubernetes-csi.github.io/docs/skip-attach.html#skip-attach-with-csi-driver-object).
|
||||
# If set to false it skips the volume attachments and makes the creation of pods using the CephCSI PVC fast.
|
||||
# **WARNING** It's highly discouraged to use this for RWO volumes. for RBD PVC it can cause data corruption,
|
||||
# csi-addons operations like Reclaimspace and PVC Keyrotation will also not be supported if set to false
|
||||
# since we'll have no VolumeAttachments to determine which node the PVC is mounted on.
|
||||
# Refer to this [issue](https://github.com/kubernetes/kubernetes/issues/103305) for more details.
|
||||
CSI_CEPHFS_ATTACH_REQUIRED: "true"
|
||||
CSI_RBD_ATTACH_REQUIRED: "true"
|
||||
CSI_NFS_ATTACH_REQUIRED: "true"
|
||||
# Rook Discover toleration. Will tolerate all taints with all keys.
|
||||
# (Optional) Rook Discover tolerations list. Put here list of taints you want to tolerate in YAML format.
|
||||
# DISCOVER_TOLERATIONS: |
|
||||
# - effect: NoSchedule
|
||||
# key: node-role.kubernetes.io/control-plane
|
||||
# operator: Exists
|
||||
# - effect: NoExecute
|
||||
# key: node-role.kubernetes.io/etcd
|
||||
# operator: Exists
|
||||
# (Optional) Rook Discover priority class name to set on the pod(s)
|
||||
# DISCOVER_PRIORITY_CLASS_NAME: "<PriorityClassName>"
|
||||
# (Optional) Discover Agent NodeAffinity.
|
||||
# DISCOVER_AGENT_NODE_AFFINITY: |
|
||||
# requiredDuringSchedulingIgnoredDuringExecution:
|
||||
# nodeSelectorTerms:
|
||||
# - matchExpressions:
|
||||
# - key: myKey
|
||||
# operator: DoesNotExist
|
||||
# (Optional) Discover Agent Pod Labels.
|
||||
# DISCOVER_AGENT_POD_LABELS: "key1=value1,key2=value2"
|
||||
# Disable automatic orchestration when new devices are discovered
|
||||
ROOK_DISABLE_DEVICE_HOTPLUG: "false"
|
||||
# The duration between discovering devices in the rook-discover daemonset.
|
||||
ROOK_DISCOVER_DEVICES_INTERVAL: "60m"
|
||||
# DISCOVER_DAEMON_RESOURCES: |
|
||||
# - name: DISCOVER_DAEMON_RESOURCES
|
||||
# resources:
|
||||
# limits:
|
||||
# memory: 512Mi
|
||||
# requests:
|
||||
# cpu: 100m
|
||||
# memory: 128Mi
|
||||
---
|
||||
# OLM: BEGIN OPERATOR DEPLOYMENT
|
||||
apiVersion: apps/v1
|
||||
kind: Deployment
|
||||
metadata:
|
||||
name: rook-ceph-operator
|
||||
namespace: {{taskserv.namespace | default (value="rook-ceph")}} # namespace:operator
|
||||
labels:
|
||||
operator: rook
|
||||
storage-backend: ceph
|
||||
app.kubernetes.io/name: rook-ceph
|
||||
app.kubernetes.io/instance: rook-ceph
|
||||
app.kubernetes.io/component: rook-ceph-operator
|
||||
app.kubernetes.io/part-of: rook-ceph-operator
|
||||
spec:
|
||||
selector:
|
||||
matchLabels:
|
||||
app: rook-ceph-operator
|
||||
strategy:
|
||||
type: Recreate
|
||||
replicas: 1
|
||||
template:
|
||||
metadata:
|
||||
labels:
|
||||
app: rook-ceph-operator
|
||||
spec:
|
||||
tolerations:
|
||||
- effect: NoExecute
|
||||
key: node.kubernetes.io/unreachable
|
||||
operator: Exists
|
||||
tolerationSeconds: 5
|
||||
serviceAccountName: rook-ceph-system
|
||||
containers:
|
||||
- name: rook-ceph-operator
|
||||
image: {{taskserv.rookCeph_image}}
|
||||
args: ["ceph", "operator"]
|
||||
securityContext:
|
||||
runAsNonRoot: true
|
||||
runAsUser: 2016
|
||||
runAsGroup: 2016
|
||||
capabilities:
|
||||
drop: ["ALL"]
|
||||
volumeMounts:
|
||||
- mountPath: {{taskserv.dataDirHostPath | default (value="/var/lib/rook")}}
|
||||
name: rook-config
|
||||
- mountPath: /etc/ceph
|
||||
name: default-config-dir
|
||||
env:
|
||||
# If the operator should only watch for cluster CRDs in the same namespace, set this to "true".
|
||||
# If this is not set to true, the operator will watch for cluster CRDs in all namespaces.
|
||||
- name: ROOK_CURRENT_NAMESPACE_ONLY
|
||||
value: "false"
|
||||
|
||||
# Whether to start pods as privileged that mount a host path, which includes the Ceph mon and osd pods.
|
||||
# Set this to true if SELinux is enabled (e.g. OpenShift) to workaround the anyuid issues.
|
||||
# For more details see https://github.com/rook/rook/issues/1314#issuecomment-355799641
|
||||
- name: ROOK_HOSTPATH_REQUIRES_PRIVILEGED
|
||||
value: "false"
|
||||
# Provide customised regex as the values using comma. For eg. regex for rbd based volume, value will be like "(?i)rbd[0-9]+".
|
||||
# In case of more than one regex, use comma to separate between them.
|
||||
# Default regex will be "(?i)dm-[0-9]+,(?i)rbd[0-9]+,(?i)nbd[0-9]+"
|
||||
# Add regex expression after putting a comma to blacklist a disk
|
||||
# If value is empty, the default regex will be used.
|
||||
- name: DISCOVER_DAEMON_UDEV_BLACKLIST
|
||||
value: "(?i)dm-[0-9]+,(?i)rbd[0-9]+,(?i)nbd[0-9]+"
|
||||
|
||||
# Time to wait until the node controller will move Rook pods to other
|
||||
# nodes after detecting an unreachable node.
|
||||
# Pods affected by this setting are:
|
||||
# mgr, rbd, mds, rgw, nfs, PVC based mons and osds, and ceph toolbox
|
||||
# The value used in this variable replaces the default value of 300 secs
|
||||
# added automatically by k8s as Toleration for
|
||||
# <node.kubernetes.io/unreachable>
|
||||
# The total amount of time to reschedule Rook pods in healthy nodes
|
||||
# before detecting a <not ready node> condition will be the sum of:
|
||||
# --> node-monitor-grace-period: 40 seconds (k8s kube-controller-manager flag)
|
||||
# --> ROOK_UNREACHABLE_NODE_TOLERATION_SECONDS: 5 seconds
|
||||
- name: ROOK_UNREACHABLE_NODE_TOLERATION_SECONDS
|
||||
value: "5"
|
||||
|
||||
# The name of the node to pass with the downward API
|
||||
- name: NODE_NAME
|
||||
valueFrom:
|
||||
fieldRef:
|
||||
fieldPath: spec.nodeName
|
||||
# The pod name to pass with the downward API
|
||||
- name: POD_NAME
|
||||
valueFrom:
|
||||
fieldRef:
|
||||
fieldPath: metadata.name
|
||||
# The pod namespace to pass with the downward API
|
||||
- name: POD_NAMESPACE
|
||||
valueFrom:
|
||||
fieldRef:
|
||||
fieldPath: metadata.namespace
|
||||
# Recommended resource requests and limits, if desired
|
||||
#resources:
|
||||
# limits:
|
||||
# memory: 512Mi
|
||||
# requests:
|
||||
# cpu: 200m
|
||||
# memory: 128Mi
|
||||
|
||||
# Uncomment it to run lib bucket provisioner in multithreaded mode
|
||||
#- name: LIB_BUCKET_PROVISIONER_THREADS
|
||||
# value: "5"
|
||||
|
||||
# Uncomment it to run rook operator on the host network
|
||||
#hostNetwork: true
|
||||
volumes:
|
||||
- name: rook-config
|
||||
emptyDir: {}
|
||||
- name: default-config-dir
|
||||
emptyDir: {}
|
||||
# OLM: END OPERATOR DEPLOYMENT
|
||||
|
|
@ -0,0 +1,19 @@
|
|||
# ###############################################################################################################
|
||||
# The `rook-ceph-osd-env-override` ConfigMap is a development feature
|
||||
# that allows to inject arbitrary environment variables to OSD-related
|
||||
# containers created by the operator.
|
||||
# ###############################################################################################################
|
||||
|
||||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
name: rook-ceph-osd-env-override
|
||||
namespace: {{taskserv.namespace | default (value="rook-ceph")}} # namespace:cluster
|
||||
data:
|
||||
# Bypass the ASan's assertion that it is the very first loaded DSO.
|
||||
# This is necessary for crimson-osd as it's currently built with
|
||||
# the ASan sanitizer turned on which means the `libasan.so` must
|
||||
# the be the very first loaded dynamic library. Unfortunately, this
|
||||
# isn't fulfilled as the containers use `ld.preload`, so ASan was
|
||||
# aborting the entire OSD.
|
||||
ASAN_OPTIONS: verify_asan_link_order=0
|
||||
93
taskservs/rook-ceph/default/rook-ceph/osd-purge.yaml.j2
Normal file
93
taskservs/rook-ceph/default/rook-ceph/osd-purge.yaml.j2
Normal file
|
|
@ -0,0 +1,93 @@
|
|||
#################################################################################################################
|
||||
# We need many operations to remove OSDs as written in Documentation/Storage-Configuration/Advanced/ceph-osd-mgmt.md.
|
||||
# This job can automate some of that operations: mark OSDs as `out`, purge these OSDs,
|
||||
# and delete the corresponding resources like OSD deployments, OSD prepare jobs, and PVCs.
|
||||
#
|
||||
# Please note the following.
|
||||
#
|
||||
# - This job only works for `down` OSDs.
|
||||
# - This job doesn't wait for backfilling to be completed.
|
||||
#
|
||||
# If you want to remove `up` OSDs and/or want to wait for backfilling to be completed between each OSD removal,
|
||||
# please do it by hand.
|
||||
#################################################################################################################
|
||||
|
||||
apiVersion: batch/v1
|
||||
kind: Job
|
||||
metadata:
|
||||
name: rook-ceph-purge-osd
|
||||
namespace: {{taskserv.namespace | default (value="rook-ceph")}} # namespace:cluster
|
||||
labels:
|
||||
app: rook-ceph-purge-osd
|
||||
spec:
|
||||
template:
|
||||
metadata:
|
||||
labels:
|
||||
app: rook-ceph-purge-osd
|
||||
spec:
|
||||
serviceAccountName: rook-ceph-purge-osd
|
||||
containers:
|
||||
- name: osd-removal
|
||||
image: {{taskserv.rookCeph_image}}
|
||||
# TODO: Insert the OSD ID in the last parameter that is to be removed
|
||||
# The OSD IDs are a comma-separated list. For example: "0" or "0,2".
|
||||
# If you want to preserve the OSD PVCs, set `--preserve-pvc true`.
|
||||
#
|
||||
# A --force-osd-removal option is available if the OSD should be destroyed even though the
|
||||
# removal could lead to data loss.
|
||||
args:
|
||||
- "ceph"
|
||||
- "osd"
|
||||
- "remove"
|
||||
- "--preserve-pvc"
|
||||
- "false"
|
||||
- "--force-osd-removal"
|
||||
- "false"
|
||||
- "--osd-ids"
|
||||
- "<OSD-IDs>"
|
||||
env:
|
||||
- name: POD_NAMESPACE
|
||||
valueFrom:
|
||||
fieldRef:
|
||||
fieldPath: metadata.namespace
|
||||
- name: ROOK_MON_ENDPOINTS
|
||||
valueFrom:
|
||||
configMapKeyRef:
|
||||
key: data
|
||||
name: rook-ceph-mon-endpoints
|
||||
- name: ROOK_CEPH_USERNAME
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
key: ceph-username
|
||||
name: rook-ceph-mon
|
||||
- name: ROOK_CONFIG_DIR
|
||||
value: {{taskserv.dataDirHostPath | default (value="/var/lib/rook")}}
|
||||
- name: ROOK_CEPH_CONFIG_OVERRIDE
|
||||
value: /etc/rook/config/override.conf
|
||||
- name: ROOK_FSID
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
key: fsid
|
||||
name: rook-ceph-mon
|
||||
- name: ROOK_LOG_LEVEL
|
||||
value: DEBUG
|
||||
volumeMounts:
|
||||
- mountPath: /etc/ceph
|
||||
name: ceph-conf-emptydir
|
||||
- mountPath: {{taskserv.dataDirHostPath | default (value="/var/lib/rook")}}
|
||||
name: rook-config
|
||||
- name: ceph-admin-secret
|
||||
mountPath: /var/lib/rook-ceph-mon
|
||||
volumes:
|
||||
- name: ceph-admin-secret
|
||||
secret:
|
||||
secretName: rook-ceph-mon
|
||||
optional: false
|
||||
items:
|
||||
- key: ceph-secret
|
||||
path: secret.keyring
|
||||
- emptyDir: {}
|
||||
name: ceph-conf-emptydir
|
||||
- emptyDir: {}
|
||||
name: rook-config
|
||||
restartPolicy: Never
|
||||
66
taskservs/rook-ceph/default/rook-ceph/pool.yaml.j2
Normal file
66
taskservs/rook-ceph/default/rook-ceph/pool.yaml.j2
Normal file
|
|
@ -0,0 +1,66 @@
|
|||
#################################################################################################################
|
||||
# Create a Ceph pool with settings for replication in production environments. A minimum of 3 OSDs on
|
||||
# different hosts are required in this example.
|
||||
# kubectl create -f pool.yaml
|
||||
#################################################################################################################
|
||||
|
||||
apiVersion: ceph.rook.io/v1
|
||||
kind: CephBlockPool
|
||||
metadata:
|
||||
name: replicapool
|
||||
namespace: {{taskserv.namespace | default (value="rook-ceph")}} # namespace:cluster
|
||||
spec:
|
||||
# The failure domain will spread the replicas of the data across different failure zones
|
||||
failureDomain: host
|
||||
# For a pool based on raw copies, specify the number of copies. A size of 1 indicates no redundancy.
|
||||
replicated:
|
||||
size: 3
|
||||
# Disallow setting pool with replica 1, this could lead to data loss without recovery.
|
||||
# Make sure you're *ABSOLUTELY CERTAIN* that is what you want
|
||||
requireSafeReplicaSize: true
|
||||
# hybridStorage:
|
||||
# primaryDeviceClass: ssd
|
||||
# secondaryDeviceClass: hdd
|
||||
# The number for replicas per failure domain, the value must be a divisor of the replica count. If specified, the most common value is 2 for stretch clusters, where the replica count would be 4.
|
||||
# replicasPerFailureDomain: 2
|
||||
# The name of the failure domain to place further down replicas
|
||||
# subFailureDomain: host
|
||||
# Ceph CRUSH root location of the rule
|
||||
# For reference: https://docs.ceph.com/docs/master/rados/operations/crush-map/#types-and-buckets
|
||||
#crushRoot: my-root
|
||||
# The Ceph CRUSH device class associated with the CRUSH replicated rule
|
||||
# For reference: https://docs.ceph.com/docs/master/rados/operations/crush-map/#device-classes
|
||||
# If device classes are specified, ensure this property is added to every pool in the cluster,
|
||||
# otherwise Ceph will warn about pools with overlapping roots.
|
||||
#deviceClass: my-class
|
||||
# Enables collecting RBD per-image IO statistics by enabling dynamic OSD performance counters. Defaults to false.
|
||||
# For reference: https://docs.ceph.com/docs/master/mgr/prometheus/#rbd-io-statistics
|
||||
# enableRBDStats: true
|
||||
# Set any property on a given pool
|
||||
# see https://docs.ceph.com/docs/master/rados/operations/pools/#set-pool-values
|
||||
parameters:
|
||||
# Inline compression mode for the data pool
|
||||
# Further reference: https://docs.ceph.com/docs/master/rados/configuration/bluestore-config-ref/#inline-compression
|
||||
compression_mode: none
|
||||
# gives a hint (%) to Ceph in terms of expected consumption of the total cluster capacity of a given pool
|
||||
# for more info: https://docs.ceph.com/docs/master/rados/operations/placement-groups/#specifying-expected-pool-size
|
||||
#target_size_ratio: ".5"
|
||||
mirroring:
|
||||
enabled: false
|
||||
# mirroring mode: pool level or per image
|
||||
# for more details see: https://docs.ceph.com/docs/master/rbd/rbd-mirroring/#enable-mirroring
|
||||
mode: image
|
||||
# specify the schedule(s) on which snapshots should be taken
|
||||
# snapshotSchedules:
|
||||
# - interval: 24h # daily snapshots
|
||||
# startTime: 14:00:00-05:00
|
||||
# reports pool mirroring status if enabled
|
||||
statusCheck:
|
||||
mirror:
|
||||
disabled: false
|
||||
interval: 60s
|
||||
# quota in bytes and/or objects, default value is 0 (unlimited)
|
||||
# see https://docs.ceph.com/en/latest/rados/operations/pools/#set-pool-quotas
|
||||
# quotas:
|
||||
# maxSize: "10Gi" # valid suffixes include k, M, G, T, P, E, Ki, Mi, Gi, Ti, Pi, Ei
|
||||
# maxObjects: 1000000000 # 1 billion objects
|
||||
21
taskservs/rook-ceph/default/rook-ceph/rgw-external.yaml.j2
Normal file
21
taskservs/rook-ceph/default/rook-ceph/rgw-external.yaml.j2
Normal file
|
|
@ -0,0 +1,21 @@
|
|||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
name: rook-ceph-rgw-{{taskserv.object_storename}}-external
|
||||
namespace: {{taskserv.namespace | default (value="rook-ceph")}} # namespace:cluster
|
||||
labels:
|
||||
app: rook-ceph-rgw
|
||||
rook_cluster: {{taskserv.clustertname | default(value="rook-ceph")}} # namespace:cluster
|
||||
rook_object_store: {{taskserv.object_storename}}
|
||||
spec:
|
||||
ports:
|
||||
- name: rgw
|
||||
port: 80 # service port mentioned in object store crd
|
||||
protocol: TCP
|
||||
targetPort: 8080
|
||||
selector:
|
||||
app: rook-ceph-rgw
|
||||
rook_cluster: {{taskserv.clustertname | default(value="rook-ceph")}} # namespace:cluster
|
||||
rook_object_store: {{taskserv.object_storename}}
|
||||
sessionAffinity: None
|
||||
type: NodePort
|
||||
|
|
@ -0,0 +1,35 @@
|
|||
apiVersion: storage.k8s.io/v1
|
||||
kind: StorageClass
|
||||
metadata:
|
||||
name: rook-cephfs
|
||||
provisioner: rook-ceph.cephfs.csi.ceph.com # csi-provisioner-name
|
||||
parameters:
|
||||
# clusterID is the namespace where the rook cluster is running
|
||||
# If you change this namespace, also change the namespace below where the secret namespaces are defined
|
||||
clusterID: {{taskserv.namespace | default(value="rook-ceph")}} # namespace:cluster
|
||||
|
||||
# CephFS filesystem name into which the volume shall be created
|
||||
fsName: {{taskserv.storage_fsName}}
|
||||
|
||||
# Ceph pool into which the volume shall be created
|
||||
# Required for provisionVolume: "true"
|
||||
pool: {{taskserv.storage_fsName}}-replicated
|
||||
|
||||
# The secrets contain Ceph admin credentials. These are generated automatically by the operator
|
||||
# in the same namespace as the cluster.
|
||||
csi.storage.k8s.io/provisioner-secret-name: rook-csi-cephfs-provisioner
|
||||
csi.storage.k8s.io/provisioner-secret-namespace: {{taskserv.namespace | default (value="rook-ceph")}} # namespace:cluster
|
||||
csi.storage.k8s.io/controller-expand-secret-name: rook-csi-cephfs-provisioner
|
||||
csi.storage.k8s.io/controller-expand-secret-namespace: {{taskserv.namespace | default (value="rook-ceph")}} # namespace:cluster
|
||||
csi.storage.k8s.io/node-stage-secret-name: rook-csi-cephfs-node
|
||||
csi.storage.k8s.io/node-stage-secret-namespace: {{taskserv.namespace | default (value="rook-ceph")}} # namespace:cluster
|
||||
|
||||
# (optional) The driver can use either ceph-fuse (fuse) or ceph kernel client (kernel)
|
||||
# If omitted, default volume mounter will be used - this is determined by probing for ceph-fuse
|
||||
# or by setting the default mounter explicitly via --volumemounter command-line argument.
|
||||
# mounter: kernel
|
||||
reclaimPolicy: Delete
|
||||
allowVolumeExpansion: true
|
||||
mountOptions:
|
||||
# uncomment the following line for debugging
|
||||
#- debug
|
||||
|
|
@ -0,0 +1,92 @@
|
|||
apiVersion: ceph.rook.io/v1
|
||||
kind: CephBlockPool
|
||||
metadata:
|
||||
name: replicapool
|
||||
namespace: {{taskserv.namespace | default (value="rook-ceph")}} # namespace:cluster
|
||||
spec:
|
||||
failureDomain: host
|
||||
replicated:
