Open bwalsh opened 7 years ago
@mayfielg @k1643 @kellrott Please review this draft document in the context of EUL-36
First architecture diagram: looks very good, except we're missing an explicit definition of the ports each piece is using to communicate with the rest of the setup. In EUL-36, we said we wanted to describe those definitively as well. It's helpful to document what ports need to be available externally on which floating IPs, since ITG needs to handle that for us. What are these diagrams drawn in? I'd be happy to make that addition, if I can edit the documents the diagrams came from.
First data-flow diagram: from everything I remember about the dcc-portal-server, it never queries mongo. It only queries elastic, and mongo is only ever used as a resource during the release pipeline. If I'm correct, then this diagram is a bit misleading. Am I missing some detail of the server that does use mongo directly? I'm also a bit unclear on what 'config' in the openstack, keystone box is referring to.
I'd life to clarify the 'future sprints' section a bit. The separation from one dotted box to two from the first diagram to the second refers to moving from using the proof-of-concept instances of keystone and swift to the ones already installed in exastack and ITG, correct?
This backlog appears to deal solely with federation (of authentication, cloud storage, dcc-server instances). It would be clearer to say that explicitly as the over-arching epic of the ungroomed backlog.
More specifically, Are keystone-with-shibboleth and keystone federation different options for addressing authentication of non-OHSU personnel? Or are they supposed to work in conjunction? Or is that unknown at this time and an issue to address when we get to that stage? Also, I believe "s3, google bucket webhooks," is referring to the issue of federation across multiple physical locations, and thus multiple cloud storage sites. At this time, is swift capable of federation across swift instances already, or no? It might be intelligent to include that as a story first, before we start to deal with inclusion of other softwares.
@mayfielg Thanks for comments. Please check to ensure that I've addressed them.
it never queries mongo
removed mongo from dataflows
I'd like to clarify the 'future sprints' section a bit.
added clarification
This backlog appears to deal solely with federation
added features section
I think the only remaining question is the bit regarding what's proposed for shibboleth and keystone federation.
Are keystone-with-shibboleth and keystone federation different options for addressing authentication of non-OHSU personnel or are they supposed to work in conjunction? Or is that unknown at this time and an issue to address when we get to that stage?
Agreed. It is an evolving architecture. In the next sprint planning we can discuss w/ Adam M + Kyle + Paul H.
+1
Overview
The intent of this document is to provide a high level scope, define a requirements-stack, and illustrate an architectural vision for the effort. The core practices we followed were:
'portal-proxy'
Functionality
ohsu ldap
for authorization and authentication)from roadmap
Deployment
Dataflows
Keystone data flows
Conceptual sequence diagram. All services [swift, compute, image, and euler] work the same way. Keystone is to openstack as the mitre service is to CCC.
Dependencies
'add-a-file'
Functionality
add a file
repository
functionality.release
is out of scope)data store
access
to the BAML or other OHSU data (eg. downloading, workflow, BAM Stats,etc.) (akaobject store
)Deployment
Dataflows
Dependencies
Current work
Deployment
Functionality
projects
Dependencies
Backlog
Functionality
The stakeholders and sponsors have identified inter-institutional collaboration as a goal. These features have not been prioritized and approved, but are captured here to provide roadmap.
un-groomed features