Great... thanks Larry. On Tue, Feb 19, 2019 at 11:33 AM larry mccay <lmc...@apache.org> wrote:
> Hi Rob - > > Thanks for your thoughts and insights into the KnoxSSO/KnoxToken signing > keys and how they should align with the TLS management improvements that > you are working on. > These details should be captured in any related KIPs/JIRAs. > > In essence, we are moving actual PKI use of keystores away from the master > secret and related assumptions but continue to support them for backward > compatibility. > This will provide easier integration with external management and > provisioning tooling - so I think it makes sense. > > As for the scope of the 1.3.0 release, it will no doubt be a subset of the > listed categories and issues that I outlined in this thread. > I wanted to capture as much as I could for the creation of KIP one-pagers > that can be used to align like work across releases. > We will then select the subset of work from the KIPs that can be > accomplished in the timeframe and/or adjust the timeframe. > > Make sense? > > thanks, > > --larry > > On Mon, Feb 18, 2019 at 12:41 PM Robert Levas <rle...@cloudera.com.invalid > > > wrote: > > > Larry... > > > > Being new to the project, I do not have much to contribute related to the > > changes for 1.3.0; however, this seems like a pretty large list of items. > > Mid-April seems optimistic to me, but then again I am new to the team and > > not sure how quickly we work. That said, I am up for the challenge. > > > > One thing to note on the SSO items is that Knox may need some cleanup on > > how the signing key is configured. The current set of configuration > > properties used to declare where to find it is lacking and assumes that > the > > decryption keys for the keystore and key are the master key (with a > little > > hack in there to customize password for the key). I think this should be > > more consistent with how the custom identity and trust store locations > > facility will work.. and maybe even utilize some of the work related to > > syncing the master key (*Management Improvements/ Master Secret > > synchronization across instances*) to also sync the signing key when > > multiple instances are involved. However, this could be work that pushes > > us over the mid-April target. > > > > Thanks... > > Rob > > > > > > On Fri, Feb 15, 2019 at 10:01 PM Phil Zampino <pzamp...@apache.org> > wrote: > > > > > Thanks for collecting this comprehensive list of improvements. Many of > > > these things have been on the “wish list” for a while now, and it would > > be > > > great to get them done. > > > > > > I’ll see if I can write up some KIP content and/or one-pagers to > propose > > > some details for some of this work. Then we can discuss in more detail, > > and > > > define some specific tasks/Jira issues. > > > > > > I think shooting for a release mid-April is a good goal, even if we > can’t > > > complete the list exhaustively. > > > > > > Thanks again, > > > Phil > > > > > > On Tue, Feb 12, 2019 at 3:51 PM larry mccay <lmc...@apache.org> wrote: > > > > > > > All - > > > > > > > > I'd like to officially start the planning for the 1.3.0 release of > > Apache > > > > Knox. > > > > > > > > After looking at the list of outstanding JIRAs with fixVersion of > > 1.3.0, > > > > existing KIPs and considering requirements for a more containerized > and > > > > cloud oriented world, I have a like of general categories: > > > > > > > > * TLS Improvements > > > > - Configurable Keystore Location and Password > > > > - Configurable Truststore Location and Password > > > > - Mutual Auth SSL truststores and client certs keystores > > > > - Dynamic keystore/truststore loading > > > > * Must keep in mind the KnoxCLI for create-cert, export-cert > > > > > > > > * Management Improvements > > > > There have been a number of people asking about the following and > they > > > are > > > > all encountering similar pain - whether it be from a containerization > > > > context, DevOps or management tool, perspective a number of these are > > > > painful today for Knox admins. > > > > - Eliminate needs to have access to the Knox machines > > > > - Bootstrap config for log locations, pids, env variable > overrides, > > > etc > > > > - Remote access to public certs (for SSL and for various > signature > > > > verification(knoxtoken, knoxsso, etc)) > > > > - UI for Alias Management > > > > - Surface logs in UI(maybe?) and API > > > > - Master Secret synchronization across instances > > > > - Service Discovery from new source/s > > > > - new Remote Config Monitor source/s > > > > - new Remote Alias Service for Vault > > > > > > > > * SSO > > > > Easing the configuration required to enable all of the participating > > > > applications for KnoxSSO across a deployment will be important in > > general > > > > but being able to more easily provision this for cloud deployments > will > > > be > > > > key. > > > > - IDP Initiated Flow with Landing Page (Okta portal page) > > > > - challenge - particpating apps are configured for a single > IDP > > > > - Landing Page is like Okta - with links to UIs - how do we > > deal > > > > with multiple topologies > > > > - KnoxSSOut - logout from landing page > > > > - Keycloak? > > > > - Add a standard integration pattern for SPs to register with > > > KnoxSSO - > > > > like SAML? > > > > - Azure AD with OAuth/OpenID Connect > > > > - Internal hostnames vs external for cookie domain > > > > - IDP metadata file for SPs to pull KnoxSSO public cert and any > > other > > > > details from an endpoint > > > > > > > > * Performance > > > > Performance is an ongoing item but deployment scenarios for cloud and > > > > hybrid may introduce new strategies for things like load balancing in > > > front > > > > of and behind the Knox gateway. > > > > - LoadBalancing from dispatch > > > > - HA provider config? > > > > - service specific > > > > - Hive cookie - sticky sessions > > > > - Knox HA story requires sticky sessions > > > > - TLS Options > > > > - Sizing Guidelines > > > > - JVM tuning > > > > - number of instances based on anticipated load (services > need > > to > > > > be taken into account) > > > > > > > > * KnoxShell > > > > As deployments move more and more to the cloud and/or hybrid > > > combinations, > > > > the need to SSH to a gateway machine becomes more and more awkward. > If > > we > > > > can provide a powerful enough scripting experience for Data > Worker/ETL > > > type > > > > roles, we will be able to limit the need to SSH. > > > > - Remote CLI classes > > > > - ETL Usecase Classes > > > > - Livy classes > > > > > > > > * KnoxCLI > > > > - return error codes rather than throwing exception and always > > > > returning zero > > > > > > > > Many of our 1.3.0 JIRAs fall into one or more of the above > categories. > > > > There are also quite a few of dispatch related issues filed. > > > > > > > > I realize that is a rather large list and a mixed back of category > and > > > > detail in places. > > > > > > > > I think that we need to write up a couple KIPs to encompass the work > > > above > > > > that we would like to tackle in 1.3.0 and then identify/file JIRAs to > > > > represent the work. > > > > We will need to carefully manage scope in order to get this done but > > > > articulating this roadmap with some new KIP pages will help 1.3.0 and > > > > future releases. > > > > Thoughts? > > > > > > > > As for timeline, I am thinking that mid-April may feel appropriate. > > > > Thoughts? > > > > > > > > thanks, > > > > > > > > --larry > > > > > > > > > >