[ceph-users] Problem with radosgw-admin subuser rm
Hi -- I'm trying to remove a subuser but it's not removing the S3 keys when I pass in --purge-keys. First I create a sub-user: $ radosgw-admin subuser create --uid=smason --subuser='smason:test' \ --access=full --key-type=s3 --gen-secret subusers: [ { id: smason:test, permissions: full-control}], keys: [ { user: smason, access_key: B8D062SWPB560CBA3HHX, secret_key: snip}, { user: smason:test, access_key: ERKTY5JJ1H2IXE9T5TY3, secret_key: snip}], Then I try to remove the user and the keys: $ radosgw-admin subuser rm --subuser='smason:test' --purge-keys subusers: [], keys: [ { user: smason, access_key: B8D062SWPB560CBA3HHX, secret_key: snip}, { user: smason:test, access_key: ERKTY5JJ1H2IXE9T5TY3, secret_key: snip}], I'm running ceph version 0.80.5 (38b73c67d375a2552d8ed67843c8a65c2c0feba6). FWIW, I've observed the same behavior when I use the admin ops REST API. Let me know if I can provide any more information. Thanks in advance, ___ ceph-users mailing list ceph-users@lists.ceph.com http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com
Re: [ceph-users] Encryption/Multi-tennancy
Why not have the application encrypt the data or at the compute server's file system? That way you don't have to manage keys. Seth On Mar 9, 2014, at 6:09 PM, Mark s2c m...@stuff2cloud.commailto:m...@stuff2cloud.com wrote: Ceph is seriously badass, but my requirements are to create a cluster in which I can host my customer's data in separate areas which are independently encrypted, with passphrases which we as cloud admins do not have access to. My current thoughts are: 1. Create an OSD per machine stretching over all installed disks, then create a user-sized block device per customer. Mount this block device on an access VM and create a LUKS container in to it followed by a zpool and then I can allow the users to create separate bins of data as separate ZFS filesystems in the container which is actually a blockdevice striped across the OSDs. 2. Create an OSD per customer and use dm-crypt, then store the dm-crypt key somewhere which is rendered in some way so that we cannot access it, such as a pgp-encrypted file using a passphrase which only the customer knows. My questions are: 1. What are people's comments regarding this problem (irrespective of my thoughts) 2. Which would be the most efficient of (1) and (2) above? 3. As per (1), would it be easy to stretch a created block dev over more OSDs dynamically should we increase the size of one or more? Also, what if we had millions of customers/block devices? Any advice on the above would be deluxe. M ___ ceph-users mailing list ceph-users@lists.ceph.commailto:ceph-users@lists.ceph.com http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com ___ ceph-users mailing list ceph-users@lists.ceph.com http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com