Hi,

Looking for some feedback with regards to utilisation of RBD devices as PV’s in the area of a multi-tenanted openshift platform.

At present, it appears you need to define the secret as such within a PV declaration

apiVersion: v1

kind: PersistentVolume

metadata:

  name: ceph-pv

spec:

  capacity:

    storage: 2Gi

  accessModes:

    - ReadWriteOnce

  rbd:

    monitors:

      - 192.168.122.133:6789 <http://192.168.122.133:6789>

    pool: rbd

    image: ceph-image

    user: admin

    secretRef:

      name: ceph-secret

    fsType: ext4

    readOnly: false

persistentVolumeReclaimPolicy: Recycle

This means the following (unless I’m missing something!)

o) ‘ceph-secret’ needs to exist within the correct project/name-space that wants to create a PVC against a RBD-backed-PV. I can’t see a way to have a general secret (for example, located within the openshift namespace)

o) On this basis – it means the contents of ceph-secret can be read by any project that requires access to the storage system? (And thus expose the required keys to mount any volumes within that pool space). Or is there a way to make it so only the openshift processes (and not the user) can read the contents of ceph-secret?

Our use case would be utilisation of openshift clusters with untrusted clients in distinct projects, so we’re trying to ensure they can’t access each/others storage.

Any input appreciated – cheers!

James.

_______________________________________________
users mailing list
[email protected]
http://lists.openshift.redhat.com/openshiftmm/listinfo/users

Reply via email to