Configure Ceph Object Gateway TLS¶
Once you enable Ceph Object Gateway (radosgw) as described in Enable Ceph RGW Object Storage, you can configure the Transport Layer Security (TLS) protocol for a Ceph Object Gateway public endpoint using custom ingressConfig specified in the CephDeployment custom resource (CR). In this case, Ceph Object Gateway public endpoint will use the public domain specified using the ingressConfig parameters.
Note
For clusters integrated with Rockoon, Pelagia has an ability to use domain and certificates, defined in Rockoon configuration. Pelagia prioritize ingressConfig data over Rockoon ingress data but if ingressConfig section is not configured, Pelagia will use Rockoon domain and certificates.
Mirantis recommends not defining ingressConfig section, if Rockoon has tls-proxy enabled. In that case, common certificates are applied to all ingresses from the OpenStackDeployment object. This implies that Pelagia will use the public domain and the common certificate from the OpenStackDeployment object.
This section describes how to specify a custom public endpoint for the Ceph Object Storage.
Ingress config parameters¶
tlsConfig- Defines TLS configuration for the Ceph Object Gateway public endpoint.controllerClassName- Name of Ingress Controller class. The default value for Pelagia integrated Rockoon isopenstack-ingress-nginxannotations- Extra annotations for the ingress proxy.
The tlsConfig section parameters¶
tlsSecretRefName- Secret name with TLS certs in Rook Ceph namespace, for example,rook-ceph. Allows avoiding exposure of certs directly inspec. Must contain the following format:data: ca.cert: <base64encodedCaCertificate> tls.crt: <base64encodedTlsCert> tls.key: <base64encodedTlsKey>
Danger
When using
tlsSecretRefName, removecertssection.certs- TLS configuration for ingress including certificates. Contains the following parameters:Danger
certsparameters section is insecure because it stores TLS certificates in plain text. Consider using thetlsSecretRefNameparameter instead to avoid exposing TLS certificates in theCephDeploymentCR.cacert- The Certificate Authority (CA) certificate, used for the ingress rule TLS support.tlsCert- The TLS certificate, used for the ingress rule TLS support.tlsKey- The TLS private key, used for the ingress rule TLS support.
publicDomain- Mandatory. The domain name to use for public endpoints.Danger
For Pelagia integrated with Rockoon, the default ingress controller does not support
publicDomainvalues different from the OpenStack ingress public domain. Therefore, if you intend to use the default OpenStack Ingress Controller for your Ceph Object Storage public endpoint, plan to use the same public domain as your OpenStack endpoints.hostname- Custom name to override the Ceph Object Storage name for public access. Public RGW endpoint has thehttps://<hostname>.<publicDomain>format.
The controllerClassName parameter¶
controllClassName defines the name of the custom Ingress Controller. Pelagia does not support deploying Ingress
Controllers, so you must deploy the Ingress Controller before configuring the ingressConfig section in the
CephDeployment CR.
For Pelagia integrated with Rockoon, the default Ingress Controller has openstack-ingress-nginx class name and Ceph
uses the Rockoon OpenStack Ingress Controller based on NGINX.
The annotations parameter¶
annotations parameter defines extra annotations for the ingress proxy that are a key-value mapping of strings
to add or override ingress rule annotations. For details, see
NGINX Ingress Controller: Annotations.
By default, the following annotations are set:
nginx.ingress.kubernetes.io/rewrite-targetis set to/.nginx.ingress.kubernetes.io/upstream-vhostis set to<spec.objectStorage.rgw.name>.rook-ceph.svc.
Optional annotations:
nginx.ingress.kubernetes.io/proxy-request-buffering: "off"that disables buffering foringressto prevent the 413 (Request Entity Too Large) error when uploading large files usingradosgw.nginx.ingress.kubernetes.io/proxy-body-size: <size>that increases the default uploading size limit to prevent the 413 (Request Entity Too Large) error when uploading large files usingradosgw. Set the value in MB (m) or KB (k). For example,100m.
By default, an ingress rule is created with an internal Ceph Object Gateway service endpoint as a backend.
Also, rgw dns name is specified by Pelagia Deployment Controller and is set to
<spec.objectStorage.rgw.name>.rook-ceph.svc by default.
You can override rgw dns name using the rookConfig key-value parameter. In this case, also change the corresponding
ingress annotation.
Configuration example with the rgw_dns_name override
spec:
objectStorage:
rgw:
name: rgw-store
...
ingressConfig:
tlsConfig:
publicDomain: public.domain.name
tlsSecretRefName: pelagia-ingress-tls-secret
controllerClassName: openstack-ingress-nginx
annotations:
nginx.ingress.kubernetes.io/rewrite-target: /
nginx.ingress.kubernetes.io/upstream-vhost: rgw-store.public.domain.name
nginx.ingress.kubernetes.io/proxy-body-size: 100m
rookConfig:
"rgw dns name": rgw-store.public.domain.name
For clouds with the publicDomain parameter specified, align the upstream-vhost ingress annotation with the
name of the Ceph Object Storage and the specified public domain.
