···
1
-
import ./make-test-python.nix (
6
-
clusterId = "066ae264-2a5d-4729-8001-6ad265f50b03";
4
+
clusterId = "066ae264-2a5d-4729-8001-6ad265f50b03";
12
+
key = "AQBCEJNa3s8nHRAANvdsr93KqzBznuIWm2gOGg==";
13
+
uuid = "55ba2294-3e24-478f-bee0-9dca4c231dd9";
18
+
key = "AQBEEJNac00kExAAXEgy943BGyOpVH1LLlHafQ==";
19
+
uuid = "5e97a838-85b6-43b0-8950-cb56d554d1e5";
24
+
key = "AQAdyhZeIaUlARAAGRoidDAmS6Vkp546UFEf5w==";
25
+
uuid = "ea999274-13d0-4dd5-9af9-ad25a324f72f";
28
+
generateCephConfig =
33
+
fsid = cfg.clusterId;
34
+
monHost = cfg.monA.ip;
35
+
monInitialMembers = cfg.monA.name;
14
-
key = "AQBCEJNa3s8nHRAANvdsr93KqzBznuIWm2gOGg==";
15
-
uuid = "55ba2294-3e24-478f-bee0-9dca4c231dd9";
41
+
{ cephConfig, networkConfig }:
45
+
emptyDiskImages = [ 20480 ];
20
-
key = "AQBEEJNac00kExAAXEgy943BGyOpVH1LLlHafQ==";
21
-
uuid = "5e97a838-85b6-43b0-8950-cb56d554d1e5";
26
-
key = "AQAdyhZeIaUlARAAGRoidDAmS6Vkp546UFEf5w==";
27
-
uuid = "ea999274-13d0-4dd5-9af9-ad25a324f72f";
30
-
generateCephConfig =
35
-
fsid = cfg.clusterId;
36
-
monHost = cfg.monA.ip;
37
-
monInitialMembers = cfg.monA.name;
51
-
emptyDiskImages = [ 20480 ];
49
+
networking = networkConfig;
55
-
networking = networkConfig;
51
+
environment.systemPackages = with pkgs; [
57
-
environment.systemPackages = with pkgs; [
59
+
boot.kernelModules = [ "xfs" ];
65
-
boot.kernelModules = [ "xfs" ];
61
+
services.ceph = cephConfig;
67
-
services.ceph = cephConfig;
71
-
dhcpcd.enable = false;
72
-
interfaces.eth1.ipv4.addresses = pkgs.lib.mkOverride 0 [
65
+
dhcpcd.enable = false;
66
+
interfaces.eth1.ipv4.addresses = lib.mkOverride 0 [
68
+
address = cfg.monA.ip;
77
+
allowedTCPPortRanges = [
74
-
address = cfg.monA.ip;
83
-
allowedTCPPortRanges = [
91
-
cephConfigMonA = generateCephConfig {
95
-
daemons = [ cfg.monA.name ];
99
-
daemons = [ cfg.monA.name ];
85
+
cephConfigMonA = generateCephConfig {
89
+
daemons = [ cfg.monA.name ];
93
+
daemons = [ cfg.monA.name ];
104
-
networkOsd = osd: {
105
-
dhcpcd.enable = false;
106
-
interfaces.eth1.ipv4.addresses = pkgs.lib.mkOverride 0 [
99
+
dhcpcd.enable = false;
100
+
interfaces.eth1.ipv4.addresses = lib.mkOverride 0 [
107
+
allowedTCPPortRanges = [
113
-
allowedTCPPortRanges = [
124
-
generateCephConfig {
128
-
daemons = [ osd.name ];
118
+
generateCephConfig {
122
+
daemons = [ osd.name ];
127
+
# Following deployment is based on the manual deployment described here:
128
+
# https://docs.ceph.com/docs/master/install/manual-deployment/
129
+
# For other ways to deploy a ceph cluster, look at the documentation at
130
+
# https://docs.ceph.com/docs/master/
133
-
# Following deployment is based on the manual deployment described here:
134
-
# https://docs.ceph.com/docs/master/install/manual-deployment/
135
