Go to file
2020-02-14 15:27:31 +00:00
_service Accepting request 770475 from home:mjura:branches:devel:kubic 2020-02-06 10:19:08 +00:00
_servicedata Accepting request 770475 from home:mjura:branches:devel:kubic 2020-02-06 10:19:08 +00:00
.gitattributes Accepting request 452165 from Virtualization:containers 2017-01-31 11:39:33 +00:00
.gitignore Accepting request 452165 from Virtualization:containers 2017-01-31 11:39:33 +00:00
etcd-3.4.3.tar.gz Accepting request 770475 from home:mjura:branches:devel:kubic 2020-02-06 10:19:08 +00:00
etcd.changes Accepting request 770475 from home:mjura:branches:devel:kubic 2020-02-06 10:19:08 +00:00
etcd.conf Accepting request 707856 from home:jsegitz:branches:devel:CaaSP:Head:ControllerNode 2019-06-06 08:30:52 +00:00
etcd.service Accepting request 520609 from Virtualization:containers 2017-09-05 13:16:31 +00:00
etcd.spec Accepting request 770475 from home:mjura:branches:devel:kubic 2020-02-06 10:19:08 +00:00
README.security Accepting request 707856 from home:jsegitz:branches:devel:CaaSP:Head:ControllerNode 2019-06-06 08:30:52 +00:00
vendor.tar.gz Accepting request 770475 from home:mjura:branches:devel:kubic 2020-02-06 10:19:08 +00:00

By default etcd doesn't require authentication.  If you configure etcd to be reachable
over the network, have untrustworthy local users on the system where etc runs or store
date in etcd that needs to be kept confidential please make sure to enable authentication.

You can do that by configuring the settings under [security] in /etc/sysconfig/etcd.
For additional guidance please red
https://coreos.com/etcd/docs/latest/v2/security.html
and
https://coreos.com/etcd/docs/latest/op-guide/authentication.html
to ensure that you enforce proper access control