Additionally, solely testing if you can write to the path could give a
false sense of security if the path is writable when the RBD is not
mounted.  It would write a file to the system drive and you would see it as
successful.

On Fri, Aug 25, 2017 at 2:27 AM Adrian Saul <adrian.s...@tpgtelecom.com.au>
wrote:

> If you are monitoring to ensure that it is mounted and active, a simple
> check_disk on the mountpoint should work.  If the mount is not present, or
> the filesystem is non-responsive then this should pick it up. A second
> check to perhaps test you can actually write files to the file system would
> not go astray either.
>
> Other than that I don't think there is much point checking anything else
> like rbd mapped output.
>
>
> > -----Original Message-----
> > From: ceph-users [mailto:ceph-users-boun...@lists.ceph.com] On Behalf Of
> > Hauke Homburg
> > Sent: Friday, 25 August 2017 1:35 PM
> > To: ceph-users <ceph-us...@ceph.com>
> > Subject: [ceph-users] Monitoring a rbd map rbd connection
> >
> > Hallo,
> >
> > Ich want to monitor the mapped Connection between a rbd map rbdimage
> > an a /dev/rbd device.
> >
> > This i want to do with icinga.
> >
> > Has anyone a Idea how i can do this?
> >
> > My first Idea is to touch and remove a File in the mount point. I am not
> sure
> > that this is the the only thing i have to do
> >
> >
> > Thanks for Help
> >
> > Hauke
> >
> > --
> > www.w3-creative.de
> >
> > www.westchat.de
> >
> > _______________________________________________
> > ceph-users mailing list
> > ceph-users@lists.ceph.com
> > http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com
> Confidentiality: This email and any attachments are confidential and may
> be subject to copyright, legal or some other professional privilege. They
> are intended solely for the attention and use of the named addressee(s).
> They may only be copied, distributed or disclosed with the consent of the
> copyright owner. If you have received this email by mistake or by breach of
> the confidentiality clause, please notify the sender immediately by return
> email and delete or destroy all copies of the email. Any confidentiality,
> privilege or copyright is not waived or lost because this email has been
> sent to you by mistake.
> _______________________________________________
> ceph-users mailing list
> ceph-users@lists.ceph.com
> http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com
>
_______________________________________________
ceph-users mailing list
ceph-users@lists.ceph.com
http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com

Reply via email to