Ceph utilisation of root privileges, secure authentication and encryption

Solution Verified - Updated -

Issue

  • How does Ceph make use of root access and what controls are in place to prevent misuse of those privileges?
    • Is there a list of the commands and system calls that Ceph runs as root?
    • Is there a way to limit sudo to include only what is absolutely necessary for Ceph to function?

Environment

  • Red Hat Ceph Storage 5.y

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content