Jump to contentJump to page navigation: previous page [access key p]/next page [access key n]
Applies to SUSE Enterprise Storage 7

Part I Ceph Dashboard Edit source

1 About the Ceph Dashboard

The Ceph Dashboard is a built-in Web-based Ceph management and monitoring application that administers various aspects and objects of the cluster. The dashboard is automatically enabled after the basic cluster is deployed in Section 5.3, “Deploying the Ceph cluster”.

2 Dashboard's Web user interface

To log in to the Ceph Dashboard, point your browser to its URL including the port number. Run the following command to find the address:

3 Manage Ceph Dashboard users and roles

Dashboard user management performed by Ceph commands on the command line was already introduced in Chapter 11, Manage users and roles on the command line.

4 View cluster internals

The Cluster menu item lets you view detailed information about Ceph cluster hosts, inventory, Ceph Monitors, services, OSDs, configuration, CRUSH Map, Ceph Manager, logs, and monitoring files.

5 Manage pools

For more general information about Ceph pools, refer to Chapter 18, Manage storage pools. For information specific to erasure code pools, refer to Chapter 19, Erasure coded pools.

6 Manage RADOS Block Device

To list all available RADOS Block Devices (RBDs), click Block › Images from the main menu.

7 Manage NFS Ganesha

NFS Ganesha supports NFS version 4.1 and newer. It does not support NFS version 3.

8 Manage CephFS

To find detailed information about CephFS, refer to Chapter 23, Clustered file system.

9 Manage the Object Gateway

Before you begin, you may encounter the following notification when trying to access the Object Gateway front-end on the Ceph Dashboard:

10 Manual configuration

This section introduces advanced information for users that prefer configuring dashboard settings manually on the command line.

11 Manage users and roles on the command line

This section describes how to manage user accounts used by the Ceph Dashboard. It helps you create or modify user accounts, as well as set proper user roles and permissions.

Print this page