Go to file
2021-04-22 16:03:37 +00:00
_service Accepting request 876551 from home:avicenzi:branches:devel:kubic 2021-03-04 16:20:13 +00:00
_servicedata Accepting request 876551 from home:avicenzi:branches:devel:kubic 2021-03-04 16:20:13 +00:00
.gitattributes Accepting request 452165 from Virtualization:containers 2017-01-31 11:39:33 +00:00
.gitignore Accepting request 452165 from Virtualization:containers 2017-01-31 11:39:33 +00:00
etcd-3.4.15.tar.gz Accepting request 876551 from home:avicenzi:branches:devel:kubic 2021-03-04 16:20:13 +00:00
etcd.changes Accepting request 886120 from home:dirkmueller:Factory 2021-04-19 08:24:42 +00:00
etcd.conf Accepting request 707856 from home:jsegitz:branches:devel:CaaSP:Head:ControllerNode 2019-06-06 08:30:52 +00:00
etcd.service Accepting request 886120 from home:dirkmueller:Factory 2021-04-19 08:24:42 +00:00
etcd.spec Accepting request 876551 from home:avicenzi:branches:devel:kubic 2021-03-04 16:20:13 +00:00
README.security Accepting request 707856 from home:jsegitz:branches:devel:CaaSP:Head:ControllerNode 2019-06-06 08:30:52 +00:00
vendor.tar.gz Accepting request 876551 from home:avicenzi:branches:devel:kubic 2021-03-04 16:20:13 +00:00

By default etcd doesn't require authentication.  If you configure etcd to be reachable
over the network, have untrustworthy local users on the system where etc runs or store
date in etcd that needs to be kept confidential please make sure to enable authentication.

You can do that by configuring the settings under [security] in /etc/sysconfig/etcd.
For additional guidance please red
https://coreos.com/etcd/docs/latest/v2/security.html
and
https://coreos.com/etcd/docs/latest/op-guide/authentication.html
to ensure that you enforce proper access control