-
Notifications
You must be signed in to change notification settings - Fork 102
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
why in BucketClass CRD, namespacePolicy.multi.writeResource is string #1150
Comments
At this point, we support a single write target for an NS bucket. |
With pleasure. We are using one object storage as single endpoint serving 200+ data scientists, data volume might be 10TB. Currently after reading noobaa CRD and prototyping, it looks like NamespaceStore + BucketClass + OBC fit our needs, except this multi write policy. |
Hi @nimrod-becker , |
Regarding local env, @dannyzaken @romayalon do we have something updated? Regarding the original question, you can set up replication between 2 NS buckets, this way you will achieve the same result of having the objects written to bucket1 also be in bucket2 (with a replication rule of bucket1 -> bucket2) |
@Alansyf by local development env, do you mean not in Kuberentes? let me know if this helps https://github.com/noobaa/noobaa-core/blob/master/docs/standalone.md |
Thinking about it further and consulting the team, I think that replication is the better way to go. |
@Alansyf I have a few questions regarding the multiple write targets:
|
Hi @dannyzaken , We think when I say
this means, this bucket policy allow user:
Now, i want allow user:
I am NOT meaning writeResources: ns1, ns4 --> write to both buckets; Our use case is, we are building a datalake platform which hosting around 8TB customer's data on storage. These 8TB data are separated by business. Around 500 data scientist will use this datalake, but they are coming from different team. Thus somewhere we need to define the access. We choose the gateway to define policy is because we have some technical difficulty / limitation from our internal S3-compatible storage. You can imaging what we need is a way to define something like, user / group/ roles(READ/WRITE) in database. |
Hi @dannyzaken , Also we tried the new way but also got problem as reported in #1150. Please let us know how we can move forward. Our plan to use noobaa is completed blocked due to not find solution for access control yet. |
Hi @dannyzaken , Can you please share anything? |
@Alansyf, Namespace buckets are not a mechanism to provide access control for external data sources. The main purpose of it (at least for multi-NS) is to aggregate multiple data source and present it as a single readable\writeable bucket. so, in your example:
you get a S3 bucket (let's call it you can also create a namespace bucket (
as for the second example
I'm trying to understand what you need. the bucket in this example will "contain" the objects in ns1, ns2, ns3, ns4, so a client can read through it. but what should happen on writes? |
@dannyzaken , I draw a diagram and hope you can get what i need. So in the diagram you can see, our py code will connect to your endpoint providing a secrets pair. |
Hi @dannyzaken , if you have any chance to take a look on this? |
Environment info
Actual behavior
noobaa-operator/deploy/crds/noobaa.io_bucketclasses_crd.yaml
Line 88 in ec7030e
Expected behavior
Then i can specify more namespacestore to allow write access.
The text was updated successfully, but these errors were encountered: