Hello,
As a part of performance/HW utilization testing I would like to compare how a
VM with single RGW instance compares to a VM with 2 or more colocated RGWs.
I’m deploying Quincy using Ansible but I’m struggling with setting the config
to use the same port across all RGW instances, but to ha
Hi everyone,
Is there any advices, best practices for a Citrix ADC VIP configuration in
front of a dual RadosGW (same zone) ?
I find many documentations for HAProxy but nothing for this hardware.
For information, the CEPH cluster version is Pacific 16.2.10.
Thanks for your help.
Regards,
Hube
Someone who's got data regarding this should file a bug report, it sounds like
a quick fix for defaults if this holds true.
On Sat, May 20, 2023, at 00:59, Hector Martin wrote:
> On 17/05/2023 03.07, 胡 玮文 wrote:
>> Hi Sake,
>>
>> We are experiencing the same. I set “osd_mclock_cost_per_byte_usec
Dear Alexander,
Thanks a lot for helpful comments and insights. Regarding CephFS and RGW, Per
user seems to be daunting and complex.
What if encryption on the server side without per user requirment? would it be
relatively easy to achieve, and how?
best regards,
Samuel
huxia...@horebdat
rgw supports the 3 flavors of S3 Server-Side Encryption, along with
the PutBucketEncryption api for per-bucket default encryption. you can
find the docs in https://docs.ceph.com/en/quincy/radosgw/encryption/
On Mon, May 22, 2023 at 10:49 AM huxia...@horebdata.cn
wrote:
>
> Dear Alexander,
>
> Tha
On 5/21/23 15:44, Alexander E. Patrakov wrote:
Hello Samuel,
On Sun, May 21, 2023 at 3:48 PM huxia...@horebdata.cn
wrote:
Dear Ceph folks,
Recently one of our clients approached us with a request on encrpytion per
user, i.e. using individual encrytion key for each user and encryption files
Hi, Stefan,
Thanks a lot for the message. It seems that client-side encryption (or per use)
is still on the way and not ready yet for today.
Are there practical methods to implement encryption for CephFS with today'
technique? e.g using LUKS or other tools?
Kind regards,
Samuel
huxia..
Hi Felix,
On Sat, May 13, 2023 at 9:18 AM Stolte, Felix wrote:
>
> Hi Patrick,
>
> we have been running one daily snapshot since december and our cephfs crashed
> 3 times because of this https://tracker.ceph.com/issues/38452
>
> We currentliy have 19 files with corrupt metadata found by your
>
On Mon, May 15, 2023 at 8:55 AM Stefan Kooman wrote:
>
> On 12/15/22 15:31, Stolte, Felix wrote:
> > Hi Patrick,
> >
> > we used your script to repair the damaged objects on the weekend and it
> > went smoothly. Thanks for your support.
> >
> > We adjusted your script to scan for damaged files on
Hi Conrad,
On Wed, May 17, 2023 at 2:41 PM Conrad Hoffmann wrote:
>
> On 5/17/23 18:07, Stefan Kooman wrote:
> > On 5/17/23 17:29, Conrad Hoffmann wrote:
> >> Hi all,
> >>
> >> I'm having difficulties removing a CephFS volume that I set up for
> >> testing. I've been through this with RBDs, so I
Hm, this thread is confusing
in the context of S3 client-side encryption means - the user is responsible
to encrypt the data with their own keys before submitting it. As far as I'm
aware, client-side encryption doesn't require any specific server support -
it's a function of the client SDK used whi
We're on 17.2.5 and had the default value (5.2), but changing it didn't
seem to impact recovery speed:
root@rdx-00:/# ceph config get osd osd_mclock_cost_per_byte_usec_hdd
5.20
root@rdx-00:/# ceph config show osd.0 osd_op_queue
mclock_scheduler
root@rdx-00:/# ceph config set osd osd_mclock_cos
Indeed, the question is on server-side encryption with keys managed by ceph on
a per-user basis
From: Christian Wuerdig
Date: 2023-05-23 00:51
To: huxia...@horebdata.cn
CC: Stefan Kooman; ceph-users
Subject: Re: [ceph-users] Re: Encryption per user Howto
Hm, this thread is confusing
in the co
13 matches
Mail list logo