23TiB On CephFS & Growing
Original post on Reddit
Hardware
Previously I posted about the used 60-bay DAS units I recently acquired and racked. Since then I've figured out the basics of using them and have them up and working.
Previously I posted about the used 60-bay DAS units I recently acquired and racked. Since then I've figured out the basics of using them and have them up and working.
I was getting this from podman on a CentOS 8 box:
"error from slirp4netns while setting up port redirection: map[desc:bad request: add_hostfwd: slirp_add_hostfwd failed]"
It was fixed by killing off all podman and /usr/bin/conmon processes as the user that I was running the commands as. Note: Don't do that as root using killall unless you limit to only your user.
The underlying error may have been running out of FD.
While setting up my Ceph cluster on a set of Dell R710s, one with 60 disks attached to it, I found that I needed to raise fs.aio-max-nr to around 1,000,000. SELinux also needed to be disabled. Once that was done the normal cephadm osd install worked great, even with 60 disks.
$ cat /etc/sysctl.d/99-osd.conf # For OSDs fs.aio-max-nr=1000000
[ceph: root@xxxxxx0 /]# ceph orch host add xxxxxxxxxxx1 Error EINVAL: Traceback (most recent call last): File "/usr/share/ceph/mgr/mgr_module.py", line 1153, in _handle_command return self.handle_command(inbuf, cmd) File "/usr/share/ceph/mgr/orchestrator/_interface.py", line 110, in handle_command return dispatch[cmd['prefix']].call(self, cmd, inbuf) File "/usr/share/ceph/mgr/mgr_module.py", line 308, in call return self.func(mgr, **kwargs) File "/usr/share/ceph/mgr/orchestrator/_interface.py", line 72, in <lambda> wrapper_copy = lambda *l_args,
OVH's DDOS Mitigation System was constantly blocking my IPSEC traffic when I had it encapsulated in UDP. Once I switched it back to native IPSEC (the IP protocol, not in a UDP wrapper for NAT traversal) it stopped blocking it. Repeated tickets to OVH resulted in no changes or fixes. They just ignored the tickets or were useless. Hope you don't need IPSEC with NAT traversal for them!
Guess what has telnet enabled and TCP/1138. Telnet is obvious but I'm still working on TCP/1138.
Trump will be remembered, not for his lies, his stupidity, his outright corruption, but for the bodies buried because of his failings.
Need xmlsec (aka xmlsec1) working in Heroku's Python? Try this: