Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[feature] Seek alternative for object store solution other than MinIO #7878

Open
Tracked by #2763
zijianjoy opened this issue Jun 9, 2022 · 24 comments
Open
Tracked by #2763

Comments

@zijianjoy
Copy link
Collaborator

zijianjoy commented Jun 9, 2022

Feature Area

/area backend
/area frontend

What is the use case or pain point?

Currently, KFP is using MinIO as the default object store for Artifact payload and Pipeline template. However, MinIO has fully changed its license to AGPLv3 since 2021. This change has prevented KFP from upgrading to the latest of MinIO: using AGPL software requires that anything it links to must also be licensed under the AGPL. Since we are not able to adopt the latest change from MinIO, we are seeking alternatives to replace it in future KFP deployment.

What feature would you like to see?

This new object store solution should have the following nature:

  1. It is open sourced and uses license that can be accepted by KFP.
  2. Orchestration engine (like Argoworkflow) can interact with this object store.
  3. It is compatible with S3.
  4. It has fine-grained permission control.
  5. Same or similar function set with MinIO.

Exploration

We are currently considering following options, we would like to hear your opinions as well.


cc @chensun @IronPan @james-jwu


Love this idea? Give it a 👍. We prioritize fulfilling features with the most 👍.

@zijianjoy zijianjoy changed the title [feature] Seek alternative for Kubeflow Pipelines object store other than MinIO [feature] Seek alternative for object store solution other than MinIO Jun 9, 2022
@zijianjoy zijianjoy pinned this issue Jun 9, 2022
@juliusvonkohout
Copy link
Member

juliusvonkohout commented Jun 28, 2022

I would clarify it a bit more

@tzstoyanov
Copy link

tzstoyanov commented Mar 21, 2023

@zijianjoy , is the MinIO license change to AGPLv3 the only motivation for looking for alternatives? As you wrote, AGPL software requires that anything it links to must also be licensed under the AGPL, but this should not be a limitation for upgrading to the latest MinIO:

  • Currently, KFP links to MinIO Golang client, which is still under Apache 2.0 License. Even though they changed the MinIO license, the license of the Golang client was not changed (yet). May be there are concerns that the Golang client license can be changed, but for now there should be no license restrictions to use the latest MinIO.
  • As rook has no Golang client, currently the only way to use it from KFP is through a standalone S3 client, such as s5cmd or s3cmd. I would suggest to implement the existing ObjectStoreInterface interface by invoking some S3 client, which can be shipped with the apiserver image. That way KFP will not depend on specific object store service, as long as the service supports the S3 API.

@streamnsight
Copy link

Minio is only used as a storage gateway. This feature has been deprecated in Minio since over a year https://blog.min.io/deprecation-of-the-minio-gateway/

To me the simplest replacement is to use an actual S3 client (which hopefully is also an S3 compatible client because not everyone is on AWS)
It needs to support the custom endpoints, region, and path-style or virtual host style URLs, as well as the various auth methods.
The problem with that, is that obviously that requires an actual object store service to run... which is where Minio could still be used as the in-cluster object store solution (but not as a gateway)

@juliusvonkohout
Copy link
Member

Minio is only used as a storage gateway. This feature has been deprecated in Minio since over a year https://blog.min.io/deprecation-of-the-minio-gateway/

To me the simplest replacement is to use an actual S3 client (which hopefully is also an S3 compatible client because not everyone is on AWS) It needs to support the custom endpoints, region, and path-style or virtual host style URLs, as well as the various auth methods. The problem with that, is that obviously that requires an actual object store service to run... which is where Minio could still be used as the in-cluster object store solution (but not as a gateway)

No, your assesment is not correct. Minio usage differs by distribution and the most important default one used by Kubeflow is NOT the gateway mode. We need a reliable storage and gateway replacement. For further information read the whole conversation here #7725

@streamnsight
Copy link

No, your assesment is not correct. Minio usage differs by distribution and the most important default one used by Kubeflow is NOT the gateway mode. We need a reliable storage and gateway replacement. For further information read the whole conversation here #7725

My bad, I wasn't clear.
Minio is used as the local storage in the vanilla distro, and liekly that's what is used on-premises, when no storage backend is defined or available, otherwise it is used as a 'gateway' for pretty much every cloud distro. Whether it is used in gateway mode, or using S3-compatible backend.
The problem is it is old and doesn't support several options that make it hard to work with cloud other than AWS. One of the main issue for me is that it doesn't support the region param.
Anyway, regardless of how it is used, my suggestion was to update the object storage client code in pipelines to use a native, modern, S3-compatible client that supports all options, so there is no need for Minio at all when using a cloud object storage backend.
For the vanilla distro that still requires a in-cluster storage solution, Minio S3 compat still does the job, and it's only a matter of pointing the S3 client to it.

@tzstoyanov
Copy link

tzstoyanov commented Apr 11, 2023

I agree with @streamnsight - the ObjectStoreInterface interface can be implemented using S3-compatible client, golang or invoking a standalone binary . There should be no MinIO dependency in the KFP code. We can still use MinIO, rook or whatever object store we choose.

@juliusvonkohout
Copy link
Member

This issue here is about the server, not the client.

@juliusvonkohout
Copy link
Member

"For the vanilla distro that still requires a in-cluster storage solution, Minio S3 compat still does the job, and it's only a matter of pointing the S3 client to it." No, that is the reason for this issue. We need a server side replacement.

