O'Reilly logo

Learning Ceph - Second Edition by Karan Singh, Vaibhav Bhembre, Anthony D'Atri

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Encryption

Ceph clusters usually service hundreds or thousands of clients, and the data for each is sliced and dice among as many as hundreds of OSD devices. This mixing and dissemination of data presents something of a barrier to would-be thieves who could gain physical access to your servers and even physically abscond with them. However, when data is truly sensitive, user or organizational requirements might dictate stronger protection in the form of encryption.

Storage drives are available that implement encryption of data at rest, which means the actual data stored persistently on them. Self Encrypting Drive (SED) is the most popular of these strategies, and a variety of drive models are available that implement it, albeit at increased ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required