-
# For other ways to deploy a ceph cluster, look at the documentation at
136
-
# https://docs.ceph.com/docs/master/
136
+
monA.wait_for_unit("network.target")
137
+
osd0.wait_for_unit("network.target")
138
+
osd1.wait_for_unit("network.target")
139
+
osd2.wait_for_unit("network.target")
142
-
monA.wait_for_unit("network.target")
143
-
osd0.wait_for_unit("network.target")
144
-
osd1.wait_for_unit("network.target")
145
-
osd2.wait_for_unit("network.target")
141
+
# Bootstrap ceph-mon daemon
143
+
"sudo -u ceph ceph-authtool --create-keyring /tmp/ceph.mon.keyring --gen-key -n mon. --cap mon 'allow *'",
144
+
"sudo -u ceph ceph-authtool --create-keyring /etc/ceph/ceph.client.admin.keyring --gen-key -n client.admin --cap mon 'allow *' --cap osd 'allow *' --cap mds 'allow *' --cap mgr 'allow *'",
145
+
"sudo -u ceph ceph-authtool /tmp/ceph.mon.keyring --import-keyring /etc/ceph/ceph.client.admin.keyring",
146
+
"monmaptool --create --add ${cfg.monA.name} ${cfg.monA.ip} --fsid ${cfg.clusterId} /tmp/monmap",
147
+
"sudo -u ceph ceph-mon --mkfs -i ${cfg.monA.name} --monmap /tmp/monmap --keyring /tmp/ceph.mon.keyring",
148
+
"sudo -u ceph mkdir -p /var/lib/ceph/mgr/ceph-${cfg.monA.name}/",
149
+
"sudo -u ceph touch /var/lib/ceph/mon/ceph-${cfg.monA.name}/done",
150
+
"systemctl start ceph-mon-${cfg.monA.name}",
152
+
monA.wait_for_unit("ceph-mon-${cfg.monA.name}")
153
+
monA.succeed("ceph mon enable-msgr2")
154
+
monA.succeed("ceph config set mon auth_allow_insecure_global_id_reclaim false")
147
-
# Bootstrap ceph-mon daemon
149
-
"sudo -u ceph ceph-authtool --create-keyring /tmp/ceph.mon.keyring --gen-key -n mon. --cap mon 'allow *'",
150
-
"sudo -u ceph ceph-authtool --create-keyring /etc/ceph/ceph.client.admin.keyring --gen-key -n client.admin --cap mon 'allow *' --cap osd 'allow *' --cap mds 'allow *' --cap mgr 'allow *'",
151
-
"sudo -u ceph ceph-authtool /tmp/ceph.mon.keyring --import-keyring /etc/ceph/ceph.client.admin.keyring",
152
-
"monmaptool --create --add ${cfg.monA.name} ${cfg.monA.ip} --fsid ${cfg.clusterId} /tmp/monmap",
153
-
"sudo -u ceph ceph-mon --mkfs -i ${cfg.monA.name} --monmap /tmp/monmap --keyring /tmp/ceph.mon.keyring",
154
-
"sudo -u ceph mkdir -p /var/lib/ceph/mgr/ceph-${cfg.monA.name}/",
155
-
"sudo -u ceph touch /var/lib/ceph/mon/ceph-${cfg.monA.name}/done",
156
-
"systemctl start ceph-mon-${cfg.monA.name}",
158
-
monA.wait_for_unit("ceph-mon-${cfg.monA.name}")
159
-
monA.succeed("ceph mon enable-msgr2")
160
-
monA.succeed("ceph config set mon auth_allow_insecure_global_id_reclaim false")
156
+
# Can't check ceph status until a mon is up
157
+
monA.succeed("ceph -s | grep 'mon: 1 daemons'")
162
-
# Can't check ceph status until a mon is up
163
-
monA.succeed("ceph -s | grep 'mon: 1 daemons'")
159
+
# Start the ceph-mgr daemon, it has no deps and hardly any setup
161
+
"ceph auth get-or-create mgr.${cfg.monA.name} mon 'allow profile mgr' osd 'allow *' mds 'allow *' > /var/lib/ceph/mgr/ceph-${cfg.monA.name}/keyring",
162
+
"systemctl start ceph-mgr-${cfg.monA.name}",
164
+
monA.wait_for_unit("ceph-mgr-a")
165
+
monA.wait_until_succeeds("ceph -s | grep 'quorum ${cfg.monA.name}'")
166
+
monA.wait_until_succeeds("ceph -s | grep 'mgr: ${cfg.monA.name}(active,'")
165
-
# Start the ceph-mgr daemon, it has no deps and hardly any setup
167
-
"ceph auth get-or-create mgr.${cfg.monA.name} mon 'allow profile mgr' osd 'allow *' mds 'allow *' > /var/lib/ceph/mgr/ceph-${cfg.monA.name}/keyring",
168
-
"systemctl start ceph-mgr-${cfg.monA.name}",
170
-
monA.wait_for_unit("ceph-mgr-a")
171
-
monA.wait_until_succeeds("ceph -s | grep 'quorum ${cfg.monA.name}'")
172
-
monA.wait_until_succeeds("ceph -s | grep 'mgr: ${cfg.monA.name}(active,'")
168
+
# Send the admin keyring to the OSD machines
169
+
monA.succeed("cp /etc/ceph/ceph.client.admin.keyring /tmp/shared")
170
+
osd0.succeed("cp /tmp/shared/ceph.client.admin.keyring /etc/ceph")
171
+
osd1.succeed("cp /tmp/shared/ceph.client.admin.keyring /etc/ceph")
172
+
osd2.succeed("cp /tmp/shared/ceph.client.admin.keyring /etc/ceph")
174
-
# Send the admin keyring to the OSD machines
175
-
monA.succeed("cp /etc/ceph/ceph.client.admin.keyring /tmp/shared")
176
-
osd0.succeed("cp /tmp/shared/ceph.client.admin.keyring /etc/ceph")
177
-
osd1.succeed("cp /tmp/shared/ceph.client.admin.keyring /etc/ceph")
178
-
osd2.succeed("cp /tmp/shared/ceph.client.admin.keyring /etc/ceph")
176
+
"mkfs.xfs /dev/vdb",
177
+
"mkdir -p /var/lib/ceph/osd/ceph-${cfg.osd0.name}",
178
+
"mount /dev/vdb /var/lib/ceph/osd/ceph-${cfg.osd0.name}",
179
+
"ceph-authtool --create-keyring /var/lib/ceph/osd/ceph-${cfg.osd0.name}/keyring --name osd.${cfg.osd0.name} --add-key ${cfg.osd0.key}",
180
+
'echo \'{"cephx_secret": "${cfg.osd0.key}"}\' | ceph osd new ${cfg.osd0.uuid} -i -',
183
+
"mkfs.xfs /dev/vdb",
184
+
"mkdir -p /var/lib/ceph/osd/ceph-${cfg.osd1.name}",
185
+
"mount /dev/vdb /var/lib/ceph/osd/ceph-${cfg.osd1.name}",
186
+
"ceph-authtool --create-keyring /var/lib/ceph/osd/ceph-${cfg.osd1.name}/keyring --name osd.${cfg.osd1.name} --add-key ${cfg.osd1.key}",
187
+
'echo \'{"cephx_secret": "${cfg.osd1.key}"}\' | ceph osd new ${cfg.osd1.uuid} -i -',
190
+
"mkfs.xfs /dev/vdb",
191
+
"mkdir -p /var/lib/ceph/osd/ceph-${cfg.osd2.name}",
192
+
"mount /dev/vdb /var/lib/ceph/osd/ceph-${cfg.osd2.name}",
193
+
"ceph-authtool --create-keyring /var/lib/ceph/osd/ceph-${cfg.osd2.name}/keyring --name osd.${cfg.osd2.name} --add-key ${cfg.osd2.key}",
194
+
'echo \'{"cephx_secret": "${cfg.osd2.key}"}\' | ceph osd new ${cfg.osd2.uuid} -i -',
