Skip to content

Commit

Permalink
doc: radosgw needs 'mon = allow rw' to create its own pools
Browse files Browse the repository at this point in the history
Fixes: ceph#5674
Signed-off-by: Sage Weil <[email protected]>
Reviewed-by: Yehuda Sadeh <[email protected]>
  • Loading branch information
Sage Weil committed Jul 19, 2013
1 parent 23cde45 commit 4bf4d92
Show file tree
Hide file tree
Showing 5 changed files with 9 additions and 4 deletions.
5 changes: 5 additions & 0 deletions PendingReleaseNotes
Original file line number Diff line number Diff line change
Expand Up @@ -19,3 +19,8 @@ v0.67
commandline tool. ceph_rest_api.py can be used as a WSGI application
for deployment in a more-capable web server. See ceph-rest-api.8
for more.

* The radosgw caps were inconsistently documented to be either 'mon =
allow r' or 'mon = allow rw'. The 'mon = allow rw' is required for
radosgw to create its own pools. All documentation has been updated
accordingly.
2 changes: 1 addition & 1 deletion doc/install/rpm.rst
Original file line number Diff line number Diff line change
Expand Up @@ -198,7 +198,7 @@ Installing Ceph Object Storage
#. Create a user key. ::

ceph-authtool -C -n client.radosgw.gateway --gen-key /etc/ceph/keyring.radosgw.gateway
ceph-authtool -n client.radosgw.gateway --cap mon 'allow r' --cap osd 'allow rwx' /etc/ceph/keyring.radosgw.gateway
ceph-authtool -n client.radosgw.gateway --cap mon 'allow rw' --cap osd 'allow rwx' /etc/ceph/keyring.radosgw.gateway
ceph auth add client.radosgw.gateway --in-file=/etc/ceph/keyring.radosgw.gateway
Expand Down
2 changes: 1 addition & 1 deletion doc/man/8/radosgw.rst
Original file line number Diff line number Diff line change
Expand Up @@ -86,7 +86,7 @@ You will also have to generate a key for the radosgw to use for
authentication with the cluster::

ceph-authtool -C -n client.radosgw.gateway --gen-key /etc/ceph/keyring.radosgw.gateway
ceph-authtool -n client.radosgw.gateway --cap mon 'allow r' --cap osd 'allow rwx' /etc/ceph/keyring.radosgw.gateway
ceph-authtool -n client.radosgw.gateway --cap mon 'allow rw' --cap osd 'allow rwx' /etc/ceph/keyring.radosgw.gateway

And add the key to the auth entries::

Expand Down
2 changes: 1 addition & 1 deletion doc/rados/operations/authentication.rst
Original file line number Diff line number Diff line change
Expand Up @@ -196,7 +196,7 @@ capabilities necessary for the daemon to function, are shown below.
``radosgw``

:Location: ``$rgw_data/keyring``
:Capabilities: ``mon 'allow r' osd 'allow rwx'``
:Capabilities: ``mon 'allow rw' osd 'allow rwx'``


Note that the monitor keyring contains a key but no capabilities, and
Expand Down
2 changes: 1 addition & 1 deletion doc/radosgw/config.rst
Original file line number Diff line number Diff line change
Expand Up @@ -164,7 +164,7 @@ Generate a key so that RADOS Gateway can identify a user name and authenticate
the user with the cluster. Then, add capabilities to the key. For example::

sudo ceph-authtool /etc/ceph/keyring.radosgw.gateway -n client.radosgw.gateway --gen-key
sudo ceph-authtool -n client.radosgw.gateway --cap osd 'allow rwx' --cap mon 'allow r' /etc/ceph/keyring.radosgw.gateway
sudo ceph-authtool -n client.radosgw.gateway --cap osd 'allow rwx' --cap mon 'allow rw' /etc/ceph/keyring.radosgw.gateway


Add to Ceph Keyring Entries
Expand Down

0 comments on commit 4bf4d92

Please sign in to comment.