You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: doc/cephadm/services/monitoring.rst
+66-61Lines changed: 66 additions & 61 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ metrics on cluster utilization and performance. Ceph users have three options:
11
11
when bootstrapping a new cluster unless the ``--skip-monitoring-stack``
12
12
option is used.
13
13
#. Deploy and configure these services manually. This is recommended for users
14
-
with existing prometheus services in their environment (and in cases where
14
+
with existing Prometheus services in their environment (and in cases where
15
15
Ceph is running in Kubernetes with Rook).
16
16
#. Skip the monitoring stack completely. Some Ceph dashboard graphs will
17
17
not be available.
@@ -35,10 +35,10 @@ Manager <https://prometheus.io/docs/alerting/alertmanager/>`_ and `Grafana
35
35
impact of denial of service attacks.
36
36
37
37
Please see `Prometheus' Security model
38
-
<https://prometheus.io/docs/operating/security/>` for more detailed
38
+
<https://prometheus.io/docs/operating/security/>`_ for more detailed
39
39
information.
40
40
41
-
Deploying monitoring with cephadm
41
+
Deploying Monitoring with Cephadm
42
42
---------------------------------
43
43
44
44
The default behavior of ``cephadm`` is to deploy a basic monitoring stack. It
@@ -58,7 +58,7 @@ steps below:
58
58
59
59
ceph orch apply node-exporter
60
60
61
-
#. Deploy alertmanager:
61
+
#. Deploy Alertmanager:
62
62
63
63
.. prompt:: bash #
64
64
@@ -77,22 +77,22 @@ steps below:
77
77
78
78
ceph orch apply prometheus --placement 'count:2'
79
79
80
-
#. Deploy grafana:
80
+
#. Deploy Grafana:
81
81
82
82
.. prompt:: bash #
83
83
84
84
ceph orch apply grafana
85
85
86
-
Enabling security for the monitoring stack
87
-
----------------------------------------------
86
+
Enabling Security for the Monitoring Stack
87
+
------------------------------------------
88
88
89
89
By default, in a cephadm-managed cluster, the monitoring components are set up and configured without enabling security measures.
90
90
While this suffices for certain deployments, others with strict security needs may find it necessary to protect the
91
91
monitoring stack against unauthorized access. In such cases, cephadm relies on a specific configuration parameter,
92
-
`mgr/cephadm/secure_monitoring_stack`, which toggles the security settings for all monitoring components. To activate security
92
+
``mgr/cephadm/secure_monitoring_stack``, which toggles the security settings for all monitoring components. To activate security
93
93
measures, set this option to ``true`` with a command of the following form:
94
94
95
-
.. prompt:: bash #
95
+
.. prompt:: bash #
96
96
97
97
ceph config set mgr mgr/cephadm/secure_monitoring_stack true
98
98
@@ -111,7 +111,7 @@ value with the commands ``ceph orch prometheus set-credentials`` and ``ceph
111
111
orch alertmanager set-credentials`` respectively. These commands offer the
112
112
flexibility to input the username/password either as parameters or via a JSON
113
113
file, which enhances security. Additionally, Cephadm provides the commands
114
-
`orch prometheus get-credentials` and `orch alertmanager get-credentials` to
114
+
``orch prometheus get-credentials`` and ``orch alertmanager get-credentials`` to
115
115
retrieve the current credentials.
116
116
117
117
.. _cephadm-monitoring-centralized-logs:
@@ -128,7 +128,7 @@ Some of the advantages are:
128
128
#. **Flexible retention policies**: with per-daemon logs, log rotation is usually set to a short interval (1-2 weeks) to save disk usage.
129
129
#. **Increased security & backup**: logs can contain sensitive information and expose usage patterns. Additionally, centralized logging allows for HA, etc.
130
130
131
-
Centralized Logging in Ceph is implemented using two services: ``loki`` and ``alloy``.
131
+
Centralized logging in Ceph is implemented using two services: ``loki`` and ``alloy``.
132
132
133
133
* Loki is a log aggregation system and is used to query logs. It can be configured as a ``datasource`` in Grafana.
134
134
* Alloy acts as an agent that gathers logs from each node and forwards them to Loki.
@@ -140,7 +140,7 @@ These two services are not deployed by default in a Ceph cluster. To enable cent
140
140
Networks and Ports
141
141
~~~~~~~~~~~~~~~~~~
142
142
143
-
All monitoring services can have the network and port they bind to configured with a yaml service specification. By default
143
+
All monitoring services can have the network and port they bind to configured with a YAML service specification. By default
144
144
cephadm will use ``https`` protocol when configuring Grafana daemons unless the user explicitly sets the protocol to ``http``.
145
145
146
146
example spec file:
@@ -161,12 +161,12 @@ example spec file:
161
161
162
162
.. _cephadm_default_images:
163
163
164
-
Default images
164
+
Default Images
165
165
~~~~~~~~~~~~~~
166
166
167
167
*The information in this section was developed by Eugen Block in a thread on
168
168
the [ceph-users] mailing list in April of 2024. The thread can be viewed here:
0 commit comments