UID/GID Mapping: Difference between revisions
Jump to navigation
Jump to search
KenRawlings (talk | contribs) (adding opensfs contract resources section) |
(→Introduction: add newer features of Nodemaps) |
||
(4 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
=== Introduction === | === Introduction === | ||
Using Nodemap, UIDs and | Using Nodemap, UIDs, GIDs and PROJIDs provided by remote clients can be mapped onto a local set of UIDs, GIDs and PROJIDs for storage in the filesystem. Non-overlapping ranges of UID, GID, PROJID would be used from the filesystem to cater to different subsets of users. | ||
mapped onto a local set of UIDs and | |||
The Nodemap functionality also allows restricting client sub-groups to mount only a specific subdirectory tree of the filesystem, rather than the whole filesystem (Subdirectory Mount). | |||
* You need to prevent UID and | You may find Nodemaps useful if: | ||
* Two or more partner organizations would like to share data | |||
* You need to prevent UID, GID, and PROJID collisions between clients in different administrative domains | |||
* Two or more partner organizations would like to share data in the same filesystem | |||
* You can limit access from a partner site | * You can limit access from a partner site | ||
* You can limit administrator/root access to the filesystem | |||
* Force clients to mount the filesystem read-only | |||
* Specifying a subdirectory for clients (e.g. multi-tenancy) | |||
* Selectively enable audit logging for clients | |||
* Selectively enable client-side data encryption | |||
== Resources == | == Resources == | ||
* [https://jira. | * [https://jira.whamcloud.com/browse/LU-3291 IU UID/GID Mapping Feature (LU-3291)] | ||
* [http://wiki.opensfs.org/Contract_SFS-DEV-002 OpenSFS Contract SFS-DEV-002] | * [http://wiki.opensfs.org/Contract_SFS-DEV-002 OpenSFS Contract SFS-DEV-002] | ||
** [http://wiki.opensfs.org/File:UID_GID_Scope_Statement_v2.pdf UID-GID Scope Statement v2] | ** [http://wiki.opensfs.org/File:UID_GID_Scope_Statement_v2.pdf UID-GID Scope Statement v2] | ||
Line 18: | Line 24: | ||
== Presentations == | == Presentations == | ||
* [https://wiki.lustre.org/images/5/5c/LUG2018-Multitenancy-Buisson.pdf Multi-tenancy: real-life implementation (LUG 2018)] | |||
* [http://lustre.ornl.gov/ecosystem-2016/documents/tutorials/Simms-IU-NodemapSharedKey.pdf Securing Lustre with Nodemap and Shared Key (Lustre Ecosystem 2016)] | * [http://lustre.ornl.gov/ecosystem-2016/documents/tutorials/Simms-IU-NodemapSharedKey.pdf Securing Lustre with Nodemap and Shared Key (Lustre Ecosystem 2016)] | ||
* [http://cdn.opensfs.org/wp-content/uploads/2015/04/GSS-Shard-key-Update-and-Using-UID_Simms.pdf Using UID Mapping in Lustre 2.7 and GSS Shared Key Update (LUG 2015)] | * [http://cdn.opensfs.org/wp-content/uploads/2015/04/GSS-Shard-key-Update-and-Using-UID_Simms.pdf Using UID Mapping in Lustre 2.7 and GSS Shared Key Update (LUG 2015)] | ||
[[Category:Features]] | [[Category:Features]] |
Latest revision as of 11:15, 6 April 2023
Introduction
Using Nodemap, UIDs, GIDs and PROJIDs provided by remote clients can be mapped onto a local set of UIDs, GIDs and PROJIDs for storage in the filesystem. Non-overlapping ranges of UID, GID, PROJID would be used from the filesystem to cater to different subsets of users.
The Nodemap functionality also allows restricting client sub-groups to mount only a specific subdirectory tree of the filesystem, rather than the whole filesystem (Subdirectory Mount).
You may find Nodemaps useful if:
- You need to prevent UID, GID, and PROJID collisions between clients in different administrative domains
- Two or more partner organizations would like to share data in the same filesystem
- You can limit access from a partner site
- You can limit administrator/root access to the filesystem
- Force clients to mount the filesystem read-only
- Specifying a subdirectory for clients (e.g. multi-tenancy)
- Selectively enable audit logging for clients
- Selectively enable client-side data encryption