Part VI Configuring a Cluster #
- 28 Ceph cluster configuration
This chapter describes how to configure the Ceph cluster by means of configuration options.
- 29 Ceph Manager modules
The architecture of the Ceph Manager (refer to Book “Deployment Guide”, Chapter 1 “SES and Ceph”, Section 1.2.3 “Ceph nodes and daemons” for a brief introduction) allows extending its functionality via modules, such as 'dashboard' (see Part I, “Ceph Dashboard”), 'prometheus' (see Chapter 16, Monitor…
- 30 Authentication with
cephx To identify clients and protect against man-in-the-middle attacks, Ceph provides its
cephxauthentication system. Clients in this context are either human users—such as the admin user—or Ceph-related services/daemons, for example OSDs, monitors, or Object Gateways.