182
-
"mkfs.xfs /dev/vdb",
183
-
"mkdir -p /var/lib/ceph/osd/ceph-${cfg.osd0.name}",
184
-
"mount /dev/vdb /var/lib/ceph/osd/ceph-${cfg.osd0.name}",
185
-
"ceph-authtool --create-keyring /var/lib/ceph/osd/ceph-${cfg.osd0.name}/keyring --name osd.${cfg.osd0.name} --add-key ${cfg.osd0.key}",
186
-
'echo \'{"cephx_secret": "${cfg.osd0.key}"}\' | ceph osd new ${cfg.osd0.uuid} -i -',
189
-
"mkfs.xfs /dev/vdb",
190
-
"mkdir -p /var/lib/ceph/osd/ceph-${cfg.osd1.name}",
191
-
"mount /dev/vdb /var/lib/ceph/osd/ceph-${cfg.osd1.name}",
192
-
"ceph-authtool --create-keyring /var/lib/ceph/osd/ceph-${cfg.osd1.name}/keyring --name osd.${cfg.osd1.name} --add-key ${cfg.osd1.key}",
193
-
'echo \'{"cephx_secret": "${cfg.osd1.key}"}\' | ceph osd new ${cfg.osd1.uuid} -i -',
196
-
"mkfs.xfs /dev/vdb",
197
-
"mkdir -p /var/lib/ceph/osd/ceph-${cfg.osd2.name}",
198
-
"mount /dev/vdb /var/lib/ceph/osd/ceph-${cfg.osd2.name}",
199
-
"ceph-authtool --create-keyring /var/lib/ceph/osd/ceph-${cfg.osd2.name}/keyring --name osd.${cfg.osd2.name} --add-key ${cfg.osd2.key}",
200
-
'echo \'{"cephx_secret": "${cfg.osd2.key}"}\' | ceph osd new ${cfg.osd2.uuid} -i -',
197
+
# Initialize the OSDs with regular filestore
199
+
"ceph-osd -i ${cfg.osd0.name} --mkfs --osd-uuid ${cfg.osd0.uuid}",
200
+
"chown -R ceph:ceph /var/lib/ceph/osd",
201
+
"systemctl start ceph-osd-${cfg.osd0.name}",
204
+
"ceph-osd -i ${cfg.osd1.name} --mkfs --osd-uuid ${cfg.osd1.uuid}",
205
+
"chown -R ceph:ceph /var/lib/ceph/osd",
206
+
"systemctl start ceph-osd-${cfg.osd1.name}",
209
+
"ceph-osd -i ${cfg.osd2.name} --mkfs --osd-uuid ${cfg.osd2.uuid}",
210
+
"chown -R ceph:ceph /var/lib/ceph/osd",
211
+
"systemctl start ceph-osd-${cfg.osd2.name}",
213
+
monA.wait_until_succeeds("ceph osd stat | grep -e '3 osds: 3 up[^,]*, 3 in'")
214
+
monA.wait_until_succeeds("ceph -s | grep 'mgr: ${cfg.monA.name}(active,'")
215
+
monA.wait_until_succeeds("ceph -s | grep 'HEALTH_OK'")
203
-
# Initialize the OSDs with regular filestore
205
-
"ceph-osd -i ${cfg.osd0.name} --mkfs --osd-uuid ${cfg.osd0.uuid}",
206
-
"chown -R ceph:ceph /var/lib/ceph/osd",
207
-
"systemctl start ceph-osd-${cfg.osd0.name}",
210
-
"ceph-osd -i ${cfg.osd1.name} --mkfs --osd-uuid ${cfg.osd1.uuid}",
211
-
"chown -R ceph:ceph /var/lib/ceph/osd",
212
-
"systemctl start ceph-osd-${cfg.osd1.name}",
215
-
"ceph-osd -i ${cfg.osd2.name} --mkfs --osd-uuid ${cfg.osd2.uuid}",
216
-
"chown -R ceph:ceph /var/lib/ceph/osd",
217
-
"systemctl start ceph-osd-${cfg.osd2.name}",
219
-
monA.wait_until_succeeds("ceph osd stat | grep -e '3 osds: 3 up[^,]*, 3 in'")
220
-
monA.wait_until_succeeds("ceph -s | grep 'mgr: ${cfg.monA.name}(active,'")
221
-
monA.wait_until_succeeds("ceph -s | grep 'HEALTH_OK'")
