Size: 2056
Comment:
|
Size: 976
Comment:
|
Deletions are marked like this. | Additions are marked like this. |
Line 2: | Line 2: |
The default GlusterFS setup does not encrypt its communication. Use the method below enable encryption. | |
Line 3: | Line 4: |
{{{#!highlight bash #!/bin/sh if [ ! -e /etc/ssl/glusterfs ] then mkdir -p /etc/ssl/glusterfs fi cd /etc/ssl/glusterfs # create the server keys openssl genrsa -out gluster01.key 2048 openssl genrsa -out gluster02.key 2048 openssl genrsa -out gluster03.key 2048 openssl genrsa -out gluster04.key 2048 # sign the server certificates openssl req -new -x509 -key gluster01.key -subj "/CN=gluster01" -out gluster01.pem openssl req -new -x509 -key gluster02.key -subj "/CN=gluster02" -out gluster02.pem openssl req -new -x509 -key gluster03.key -subj "/CN=gluster03" -out gluster03.pem openssl req -new -x509 -key gluster04.key -subj "/CN=gluster04" -out gluster04.pem # create the client keys openssl genrsa -out glusterclient01.key 2048 # sign the client certificates openssl req -new -x509 -key glusterclient01.key -subj "/CN=glusterclient01" -out glusterclient01.pem # server certificates authorities cat gluster01.key gluster02.key gluster03.key gluster04.key glusterclient01.pem > glusterfs.ca # client certificates authorities cat gluster01.key gluster02.key gluster03.key gluster04.key > glusterfs-client.ca }}} == Keys == On each of the Glusterfs servers and clients run. |
== Keys and Certificates == Make an encryption key and make sure to set the `CN` to match the name of the host. Repeat this on the client and on each of the servers. |
Line 43: | Line 9: |
openssl genrsa -out glusterfs.key 2048 | openssl genrsa -out gluster01.key 2048 openssl req -new -x509 -key gluster01.key -subj "/CN=gluster01" -out gluster01.pem |
Line 46: | Line 13: |
== Certificates == Now sign certificates using those keys. Replace the `CN` so it matches the host you are siging the certificate for. |
== Certificate Authorities == Compile all the certificates in one place and concatenate them into two files. `glusterfs.ca` and `glusterfs-client.ca`. |
Line 49: | Line 16: |
openssl req -new -x509 -key glusterfs.key -subj "/CN=gluster01" -out glusterfs.pem | cat gluster01.pem gluster02.pem gluster03.pem gluster04.pem glusterclient01.pem > glusterfs.ca cat gluster01.pem gluster02.pem gluster03.pem gluster04.pem > glusterfs-client.ca |
Line 51: | Line 19: |
== Compile == Compile all the certificates into one large file {{{ scp gluster01:/etc/ssl/glusterfs/gluster.pem gluster01.pem scp gluster02:/etc/ssl/glusterfs/gluster.pem gluster02.pem scp gluster03:/etc/ssl/glusterfs/gluster.pem gluster03.pem scp gluster04:/etc/ssl/glusterfs/gluster.pem gluster04.pem scp glusterclient01:/etc/ssl/glusterfs/gluster.pem glusterclient01.pem cat gluster01.pem gluster02.pem gluster03.pem gluster04.pem > glusterfs.ca }}} |
Copy the `glusterfs.ca` to all servers in the `/etc/ssl` directory. Copy the `glusterfs-client.ca`file to the client in the `/etc/ssl` directory. |
GlusterFS Encryption
The default GlusterFS setup does not encrypt its communication. Use the method below enable encryption.
Keys and Certificates
Make an encryption key and make sure to set the CN to match the name of the host. Repeat this on the client and on each of the servers.
mkdir /etc/ssl/glusterfs cd /etc/ssl/glusterfs openssl genrsa -out gluster01.key 2048 openssl req -new -x509 -key gluster01.key -subj "/CN=gluster01" -out gluster01.pem
Certificate Authorities
Compile all the certificates in one place and concatenate them into two files. glusterfs.ca and glusterfs-client.ca.
cat gluster01.pem gluster02.pem gluster03.pem gluster04.pem glusterclient01.pem > glusterfs.ca cat gluster01.pem gluster02.pem gluster03.pem gluster04.pem > glusterfs-client.ca
Copy the glusterfs.ca to all servers in the /etc/ssl directory. Copy the glusterfs-client.cafile to the client in the /etc/ssl directory.