This week:
Exploring whether we can deprecate FileStore (which isn't supported by
cephadm) in Q and remove in R. The conversion process is documented
but tedious - improve docs where we can, and add some automation if
necessary. When a decision is made, announce asap on ceph-users.
Blog posts for Pacific, still need content from RADOS, RBD, RGW and Dashboard.
CDS followup meetings are scheduled for Quincy planning:
https://tracker.ceph.com/projects/ceph/wiki/CDS_Quincy
Ubuntu Bionic crashes (https://tracker.ceph.com/issues/50218), related
to static linkage of the standard library from PPA. We'll try
disabling the PPA repo for nautilus and octopus builds. If they don't
build without PPA, we may need to pin an older gcc version from before
it started crashing.
YAML specification of ceph.conf options. We'll start backporting these
changes to Pacific now. Documentation can link directly to a config
variable using '.. confval:: <option-name>' or
':confval:`<option-name>`'. If any documentation changes need backport
to nautilus or octopus, their doc builds may fail on 'confval' and
need to be addressed manually.
Hello,
This Friday's stand-up will be extended to go over the CDS notes and
the backlog board for RBD. Join us at https://bluejeans.com/560222053
on April 23rd, 15:30 UTC.
Thanks,
Ilya
Hi all,
We'll be updating the Dashboard backlog for Quincy based on this pad (
https://pad.ceph.com/p/ceph-dashboard-quincy-priorities) during this
Thursday 22, from 3pm CEST on (same slot and Bluejeans URL as the usual
Dashboard Backlog Grooming).
You are all welcome to join and contribute with your inputs.
Thanks!
Kind Regards,
Ernesto
Hi,
I am running Fedora 33 and am failing to get vstart cluster running on it.
Running "../src/vstart.sh -n -d" ends up in an infinite loop and following
two lines get printed on stdout at every iteration -
/home/rishabh/repos/ceph/test2/build/bin/ceph -c
/home/rishabh/repos/ceph/test2/build/ceph.conf -k
/home/rishabh/repos/ceph/test2/build/keyring -h
waiting for mgr restful module to start
I've seen vstart.sh loop at the exact same point a few months ago when few
Python dependencies were missing.
I took a look into build/out/mgr.x.log and the log message
there seems to be speak of the cause -
https://gist.github.com/rishabh-d-dave/c4d413fcdf67aadffc2875479cd5d73f.
Since the log message includes the names of the MGR plugins and not some
Python packages/modules, I think the issue is most probably a bug somewhere
in Ceph repo. Here are the few more related messages from the same log during
same run - https://gist.github.com/rishabh-d-dave/05c75bb4729014295f32706a0555b17e
I've tried running vstart.sh differently -- passing the number of daemons
explicitly, running with different options, etc -- but nothing has led to a
different outcome so far. I've also tried twice to recompile the code from
scratch -- triggering building after "git clean" andsubmodule update and
building on a brand new repo once. I was at the latest master orvery close to
it both the times. The commit IDs are
477b705fe782668427bd11ab3fe9e350b9e72eac and
0be78da368f2dc1c891e3caafac38f7aa96d3c49.
I used following commands to trigger code's compilation -
time(sudo ./install-deps.sh &&
./do_cmake.sh -DWITH_CEPHFS_SHELL=ON -DWITH_BABELTRACE=OFF
-DWITH_MANPAGE=OFF -DWITH_RBD=OFF -DWITH_RADOSGW=OFF -DWITH_KRBD=OFF
&&
cd build &&
ninja -j 7
)
Is this issue already known/seen? I haven't opened a ticket on the tracker
since I am not sure that this is definitely a bug.
Thanks,
- Rishabh
Dev leads and all !
We are getting ready for point release soon.
Please label PRs needed for the next point release with
"pacific-batch-1" and "needs-qa" so they are tested and included.
Thx
YuriW
This is the 20th bugfix release in the Nautilus stable series. It
addresses a security vulnerability in the Ceph authentication framework.
We recommend users to update to this release. For a detailed release
notes with links & changelog please refer to the official blog entry at
https://ceph.io/releases/v14-2-20-nautilus-released
Security Fixes
--------------
* This release includes a security fix that ensures the global_id value
(a numeric value that should be unique for every authenticated client or
daemon in the cluster) is reclaimed after a network disconnect or ticket
renewal in a secure fashion. Two new health alerts may appear during
the upgrade indicating that there are clients or daemons that are not
yet patched with the appropriate fix.
Getting Ceph
------------
* Git at git://github.com/ceph/ceph.git
* Tarball at http://download.ceph.com/tarballs/ceph-14.2.20.tar.gz
* For packages, see http://docs.ceph.com/docs/master/install/get-packages/
* Release git sha1: 36274af6eb7f2a5055f2d53ad448f2694e9046a0
This is the first bugfix release in the Pacific stable series. It
addresses a security vulnerability in the Ceph authentication framework.
We recommend users to update to this release. For a detailed release
notes with links & changelog please refer to the official blog entry at
https://ceph.io/releases/v16-2-1-pacific-released
Security Fixes
--------------
* This release includes a security fix that ensures the global_id value
(a numeric value that should be unique for every authenticated client or
daemon in the cluster) is reclaimed after a network disconnect or ticket
renewal in a secure fashion. Two new health alerts may appear during
the upgrade indicating that there are clients or daemons that are not
yet patched with the appropriate fix.
Getting Ceph
------------
* Git at git://github.com/ceph/ceph.git
* Tarball at http://download.ceph.com/tarballs/ceph-16.2.1.tar.gz
* For packages, see http://docs.ceph.com/docs/master/install/get-packages/
* Release git sha1: afb9061ab4117f798c858c741efa6390e48ccf10
This is the 11th bugfix release in the Octopus stable series. It
addresses a security vulnerability in the Ceph authentication framework.
We recommend users to update to this release. For a detailed release
notes with links & changelog please refer to the official blog entry at
https://ceph.io/releases/v15-2-11-octopus-released
Security Fixes
--------------
* This release includes a security fix that ensures the global_id value
(a numeric value that should be unique for every authenticated client or
daemon in the cluster) is reclaimed after a network disconnect or ticket
renewal in a secure fashion. Two new health alerts may appear during the
upgrade indicating that there are clients or daemons that are not yet
patched with the appropriate fix.
Getting Ceph
------------
* Git at git://github.com/ceph/ceph.git
* Tarball at http://download.ceph.com/tarballs/ceph-15.2.11.tar.gz
* For packages, see http://docs.ceph.com/docs/master/install/get-packages/
* Release git sha1: e3523634d9c2227df9af89a4eac33d16738c49cb