]> git.proxmox.com Git - ceph.git/blame - ceph/doc/radosgw/admin.rst
Import ceph 15.2.8
[ceph.git] / ceph / doc / radosgw / admin.rst
CommitLineData
7c673cae
FG
1=============
2 Admin Guide
3=============
4
5Once you have your Ceph Object Storage service up and running, you may
6administer the service with user management, access controls, quotas
7and usage tracking among other features.
8
9
10User Management
11===============
12
13Ceph Object Storage user management refers to users of the Ceph Object Storage
14service (i.e., not the Ceph Object Gateway as a user of the Ceph Storage
15Cluster). You must create a user, access key and secret to enable end users to
16interact with Ceph Object Gateway services.
17
18There are two user types:
19
20- **User:** The term 'user' reflects a user of the S3 interface.
21
22- **Subuser:** The term 'subuser' reflects a user of the Swift interface. A subuser
23 is associated to a user .
24
f91f0fd5
TL
25.. ditaa::
26 +---------+
7c673cae
FG
27 | User |
28 +----+----+
29 |
30 | +-----------+
31 +-----+ Subuser |
32 +-----------+
33
34You can create, modify, view, suspend and remove users and subusers. In addition
35to user and subuser IDs, you may add a display name and an email address for a
36user. You can specify a key and secret, or generate a key and secret
37automatically. When generating or specifying keys, note that user IDs correspond
38to an S3 key type and subuser IDs correspond to a swift key type. Swift keys
39also have access levels of ``read``, ``write``, ``readwrite`` and ``full``.
40
41
42Create a User
43-------------
44
45To create a user (S3 interface), execute the following::
46
47 radosgw-admin user create --uid={username} --display-name="{display-name}" [--email={email}]
48
49For example::
50
51 radosgw-admin user create --uid=johndoe --display-name="John Doe" --email=john@example.com
52
53.. code-block:: javascript
54
55 { "user_id": "johndoe",
56 "display_name": "John Doe",
57 "email": "john@example.com",
58 "suspended": 0,
59 "max_buckets": 1000,
7c673cae
FG
60 "subusers": [],
61 "keys": [
62 { "user": "johndoe",
63 "access_key": "11BS02LGFB6AL6H1ADMW",
64 "secret_key": "vzCEkuryfn060dfee4fgQPqFrncKEIkh3ZcdOANY"}],
65 "swift_keys": [],
66 "caps": [],
67 "op_mask": "read, write, delete",
68 "default_placement": "",
69 "placement_tags": [],
70 "bucket_quota": { "enabled": false,
71 "max_size_kb": -1,
72 "max_objects": -1},
73 "user_quota": { "enabled": false,
74 "max_size_kb": -1,
75 "max_objects": -1},
76 "temp_url_keys": []}
77
78Creating a user also creates an ``access_key`` and ``secret_key`` entry for use
79with any S3 API-compatible client.
80
81.. important:: Check the key output. Sometimes ``radosgw-admin``
82 generates a JSON escape (``\``) character, and some clients
83 do not know how to handle JSON escape characters. Remedies include
84 removing the JSON escape character (``\``), encapsulating the string
85 in quotes, regenerating the key and ensuring that it
86 does not have a JSON escape character or specify the key and secret
87 manually.
88
89
90Create a Subuser
91----------------
92
93To create a subuser (Swift interface) for the user, you must specify the user ID
94(``--uid={username}``), a subuser ID and the access level for the subuser. ::
95
96 radosgw-admin subuser create --uid={uid} --subuser={uid} --access=[ read | write | readwrite | full ]
97
98For example::
99
100 radosgw-admin subuser create --uid=johndoe --subuser=johndoe:swift --access=full
101
102
103.. note:: ``full`` is not ``readwrite``, as it also includes the access control policy.
