=================== config-key layout =================== *config-key* is a general-purpose key/value storage service offered by the mons. Generally speaking, you can put whatever you want there. Current in-tree users should be captured here with their key layout schema. OSD dm-crypt keys ================= Key:: dm-crypt/osd/$OSD_UUID/luks = The JSON payload has the form:: { "dm-crypt": } where the secret is a base64 encoded LUKS key. Created by the 'osd new' command (see OSDMonitor.cc). Consumed by ceph-disk, ceph-volume, and similar tools. Normally access to the dm-crypt/osd/$OSD_UUID prefix is allowed by a client.osd-lockbox.$OSD_UUID cephx key, such that only the appropriate host can retrieve the LUKS key (which in turn decrypts the actual raw key, also stored on the device itself). ceph-mgr modules ================ The convention for keys is:: mgr/$MODULE/$option = $value or:: mgr/$MODULE/$MGRID/$option = $value For example,:: mgr/dashboard/server_port = 80 mgr/dashboard/foo/server_addr = 1.2.3.4 mgr/dashboard/bar/server_addr = 1.2.3.5 Configuration ============= Configuration options for clients and daemons are also stored in config-key. Keys take the form:: config/$option = $value config/$type/$option = $value config/$type.$id/$option = $value config/$type.$id/$mask[/$mask2...]/$option = $value Where * `type` is a daemon type (`osd`, `mon`, `mds`, `mgr`, `client`) * `id` is a daemon id (e.g., `0`, `foo`), such that `$type.$id` is something like `osd.123` or `mds.foo`) * `mask` restricts who the option applies to, and can take two forms: #. `$crush_type:$crush_value`. For example, `rack:foorack` #. `class:$classname`, in reference to CRUSH device classes (e.g., `ssd`)