Jump to contentJump to page navigation: previous page [access key p]/next page [access key n]
Applies to SUSE Enterprise Storage 6

Part II Ceph Dashboard Edit source

4 About Ceph Dashboard

The Ceph Dashboard is a module that adds a built-in Web based monitoring and administration application to the Ceph Manager (refer to Section 1.2.3, “Ceph Nodes and Daemons” for more details on Ceph Manager). You no longer need to know complex Ceph related commands to manage and monitor your Ceph cl…

5 Dashboard's Web User Interface

To log in to the dashboard Web application, point your browser to its URL including the port number. You can find its address by running

6 Managing Dashboard Users and Roles

Dashboard user management performed by Ceph commands on the command line was already introduced in Chapter 14, Managing Users and Roles on the Command Line.

7 Viewing Cluster Internals

The Cluster menu item lets you view detailed information about Ceph cluster hosts, OSDs, MONs, CRUSH Map, and the content of log files.

8 Managing Pools

For more general information about Ceph pools, refer to Chapter 22, Managing Storage Pools. For information specific to erasure code pools, refer to Chapter 24, Erasure Coded Pools.

9 Managing RADOS Block Devices

To list all available RADOS Block Devices (RBDs), click Block › Images from the main menu.

10 Managing NFS Ganesha

For more general information about NFS Ganesha, refer to Chapter 30, NFS Ganesha: Export Ceph Data via NFS.

11 Managing Ceph File Systems

To find detailed information about CephFS, refer to Chapter 28, Clustered File System.

12 Managing Object Gateways

For more general information about Object Gateway, refer to Chapter 26, Ceph Object Gateway.

13 Manual Configuration

This section introduces advanced information for users that prefer configuring dashboard's settings manually on the command line.

14 Managing Users and Roles on the Command Line

This section describes how to manage user accounts used by the Ceph Dashboard. It helps you create or modify user accounts, as well as set proper user roles and permissions.

Print this page