Ceph utilisation of root privileges, secure authentication and encryption
Issue
- How does Ceph make use of
root
access and what controls are in place to prevent misuse of those privileges?- Is there a list of the commands and system calls that Ceph runs as
root
? - Is there a way to limit
sudo
to include only what is absolutely necessary for Ceph to function?
- Is there a list of the commands and system calls that Ceph runs as
Environment
- Red Hat Ceph Storage 5.y
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.