Pelagia Ceph Object Storage requires the upstream-vhost and rgw dns name parameters to be equal. Therefore,
override the default rgw dns name with the corresponding ingress annotation value.
Сonfigure TLS for Ceph Object Gateway¶
To generate an SSL certificate for internal usage, verify that the RADOS Gateway
spec.objectStorage.rgw.gateway.securePortparameter is specified in theCephDeploymentCR. For details, see Enable Ceph RGW Object Storage.Open the
CephDeploymentCR for editing:kubectl -n pelagia edit cephdpl <name>
Substitute
<name>with the name of yourCephDeployment.Specify the
ingressConfigparameters as required.Save the changes and close the editor.
Note
For Pelagia with Rockoon, you can omit TLS configuration for the default settings provided by Rockoon to be applied. Just obtain the Rockoon OpenStack CA certificate for a trusted connection:
kubectl -n openstack-ceph-shared get secret openstack-rgw-creds -o jsonpath="{.data.ca_cert}" | base64 -d
If you use the HTTP scheme instead of HTTPS for internal or public Ceph Object Gateway endpoints, add custom annotations to the
ingressConfig.annotationssection of theCephDeploymentCR:spec: ingressConfig: annotations: "nginx.ingress.kubernetes.io/force-ssl-redirect": "false" "nginx.ingress.kubernetes.io/ssl-redirect": "false"
If both HTTP and HTTPS must be used, apply the following configuration in the
CephDeploymentobject:spec: ingressConfig: tlsConfig: publicDomain: public.domain.name tlsSecretRefName: pelagia-ingress-tls-secret annotations: "nginx.ingress.kubernetes.io/force-ssl-redirect": "false" "nginx.ingress.kubernetes.io/ssl-redirect": "false"
Access the public Ceph Object Gateway endpoint:
Obtain the Ceph Object Gateway public endpoint:
kubectl -n rook-ceph get ingress
Obtain the public endpoint TLS CA certificate:
kubectl -n rook-ceph get secret $(kubectl -n rook-ceph get ingress -o jsonpath='{.items[0].spec.tls[0].secretName}{"\n"}') -o jsonpath='{.data.ca\.crt}' | base64 -d; echo
To access the internal Ceph Object Gateway endpoint, if needed:
Obtain the internal endpoint name for Ceph Object Gateway:
kubectl -n rook-ceph get svc -l app=rook-ceph-rgw
The internal endpoint for Ceph Object Gateway has the following format:
https://<internal-svc-name>.rook-ceph.svc:<rgw-secure-port>/
where
<rgw-secure-port>isspec.objectStorage.rgw.gateway.securePortspecified in theCephDeploymentCR.Obtain the internal endpoint TLS CA certificate:
kubectl -n rook-ceph get secret rgw-ssl-certificate -o jsonpath="{.data.cacert}" | base64 -d
Verify that at least one of the following requirements is met:
The public hostname matches the public domain name set by the
spec.ingressConfig.tlsConfig.publicDomainfieldThe OpenStack configuration has been applied
If both options are not
true, update thezonegrouphostnamesof Ceph Object Gateway:Enter the
pelagia-ceph-toolboxpod:kubectl -n rook-ceph exec -it deployment/pelagia-ceph-toolbox -- bash
Obtain Ceph Object Gateway default
zonegroupconfiguration:radosgw-admin zonegroup get --rgw-zonegroup=<objectStorageName> --rgw-zone=<objectStorageName> | tee zonegroup.json
Substitute
<objectStorageName>with the Ceph Object Storage name fromspec.objectStorage.rgw.name.Inspect
zonegroup.jsonand verify that thehostnameskey is a list that contains two endpoints: an internal endpoint and a custom public endpoint:"hostnames": ["rook-ceph-rgw-<objectStorageName>.rook-ceph.svc", <customPublicEndpoint>]
Substitute
<objectStorageName>with the Ceph Object Storage name and<customPublicEndpoint>with the public endpoint with a custom public domain.If one or both endpoints are omitted in the list, add the missing endpoints to the
hostnameslist in thezonegroup.jsonfile and update the Ceph Object Gatewayzonegroupconfiguration:radosgw-admin zonegroup set --rgw-zonegroup=<objectStorageName> --rgw-zone=<objectStorageName> --infile zonegroup.json radosgw-admin period update --commit
Verify that the
hostnameslist contains both the internal and custom public endpoint:radosgw-admin --rgw-zonegroup=<objectStorageName> --rgw-zone=<objectStorageName> zonegroup get | jq -r ".hostnames"
Example of system response:
[ "rook-ceph-rgw-obj-store.rook-ceph.svc", "obj-store.mcc1.cluster1.example.com" ]
Exit the
pelagia-ceph-toolboxpod:exit
Once done, Ceph Object Gateway becomes available by the custom public endpoint with an S3 API client, OpenStack Swift CLI, and OpenStack Horizon Containers plugin.