kea-custom-hooks
FeM custom hooks libraries for Kea DHCP
|
A few packages need to be installed on the system where kea-custom-hooks shall be deployed. See the list of runtime dependencies at Installation.
Kea-custom-hooks require some software at runtme to fully work. Depending on the used hooks, some software is required, some is not:
Furthermore, kea-custom-hooks require a working connection to the AdminDB database servers. Credentials for kea-custom-hooks must be provided for some components to function properly.
Kea-custom-hooks need access to a local Redis server for caching of various data, e.g. assigned leases in the last X minutes. For updating the Kea host reservation database, kea-custom-hooks need to have access to the host reservation database and at least one AdminDB database server. For incremental updates, read-only access is sufficient, so access to DB slaves should be sufficient. A full sync, however, might still require write access and thus a connection to a DB master.
Kea hooks are installed in the standard way:
ninja install
or make install
, if kea-custom-hooks isn't installed using the system package manager (recommended).The exact configuration files/sections are described in the individual hooks' README files, listed on the Main page.
A general deployment usually requires the following configuration:
All parts running as a Kea hook are controlled completely by Kea and thus don't have separate init scripts. Restarting/reloading of hooks happens with Kea reloads/restarts.
Parts running outside of Kea as a standalone binary bring a system service or init script with them. The services follow the naming convention kch-[COMPONENT_NAME]
(kch is an abbreviation for “kea-custom-hooks”). Thus, a component xmlrpc-interface
has the service name kch-xmlrpc-interface
.