Differences between revisions 28 and 30 (spanning 2 versions)
Revision 28 as of 2017-12-24 18:02:06
Size: 899
Comment:
Revision 30 as of 2017-12-24 18:18:22
Size: 970
Comment:
Deletions are marked like this. Additions are marked like this.
Line 18: Line 18:
Copy `glusterfs.ca` to `/etc/ssl` on all servers. Copy `glusterfs-client.ca` to `/etc/ssl` on the client. Copy `glusterfs.ca` to `/etc/ssl` on all servers. Copy `glusterfs.ca` to `/etc/ssl` on the client.

== Activate Encryption ==
{{{
touch /var/lib/glusterd/secure-access
}}}

GlusterFS Encryption

The default GlusterFS setup does not encrypt its communication. Use the method below enable encryption.

Keys and Certificates

Make an encryption key and make sure to set the CN to match the name of the host. Repeat this on the client and on each of the servers.

cd /etc/ssl
openssl genrsa -out glusterfs.key 2048
openssl req -new -x509 -key glusterfs.key -subj "/CN=gluster01" -out glusterfs.pem

Certificate Authorities

Compile all the certificates in one place and concatenate them into two files. glusterfs.ca and glusterfs-client.ca.

cat gluster01.pem gluster02.pem gluster03.pem gluster04.pem glusterclient01.pem > glusterfs.ca
cat gluster01.pem gluster02.pem gluster03.pem gluster04.pem > glusterfs-client.ca

Copy glusterfs.ca to /etc/ssl on all servers. Copy glusterfs.ca to /etc/ssl on the client.

Activate Encryption

touch /var/lib/glusterd/secure-access

None: GlusterFS Encryption (last edited 2021-03-26 21:25:57 by Kristian Kallenberg)