104
105.. code-block:: javascript
106
107 { "user_id": "johndoe",
108 "display_name": "John Doe",
109 "email": "john@example.com",
110 "suspended": 0,
111 "max_buckets": 1000,
7c673cae
FG
112 "subusers": [
113 { "id": "johndoe:swift",
114 "permissions": "full-control"}],
115 "keys": [
116 { "user": "johndoe",
117 "access_key": "11BS02LGFB6AL6H1ADMW",
118 "secret_key": "vzCEkuryfn060dfee4fgQPqFrncKEIkh3ZcdOANY"}],
119 "swift_keys": [],
120 "caps": [],
121 "op_mask": "read, write, delete",
122 "default_placement": "",
123 "placement_tags": [],
124 "bucket_quota": { "enabled": false,
125 "max_size_kb": -1,
126 "max_objects": -1},
127 "user_quota": { "enabled": false,
128 "max_size_kb": -1,
129 "max_objects": -1},
130 "temp_url_keys": []}
131
132
133Get User Info
134-------------
135
136To get information about a user, you must specify ``user info`` and the user ID
137(``--uid={username}``) . ::
138
139 radosgw-admin user info --uid=johndoe
140
141
142
143Modify User Info
144----------------
145
146To modify information about a user, you must specify the user ID (``--uid={username}``)
147and the attributes you want to modify. Typical modifications are to keys and secrets,
148email addresses, display names and access levels. For example::
149
150 radosgw-admin user modify --uid=johndoe --display-name="John E. Doe"
151
9f95a23c 152To modify subuser values, specify ``subuser modify``, user ID and the subuser ID. For example::
7c673cae 153
9f95a23c 154 radosgw-admin subuser modify --uid=johndoe --subuser=johndoe:swift --access=full
7c673cae
FG
155
156
157User Enable/Suspend
158-------------------
159
160When you create a user, the user is enabled by default. However, you may suspend
161user privileges and re-enable them at a later time. To suspend a user, specify
162``user suspend`` and the user ID. ::
163
164 radosgw-admin user suspend --uid=johndoe
165
166To re-enable a suspended user, specify ``user enable`` and the user ID. ::
167
168 radosgw-admin user enable --uid=johndoe
169
170.. note:: Disabling the user disables the subuser.
171
172
173Remove a User
174-------------
175
176When you remove a user, the user and subuser are removed from the system.
177However, you may remove just the subuser if you wish. To remove a user (and
178subuser), specify ``user rm`` and the user ID. ::
179
180 radosgw-admin user rm --uid=johndoe
181
182To remove the subuser only, specify ``subuser rm`` and the subuser ID. ::
183
184 radosgw-admin subuser rm --subuser=johndoe:swift
185
186
187Options include:
188
189- **Purge Data:** The ``--purge-data`` option purges all data associated
190 to the UID.
191
192- **Purge Keys:** The ``--purge-keys`` option purges all keys associated
193 to the UID.
194
195
196Remove a Subuser
197----------------
198
199When you remove a sub user, you are removing access to the Swift interface.
200The user will remain in the system. To remove the subuser, specify
201``subuser rm`` and the subuser ID. ::
202
203 radosgw-admin subuser rm --subuser=johndoe:swift
204
205
206
207Options include:
208
209- **Purge Keys:** The ``--purge-keys`` option purges all keys associated
210 to the UID.
211
212
213Add / Remove a Key
214------------------------
215
216Both users and subusers require the key to access the S3 or Swift interface. To
217use S3, the user needs a key pair which is composed of an access key and a
218secret key. On the other hand, to use Swift, the user typically needs a secret
219key (password), and use it together with the associated user ID. You may create
220a key and either specify or generate the access key and/or secret key. You may
221also remove a key. Options include:
222
223- ``--key-type=<type>`` specifies the key type. The options are: s3, swift
224- ``--access-key=<key>`` manually specifies an S3 access key.
225- ``--secret-key=<key>`` manually specifies a S3 secret key or a Swift secret key.
11fdf7f2
TL
226- ``--gen-access-key`` automatically generates a random S3 access key.
227- ``--gen-secret`` automatically generates a random S3 secret key or a random Swift secret key.
7c673cae
FG
228
229An example how to add a specified S3 key pair for a user. ::
230
231 radosgw-admin key create --uid=foo --key-type=s3 --access-key fooAccessKey --secret-key fooSecretKey
232
233.. code-block:: javascript
234
235 { "user_id": "foo",
236 "rados_uid": 0,
237 "display_name": "foo",
238 "email": "foo@example.com",
239 "suspended": 0,
240 "keys": [
241 { "user": "foo",
242 "access_key": "fooAccessKey",
243 "secret_key": "fooSecretKey"}],
244 }
245
246Note that you may create multiple S3 key pairs for a user.
247
248To attach a specified swift secret key for a subuser. ::
249
250 radosgw-admin key create --subuser=foo:bar --key-type=swift --secret-key barSecret
251
252.. code-block:: javascript
253
254 { "user_id": "foo",
255 "rados_uid": 0,
256 "display_name": "foo",
257 "email": "foo@example.com",
258 "suspended": 0,
259 "subusers": [
260 { "id": "foo:bar",
261 "permissions": "full-control"}],
262 "swift_keys": [
263 { "user": "foo:bar",
264 "secret_key": "asfghjghghmgm"}]}
265
266Note that a subuser can have only one swift secret key.
