Configuring AFM to cloud object storage fileset by using use-keys and STS token
You can configure AFM to cloud object storage fileset by using use-keys option and Security Token Service (STS).
An AFM to cloud object storage fileset can be configured either by providing the credentials that includes use-keys and security token service (STS) to AFM or by configuring a file to return the credentials.
The mmafmcoskeys command can be used to store the credentials with AFM. AFM stores and uses the credentials for communication with the server.
- To configure AFM to retrieve the credentials without storing it, you must configure the file /var/mmfs/etc/mmuid2keys to return the credentials after execution. This mmuid2keys file must be available at all the AFM gateway nodes and must have root executable permission enabled.
- When you start to retrieve the credentials from mmuid2keys file, --user-keys option must be specified while creating fileset by using the mmafmcosconfig command.
- Obtain temporary credentials.
- Update the /var/mmfs/etc/mmuid2keys file to return the credentials in
following format as shown after the execution on all the gateway
nodes.
#cat /var/mmfs/etc/mmuid2keys echo "akey:skey:sts" #chmod +x /var/mmfs/etc/mmuid2keys
- Create a fileset by using --user-keys parameter with the
mmafmcosconfig
command.
#mmafmcosconfig fs1 sw1 --endpoint http://s3.amazonaws.com --user-keys --bucket bkt1 --mode sw1 --xattr --acls --debug --cleanup