You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Jul 22, 2024. It is now read-only.
Copy file name to clipboardExpand all lines: workshop/Lab5/README.md
+29-25Lines changed: 29 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,4 +1,4 @@
1
-
# Object Storage with Kubernetes
1
+
# Object Storage with Kubernetes
2
2
3
3
## About Object Storage
4
4
@@ -7,52 +7,56 @@ In `object storage` or `Object-based Storage Devices (OSD)`, data is organized i
7
7
Object storage also provides programmatic interfaces (mostly RESTful APIs) to manipulate data for CRUD, versioning, replication, life-cycle management and data transfer. Applications don't need to go through an operating system's storage drivers to manipulate data, they simply send `get`, `put`, or `delete` requests to the storage system.
8
8
9
9
Object storage has the following benefits:
10
+
10
11
1. durable, built-in data integrity (e.g. in case of disk failure),
11
-
2. available, highly available via REST APIs at the manager layer,
12
-
3. scalable, in order of terabytes (TBs), petabytes (PBs), and greater, unavailable in file or block storage,
13
-
4. flexible, access from anywhere via REST APIs,
14
-
5. secure, encrypt at-rest and in-transit.
12
+
1. available, highly available via REST APIs at the manager layer,
13
+
1. scalable, in order of terabytes (TBs), petabytes (PBs), and greater, unavailable in file or block storage,
14
+
1. flexible, access from anywhere via REST APIs,
15
+
1. secure, encrypt at-rest and in-transit.
15
16
16
17
### Usage
17
18
18
-
Object storage is often used for handling large amounts of unstructured data, including email, video, photos, web pages, audio, sensor data and other types of media and web content, both textual and non-textual.
19
+
Object storage is often used for handling large amounts of unstructured data, including email, video, photos, web pages, audio, sensor data and other types of media and web content, both textual and non-textual.
19
20
20
21
Use cases are:
22
+
21
23
1. Disaster recovery (DR) and backup (BC),
22
-
2. AI and analytics, as a data lake in combination with Spark and Tensorflow,
23
-
3. cloud native, startups combining cost-effectiveness of cloud native with flexibility of object storage,
24
-
4. data archive, e.g. media files.
24
+
1. AI and analytics, as a data lake in combination with Spark and Tensorflow,
25
+
1. cloud native, startups combining cost-effectiveness of cloud native with flexibility of object storage,
26
+
1. data archive, e.g. media files.
25
27
26
28
### Standards
27
29
28
30
The International Committee for Information Technology Standards (INCITS) is an American standards organization for computer and communications standards. Its [T10 committee](http://www.t10.org) is devoted to Small Computer Systems Interface (SCSI) technology and this T10 committee has published 2 standards for Object-Based Storage Devices (OSD):
31
+
29
32
* Object-Based Storage Device Commands (OSD), INCITS 400-2004 (R2013), InterNational Committee for Information Technology Standards. Retrieved 8 November 2013.
30
33
* Object-Based Storage Devices - 2 (OSD-2), INCITS 458-2011 (R2016), InterNational Committee for Information Technology Standards. 15 March 2011. Retrieved 8 November 2013.
31
34
32
35
## About IBM Cloud Object Storage
33
36
34
37
The IBM Cloud Object Storage (COS) offers a few features that help secure your data. IBM Cloud Object Storage (COS) actively participates in several industry compliance programs and provides the following compliance, certifications, attestations, or reports as measure of proof:
35
-
- ISO 27001,
36
-
- PCI-DSS for Payment Card Industry (PCI) USA,
37
-
- HIPAA for Healthcare USA, (including administrative, physical, and technical safeguards required of Business Associates in 45 CFR Part 160 and Subparts A and C of Part 164),
38
-
- ISO 22301 Business Continuity Management,
39
-
- ISO 27017,
40
-
- ISO 27018,
41
-
- ISO 31000 Risk Management Principles,
42
-
- ISO 9001 Quality Management System,
43
-
- SOC1 Type 2 (SSAE 16), (System and Organization Controls 1),
44
-
- SOC2 Type 2 (SSAE 16), (System and Organization Controls 2),
45
-
- CSA STAR Level 1 (Self-Assessment),
46
-
- General Data Protection Regulation (GDPR) ready,
47
-
- Privacy shield certified.
38
+
39
+
* ISO 27001,
40
+
* PCI-DSS for Payment Card Industry (PCI) USA,
41
+
* HIPAA for Healthcare USA, (including administrative, physical, and technical safeguards required of Business Associates in 45 CFR Part 160 and Subparts A and C of Part 164),
42
+
* ISO 22301 Business Continuity Management,
43
+
* ISO 27017,
44
+
* ISO 27018,
45
+
* ISO 31000 Risk Management Principles,
46
+
* ISO 9001 Quality Management System,
47
+
* SOC1 Type 2 (SSAE 16), (System and Organization Controls 1),
48
+
* SOC2 Type 2 (SSAE 16), (System and Organization Controls 2),
49
+
* CSA STAR Level 1 (Self-Assessment),
50
+
* General Data Protection Regulation (GDPR) ready,
51
+
* Privacy shield certified.
48
52
49
53
At a high level, information on `IBM Cloud Object Storage (COS)` is encrypted, then dispersed across multiple geographic locations, and accessed over popular protocols like HTTP with a RESTful API.
50
54
51
-
`SecureSlice` distributes the data in slices across geo locations so that no full copy of data exists on any individual storage node, and automatically encrypts each segment of data before it is erasure coded and dispersed.
55
+
`SecureSlice` distributes the data in slices across geo locations so that no full copy of data exists on any individual storage node, and automatically encrypts each segment of data before it is erasure coded and dispersed.
52
56
53
-
The content can only be re-assembled through IBM Cloud’s `Accesser` technology at the client’s primary data center, where the data was originally received, and decrypted again by `SecureSlice`.
57
+
The content can only be re-assembled through IBM Cloud’s `Accesser` technology at the client’s primary data center, where the data was originally received, and decrypted again by `SecureSlice`.
54
58
55
-
`Data-in-place` or `data-at-rest` security is ensured when you persist database contents in IBM Cloud Object Storage.
59
+
`Data-in-place` or `data-at-rest` security is ensured when you persist database contents in IBM Cloud Object Storage.
56
60
57
61
You also have a choice to use integration capabilities with IBM Cloud Key Management Services like `IBM Key Protect` (using FIPS 140-2 Level 3 certified hardware security modules (HSMs)) and `Hyper Protect Crypto Services` (built on FIPS 140-2 Level 4-certified hardware) for enhanced security features and compliance.
You now have an Object Storage instance with a bucket, and have found the corresponding private endpoint for your Object Storage. Next, we can configure a Kubernetes cluster:
4
+
4
5
1. Create a New Namespace in your Cluster,
5
6
2. Create a Secret to Access the Object Storage,
6
7
7
8
## Create a New Namespace in your Cluster
8
9
9
10
1. Previously, you logged in to your personal account to create a free instance of IBM Cloud Object Storage (COS). If the cluster exists in a different account, make sure to to switch accounts and log in to the IBM Cloud where your cluster exists.
10
11
11
-
```
12
+
```console
12
13
ibmcloud login -u $IBM_ID
13
14
```
14
15
15
16
**Note:** if you use a single-sign-on provider, use the `-sso` flag.
16
17
17
18
2. If you needed to switch accounts, you will have logged in again, and when prompted to `Select an account`, this time, choose the account with your cluster. In the example below, I have to choose account number **2** from the list, `2. IBM Client Developer Advocacy (e65910fa61) <-> 1234567`,
18
19
19
-
```
20
+
```console
20
21
ibmcloud login -u b.newell2@remkoh.dev
21
22
API endpoint: https://cloud.ibm.com
22
23
Region: us-south
@@ -34,13 +35,13 @@ You now have an Object Storage instance with a bucket, and have found the corres
34
35
35
36
3. Retrieve your cluster information.
36
37
37
-
```
38
+
```console
38
39
ibmcloud ks clusters
39
40
```
40
41
41
-
outputs,
42
+
outputs,
42
43
43
-
```
44
+
```console
44
45
$ ibmcloud ks clusters
45
46
46
47
Name ID State Created Workers Location Version Resource Group Name Provider
@@ -49,30 +50,31 @@ You now have an Object Storage instance with a bucket, and have found the corres
49
50
50
51
4. Retrieve the name of your cluster, in this example, I set the name of the first cluster with index `0`,
5. **In your browser:** get the login command for your cluster:
58
-
1. Go to the IBM Cloud resources page at https://cloud.ibm.com/resources,
58
+
5. **In your browser:** get the login command for your cluster:
59
+
60
+
1. Go to the IBM Cloud resources page at https://cloud.ibm.com/resources,
59
61
Under `Clusters` find and select your cluster, and load the cluster overview page. There are two ways to retrieve the login command with token:
60
62
1. Click the `Actions` drop down next to the `OpenShift web console` button, and select `Connect via CLI`, in the pop-up window, click the `oauth token request page` link, or
61
-
2. Click `OpenShift web console` button, in the `OpenShift web console`, click your profile name, such as IAM#name@email.com, and then click `Copy Login Command`.
63
+
1. Click `OpenShift web console` button, in the `OpenShift web console`, click your profile name, such as IAM#name@email.com, and then click `Copy Login Command`.
0 commit comments