267
268Subusers can also be used with S3 APIs if the subuser is associated with a S3 key pair. ::
269
270 radosgw-admin key create --subuser=foo:bar --key-type=s3 --access-key barAccessKey --secret-key barSecretKey
271
272.. code-block:: javascript
273
274 { "user_id": "foo",
275 "rados_uid": 0,
276 "display_name": "foo",
277 "email": "foo@example.com",
278 "suspended": 0,
279 "subusers": [
280 { "id": "foo:bar",
281 "permissions": "full-control"}],
282 "keys": [
283 { "user": "foo:bar",
284 "access_key": "barAccessKey",
285 "secret_key": "barSecretKey"}],
286 }
287
288
289To remove a S3 key pair, specify the access key. ::
290
291 radosgw-admin key rm --uid=foo --key-type=s3 --access-key=fooAccessKey
292
293To remove the swift secret key. ::
294
295 radosgw-admin key rm -subuser=foo:bar --key-type=swift
296
297
298Add / Remove Admin Capabilities
299-------------------------------
300
301The Ceph Storage Cluster provides an administrative API that enables users to
302execute administrative functions via the REST API. By default, users do NOT have
303access to this API. To enable a user to exercise administrative functionality,
304provide the user with administrative capabilities.
305
306To add administrative capabilities to a user, execute the following::
307
308 radosgw-admin caps add --uid={uid} --caps={caps}
309
310
311You can add read, write or all capabilities to users, buckets, metadata and
312usage (utilization). For example::
313
314 --caps="[users|buckets|metadata|usage|zone]=[*|read|write|read, write]"
315
316For example::
317
318 radosgw-admin caps add --uid=johndoe --caps="users=*;buckets=*"
319
320
321To remove administrative capabilities from a user, execute the following::
322
323 radosgw-admin caps rm --uid=johndoe --caps={caps}
324
325
326Quota Management
327================
328
329The Ceph Object Gateway enables you to set quotas on users and buckets owned by
330users. Quotas include the maximum number of objects in a bucket and the maximum
331storage size a bucket can hold.
332
333- **Bucket:** The ``--bucket`` option allows you to specify a quota for
334 buckets the user owns.
335
336- **Maximum Objects:** The ``--max-objects`` setting allows you to specify
337 the maximum number of objects. A negative value disables this setting.
338
339- **Maximum Size:** The ``--max-size`` option allows you to specify a quota
340 size in B/K/M/G/T, where B is the default. A negative value disables this setting.
341
342- **Quota Scope:** The ``--quota-scope`` option sets the scope for the quota.
343 The options are ``bucket`` and ``user``. Bucket quotas apply to buckets a
344 user owns. User quotas apply to a user.
345
346
347Set User Quota
348--------------
349
350Before you enable a quota, you must first set the quota parameters.
351For example::
352
353 radosgw-admin quota set --quota-scope=user --uid=<uid> [--max-objects=<num objects>] [--max-size=<max size>]
354
355For example::
356
357 radosgw-admin quota set --quota-scope=user --uid=johndoe --max-objects=1024 --max-size=1024B
358
359
360A negative value for num objects and / or max size means that the
361specific quota attribute check is disabled.
362
363
364Enable/Disable User Quota
365-------------------------
366
367Once you set a user quota, you may enable it. For example::
368
369 radosgw-admin quota enable --quota-scope=user --uid=<uid>
370
371You may disable an enabled user quota. For example::
372
373 radosgw-admin quota disable --quota-scope=user --uid=<uid>
374
375
376Set Bucket Quota
377----------------
378
379Bucket quotas apply to the buckets owned by the specified ``uid``. They are
380independent of the user. ::
381
382 radosgw-admin quota set --uid=<uid> --quota-scope=bucket [--max-objects=<num objects>] [--max-size=<max size]
383
384A negative value for num objects and / or max size means that the
385specific quota attribute check is disabled.
