19:01:41 #startmeeting swift 19:01:42 Meeting started Wed Feb 6 19:01:41 2013 UTC. The chair is notmyname. Information about MeetBot at http://wiki.debian.org/MeetBot. 19:01:43 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 19:01:45 The meeting name has been set to 'swift' 19:01:56 should be a pretty short meeting, I think 19:02:04 at least I don't have much on my agenda to talk about 19:02:37 1) is encryption in the scope of swift? 2) docs / copyright 3) any patches need considering 19:02:53 and at the end, torgomatic has volunteered to answer all your questions about global clusters 19:03:11 #topic is encryption in the scope of swift? 19:03:44 ok, there have been some mailing list threads and ideas floating around about adding various flavors of encryption to swift 19:04:05 I think having tools or client librarie making it maybe easier to encrypt bfore uploading to swift would be more in scope 19:04:26 there are 2 use cases that I know of: users don't want anyone to read their data and deployers want to easily recycle drives by simply throwing away a key 19:04:44 dmcrypt is good for the second one 19:05:09 We've had at least one hard requirement from a customer deploying Swift for encryption of data, but only at rest; that was solved with disk-level encryption out-of-band to Swift 19:05:11 if adding encryption in the server side, we need key management 19:05:14 does anyone want to argue in favor of either of these being in scope for swift itself (ie should there be code in swift's codebase that handles this)? 19:05:15 yep, dm-crypt or luks or something else underneath Swift 19:05:15 yeah that or luks 19:06:06 so does that mean we all agree that encryption should be out-of-band to swift itself? 19:06:19 I'm perfectly happy with keeping encryption (and the associated problems and complexity which come with key management) outside the scope of Swift 19:06:20 +1 to out 19:06:27 Push that stuff out to deployments 19:06:43 (IOW +1 to out) 19:06:45 +1 to encryption being outside the scope of Swift 19:06:54 buy a drive shredder 19:07:09 redbo: or a ball-peen hammer ;-) 19:07:21 How would you shred only files form one customer? 19:07:40 davidha: that data is spread out over all drives in the entire cluster 19:07:50 why would I need to shred one customer's files? 19:08:13 Right, this is a real use case for server side encryption. 19:08:42 "this"? the user use case or the deployer use case? 19:08:44 Let's not pretend that encrypting data at rest and possibly in-flight as well are not valid requirements for an object storage system. The question is whether that use-case should be satisfied by code in Swift or not. 19:08:55 swifterdarrell: exactly 19:09:38 I think Swift should enable it - we at least need to see that one can add it to Swift 19:09:52 davidha: what is "it"? 19:10:05 It being server side encryption 19:10:14 davidha: full drive encryption or encryption of the object data? 19:10:18 It is possible it can be done as a middleware ... :) 19:10:42 encr of the object data by a per user key 19:11:10 davidha: so that the deployer then has access to both the encrypted data and the key? what use case does that solve? 19:11:31 notmyname: Shreding of data whne the user leaves 19:11:54 I need to go deaper on that 19:12:11 I will ask the team here, lets leave that to next meeting 19:12:25 who's that serving, the user or the provider? 19:12:47 that's going bad for performances for both 19:13:26 ok. for now it looks like we are agreed that encryption should stay outside of swift, unless there is another use case that cannot be efficiently implemented in middleware 19:13:40 Agreed 19:14:05 #agreed that encryption should stay outside of swift 19:14:24 #topic docs and copyright 19:15:09 just as an FYI, as I've been looking at some of the docs lately (like the SAIO and multinode install instructions), it seems that they are getting somewhat dated 19:15:32 if you are looking for something to do in your free time (hah!), re-reading the docs is a good place to start 19:15:45 this applies as much to me as anyone 19:15:49 just wanted to bring it up 19:16:05 (or get the newcommers in your company to do it while learning swift 8-)) 19:16:11 heh 19:16:19 chmouel: aren't you the newcomer in your company? 19:16:21 :-) 19:16:27 haha 19:16:55 annegentle proposed a patch that mentions copyright (https://review.openstack.org/#/c/18889/). looks like there may be a little more clarification needed (as per the comments) 19:17:09 but review the http://wiki.openstack.org/Documentation/Copyright page 19:17:47 also, I've heard that we should stop assigning copyright to openstack (btw, openstack llc doesn't exist any more) and should be keeping it for whatever company you work for 19:17:48 (I hate to be annoying, but if we got legal guidance, we might as well follow all of it.) 19:18:38 #topic patches? 19:18:54 are there any patches that we need to discuss in here that can't be handled in gerrit comments? 19:19:10 https://review.openstack.org/#/q/status:open+swift,n,z 19:19:35 I would like to see account qouta as an enhancement to the container one - seem to be trivial enhancement 19:19:57 I can work on this unless this is already being worked on 19:19:59 davidha: yeah i can do that since we are going to use it 19:20:30 cool 19:20:54 redbo: any big reason not to extend your container quotas to handle entire accounts? 19:21:26 patches welcomed, perhaps? There's at least one account quota middleware floating around outside Swift (don't have link handy) 19:21:42 #link https://github.com/cschwede/swquota 19:22:00 I think it should be a single middleware doing both 19:22:00 chmouel: thanks! 