Hi,
Looking for some feedback with regards to utilisation of RBD devices as PV's in
the area of a multi-tenanted openshift platform.
At present, it appears you need to define the secret as such within a PV
declaration
apiVersion: v1
kind: PersistentVolume
metadata:
name: ceph-pv
spec:
capacity:
storage: 2Gi
accessModes:
- ReadWriteOnce
rbd:
monitors:
- 192.168.122.133:6789
pool: rbd
image: ceph-image
user: admin
secretRef:
name: ceph-secret
fsType: ext4
readOnly: false
persistentVolumeReclaimPolicy: Recycle
This means the following (unless I'm missing something!)
o) 'ceph-secret' needs to exist within the correct project/name-space that
wants to create a PVC against a RBD-backed-PV. I can't see a way to have a
general secret (for example, located within the openshift namespace)
o) On this basis - it means the contents of ceph-secret can be read by any
project that requires access to the storage system? (And thus expose the
required keys to mount any volumes within that pool space). Or is there a way
to make it so only the openshift processes (and not the user) can read the
contents of ceph-secret?
Our use case would be utilisation of openshift clusters with untrusted clients
in distinct projects, so we're trying to ensure they can't access each/others
storage.
Any input appreciated - cheers!
James.
_______________________________________________
users mailing list
[email protected]
http://lists.openshift.redhat.com/openshiftmm/listinfo/users