Skip to content

Support both ssl/non-ssl volumes on the same client node #4499

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: devel
Choose a base branch
from

Conversation

jiankyu
Copy link
Contributor

@jiankyu jiankyu commented Mar 19, 2025

glusterfsd supports the '--secure-mgmt' cli option to specify management transport type (ssl or non ssl), when we start a fuse daemon, this option tells the daemon how to initialize the mamangement socket and establish the connection to the remote glusterd.

However, this option is missing in the mount.glusterfs script, as a result, we can only rely on the presence of the
/var/lib/glusterd/secure-access file to decide the tranport type. This is cumbersome, it literally makes it impossible to mount two volumes on the same client node: one from a regular glusterfs cluster, one from a "secure" cluster where glusterd runs on ssl transport.

We do have this use case due to data classification requirements. Adding this option into mount.glusterfs would resolve the issue: on the client side we properly set the secure-access file, and the cert files. To mount a regular volume, add the '-o secure-mgmt=false' option, to mount a secure volume, either leave this option not set, or set it to 'true'.

glusterfsd supports the '--secure-mgmt' cli option to specify management
transport type (ssl or non ssl), when we start a fuse daemon, this
option tells the daemon how to initialize the mamangement socket and
establish the connection to the remote glusterd.

However, this option is missing in the mount.glusterfs script, as a
result, we can only rely on the presence of the
/var/lib/glusterd/secure-access file to decide the tranport type. This
is cumbersome, it literally makes it impossible to mount two volumes
on the same client node: one from a regular glusterfs cluster, one
from a "secure" cluster where glusterd runs on ssl transport.

We do have this use case due to data classification requirements. Adding
this option into mount.glusterfs would resolve the issue: on the
client side we properly set the secure-access file, and the cert files.
To mount a regular volume, add the '-o secure-mgmt=false' option, to
mount a secure volume, either leave this option not set, or set it to
'true'.
@gluster-ant
Copy link
Collaborator

Can one of the admins verify this patch?

1 similar comment
@gluster-ant
Copy link
Collaborator

Can one of the admins verify this patch?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants