Re: Minimal requirements for ceph csi users?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi,

On 28.10.21 18:10, Konstantin Shalygin wrote:
Hi,

Try to use profile cap, like 'allow profile rbd'


That's fine for csi rbd, thx. Works like a charm so far.


But cephfs is a little different beast. As far as I understand the source code, it uses the mgr interface to create subvolumes and subvolume groups (e.g. the same API calls used by 'ceph fs subvolume create..' and others). The default authx caps generated by 'ceph fs authorize' do not seem to be sufficient in this case.


To give an example:

    caps mds = "allow rwps fsname=test"
    caps mon = "allow r fsname=test"
    caps osd = "allow rw tag cephfs data=test"

This is not enough to be used with the cephfs csi driver. The caps are fine for accessing the filesystem, e.g. mounting.

Even adding 'mgr = "allow rw"' does not work. If I use the client.admin credentials instead everything is fine, but I do not want to expose those in kubernetes...


Regards,

Burkhard


_______________________________________________
ceph-users mailing list -- ceph-users@xxxxxxx
To unsubscribe send an email to ceph-users-leave@xxxxxxx




[Index of Archives]     [Information on CEPH]     [Linux Filesystem Development]     [Ceph Development]     [Ceph Large]     [Ceph Dev]     [Linux USB Development]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]     [xfs]


  Powered by Linux