19:22:42 #link https://github.com/AlexYangYu/StackLab-swift/tree/dev-quota 19:22:49 chmouel: davidha: I look forward to seeing your patches :-) 19:22:56 Not that I know of. It just wasn't a use case we had. 19:22:57 and last one 19:23:02 #link https://github.com/chmouel/swift-quota 19:23:14 (it actually works need to update the README) 19:23:25 I'm happy having two middlewares with different names which differentiate their different behavior (most importantly that container quotas are mostly voluntary and account quotas would presumably be most useful to resellers enforcing restrictions on customers); but that assesment of the use-cases could be biased/inaccurate. 19:24:19 Why would that make more sense? A single quota middleware will not be less efficient if only container quota is used 19:24:25 I think having them merged would make more sense 19:24:43 IOW, I think if two things both implement "quotas" but they're substantially different, they needn't be implemented in one piece of code/middleware 19:24:44 it may be confusing for deployers and it's not much of biggie to have the two 19:25:01 as much as I enjoy long pipelines..... this is becoming too long :) 19:25:08 chmouel: really? _this_ is what will be confusing to deployers about swift? ;-) 19:25:09 we could call them user_quotas and provider_quotas or something 19:25:20 notmyname: good point :) 19:25:21 or deployer_quotas 19:25:24 redbo: +1 19:25:35 redbo: +1 19:26:17 and a nice quota.txt explaining the difference between the two :) 19:26:22 .rst 19:26:40 I would guess userrs would expect both to work together and be aligned, and the performance of both will be affected 19:26:44 so -1 for me 19:27:15 let's carry this on in the gerrit comments on the patch that comes in 19:27:35 #topic other 19:27:53 anything else need to be brought up today? 19:28:08 Is there any work on one of the following topics: 19:28:16 Metadata, search 19:28:17 ? 19:28:52 I wanted to point out that I got a lot of positive comments last week at linux conf australia. people like the stuff you all are working on. good job :-) 19:29:14 davidha: you mean metadata beyond Swift's existing support for account/container/object metadata? 19:29:16 davidha: softlayer has a metadata search feature using an external system for their swift cluster 19:29:16 i think the guys of keystone v3 want to talk more about swift 19:29:24 umm I have a branch somewhere where I just stuck a fts3 table in the container db and indexed metadata 19:29:25 swift integration i mean with ACL 19:29:30 torgomatic: yep 19:30:03 chmouel: right, I know of a change needed to support v3 also 19:30:22 chmouel: they can define whatever they want. the ACL tokens are opaque to swift, and the only thing that needs possibly updating is the keystoneauth middleware in swift. if they decide to change things, they'll have to accound for a migration path, of course 19:30:43 is v3 supported ? : p 19:30:54 zykes-: does v3 exist? ;-) 19:30:58 We may need to add domain id as a MD for containers 19:31:02 notmyname: yep that's correct, it just has to be to authorize to whatever acl they are giving to us by auth_token 19:31:38 Since there is not another hirarchy in v3, we would need to add some support for it to work 19:31:58 I don't think I would like much if they are taking in account migration (we have a large v2 swift/keystone cluster here) 19:32:07 if they are not 19:32:17 doesn't it in G notmyname ? :) 19:32:37 zykes-: I'm just half joking. I thought they were still defining it 19:32:59 from the discussion on the ml they seem so 19:33:08 (i.e: making email attr compulsory) 19:33:28 chmouel: but that shouldn't change anything in swift, from what I could tell 19:33:56 if they decide to give tenant_email instead of tenant_id 19:34:07 that would get difficult for migration 19:34:37 so accounts would look like /v1.0/AUTH_#{tenant_email} ? 19:34:46 a user gives X to keystone in order to get back a token and and endpoint. swift's middleware then give the request and the token to keystone for authorization. I don't see what changes 19:35:09 notmyname: v3 apparantly has a goal to be fully implemented in G 19:35:15 notmyname: as long as the endpoint is immutable, that's true 19:35:15 torgomatic: I think he just means for acls 19:35:16 torgomatic: that's what i am worried about will clarify with those guys 19:35:17 fyi :) 19:35:24 they can redefine how they are passing out the endpoints all they want, but you can't do that for existing data 19:36:09 redbo: I hope you're right 19:37:41 chmouel: you've got an existing keystone v2 cluster. when you get a clarifying answer, can you let me know what you find out? (I thought this had been settled on the ML) 19:38:15 notmyname: yep will do 19:38:19 As far as I understand it, there is an additional hirarchy - this mean that you may have the same "account name" in two different domains - we would therfore need to store another attribute as a system MD being the domain id to which the account belong to 19:38:20 thanks 19:38:58 we have accounts, keystone can delegate access to those however it wants 19:39:32 redbo, the previous mapping betweeing users and account no longer stanbd 19:41:05 I expect to see a blueprint on that soon that will elaboarte on how it can be done, than we can discuss issues it may bring 19:41:24 there's been a huge mailing list discussion 19:41:48 let's see what chmouel comes back with 19:41:50 anything else that needs to be brought up today? 19:42:22 if anyone has spare review time, the multi-range GET patch for segmented objects could use some eyeballs 19:42:44 it's the oldest in the review queue, and it's been resurrected at least once 19:43:10 ok 19:43:25 next meeting is in two weeks 19:43:29 #endmeeting