Glossary
Backup Bucket
All StorageFabric configuration data is encrypted with the Master Encryption Key and stored in the Configuration Bucket in the cloud.
For increased availability, in the event of failures at the backend storage provider, a Backup Bucket can also be configured for StorageFabric configuration data. If the Configuration Bucket becomes inaccessible, StorageFabric components automatically access the configuration data from the Backup Bucket.
Backend Bucket
A Backend Bucket is a regular S3 bucket, hosted with either an on-prem or a cloud storage provider. Clients’ data is stored in Backend Buckets. However, since StorageFabric virtualizes your entire storage namespace, StorageFabric clients are not exposed to provider-side buckets directly. Clients instead use Virtual Bucket Names. Each Virtual Bucket is backed by a Backend Bucket.
Configuration Bucket
The Configuration Bucket is a specially designated bucket to store StorageFabric configuration data. All StorageFabric configuration data is encrypted with the Master Encryption Key and stored in the Configuration Bucket in the cloud. Therefore, storage providers cannot access the data.
Storing configuration data with providers makes StorageFabric components stateless, making deployment options extremely flexible. Components can be added and removed easily without affecting overall availability.
StorageFabric does not require complex on-prem data management using relational databases, or other heavyweight storage solutions. All you need to manage is the Master Encryption Key. Entire deployments can be bootstrapped and restored using the Master Encryption Key.
Configuration Sync Time
The time between a configuration change made on a StorageFabric Configuration Manager and the propagation of that change to the Gateways. For details, see the full product documentation.
Master Encryption Key
All StorageFabric configuration data is encrypted with the the Master Encryption Key.
Internally, StorageFabric uses hierarchical keying wherein lower layer keys are encrypted using higher layer keys. The Master Encryption Key is the root key in the hierarchy.
The Master Encryption Key must be kept safe. Losing the Master Encryption Key is equivalent to losing your data. The Master Encryption Key is never communicated to the outside by StorageFabric components.
StorageFabric Configuration Manager
The StorageFabric Configuration Manager is a set of tools, REST APIs, and a web interface used to configure StorageFabric Gateways. Configuration data includes information about cloud providers, buckets, encryption keys, access control, and client and cloud access keys.
The Configuration Manager facilitates setup and management of information that enables StorageFabric Gateway services. For example, the Configuration Manager is used to set up encryption keys that are then used by StorageFabric Gateways for transparent encryption and decryption of applications’ data.
StorageFabric Gateway
The StorageFabric Gateway is the single-point-of-access to cloud storage services, such as Amazon S3, Google Cloud Storage, etc. The Gateway exposes a standard object storage interface to client applications.
Gateway functionality includes, but is not limited to, the following:
Transparent data encryption and decryption.
Client authentication.
Access control enforcement.
Transparent caching.
Data compression.
Data deduplication.
Logging and audit trails.
Data governance enforcement.
StorageFabric LogViewer
The StorageFabric LogViewer is a web-based graphical interface to access StorageFabric Gateway statistics and logs.
StorageFabric Scheduler
StorageFabric Scheduler is a StorageFabric component that manages internal housekeeping tasks for StorageFabric components. The scheduler runs on the StorageFabric Configuration Manager and on Gateways.
Virtual Bucket
StorageFabric virtualizes your entire storage namespace across all your storage providers. No matter what the actual bucket names are with storage providers, StorageFabric clients see a virtual namespace. Clients upload and download data to and from Virtual Buckets. A Virtual Bucket is identified by its Virtual Bucket Name.
Empty Virtual Bucket
A Virtual Bucket is considered empty if there is no user data in the bucket. The bucket may contain objects in the Special Dir.
Virtual File System
StorageFabric supports Virtual File systems (VFS) using NFS and SMB protocols.
See the full product documentation
Data View
A Data View is a collection of Virtual Buckets. To learn more about views, refer to the full product documentation.
View Encryption Key
An encryption key that encrypts configuration data for a Data View. StorageFabric Gateways have access to the View Encryption Keys only. Each Gateway is set up using the View Encryption Key of the Data View that the Gateway is part of.
Virtual Bucket Name
Name of a Virtual Bucket. This name can be different from actual bucket name with a cloud provider. Hence it is referred to as a Virtual Bucket Name. StorageFabric clients use the virtual bucket name in API requests to a StorageFabric Gateway.
Note
In StorageFabric, there is a single global bucket namespace. Each Virtual Bucket has a globally unique virtual name.
StorageFabric Gateway Domain
The base domain where clients can send requests to the StorageFabric Gateway. The StorageFabric Gateway supports both Virtual Host Style Addressing URLs and Path Style Addressing URLs. For example, if the StorageFabric Gateway Domain is s3.abccorp.com, the bucket name is amazon-data-bucket and the file to access in the bucket is file.txt then clients can send requests to the following URLs:
amazon-data-bucket.s3.abccorp.com/file.txt s3.abccorp.com/amazon-data-bucket/file.txt
A StorageFabric Gateway Domain is necessary for:
Remote clients to access the StorageFabric Gateway.
SSL connection between clients and the StorageFabric Gateway.
License
A StorageFabric license governs the use of StorageFabric. A valid license is required to use StorageFabric. In the absence of a valid license, StorageFabric may operate with limitations.
To learn more, refer to the document on the full product documentation.
Licenses Directory
Directory on a StorageFabric Configuration Manager from which Licenses are automatically loaded.
The default license directory path is /etc/storagefabric/licenses/
.
StorageFabric License Server
StorageFabric License Server is a StorageFabric component that keeps track of the other components in StorageFabric deployments. This includes snapshot information and historical trends about the deployed Gateways and Configuration Managers.
The license server is not in the data or configuration path and does not impact StorageFabric functionality or performance. Depending on your StorageFabric licenses, it may be required to run a License server in your enterprise. Contact the Virtalica team for details.
Access Key ID
Authentication to most cloud providers is done using an Access Key ID and a Secret Access Key. An Access Key ID acts like a username, uniquely identifying the requester.
Secret Access Key
Authentication to most cloud providers is done using an Access Key ID and a Secret Access Key. A Secret Access Key acts like a password corresponding to an Access Key ID.
Session Token
An additional piece of information used by cloud providers for client authentication, in addition to the Access Key ID and Secret Access Key. Typically used when the credentials are temporary, with a brief expiration time. For more details, see the full product documentation.
Client
A client is any entity that sends requests to the StorageFabric Gateway. Clients are authenticated by the StorageFabric Gateway using Client Access Keys.
User
In StorageFabric, user specifically refers to an entity performing configuration management via the StorageFabric Configuration Manager web or command line interfaces.
When using the web interface, users authenticate using their username and password or via single sign-on.
When using the configuration manager REST API, users authenticate using their Client Access Keys.
Group
In StorageFabric, a group is a collection of users. Users in a group can perform configuration management based on the roles attached to the group.
Provider Access Keys
The StorageFabric Gateway authenticates to cloud providers using an Access Key ID and a Secret Access Key. An access key ID and secret key combination is referred to as a Provider Access Key.
Client Access Keys
A Client authenticates to the StorageFabric Gateway using an Access Key ID and a Secret Access Key. A client access key ID and secret key combination is referred to as a Client Access Key.
Restoration Command
By default, StorageFabric components are stateless. In the event that a component fails or the component setup or initialization information is lost, all that is needed to set up an identical component are credentials to access the Configuration Bucket and the Master Encryption Key. To make recovery convenient, a command is displayed by the the full product documentation at completion. Using only this command and the Master Encryption Key, a new identical component can be set at a later time, such as for recovery.
Bucket Encryption Key
The encryption key used to encrypt each File Encryption Key for all files in a Virtual Bucket. Each Virtual Bucket can have multiple encryption keys.
File Encryption Key
The encryption key used to encrypt file data.
Multipart Mode
There are three provider settings for multipart mode as described next:
Disabled
: Multipart is not supported by provider.
Emulated
: Multipart is not supported by provider. However, StorageFabric
can emulate multipart uploads and downloads. Google is one such provider.
Native
: Multipart is natively supported by provider.
Amazon S3 and DreamObjects are two providers with native multipart support.
POST Object Mode
There are three provider settings for POST Object mode as described next:
Emulated
: POST is not supported by provider. However, StorageFabric
can emulate POST uploads. StorageGRID is one such provider.
Native
: POST is natively supported by provider.
Amazon S3 and Google are two providers with native POST support.
Tail Range Mode
Indicates whether a storage provider supports HTTP Range request of the type Last X bytes.
Encoding Type
Indicates whether a storage provider supports encoding-type=url
argument.
List V2
Indicates whether a storage provider supports Version 2 listing.
V4 Unsigned Payload
Indicates that Unsigned Payload for V4 instances is supported by the provider.
Signature V2
Indicates that requests are signed using the Version 2 signature.
Signed URL
Signed URLs can be used to share objects between clients using simple URL exchanges. A signed URL cannot be used to access an object that the signer does not have access to.
Role-Based Access Control
Role-based access control (RBAC) is an approach to managing Permissions for subjects (users and Client Access Keys). In RBAC, permissions are grouped under roles. Roles are then assigned to subjects.
Roles
A named collection of Permissions.
Permissions
A permission specifies whether a particular operation is allowed or denied.
Context
A context is a JSON document that specifies a set of resources. Under Role-Based Access Control, contexts are used to specify the resources for which permissions are to be granted.
Financial Archival Mode
Financial Archival Mode enforces different encryption and data integrity checks for Virtual Buckets. The Financial archival mode is designed to be compatible with Sheltered Harbor.
Sheltered Harbor
Sheltered Harbor is a standard developed by the financial industry to protect consumer data in the event that a financial institution becomes inoperable.
Under Sheltered Harbor, consumers’ account data is archived and stored in a standard format and can be recovered in the event of outage.
Archived data is regularly monitored to ensure compliance with the specifications.
For more information, visit shelteredharbor.org.
Assertion
An assertion is a signed document generated by an Identity Provider, that contains one or more claims.
Claim
A claim contains information about users and groups. Claims are contained within Assertions.
Identity Provider
In StorageFabric, an identity provider refers to a system that creates, stores, and manages identities within an enterprise. For example, ADFS, Okta, etc. The identity provider manages user credentials, and issues signed assertions containing one or more claims.
Service Provider
A service provider relies on signed assertions from an identity provider to log users in and enforce access control. In StorageFabric the service provider is the StorageFabric Configuration Manager.
SAML
Security Assertion Markup Language (SAML) is an XML-based standard for exchanging assertions (and claims) between an Identity Provider and a Service Provider. In StorageFabric, assertions generated by an identity provider must be in SAML format.
Relying Party Trust
In ADFS, a relying party is a trusted entity that will be receiving and processing assertions. In StorageFabric, the relying party is the StorageFabric Configuration Manager. The trust established between the relying party and an Identity Provider is referred to as relying party trust.
Active Directory
Microsoft Active Directory is a set of components that manage information about network resources such as users, systems, services, etc. For more information, see msdn Active Directory documentation
Active Directory Federation Services
Microsoft Active Directory Federation Services (ADFS) is a service that allows secure sharing of identity information within networks, for example, single sign on. For more information, see msdn ADFS documentation
AWS KMS ID
AWS key ID. See AWS docs for more information.
In StorageFabric, the full ARN should not be used, but only the UUID.
For example, if the key ARN is arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab
,
then use only 1234abcd-12ab-34cd-56ef-1234567890ab
as the AWS KMS ID.
Passthrough (Plaintext) Mode
If passthrough mode is enabled on a Virtual Bucket, StorageFabric Gateways will not encrypt data stored in the Virtual Bucket.
This mode is useful for adding Virtual Buckets that were already in use prior to the StorageFabric deployment. Moreover, data stored in passthrough Virtual Buckets can directly be downloaded from the storage provider without using StorageFabric.
Note
Passthrough mode is recommended only for Virtual Buckets storing non-sensitive data.
StorageFabric File Browser
The StorageFabric File Browser is a StorageFabric component that provides a browser-based interface for users to access their data.
DNS Inline
In Inline DNS resolution mode, Gateways resolve DNS (for providers) when a client request is received. Gateways then cache the DNS entry for the duration of the server response TTL (time-to-live).
DNS Background
In Background DNS resolution mode, Gateways continue to resolve the DNS (for providers) in the background, at a frequency dictated by the TTL. If no client requests are received for 60 seconds, background resolution is stopped until a new client request arrives for that provider.
Background mode offers better performance than DNS Inline when the cloud provider has a low TTL, such as Amazon, which has less than 5 seconds. Gateways continue to resolve DNS in the background. As a result, subsequent client requests don’t need to wait for DNS resolution after the TTL would have expired.
Path Style Addressing
Path-style (or V1) includes the bucket
name in the path of the URL. For example,
s3://s3.storageprovider.com/<bucketname>/key
.
Virtual Host Style Addressing
Virtual-hosted style (or V2) uses the bucket name
as part of the domain name. For example,
s3://<bucketname>.s3.storageprovider.com/key
.
Null Bucket
The null bucket is a special Virtual Bucket similar to /dev/null
.
The null bucket can be used to test the network conditions between clients and Gateways,
without consuming storage with a backend provider.
The null bucket is accessible at the endpoint /null-bucket
on Gateways.
Note that the null bucket cannot be accessed using synchronous client credentials.
This feature is available in Release 3.4.0+.
SANScaler
SANScaler is a high-performance solution delivering low-latency, redundant enterprise SAN and NAS on-premise with near-zero physical storage footprint. For more details, visit https://sanscaler.io/.
Advanced Data Placement
Data Placement is a StorageFabric service that provides transparent and automated data replication, migration, and caching across Virtual Buckets.
This feature is available in Release 3.5.0+.
For details, refer to the full product documentation
Smart Online Migration
Smart Online Migration is a StorageFabric feature that provides transparent, in-line cross-provider data migration. This feature is available in Release 4.3.0+. For details, refer to the full product documentation.
Special Dir
Within each Virtual Bucket, StorageFabric maintains state for its internal operations. This enables StorageFabric to provide key features such as Advanced Data Placement, monitoring, stats, the full product documentation, and more. This internal state is also referred to as the Special Dir. Location of this internal state within a bucket is specified by the Reserved Key.
Reserved Key
StorageFabric stores additional data in a reserved path within Virtual Buckets. This key starts with the reserved prefix zu3KR6gafn4y1LjwwOrQNyV14rkFBhHd3JmpwfMjmz. This data is used for StorageFabric’s internal operation, support for emulated multipart mode, stats, and monitoring. This data is not visible to clients.
Upstream Resolver Idle Timeout
Time in seconds an upstream can be idle before the task that keeps the DNS cache fresh stops. The default is 60 seconds.