O'Reilly logo

Ceph Cookbook - Second Edition by Karan Singh, Michael Hackett, Vikhyat Umrao

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

The cluster authentication entries

Ceph works on an authentication system based on keys. All cluster components interact with each other once they undergo a key-based authentication system. You can use the ceph command with the auth list subcommand to get a list of all the keys:

# ceph auth list
To find out more about command operation, you can use help with the suboption. For instance, run # ceph auth --help and use the command as directed in the help.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required