Welcome to Riak CS or Riak S2.
Riak CS is an object storage system built on top of Riak KV. It facilitates storing large objects in Riak KV and presents an S3-compatible interface. It also provides multi-tenancy features such as user accounts, authentication, access control mechanisms, and per account usage reporting.
Below, you will find a link to the "fast track" directions for setting up and using Riak CS. For more information, browse the following files:
- README: this file
- LICENSE: the license under which Riak CS is released
- RELEASE-NOTES: new features and changes for each release.
The full suite of Riak CS includes:
- one or more nodes of Riak CS proper;
- prior to version 3.1.0, a single instance of Stanchion;
- a Riak cluster;
- optionally, a node running Riak CS Control.
These components need to be properly configured, at a minimum:
-
Riak nodes must have these items in
riak.conf
:backend = multi buckets.default.allow_mult = true buckets.default.merge_strategy = 2
and, in
advanced.config
:{riak_kv, [ {multi_backend, [{be_default, riak_kv_eleveldb_backend, [{max_open_files, 20}]}, {be_blocks, riak_kv_bitcask_backend, []}]}, {multi_backend_default, be_default}, {multi_backend_prefix_list, [{<<"0b:">>, be_blocks}]}, {storage_backend, riak_kv_multi_backend} ]}
There is a convenience script, misc/prepare-riak-for-cs, which will apply these changes to a factory
riak.conf
. -
riak-cs.conf
andstanchion.conf
must have the actual address:port of nodes (same or different) of the underlying riak cluster; -
likewise, in
riak-cs.conf
, you should set the address:port of the stanchion node.
Riak must be started before Riak CS and Stanchion. Also, Stanchion must be running before Riak CS can begin to serve user requests.
On a fresh install, in order to create an admin user, you will need
to start Riak CS with authorization disabled. This can be done with
this block in riak-cs/advanced.config
:
{riak_cs, [{admin_auth_enabled, false}]}
At this point, you should block any traffic from your real users.
Now you can create a user, which will become your admin user, with a
POST
to $RIAK_CS_ADDRESS:$RIAK_CS_PORT/riak-cs/user
, like so:
curl -X POST 172.17.0.2:8080/riak-cs/user \
-H 'Content-Type: application/json' \
--data '{"name": "fafa", "email": "fa@keke.org"}'
Copy the key_id
from the returned json and set admin.key
option to its value in riak-cs.conf
and stanchion.conf
. Then disable
the auth bypass by changing admin_auth_enabled
setting to true
,
and restart Riak CS and Stanchion. Your Riak CS suite is ready
for production use; now external incoming requests can be unblocked.
All the configuration steps and procedures are scripted in Riak CS as a Docker service, which you can, incidentally, use not only to acquaint yourself with the operations, but also as a quick and minimal, yet fully functional, local installation of a full Riak CS suite.
Any client or library that faithfully implements the S3 API should also work with Riak CS. We have tested quite a few and try to make adjustments as necessary to support as many as possible. Feel free to open an issue if there is an issue using a particular library.
The following is a sample of the clients and libraries that have been tested with Riak CS:
- s3cmd
- boto3
- erlcloud (an old fork; current upstream version not tested)
- AWS Ruby SDK
The following clients have been tested with 2.x and may or may not work with 3.0:
The Riak CS administrative interface is accessible via HTTP just like
the object storage interface. All functions can be accessed under the
/riak-cs/
resource. The administrative interface features the
following capabilities:
- Create user accounts
- Modify user account status or generate new user account credentials
- List all user accounts or a specific user account
- Report the network or storage usage of a user account
- Get performance statistics of the system operations
- Ping the Riak CS node to verify it is alive and functional
In the default mode of operation the administrative interface accepts requests on the same IP address and port number as the object storage requests and requires each request to be properly authenticated.
It is also possible to have administrative requests handled on a
separate IP address and port number. This allows the system to be
setup so that administrative requests are handled on a private
interface. The admin_ip
and admin_port
configuration options are
used to control this behavior. Additionally, it is also possible to
disable administrative request authentication using the
admin_auth_enabled
option. Setting this option to false
disables
request authentication for administrative commands. This option
should be used with /caution/ and it is only recommended when the
administrative requests are handled by a private interface that only
system administrators may access.
Riak CS uses the git-flow
branching model and we have the default
branch on this repo set to develop-3.0
so that when you browse here on
GitHub you always see the latest changes and to serve as a reminder
when opening pull requests for new features.
Below, you'll find a direct link to a guide to quickly getting started with Riak CS. For more information about Riak CS please visit our docs.
http://docs.basho.com/riakcs/latest/tutorials/fast-track/
Basho encourages contributions to Riak CS from the community. Here is how to get started.
- Fork the appropriate repos that are affected by your change.
- Make your changes and run the test suite. (see below)
- Commit your changes and push them to your fork.
- Open pull-requests for the appropriate projects. Note: Riak CS
development uses the git-flow model for branching and most
pull-requests should be targeted against the
develop
branch. - Basho engineers will review your pull-request, suggest changes, and merge it when it is ready.
Please open a GitHub issue that fully describes the bug and be sure to include steps on how to reproduce.
To make sure your patch works, be sure to run the test suite in each modified sub-project, and dialyzer from the top-level project to detect static code errors.
To run the QuickCheck properties included with Riak CS, download QuickCheck Mini: http://quviq.com/downloads.htm NOTE: Some properties that require features in the Full version will fail.
Also see the Testing section of the Riak CS repo wiki for more testing options and guidance.
The unit tests for each subproject can be run with make
or
rebar
like so:
make test
or, if you only want eunit tests:
./rebar3 eunit
Dialyzer performs static analysis of the code to discover defects, edge-cases and discrepancies between type specifications and the actual implementation.
Dialyzer requires a pre-built code analysis table called a PLT. Building a PLT is expensive and can take up to 30 minutes on some machines. Once built, you generally want to avoid clearing or rebuilding the PLT unless you have had significant changes in your build (a new version of Erlang, for example).
Dialyzer can be run with make
:
make dialyzer
Riak CS has a number of integration and regression tests, in a separate project.