Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Learning Ceph

You're reading from   Learning Ceph Unifed, scalable, and reliable open source storage solution

Arrow left icon
Product type Paperback
Published in Oct 2017
Publisher
ISBN-13 9781787127913
Length 340 pages
Edition 2nd Edition
Languages
Tools
Arrow right icon
Authors (4):
Arrow left icon
Karan Singh Karan Singh
Author Profile Icon Karan Singh
Karan Singh
Bryan Stillwell Bryan Stillwell
Author Profile Icon Bryan Stillwell
Bryan Stillwell
Anthony D'Atri Anthony D'Atri
Author Profile Icon Anthony D'Atri
Anthony D'Atri
Vaibhav Bhembre Vaibhav Bhembre
Author Profile Icon Vaibhav Bhembre
Vaibhav Bhembre
Arrow right icon
View More author details
Toc

Table of Contents (12) Chapters Close

Preface 1. Introducing Ceph Storage FREE CHAPTER 2. Ceph Components and Services 3. Hardware and Network Selection 4. Planning Your Deployment 5. Deploying a Virtual Sandbox Cluster 6. Operations and Maintenance 7. Monitoring Ceph 8. Ceph Architecture: Under the Hood 9. Storage Provisioning with Ceph 10. Integrating Ceph with OpenStack 11. Performance and Stability Tuning

Monitoring Ceph clusters


Monitoring is the process of gathering, aggregating, and processing important quantifiable information about a given system. It enables us to understand the health of the system and its components and provides information necessary to take steps to troubleshoot problems that arise. A well-monitored system will let us know when something is broken or is about to break. Deploying a Ceph cluster involves an orchestration dance among hundreds, thousands, or even tens of thousands of interconnected components including variety of kernels, processes, storage drives, controllers (HBAs), network cards (NICs), chassis, switches, PSUs,and so on. Each of these components can fail or degrade in its own unique way.

External monitoring of a complex system is itself a significant endeavor and is best worked right into the architecture and deployment model. When monitoring is an afterthought (we'll get to it in phase 2) it tends to be less effective and less pervasively implemented...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime