Ceph Keyring and Network Security 101
Updated -
This article details some recommended best practices for maintaining the security of your Red Hat Ceph Storage cluster. Ceph uses a client authentication technique called 'cephx' which stores client keyrings in plaintext.
-
Only have the ceph.client.admin.keyring file on Admin nodes
- Do not widely distribute this keyring as it's equival...
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.