|
||||
size: 3
|
||||
# Disallow setting pool with replica 1, this could lead to data loss without recovery.
|
||||
# Make sure you're *ABSOLUTELY CERTAIN* that is what you want
|
||||
requireSafeReplicaSize: true
|
||||
# gives a hint (%) to Ceph in terms of expected consumption of the total cluster capacity of a given pool
|
||||
# for more info: https://docs.ceph.com/docs/master/rados/operations/placement-groups/#specifying-expected-pool-size
|
||||
#targetSizeRatio: .5
|
||||
---
|
||||
apiVersion: storage.k8s.io/v1
|
||||
kind: StorageClass
|
||||
metadata:
|
||||
name: rook-ceph-block
|
||||
provisioner: rook-ceph.rbd.csi.ceph.com # csi-provisioner-name
|
||||
parameters:
|
||||
# clusterID is the namespace where the rook cluster is running
|
||||
# If you change this namespace, also change the namespace below where the secret namespaces are defined
|
||||
clusterID: {{taskserv.cluster | default(value="rook-ceph")}} # namespace:cluster
|
||||
|
||||
# If you want to use erasure coded pool with RBD, you need to create
|
||||
# two pools. one erasure coded and one replicated.
|
||||
# You need to specify the replicated pool here in the `pool` parameter, it is
|
||||
# used for the metadata of the images.
|
||||
# The erasure coded pool must be set as the `dataPool` parameter below.
|
||||
#dataPool: ec-data-pool
|
||||
pool: replicapool
|
||||
|
||||
# (optional) mapOptions is a comma-separated list of map options.
|
||||
# For krbd options refer
|
||||
# https://docs.ceph.com/docs/master/man/8/rbd/#kernel-rbd-krbd-options
|
||||
# For nbd options refer
|
||||
# https://docs.ceph.com/docs/master/man/8/rbd-nbd/#options
|
||||
# mapOptions: lock_on_read,queue_depth=1024
|
||||
|
||||
# (optional) unmapOptions is a comma-separated list of unmap options.
|
||||
# For krbd options refer
|
||||
# https://docs.ceph.com/docs/master/man/8/rbd/#kernel-rbd-krbd-options
|
||||
# For nbd options refer
|
||||
# https://docs.ceph.com/docs/master/man/8/rbd-nbd/#options
|
||||
# unmapOptions: force
|
||||
|
||||
# (optional) Set it to true to encrypt each volume with encryption keys
|
||||
# from a key management system (KMS)
|
||||
# encrypted: "true"
|
||||
|
||||
# (optional) Use external key management system (KMS) for encryption key by
|
||||
# specifying a unique ID matching a KMS ConfigMap. The ID is only used for
|
||||
# correlation to configmap entry.
|
||||
# encryptionKMSID: <kms-config-id>
|
||||
|
||||
# RBD image format. Defaults to "2".
|
||||
imageFormat: "2"
|
||||
|
||||
# RBD image features
|
||||
# Available for imageFormat: "2". Older releases of CSI RBD
|
||||
# support only the `layering` feature. The Linux kernel (KRBD) supports the
|
||||
# full complement of features as of 5.4
|
||||
# `layering` alone corresponds to Ceph's bitfield value of "2" ;
|
||||
# `layering` + `fast-diff` + `object-map` + `deep-flatten` + `exclusive-lock` together
|
||||
# correspond to Ceph's OR'd bitfield value of "63". Here we use
|
||||
# a symbolic, comma-separated format:
|
||||
# For 5.4 or later kernels:
|
||||
#imageFeatures: layering,fast-diff,object-map,deep-flatten,exclusive-lock
|
||||
# For 5.3 or earlier kernels:
|
||||
imageFeatures: layering
|
||||
|
||||
# The secrets contain Ceph admin credentials. These are generated automatically by the operator
|
||||
# in the same namespace as the cluster.
|
||||
csi.storage.k8s.io/provisioner-secret-name: rook-csi-rbd-provisioner
|
||||
csi.storage.k8s.io/provisioner-secret-namespace: {{taskserv.namespace | default (value="rook-ceph")}} # namespace:cluster
|
||||
csi.storage.k8s.io/controller-expand-secret-name: rook-csi-rbd-provisioner
|
||||
csi.storage.k8s.io/controller-expand-secret-namespace: {{taskserv.namespace | default (value="rook-ceph")}} # namespace:cluster
|
||||
csi.storage.k8s.io/node-stage-secret-name: rook-csi-rbd-node
|
||||
csi.storage.k8s.io/node-stage-secret-namespace: {{taskserv.namespace | default (value="rook-ceph")}} # namespace:cluster
