There isn't a Ceph client for Windows, but there are two options for integrating Ceph and Windows: the Ceph Gateway...
or the iSCSI target in SUSE Enterprise Storage.
Open source Ceph storage is Linux-based. As a result, the default Ceph client options are focused on Linux. The RADOS Block Device offers a Linux kernel-level driver, so it won't help you integrate Ceph with Windows. CephFS is a POSIX file system that doesn't enable easy implementation on Windows either.
But the Ceph Gateway offers RESTful access to applications. It is compatible with Amazon Simple Storage Service, as well as OpenStack Swift, and you can easily access the Ceph Gateway directly from RESTful client applications. This method is meant to enable access to applications; it's not the best way to deliver access to an operating system.
Without a Ceph client, the easiest way to provide transparent access to Ceph from Windows is the Ceph iSCSI Gateway, which is available in SUSE's Ceph-based Enterprise Storage product. Using this gateway lets you configure Ceph as an iSCSI-based SAN, which makes it available for any operating system that runs an iSCSI initiator. The iSCSI Initiator is native to Windows server operating systems, which makes the iSCSI gateway the best way to connect Windows to Ceph.
After configuring the iSCSI Initiator on Windows to the iSCSI target that's offered through the Ceph gateway, Windows will have access to the Ceph storage by means of a locally added iSCSI disk.
Comparing Gluster and Ceph
Is object storage right for virtual environments?
HCI, containers next up for Red Hat Gluster, Ceph
Dig Deeper on Solid-state storage
Related Q&A from Sander van Vugt
Containers in the data center can help maximize server capacity, but there are a few things to consider before a Docker or Kubernetes implementation. Continue Reading
File management is an essential part of working within Linux. Knowing a few basic commands makes it easier to move content and avoid file ... Continue Reading
Linux has a security framework with multiple layers, which makes it hard to maintain permissions and privileges. User-based profiles and whitelisting... Continue Reading