Support creating NFS-volumes that requires clients to authenticate with Kerberos #3387
Labels
component/nfs
Issues related to NFS
enhancement
New feature or request
keepalive
This label can be used to disable stale bot activiity in the repo
Describe the feature you'd like to have
Rook supports configuring NFS-Ganesha with Kerberos support. This can not (easily) be used within a Kubernetes environment, but is useful for external NFS-clients. Ceph-CSI can have a parameter in the StorageClass that makes it possible to select one or more security flavours when a volume is created.
What is the value to the end user? (why is it a priority?)
External NFS-clients can securely use NFS-volumes that are managed within a Kubernetes environment.
How will we know we have a good solution? (acceptance criteria)
NFS-clients inside the Kubernetes environment (worker nodes) should be able to mount NFS-volumes with standard security flavour, while external NFS-clients can use Kerberos.
Additional context
https://rook.io/docs/rook/latest/CRDs/ceph-nfs-crd/ contains the CephNFS configuration with Kerberos options.
Depends-On: ceph/go-ceph#767
The text was updated successfully, but these errors were encountered: