[ClusterLabs] Coming in Pacemaker 3.0.2: PSK support for remote CIB administration

Chris Lumens clumens at redhat.com
Wed Apr 22 15:26:12 UTC 2026


If you are not using remote CIB administration in Pacemaker, you can 
completely disregard this email.  For the several that do, starting in 
Pacemaker 3.0.2, we've introduced a variety of changes:

* PSK is now a supported authentication method, alongside TLS 
certificates.  This brings it in line with the supported authentication 
methods for Pacemaker Remote nodes.  The Pacemaker Administration 
document has all the details for how to set this up, but the quick 
overview is you create a secret key, put it on the client and cluster 
node, and then set up the right environment variables for Pacemaker to 
know where to look for the key.  You will still need to log in with a 
username and password, and there is some weirdness around this at the 
moment, which I am hoping to fix relatively soon.

* The remote-clear-port cluster property is deprecated and will be 
removed soon.  This property allows you to perform remote cluster 
administration with no encryption at all.  You still need to log in with 
a username and password, but that would happen in the clear.  We've 
suggested only using this on secure networks, but it's time to stop 
offering it at all.  Instead, use the remote-tls-port property which was 
introduced in 2014.

* Anonymous authentication for remote CIB administration is deprecated 
and will be removed soon.  This allowed you to perform remote cluster 
administration over an encrypted channel, but with no authentication on 
that channel. Instead, move to using TLS certificates or the new PSK 
support.

Of the two authentication methods (TLS certs and PSK), PSK is far easier 
to set up and is what I would suggest for the more casual user (if there 
any casual users of remote CIB administration).

- Chris



More information about the Users mailing list