|
||||
# Specify the filesystem type of the volume. If not specified, csi-provisioner
|
||||
# will set default as `ext4`. Note that `xfs` is not recommended due to potential deadlock
|
||||
# in hyperconverged settings where the volume is mounted on the same node as the osds.
|
||||
csi.storage.k8s.io/fstype: ext4
|
||||
# uncomment the following to use rbd-nbd as mounter on supported nodes
|
||||
# **IMPORTANT**: CephCSI v3.4.0 onwards a volume healer functionality is added to reattach
|
||||
# the PVC to application pod if nodeplugin pod restart.
|
||||
# Its still in Alpha support. Therefore, this option is not recommended for production use.
|
||||
#mounter: rbd-nbd
|
||||
allowVolumeExpansion: true
|
||||
reclaimPolicy: Delete
|
||||
35
taskservs/rook-ceph/default/rook-ceph/storageclass.yaml
Normal file
35
taskservs/rook-ceph/default/rook-ceph/storageclass.yaml
Normal file
|
|
@ -0,0 +1,35 @@
|
|||
apiVersion: storage.k8s.io/v1
|
||||
kind: StorageClass
|
||||
metadata:
|
||||
name: rook-cephfs
|
||||
provisioner: rook-ceph.cephfs.csi.ceph.com # csi-provisioner-name
|
||||
parameters:
|
||||
# clusterID is the namespace where the rook cluster is running
|
||||
# If you change this namespace, also change the namespace below where the secret namespaces are defined
|
||||
clusterID: {{taskserv.namespace | default(value="rook-ceph")}} # namespace:cluster
|
||||
|
||||
# CephFS filesystem name into which the volume shall be created
|
||||
fsName: {{taskserv.storage_fsName}}
|
||||
|
||||
# Ceph pool into which the volume shall be created
|
||||
# Required for provisionVolume: "true"
|
||||
pool: {{taskserv.storage_pool}} #-replicated
|
||||
|
||||
# The secrets contain Ceph admin credentials. These are generated automatically by the operator
|
||||
# in the same namespace as the cluster.
|
||||
csi.storage.k8s.io/provisioner-secret-name: rook-csi-cephfs-provisioner
|
||||
csi.storage.k8s.io/provisioner-secret-namespace: {{taskserv.namespace | default (value="rook-ceph")}} # namespace:cluster
|
||||
csi.storage.k8s.io/controller-expand-secret-name: rook-csi-cephfs-provisioner
|
||||
csi.storage.k8s.io/controller-expand-secret-namespace: {{taskserv.namespace | default (value="rook-ceph")}} # namespace:cluster
|
||||
csi.storage.k8s.io/node-stage-secret-name: rook-csi-cephfs-node
|
||||
csi.storage.k8s.io/node-stage-secret-namespace: {{taskserv.namespace | default (value="rook-ceph")}} # namespace:cluster
|
||||
|
||||
# (optional) The driver can use either ceph-fuse (fuse) or ceph kernel client (kernel)
|
||||
# If omitted, default volume mounter will be used - this is determined by probing for ceph-fuse
|
||||
# or by setting the default mounter explicitly via --volumemounter command-line argument.
|
||||
# mounter: kernel
|
||||
reclaimPolicy: Delete
|
||||
allowVolumeExpansion: true
|
||||
mountOptions:
|
||||
# uncomment the following line for debugging
|
||||
#- debug
|
||||
62
taskservs/rook-ceph/default/rook-ceph/toolbox-job.yaml.j2
Normal file
62
taskservs/rook-ceph/default/rook-ceph/toolbox-job.yaml.j2
Normal file
|
|
@ -0,0 +1,62 @@
|
|||
apiVersion: batch/v1
|
||||
kind: Job
|
||||
metadata:
|
||||
name: rook-ceph-toolbox-job
|
||||
namespace: {{taskserv.namespace | default (value="rook-ceph")}} # namespace:cluster
|
||||
labels:
|
||||
app: ceph-toolbox-job
|
||||
spec:
|
||||
template:
|
||||
spec:
|
||||
initContainers:
|
||||
- name: config-init
|
||||
image: {{taskserv.rookCeph_image}}
|
||||
command: ["/usr/local/bin/toolbox.sh"]
|
||||
args: ["--skip-watch"]
|
||||
imagePullPolicy: IfNotPresent
|
||||
env:
|
||||
- name: ROOK_CEPH_USERNAME
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
name: rook-ceph-mon
|
||||
key: ceph-username
|
||||
volumeMounts:
|
||||
- mountPath: /etc/ceph
|
||||
name: ceph-config
|
||||
- name: mon-endpoint-volume
|
||||
mountPath: /etc/rook
|
||||
- name: ceph-admin-secret
|
||||
mountPath: /var/lib/rook-ceph-mon
|
||||
containers:
|
||||
- name: script
|
||||
image: {{taskserv.rookCeph_image}}
|
||||
volumeMounts:
|
||||
- mountPath: /etc/ceph
|
||||
name: ceph-config
|
||||
readOnly: true
|
||||
command:
|
||||
- "bash"
|
||||
- "-c"
|
||||
- |
|
||||
# Modify this script to run any ceph, rbd, radosgw-admin, or other commands that could
|
||||
# be run in the toolbox pod. The output of the commands can be seen by getting the pod log.
|
||||
#
|
||||
# example: print the ceph status
|
||||
ceph status
|
||||
volumes:
|
||||
- name: ceph-admin-secret
|
||||
secret:
|
||||
secretName: rook-ceph-mon
|
||||
optional: false
|
||||
items:
|
||||
- key: ceph-secret
|
||||
path: secret.keyring
|
||||
- name: mon-endpoint-volume
|
||||
configMap:
|
||||
name: rook-ceph-mon-endpoints
|
||||
items:
|
||||
- key: data
|
||||
path: mon-endpoints
|
||||
- name: ceph-config
|
||||
emptyDir: {}
|
||||
restartPolicy: Never
|
||||
|
|
@ -0,0 +1,137 @@
|
|||
#################################################################################################################
|
||||
# Define the toolbox that will run with the Rook operator image.
|
||||
|
||||
# For example
|
||||
# kubectl create -f toolbox-operator-image.yaml
|
||||
#################################################################################################################
|
||||
apiVersion: apps/v1
|
||||
kind: Deployment
|
||||
metadata:
|
||||
name: rook-ceph-tools-operator-image
|
||||
namespace: {{taskserv.namespace | default (value="rook-ceph")}} # namespace:cluster
|
||||
labels:
|
||||
app: rook-ceph-tools-operator-image
|
||||
spec:
|
||||
replicas: 1
|
||||
selector:
|
||||
matchLabels:
|
||||
app: rook-ceph-tools-operator-image
|
||||
template:
|
||||
metadata:
|
||||
labels:
|
||||
app: rook-ceph-tools-operator-image
|
||||
spec:
|
||||
dnsPolicy: ClusterFirstWithHostNet
|
||||
serviceAccountName: rook-ceph-default
|
||||
containers:
|
||||
- name: rook-ceph-tools-operator-image
|
||||
image: {{taskserv.rookCeph_image}}
|
||||
command:
|
||||
- /bin/bash
|
||||
- -c
|
||||
- |
|
||||
# Replicate the script from toolbox.sh inline so the ceph image
|
||||
# can be run directly, instead of requiring the rook toolbox
|
||||
CEPH_CONFIG="/etc/ceph/ceph.conf"
|
||||
MON_CONFIG="/etc/rook/mon-endpoints"
|
||||
KEYRING_FILE="/etc/ceph/keyring"
|
||||
|
||||
# create a ceph config file in its default location so ceph/rados tools can be used
|
||||
# without specifying any arguments
|
||||
write_endpoints() {
|
||||
endpoints=$(cat ${MON_CONFIG})
|
||||
|
||||
# filter out the mon names
|
||||
# external cluster can have numbers or hyphens in mon names, handling them in regex
|
||||
# shellcheck disable=SC2001
|
||||
mon_endpoints=$(echo "${endpoints}"| sed 's/[a-z0-9_-]\+=//g')
|
||||
|
||||
DATE=$(date)
|
||||
echo "$DATE writing mon endpoints to ${CEPH_CONFIG}: ${endpoints}"
|
||||
cat <<EOF > ${CEPH_CONFIG}
|
||||
[global]
|
||||
mon_host = ${mon_endpoints}
|
||||
|
||||
[client.admin]
|
||||
keyring = ${KEYRING_FILE}
|
||||
EOF
|
||||
}
|
||||
|
||||
# watch the endpoints config file and update if the mon endpoints ever change
|
||||
watch_endpoints() {
|
||||
# get the timestamp for the target of the soft link
|
||||
real_path=$(realpath ${MON_CONFIG})
|
||||
initial_time=$(stat -c %Z "${real_path}")
|
||||
while true; do
|
||||
real_path=$(realpath ${MON_CONFIG})
|
||||
latest_time=$(stat -c %Z "${real_path}")
|
||||
|
||||
if [[ "${latest_time}" != "${initial_time}" ]]; then
|
||||
write_endpoints
|
||||
initial_time=${latest_time}
|
||||
fi
|
||||
|
||||
sleep 10
|
||||
done
|
||||
}
|
||||
|
||||
# read the secret from an env var (for backward compatibility), or from the secret file
|
||||
ceph_secret=${ROOK_CEPH_SECRET}
|
||||
if [[ "$ceph_secret" == "" ]]; then
|
||||
ceph_secret=$(cat /var/lib/rook-ceph-mon/secret.keyring)
|
||||
fi
|
||||
|
||||
# create the keyring file
|
||||
cat <<EOF > ${KEYRING_FILE}
|
||||
[${ROOK_CEPH_USERNAME}]
|
||||
key = ${ceph_secret}
|
||||
EOF
|
||||
|
||||
# write the initial config file
|
||||
write_endpoints
|
||||
|
||||
# continuously update the mon endpoints if they fail over
|
||||
watch_endpoints
|
||||
imagePullPolicy: IfNotPresent
|
||||
tty: true
|
||||
securityContext:
|
||||
runAsNonRoot: true
|
||||
runAsUser: 2016
|
||||
runAsGroup: 2016
|
||||
capabilities:
|
||||
drop: ["ALL"]
|
||||
env:
|
||||
- name: ROOK_CEPH_USERNAME
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
name: rook-ceph-mon
|
||||
key: ceph-username
|
||||
volumeMounts:
|
||||
- mountPath: /etc/ceph
|
||||
name: ceph-config
|
||||
- name: mon-endpoint-volume
|
||||
mountPath: /etc/rook
|
||||
- name: ceph-admin-secret
|
||||
mountPath: /var/lib/rook-ceph-mon
|
||||
readOnly: true
|
||||
volumes:
|
||||
- name: ceph-admin-secret
|
||||
secret:
|
||||
secretName: rook-ceph-mon
|
||||
optional: false
|
||||
items:
|
||||
- key: ceph-secret
|
||||
path: secret.keyring
|
||||
- name: mon-endpoint-volume
|
||||
configMap:
|
||||
name: rook-ceph-mon-endpoints
|
||||
items:
|
||||
- key: data
|
||||
path: mon-endpoints
|
||||
- name: ceph-config
|
||||
emptyDir: {}
|
||||
tolerations:
|
||||
- key: "node.kubernetes.io/unreachable"
|
||||
operator: "Exists"
|
||||
effect: "NoExecute"
|
||||
tolerationSeconds: 5
|
||||
131
taskservs/rook-ceph/default/rook-ceph/toolbox.yaml.j2
Normal file
131
taskservs/rook-ceph/default/rook-ceph/toolbox.yaml.j2
Normal file
|
|
@ -0,0 +1,131 @@
|
|||
apiVersion: apps/v1
|
||||
kind: Deployment
|
||||
metadata:
|
||||
name: rook-ceph-tools
|
||||
namespace: {{taskserv.namespace | default (value="rook-ceph")}} # namespace:cluster
|
||||
labels:
|
||||
app: rook-ceph-tools
|
||||
spec:
|
||||
replicas: 1
|
||||
selector:
|
||||
matchLabels:
|
||||
app: rook-ceph-tools
|
||||
template:
|
||||
metadata:
|
||||
labels:
|
||||
app: rook-ceph-tools
|
||||
spec:
|
||||
dnsPolicy: ClusterFirstWithHostNet
|
||||
serviceAccountName: rook-ceph-default
|
||||
containers:
|
||||
- name: rook-ceph-tools
|
||||
image: {{taskserv.ceph_image}}
|
||||
command:
|
||||
- /bin/bash
|
||||
- -c
|
||||
- |
|
||||
# Replicate the script from toolbox.sh inline so the ceph image
|
||||
# can be run directly, instead of requiring the rook toolbox
|
||||
CEPH_CONFIG="/etc/ceph/ceph.conf"
|
||||
MON_CONFIG="/etc/rook/mon-endpoints"
|
||||
KEYRING_FILE="/etc/ceph/keyring"
|
||||
|
||||
# create a ceph config file in its default location so ceph/rados tools can be used
|
||||
# without specifying any arguments
|
||||
write_endpoints() {
|
||||
endpoints=$(cat ${MON_CONFIG})
|
||||
|
||||
# filter out the mon names
|
||||
# external cluster can have numbers or hyphens in mon names, handling them in regex
|
||||
# shellcheck disable=SC2001
|
||||
mon_endpoints=$(echo "${endpoints}"| sed 's/[a-z0-9_-]\+=//g')
|
||||
|
||||
DATE=$(date)
|
||||
echo "$DATE writing mon endpoints to ${CEPH_CONFIG}: ${endpoints}"
|
||||
cat <<EOF > ${CEPH_CONFIG}
|
||||
[global]
|
||||
mon_host = ${mon_endpoints}
|
||||
|
||||
[client.admin]
|
||||
keyring = ${KEYRING_FILE}
|
||||
EOF
|
||||
}
|
||||
|
||||
# watch the endpoints config file and update if the mon endpoints ever change
|
||||
watch_endpoints() {
|
||||
# get the timestamp for the target of the soft link
|
||||
real_path=$(realpath ${MON_CONFIG})
|
||||
initial_time=$(stat -c %Z "${real_path}")
|
||||
while true; do
|
||||
real_path=$(realpath ${MON_CONFIG})
|
||||
latest_time=$(stat -c %Z "${real_path}")
|
||||
|
||||
if [[ "${latest_time}" != "${initial_time}" ]]; then
|
||||
write_endpoints
|
||||
initial_time=${latest_time}
|
||||
fi
|
||||
|
||||
sleep 10
|
||||
done
|
||||
}
|
||||
|
||||
# read the secret from an env var (for backward compatibility), or from the secret file
|
||||
ceph_secret=${ROOK_CEPH_SECRET}
|
||||
if [[ "$ceph_secret" == "" ]]; then
|
||||
ceph_secret=$(cat /var/lib/rook-ceph-mon/secret.keyring)
|
||||
fi
|
||||
|
||||
# create the keyring file
|
||||
cat <<EOF > ${KEYRING_FILE}
|
||||
[${ROOK_CEPH_USERNAME}]
|
||||
key = ${ceph_secret}
|
||||
EOF
|
||||
|
||||
# write the initial config file
|
||||
write_endpoints
|
||||
|
||||
# continuously update the mon endpoints if they fail over
|
||||
watch_endpoints
|
||||
imagePullPolicy: IfNotPresent
|
||||
tty: true
|
||||
securityContext:
|
||||
runAsNonRoot: true
|
||||
runAsUser: 2016
|
||||
runAsGroup: 2016
|
||||
capabilities:
|
||||
drop: ["ALL"]
|
||||
env:
|
||||
- name: ROOK_CEPH_USERNAME
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
name: rook-ceph-mon
|
||||
key: ceph-username
|
||||
volumeMounts:
|
||||
- mountPath: /etc/ceph
|
||||
name: ceph-config
|
||||
- name: mon-endpoint-volume
|
||||
mountPath: /etc/rook
|
||||
- name: ceph-admin-secret
|
||||
mountPath: /var/lib/rook-ceph-mon
|
||||
readOnly: true
|
||||
volumes:
|
||||
- name: ceph-admin-secret
|
||||
secret:
|
||||
secretName: rook-ceph-mon
|
||||
optional: false
|
||||
items:
|
||||
- key: ceph-secret
|
||||
path: secret.keyring
|
||||
- name: mon-endpoint-volume
|
||||
configMap:
|
||||
name: rook-ceph-mon-endpoints
|
||||
items:
|
||||
- key: data
|
||||
path: mon-endpoints
|
||||
- name: ceph-config
|
||||
emptyDir: {}
|
||||
tolerations:
|
||||
- key: "node.kubernetes.io/unreachable"
|
||||
operator: "Exists"
|
||||
effect: "NoExecute"
|
||||
tolerationSeconds: 5
|
||||
1
taskservs/rook-ceph/default/rook-ceph/version.txt
Normal file
1
taskservs/rook-ceph/default/rook-ceph/version.txt
Normal file
|
|
@ -0,0 +1 @@
|
|||
1.14.2
|
||||
Loading…
Add table
Add a link
Reference in a new issue