Questo contenuto non è disponibile nella lingua selezionata.
Chapter 3. Configuring the Ceph Object Gateway
As a storage administrator, you must configure the Ceph Object Gateway to accept authentication requests from the Keystone service.
3.1. Prerequisites
- A running Red Hat OpenStack Platform 13, 15, or 16 environment.
- A running Red Hat Ceph Storage environment.
- A running Ceph Object Gateway environment.
3.2. Configuring the Ceph Object Gateway to use Keystone SSL
Converting the OpenSSL certificates that Keystone uses configures the Ceph Object Gateway to work with Keystone. When the Ceph Object Gateway interacts with OpenStack’s Keystone authentication, Keystone will terminate with a self-signed SSL certificate.
Prerequisites
- A running Red Hat Ceph Storage cluster.
- Access to the Ceph software repository.
Procedure
- Convert the OpenSSL certificate to the - nss dbformat:- Example - Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Install Keystone’s SSL certificate in the node running the Ceph Object Gateway. Alternatively set the value of the configurable - rgw_keystone_verify_sslsetting to- false.- Setting - rgw_keystone_verify_sslto- falsemeans that the gateway won’t attempt to verify the certificate.
3.3. Configuring the Ceph Object Gateway to use Keystone authentication
Configure the Red Hat Ceph Storage to use OpenStack’s Keystone authentication.
Prerequisites
- A running Red Hat Ceph Storage cluster.
- Access to the Ceph software repository.
- 
						adminprivileges to the production environment.
Procedure
- Edit the Ceph configuration file on the admin node.
- 
						Navigate to the [client.radosgw.INSTANCE_NAME], where INSTANCE_NAME is the name of the Gateway instance to configure.
- Do the following for each gateway instance: - 
								Set the rgw_s3_auth_use_keystonesetting totrue.
- 
								Set the nss_db_pathsetting to the path where the NSS database is stored.
 
- 
								Set the 
- Provide authentication credentials: - It is possible to configure a Keystone service tenant, user and password for keystone for v2.0 version of the OpenStack Identity API, similar to the way system administrators tend to configure OpenStack services. Providing a username and password avoids providing the shared secret to the - rgw_keystone_admin_tokensetting.Important- Red Hat recommends disabling authentication by admin token in production environments. The service tenant credentials should have - adminprivileges.- The necessary configuration options are: - rgw_keystone_admin_user = KEYSTONE_TENANT_USER_NAME rgw_keystone_admin_password = KEYSTONE_TENANT_USER_PASSWORD rgw_keystone_admin_tenant = KEYSTONE_TENANT_NAME - rgw_keystone_admin_user = KEYSTONE_TENANT_USER_NAME rgw_keystone_admin_password = KEYSTONE_TENANT_USER_PASSWORD rgw_keystone_admin_tenant = KEYSTONE_TENANT_NAME- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - A Ceph Object Gateway user is mapped into a Keystone - tenant. A Keystone user has different roles assigned to it on possibly more than a single tenant. When the Ceph Object Gateway gets the ticket, it looks at the tenant, and the user roles that are assigned to that ticket, and accepts or rejects the request according to the- rgw_keystone_accepted_rolesconfigurable.- A typical configuration might have the following settings: - Example - Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
Additional Resources
- Users and Identity Management Guide for Red Hat OpenStack Platform 13.
- Users and Identity Management Guide for Red Hat OpenStack Platform 15.
- Users and Identity Management Guide for Red Hat OpenStack Platform 16.
3.4. Restarting the Ceph Object Gateway daemon
Restarting the Ceph Object Gateway must be done to active configuration changes.
Prerequisites
- A running Red Hat Ceph Storage cluster.
- Access to the Ceph software repository.
- 
						adminprivileges to the production environment.
Procedure
- Once you have saved the Ceph configuration file and distributed it to each Ceph node, restart the Ceph Object Gateway instances:
systemctl restart ceph-radosgw systemctl restart ceph-radosgw@rgw.`hostname -s`
[root@ceph~]# systemctl restart ceph-radosgw
[root@ceph~]# systemctl restart ceph-radosgw@rgw.`hostname -s`