I asked a similar question in a previous email but I didn't get any
satisfying answers. What exactly does cephx auth secure?
From the wiki I just get this makes your cluster more secure, well
from what? If I run on an internal network accessible only
by a few trusted people - what does cephx auth
Ok I think I have a better understanding now.
I really don't want to setup a cluster using mkcephfs, it feels like
that's something built for test setups. If I(and I do) want to
automate the setup of OSDs, MONs and RGW it definitely makes it more
complicated using key based auth. I've seen the
A few things that Wido missed:
On Tue, 12 Jun 2012, John Axel Eriksson wrote:
I asked a similar question in a previous email but I didn't get any
satisfying answers. What exactly does cephx auth secure?
From the wiki I just get this makes your cluster more secure, well
from what? If I run on
Thanks alot for your input Sage!
I get a feeling that this is good for a larger cluster, especially
when you have many people logging in - some without root access.
We are currently a VERY small company (two people have logins and root
access - noone else has a login at all). We've been running
On Tue, 12 Jun 2012, John Axel Eriksson wrote:
Thanks alot for your input Sage!
I get a feeling that this is good for a larger cluster, especially
when you have many people logging in - some without root access.
We are currently a VERY small company (two people have logins and root
access -