Content Gateway 6.2 Release
Changes
Support for Untenanted Objects
Untenanted objects are unnamed objects that are written to Swarm without specifying a domain. This release adds support for untenanted objects, so Gateway now accepts the Swarm setting enforceTenancy=false
. (UIC-409)
Note
Untenanted objects are incompatible with the Content UI
SCSP Proxy Replacement: Upgrade to Content Gateway if using SCSP Proxy because you have untenanted unnamed objects. Gateway 6.2.0 accepts untenanted objects, so it is a drop-in replacement for SCSP Proxy, which is now deprecated. (CLOUD-3136)
With Swarm set to
enforceTenancy=false
, you can access and continue creating untenanted objects with existing client applications.By default, Gateway's root policy.json provides full anonymous access, and the idsys.json is empty (no users). If you need to grant specific read/write access to untenanted objects, add PAM/LDAP users to the root idsys.json and edit the root policy.json to permission GetObject, PutObject, etc. as needed. See Content Gateway Authentication.
Metrics for Untenanted: Point-in-time (/
current
) metrics are available for untenanted objects. By usingbytesSize/untenanted
,bytesStored/untenanted
, andobjectsStored/untenanted
, you can determine the sum of content lengths, disk space used, and number of objects, respectively. See Content Metering. (CLOUD-3093)
This release also includes these improvements:
Prometheus Metrics: The Content Gateway now generates Prometheus metrics for monitoring any dynamic features installed, such as Video Clipping. The metrics include counts of installed features, per-feature usage, and per-feature errors, as well as average time for those calls to complete. See Managing Dynamic Features. (CLOUD-3123)
Storage Node Pool: Gateway has new handling of its storage node pool in response to Swarm architecture changes, resulting in smoother performance for Swarm clients such as FileFly. (CLOUD-3101)
Fixed
Gateway 6.2 resolves S3 bucket listing problems related to versioning and showing more than 1000 pseudo-directories. (CLOUD-2871)
Upgrade Impacts
To upgrade from a version of Gateway 6, see Upgrading Gateway. If migrating from Elasticsearch 2.3.3 and are ready to upgrade from Gateway 5, see Upgrading from Gateway 5.x.
Address the upgrade impacts for each of the versions since the one bring upgraded from:
Impacts for 6.2
Version Requirements
Swarm Storage 11.0 or higher
Content UI 6.2, if used
Upgrade before using S3 clients such as Cyberduck.
Watch Items and Known Issues
These are known operational limitations and watch items that exist for Gateway.
When using the default RHEL/CentOS configuration of IPTABLES, traffic to the Gateway is blocked unless action is taken to disable IPTABLES or to enable inbound traffic to the front-end protocol port(s).
Gateway is not compatible with the fingerprint scanner module for Linux PAM. If it is installed, remove it by running:
yum remove fprintd-pam
SCSP reading operations that request a Content-MD5 hash validation and for which there is a hash mismatch causes a storage node to be temporarily removed for the Gateway's connection pool due to the way Swarm reports a hash validation failure.
Swarm Integrity Seal upgrades cannot be performed through Gateway. They may be done directly to the back-end Swarm cluster.
If the HTTP cache control headers
If-Modified-Since
andIf-Unmodified-Since
are used, review the discussion of these in the Storage SCSP Development.
The following are known issues in this release:
The AWS S3 SDK for C# does not properly sign S3-compatible requests with spaces in the name unless the domain contains ".s3." or ".s3-". See https://github.com/aws/aws-sdk-net/issues/933. (CLOUD-3068)
When buckets are created, the x-amz-storage-class header is not preserved. (CLOUD-3062)
The Gateway error "Failed reading from client" on a PUT due to "EofException: Early EOF" may occur when clients do not send the full body. This may point to a bug in the client's retry logic, such as not resetting the position marker to the beginning of the file or part. (CLOUD-3010)
During new object creation as part of renaming with ?newname, Gateway does not verify the user has permission to create the new object name (although it is highly likely, because it is a write within the same context). (CLOUD-2966)
An s3cmd or rclone server-side copy request may time out on a multipart copy for >5GB objects (s4cmd performs it correctly). Workaround: After you verify it is not the HTTPS proxy timing out, increase the client timeout: set s3mcd socket_timeout = 600 in ~/.s3cfg or use rclone copy --timeout=10m --contimeout=2m caringo:mybucket/5gb caringo:mybucket/subfolder/. (CLOUD-2949)
Listings with max-keys may be shorter than expected because CommonPrefixes are included in the count of keys returned. (CLOUD-2917)
Uploading files / photos using Panic's Transmit app on iOS fails due to a 403 Invalid Signature error. (CLOUD-2886)
Usernames are case-insensitive, but listings exclude a token if the username (myadmin) does not match the case used when the token was created (myAdmin). (CLOUD-2837)
Multipart PUT requests via recent Cyberduck versions fail with 403 SignatureDoesNotMatch when using AWS Signature Version 4. Install the Caringo .cyberduckprofiles from Using the Cyberduck application with Content Gateway S3 which force V2 signatures. (CLOUD-2799)
If a policy document includes a Principal that has plural "users" or "groups" instead of "user" or "group", the policy fails to take effect without warning. (CLOUD-2783)
Versioning-enabled buckets with large numbers of objects may generate Gateway server.log warnings that can be safely ignored: "S3BucketRequestHandler: WARNING: problem with versioned bucket listing. Number of CommonPrefix (2000) exceeds max-size limit (1000)." (CLOUD-2643)
403 S3 V4 Signature mismatch errors may result when using Cyberduck with the "pound" proxy in front of Gateway S3. Workaround: Disable the Expect header in the Cyberduck preferences, or (recommended) use a different proxy such as HAProxy. (CLOUD-2628)
When Gateway cannot connect to Elasticsearch nodes, the errors may erroneously report this as being related to Storage nodes. (CLOUD-2595)
Because of issues with Range and ETag header handling, video playback of .mp4 streams may not work correctly when served via the Gateway S3 port. It does work when served via the Gateway SCSP port. (CLOUD-1964)
Gateway caches the Swarm version from the "Server:" response header, so after upgrading Swarm you must restart Gateway to consistently see the new version. (CLOUD-1271)
Gateway responds with a 500 (Internal Server Error) instead of 400 (Bad Request) if the size of the metadata headers sent to Swarm is too large. (CLOUD-800)
The S3 bucket listing StorageClass response element always reports STANDARD. (CLOUD-766)
If an S3 client escapes URI path characters such as "/", the Gateway audit log escapes the "%" characters used by the client as escape characters. URI audit log processing for S3 clients requires double-unescaping when this occurs. (CLOUD-703)
© DataCore Software Corporation. · https://www.datacore.com · All rights reserved.