218
+
"ceph osd pool create multi-node-test 32 32",
219
+
"ceph osd pool ls | grep 'multi-node-test'",
224
-
"ceph osd pool create multi-node-test 32 32",
225
-
"ceph osd pool ls | grep 'multi-node-test'",
221
+
# We need to enable an application on the pool, otherwise it will
222
+
# stay unhealthy in state POOL_APP_NOT_ENABLED.
223
+
# Creating a CephFS would do this automatically, but we haven't done that here.
224
+
# See: https://docs.ceph.com/en/reef/rados/operations/pools/#associating-a-pool-with-an-application
225
+
# We use the custom application name "nixos-test" for this.
226
+
"ceph osd pool application enable multi-node-test nixos-test",
227
-
# We need to enable an application on the pool, otherwise it will
228
-
# stay unhealthy in state POOL_APP_NOT_ENABLED.
229
-
# Creating a CephFS would do this automatically, but we haven't done that here.
230
-
# See: https://docs.ceph.com/en/reef/rados/operations/pools/#associating-a-pool-with-an-application
231
-
# We use the custom application name "nixos-test" for this.
232
-
"ceph osd pool application enable multi-node-test nixos-test",
228
+
"ceph osd pool rename multi-node-test multi-node-other-test",
229
+
"ceph osd pool ls | grep 'multi-node-other-test'",
231
+
monA.wait_until_succeeds("ceph -s | grep '2 pools, 33 pgs'")
232
+
monA.succeed("ceph osd pool set multi-node-other-test size 2")
233
+
monA.wait_until_succeeds("ceph -s | grep 'HEALTH_OK'")
234
+
monA.wait_until_succeeds("ceph -s | grep '33 active+clean'")
236
+
"ceph osd pool ls | grep 'multi-node-test'",
237
+
"ceph osd pool delete multi-node-other-test multi-node-other-test --yes-i-really-really-mean-it",
234
-
"ceph osd pool rename multi-node-test multi-node-other-test",
235
-
"ceph osd pool ls | grep 'multi-node-other-test'",
237
-
monA.wait_until_succeeds("ceph -s | grep '2 pools, 33 pgs'")
238
-
monA.succeed("ceph osd pool set multi-node-other-test size 2")
239
-
monA.wait_until_succeeds("ceph -s | grep 'HEALTH_OK'")
240
-
monA.wait_until_succeeds("ceph -s | grep '33 active+clean'")
242
-
"ceph osd pool ls | grep 'multi-node-test'",
243
-
"ceph osd pool delete multi-node-other-test multi-node-other-test --yes-i-really-really-mean-it",
240
+
# Shut down ceph on all machines in a very unpolite way
246
-
# Shut down ceph on all machines in a very unpolite way
252
+
# Ensure the cluster comes back up again
253
+
monA.succeed("ceph -s | grep 'mon: 1 daemons'")
254
+
monA.wait_until_succeeds("ceph -s | grep 'quorum ${cfg.monA.name}'")
255
+
monA.wait_until_succeeds("ceph osd stat | grep -e '3 osds: 3 up[^,]*, 3 in'")
256
+
monA.wait_until_succeeds("ceph -s | grep 'mgr: ${cfg.monA.name}(active,'")
257
+
monA.wait_until_succeeds("ceph -s | grep 'HEALTH_OK'")
261
+
name = "basic-multi-node-ceph-cluster";
262
+
meta = with lib.maintainers; {
263
+
maintainers = [ lejonet ];
258
-
# Ensure the cluster comes back up again
259
-
monA.succeed("ceph -s | grep 'mon: 1 daemons'")
260
-
monA.wait_until_succeeds("ceph -s | grep 'quorum ${cfg.monA.name}'")
261
-
monA.wait_until_succeeds("ceph osd stat | grep -e '3 osds: 3 up[^,]*, 3 in'")
262
-
monA.wait_until_succeeds("ceph -s | grep 'mgr: ${cfg.monA.name}(active,'")
263
-
monA.wait_until_succeeds("ceph -s | grep 'HEALTH_OK'")
267
-
name = "basic-multi-node-ceph-cluster";
268
-
meta = with pkgs.lib.maintainers; {
269
-
maintainers = [ lejonet ];
267
+
monA = generateHost {
268
+
cephConfig = cephConfigMonA;
269
+
networkConfig = networkMonA;
271
+
osd0 = generateHost {
272
+
cephConfig = cephConfigOsd cfg.osd0;
273
+
networkConfig = networkOsd cfg.osd0;
275
+
osd1 = generateHost {
276
+
cephConfig = cephConfigOsd cfg.osd1;
277
+
networkConfig = networkOsd cfg.osd1;
273
-
monA = generateHost {
275
-
cephConfig = cephConfigMonA;
276
-
networkConfig = networkMonA;
278
-
osd0 = generateHost {
280
-
cephConfig = cephConfigOsd cfg.osd0;
281
-
networkConfig = networkOsd cfg.osd0;
283
-
osd1 = generateHost {
285
-
cephConfig = cephConfigOsd cfg.osd1;
286
-
networkConfig = networkOsd cfg.osd1;
288
-
osd2 = generateHost {
290
-
cephConfig = cephConfigOsd cfg.osd2;
291
-
networkConfig = networkOsd cfg.osd2;
279
+
osd2 = generateHost {
280
+
cephConfig = cephConfigOsd cfg.osd2;
281
+
networkConfig = networkOsd cfg.osd2;
295
-
testScript = testscript;
285
+
testScript = testscript;