Hi Wes,
thanks the `ceph tell mon.* sessions` got me the answer very quickly :-)
Cheers
/Simon
On Thu, 21 Dec 2023 at 18:27, Wesley Dillingham
wrote:
> You can ask the monitor to dump its sessions (which should expose the IPs
> and the release / features) you can then track down by IP those w
You can ask the monitor to dump its sessions (which should expose the IPs
and the release / features) you can then track down by IP those with the
undesirable features/release
ceph daemon mon.`hostname -s` sessions
Assuming your mon is named after the short hostname, you may need to do
this for e
[rook@rook-ceph-tools-5ff8d58445-gkl5w .aws]$ ceph features
{
"mon": [
{
"features": "0x3f01cfbf7ffd",
"release": "luminous",
"num": 3
}
],
"osd": [
{
"features": "0x3f01cfbf7ffd",
"release": "lu