Configure Ceph Object Gateway TLS#
Once you enable Ceph Object Gateway (radosgw) as described in
Enable Ceph RGW Object Storage, you can configure
the Transport Layer Security (TLS) protocol for a Ceph Object Gateway public endpoint using custom ingressConfig
specified in the CephDeployment custom resource (CR). In this case, Ceph Object Gateway public endpoint will use
the public domain specified using the ingressConfig parameters.
Note
For clusters integrated with Rockoon, Pelagia has an ability to use domain
and certificates, defined in Rockoon configuration. Pelagia prioritize ingressConfig data over Rockoon ingress
data but if ingressConfig section is not configured, Pelagia will use Rockoon domain and certificates. Mirantis
recommends not defining ingressConfig section, if Rockoon has tls-proxy enabled. In that case, common
certificates are applied to all ingresses from the OpenStackDeployment object. This implies that Pelagia will use
the public domain and the common certificate from the OpenStackDeployment object.
This section describes how to specify a custom public endpoint for the Ceph Object Storage.
Ingress config parameters #
Parameter |
Description |
|---|---|
tlsConfig |
Defines TLS configuration for the Ceph Object Gateway public endpoint. |
controllerClassName |
Name of Ingress Controller class. The default value for Pelagia integrated Rockoon is openstack-ingress-nginx |
annotations |
Extra annotations for the ingress proxy. |
tlsConfig section parameters#
-
tlsSecretRefName- Secret name with TLS certs in Rook Ceph namespace, for example,rook-ceph. Allows avoiding exposure of certs directly inspec. Must contain the following format:data: ca.cert: <base64encodedCaCertificate> tls.crt: <base64encodedTlsCert> tls.key: <base64encodedTlsKey>Caution
When using
tlsSecretRefName, removecertssection. -
certs- TLS configuration for ingress including certificates. Contains the following parameters:Caution
certsparameters section is insecure because it stores TLS certificates in plain text. Consider using thetlsSecretRefNameparameter instead to avoid exposing TLS certificates in theCephDeploymentCR.cacert- The Certificate Authority (CA) certificate, used for the ingress rule TLS support.tlsCert- The TLS certificate, used for the ingress rule TLS support.tlsKey- The TLS private key, used for the ingress rule TLS support.
-
publicDomain- Mandatory. The domain name to use for public endpoints.Caution
For Pelagia integrated with Rockoon, the default ingress controller does not support
publicDomainvalues different from the OpenStack ingress public domain. Therefore, if you intend to use the default OpenStack Ingress Controller for your Ceph Object Storage public endpoint, plan to use the same public domain as your OpenStack endpoints. -
hostname- Custom name to override the Ceph Object Storage name for public access. Public RGW endpoint has thehttps://<hostname>.<publicDomain>format.
controllerClassName parameter#
controllClassName defines the name of the custom Ingress Controller. Pelagia does not support deploying Ingress
Controllers, so you must deploy the Ingress Controller before configuring the ingressConfig section in the
CephDeployment CR.
For Pelagia integrated with Rockoon, the default Ingress Controller has openstack-ingress-nginx class name and Ceph
uses the Rockoon OpenStack Ingress Controller based on NGINX.
annotations parameter#
annotations parameter defines extra annotations for the ingress proxy that are a key-value mapping of strings
to add or override ingress rule annotations. For details, see
NGINX Ingress Controller: Annotations.
By default, the following annotations are set:
nginx.ingress.kubernetes.io/rewrite-targetis set to/.nginx.ingress.kubernetes.io/upstream-vhostis set to<spec.objectStorage.rgw.name>.rook-ceph.svc.
Optional annotations:
nginx.ingress.kubernetes.io/proxy-request-buffering: "off"that disables buffering foringressto prevent the 413 (Request Entity Too Large) error when uploading large files usingradosgw.nginx.ingress.kubernetes.io/proxy-body-size: <size>that increases the default uploading size limit to prevent the 413 (Request Entity Too Large) error when uploading large files usingradosgw. Set the value in MB (m) or KB (k). For example,100m.
By default, an ingress rule is created with an internal Ceph Object Gateway service endpoint as a backend.
Also, rgw dns name is specified by Pelagia Deployment Controller and is set to
<spec.objectStorage.rgw.name>.rook-ceph.svc by default.
You can override rgw dns name using the rookConfig key-value parameter. In this case, also change the corresponding
ingress annotation.
Configuration example with the rgw_dns_name override
spec:
objectStorage:
rgw:
name: rgw-store
...
ingressConfig:
tlsConfig:
publicDomain: public.domain.name
tlsSecretRefName: pelagia-ingress-tls-secret
controllerClassName: openstack-ingress-nginx
annotations:
nginx.ingress.kubernetes.io/rewrite-target: /
nginx.ingress.kubernetes.io/upstream-vhost: rgw-store.public.domain.name
nginx.ingress.kubernetes.io/proxy-body-size: 100m
rookConfig:
"rgw dns name": rgw-store.public.domain.name
For clouds with the publicDomain parameter specified, align the upstream-vhost ingress annotation with the
name of the Ceph Object Storage and the specified public domain.
Pelagia Ceph Object Storage requires the upstream-vhost and rgw dns name parameters to be equal. Therefore,
override the default rgw dns name with the corresponding ingress annotation value.
To configure Ceph Object Gateway TLS#
- To generate an SSL certificate for internal usage, verify that the
RADOS Gateway
spec.objectStorage.rgw.gateway.securePortparameter is specified in theCephDeploymentCR. For details, see Enable Ceph RGW Object Storage. -
Configure TLS for Ceph Object Gateway using a custom
ingressConfig:- Open the
CephDeploymentCR for editing:Substitutekubectl -n pelagia edit cephdpl <name><name>with the name of yourCephDeployment. - Specify the
ingressConfigparameters according Ingress config parameters. - Save the changes and close the editor.
Note
For Pelagia with Rockoon, you can omit TLS configuration for the default settings provided by Rockoon to be applied. Just obtain the Rockoon OpenStack CA certificate for a trusted connection:
kubectl -n openstack-ceph-shared get secret openstack-rgw-creds -o jsonpath="{.data.ca_cert}" | base64 -d - Open the
-
If you use the HTTP scheme instead of HTTPS for internal or public Ceph Object Gateway endpoints, add custom annotations to the
ingressConfig.annotationssection of theCephDeploymentCR:spec: ingressConfig: annotations: "nginx.ingress.kubernetes.io/force-ssl-redirect": "false" "nginx.ingress.kubernetes.io/ssl-redirect": "false"If both HTTP and HTTPS must be used, apply the following configuration in the
CephDeploymentobject:spec: ingressConfig: tlsConfig: publicDomain: public.domain.name tlsSecretRefName: pelagia-ingress-tls-secret annotations: "nginx.ingress.kubernetes.io/force-ssl-redirect": "false" "nginx.ingress.kubernetes.io/ssl-redirect": "false" -
Access internal and public Ceph Object Gateway endpoints by selecting one of the following options:
-
For a public endpoint:
- Obtain the Ceph Object Gateway public endpoint:
kubectl -n rook-ceph get ingress - Obtain the public endpoint TLS CA certificate:
kubectl -n rook-ceph get secret $(kubectl -n rook-ceph get ingress -o jsonpath='{.items[0].spec.tls[0].secretName}{"\n"}') -o jsonpath='{.data.ca\.crt}' | base64 -d; echo
- Obtain the Ceph Object Gateway public endpoint:
-
For an internal endpoint:
-
Obtain the internal endpoint name for Ceph Object Gateway:
kubectl -n rook-ceph get svc -l app=rook-ceph-rgwThe internal endpoint for Ceph Object Gateway has the following format:
wherehttps://<internal-svc-name>.rook-ceph.svc:<rgw-secure-port>/<rgw-secure-port>isspec.objectStorage.rgw.gateway.securePortspecified in theCephDeploymentCR. -
Obtain the internal endpoint TLS CA certificate:
kubectl -n rook-ceph get secret rgw-ssl-certificate -o jsonpath="{.data.cacert}" | base64 -d
-
-
-
Skip this step if one of the following requirements is met:
- The public hostname matches the public domain name set by the
spec.ingressConfig.tlsConfig.publicDomainfield; - The OpenStack configuration has been applied.
Otherwise, update the zonegroup
hostnamesof Ceph Object Gateway:- Enter the
pelagia-ceph-toolboxpod:kubectl -n rook-ceph exec -it deployment/pelagia-ceph-toolbox -- bash -
Obtain Ceph Object Gateway default zonegroup configuration:
radosgw-admin zonegroup get --rgw-zonegroup=<objectStorageName> --rgw-zone=<objectStorageName> | tee zonegroup.jsonSubstitute
<objectStorageName>with the Ceph Object Storage name fromspec.objectStorage.rgw.name. -
Inspect
zonegroup.jsonand verify that thehostnameskey is a list that contains two endpoints: an internal endpoint and a custom public endpoint:"hostnames": ["rook-ceph-rgw-<objectStorageName>.rook-ceph.svc", <customPublicEndpoint>]Substitute
<objectStorageName>with the Ceph Object Storage name and<customPublicEndpoint>with the public endpoint with a custom public domain. -
If one or both endpoints are omitted in the list, add the missing endpoints to the
hostnameslist in thezonegroup.jsonfile and update Ceph Object Gateway zonegroup configuration:radosgw-admin zonegroup set --rgw-zonegroup=<objectStorageName> --rgw-zone=<objectStorageName> --infile zonegroup.json radosgw-admin period update --commit -
Verify that the
hostnameslist contains both the internal and custom public endpoint:radosgw-admin --rgw-zonegroup=<objectStorageName> --rgw-zone=<objectStorageName> zonegroup get | jq -r ".hostnames"Example of system response:
[ "rook-ceph-rgw-obj-store.rook-ceph.svc", "obj-store.mcc1.cluster1.example.com" ] -
Exit the
pelagia-ceph-toolboxpod:exit
- The public hostname matches the public domain name set by the
Once done, Ceph Object Gateway becomes available by the custom public endpoint with an S3 API client, OpenStack Swift CLI, and OpenStack Horizon Containers plugin.