@tzstoyanov
Copy link

tzstoyanov commented Apr 11, 2023

This issue here is about the server, not the client.

Currently there is a dependency between the server and the client, the server cannot be changed easily without client modifications. The first step is to replace the client with a generic S3-compatible client, without changing the server. After that we can change the server with any object store that supports S3 API.

Why do you think that the MinIO server needs to be replaced ? According to the issue description, using AGPL software requires that anything it links to must also be licensed under the AGPL , but obviously the MinIO server does not link to any KFP code. The MinIO client links to KFP, but as it remains under Apache 2.0 License, there is no licensing restrictions to use the latest MinIO server and client versions.

@juliusvonkohout
Copy link
Member

juliusvonkohout commented Apr 11, 2023

@tzstoyanov
"but as it remains under Apache 2.0 License, there is no licensing restrictions to use the latest MinIO server and client versions." Googles Lawyers say otherwise. I have discussed it with their team several times.

Please also read everything from #7725 to fully understand the long-term goals for the artifact storage within Kubeflow.

You can already use the minio server with most S3 clients, but yes, maybe it is problematic to use the minio client for other S3 servers.

We are always looking for volunteers. I already mentored several people that now have their first commits to the Kubeflow project.

@tzstoyanov
Copy link

tzstoyanov commented Apr 13, 2023

@juliusvonkohout, I looked at the comments of the #7725. Thanks for pointing me to that, now I have a better idea of the problem and the work you did in the context of that PR. I have a few questions, will be happy if you or someone from the community can answer:

  • Regarding the MinIO license problem, you mentioned that Googles Lawyers say otherwise. I have discussed it with their team several times. I wonder if these discussions were public? I'm curious to see their arguments against this specific use case. I'm not a license expert, but the AGPL restrictions are pretty clear. From my understanding, and according to the description of this specific issue I cannot see any license violation in our use case - we do not modify any AGPL code, nor we do link to any AGPL code. Moreover - the KFP image is already based on Debian, there are a lot of GPL binaries distributed as part of it.
  • In the context of your PR, @zijianjoy mentioned that New image has to pass license review. Do you know what is that license review process, is it described somewhere?
  • In any case, replacing the MinIO client with some generic S3 client is a good idea. This will make KFP more flexible and is the first step in replacing the MinIO server. Do you know if there is a specific issue about the client?

I can contribute to that, implement the ObjectStoreInterface interface using a generic S3 client. We can use the official AWS SDK, or use a command line client such as s5cmd or s3cmd.

@juliusvonkohout
Copy link
Member

juliusvonkohout commented Apr 13, 2023

@tzstoyanov please reach out on LinkedIn or slack for discussion. I am already working with one of your colleagues @difince https://kccnceu2023.sched.com/event/1HyY8/hardening-kubeflow-security-for-enterprise-environments-julius-von-kohout-dhl-deutsche-telekom-diana-dimitrova-atanasova-vmware

Maybe these here are are lower hanging fruit. kubeflow/kubeflow#7032 (comment) we really need to focus on what to work on first, because getting stuff into KFP is difficult.

@koalalorenzo
Copy link

Do we have any update on this? :)

@gsoec
Copy link

gsoec commented Aug 23, 2023

cubefs looks promising.

@lehrig
Copy link

lehrig commented Aug 23, 2023

@gsoec can you articulate why cubefs looks promising?

I think we need an assessment similar to what @juliusvonkohout did in #7878 (comment). Based on that, comparing with ceph-rook appears to be most relevant. From what I see here, the latter appears to be the favorable solution...

@juliusvonkohout
Copy link
Member

@lehrig please take a look at the last comments of #7725. i think we need to use istio or something else for the authentication part since only a few s3 providers fully support enterprise-level user management and authorization. Furthermore we could just plug and play any basic-S3 compatible storage backend and get rid of passwords and the necessary rotation altogether.

@harshavardhana
Copy link

So that you all know, sticking to this release has three different security vulnerabilities that are high or critical.

So, anyone running this release would be exposed and vulnerable to these vulnerabilities, potentially causing data loss.

What does it take for Kubeflow to upgrade the MinIO container version? - I can help.

@juliusvonkohout
Copy link
Member

Agpl is not allowed, so Google denied an update. Please join the meetings at https://www.kubeflow.org/docs/about/community/ for discussing it. Especially the KFP meeting

@rimolive
Copy link
Member

Another alternative could be https://ozone.apache.org

Copy link

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.

@github-actions github-actions bot added the lifecycle/stale The issue / pull request is stale, any activities remove this label. label Apr 30, 2024
@juliusvonkohout
Copy link
Member

not stale

@stale stale bot removed the lifecycle/stale The issue / pull request is stale, any activities remove this label. label Apr 30, 2024
@juliusvonkohout
Copy link
Member

juliusvonkohout commented Apr 30, 2024

Another alternative could be https://ozone.apache.org

it might be suitable for the multi bucket approach https://ozone.apache.org/docs/1.3.0/feature/s3-multi-tenancy-access-control.html

Copy link

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.

@github-actions github-actions bot added the lifecycle/stale The issue / pull request is stale, any activities remove this label. label Jun 30, 2024
@juliusvonkohout
Copy link
Member

/lifecycle frozen

We are actively working on this.

@google-oss-prow google-oss-prow bot added lifecycle/frozen and removed lifecycle/stale The issue / pull request is stale, any activities remove this label. labels Jun 30, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

9 participants