386
387
388Enable/Disable Bucket Quota
389---------------------------
390
391Once you set a bucket quota, you may enable it. For example::
392
393 radosgw-admin quota enable --quota-scope=bucket --uid=<uid>
394
395You may disable an enabled bucket quota. For example::
396
397 radosgw-admin quota disable --quota-scope=bucket --uid=<uid>
398
399
400Get Quota Settings
401------------------
402
403You may access each user's quota settings via the user information
404API. To read user quota setting information with the CLI interface,
405execute the following::
406
407 radosgw-admin user info --uid=<uid>
408
409
410Update Quota Stats
411------------------
412
413Quota stats get updated asynchronously. You can update quota
414statistics for all users and all buckets manually to retrieve
415the latest quota stats. ::
416
417 radosgw-admin user stats --uid=<uid> --sync-stats
418
9f95a23c 419.. _rgw_user_usage_stats:
7c673cae
FG
420
421Get User Usage Stats
422--------------------
423
424To see how much of the quota a user has consumed, execute the following::
425
426 radosgw-admin user stats --uid=<uid>
427
428.. note:: You should execute ``radosgw-admin user stats`` with the
429 ``--sync-stats`` option to receive the latest data.
430
431Default Quotas
432--------------
433
434You can set default quotas in the config. These defaults are used when
435creating a new user and have no effect on existing users. If the
436relevant default quota is set in config, then that quota is set on the
437new user, and that quota is enabled. See ``rgw bucket default quota max objects``,
438``rgw bucket default quota max size``, ``rgw user default quota max objects``, and
439``rgw user default quota max size`` in `Ceph Object Gateway Config Reference`_
440
31f18b77
FG
441Quota Cache
442-----------
443
444Quota statistics are cached on each RGW instance. If there are multiple
445instances, then the cache can keep quotas from being perfectly enforced, as
446each instance will have a different view of quotas. The options that control
447this are ``rgw bucket quota ttl``, ``rgw user quota bucket sync interval`` and
448``rgw user quota sync interval``. The higher these values are, the more
449efficient quota operations are, but the more out-of-sync multiple instances
450will be. The lower these values are, the closer to perfect enforcement
451multiple instances will achieve. If all three are 0, then quota caching is
452effectively disabled, and multiple instances will have perfect quota
453enforcement. See `Ceph Object Gateway Config Reference`_
454
7c673cae
FG
455Reading / Writing Global Quotas
456-------------------------------
457
458You can read and write global quota settings in the period configuration. To
459view the global quota settings::
460
461 radosgw-admin global quota get
462
463The global quota settings can be manipulated with the ``global quota``
464counterparts of the ``quota set``, ``quota enable``, and ``quota disable``
465commands. ::
466
467 radosgw-admin global quota set --quota-scope bucket --max-objects 1024
468 radosgw-admin global quota enable --quota-scope bucket
469
470.. note:: In a multisite configuration, where there is a realm and period
471 present, changes to the global quotas must be committed using ``period
472 update --commit``. If there is no period present, the rados gateway(s) must
473 be restarted for the changes to take effect.
474
475
476Usage
477=====
478
479The Ceph Object Gateway logs usage for each user. You can track
480user usage within date ranges too.
481
482- Add ``rgw enable usage log = true`` in [client.rgw] section of ceph.conf and restart the radosgw service.
483
484Options include:
485
486- **Start Date:** The ``--start-date`` option allows you to filter usage
487 stats from a particular start date (**format:** ``yyyy-mm-dd[HH:MM:SS]``).
488
489- **End Date:** The ``--end-date`` option allows you to filter usage up
490 to a particular date (**format:** ``yyyy-mm-dd[HH:MM:SS]``).
491
492- **Log Entries:** The ``--show-log-entries`` option allows you to specify
493 whether or not to include log entries with the usage stats
494 (options: ``true`` | ``false``).
495
496.. note:: You may specify time with minutes and seconds, but it is stored
497 with 1 hour resolution.
498
499
500Show Usage
501----------
502
503To show usage statistics, specify the ``usage show``. To show usage for a
504particular user, you must specify a user ID. You may also specify a start date,
505end date, and whether or not to show log entries.::
506
507 radosgw-admin usage show --uid=johndoe --start-date=2012-03-01 --end-date=2012-04-01
508
509You may also show a summary of usage information for all users by omitting a user ID. ::
510
511 radosgw-admin usage show --show-log-entries=false
512
513
514Trim Usage
515----------
516
517With heavy use, usage logs can begin to take up storage space. You can trim
518usage logs for all users and for specific users. You may also specify date
519ranges for trim operations. ::
520
521 radosgw-admin usage trim --start-date=2010-01-01 --end-date=2010-12-31
522 radosgw-admin usage trim --uid=johndoe
523 radosgw-admin usage trim --uid=johndoe --end-date=2013-12-31
524
525
526.. _radosgw-admin: ../../man/8/radosgw-admin/
527.. _Pool Configuration: ../../rados/configuration/pool-pg-config-ref/
528.. _Ceph Object Gateway Config Reference: ../config-ref/