I just presented a talk on GlusterD Next Gen / GlusterD-2.0 at the first ever Gluster Summit at Barcelona. I’m embedding the slide deck here for all to see. Fullscreen it to see it properly (you also need to use Chrome/Chromium to get the slide renedered correctly, some issue with CSS that I’m too lazy to fix).
Introduction GlusterFS has supported network encryption using TLS/SSL since GlusterFS-3.5. GlusterFS-3.5 supported encryption only on the I/O connections, ie. the connections between GlusterFS clients and servers. GlusterFS-3.6 introduced support for encrypting the manangement connections, the connections between GlusterDs within a trusted storage pool. When using network encryption, GlusterFS also uses TLS/SSL for authentication and authorization, in place of the home grown auth framework used for normal connections. Though encryption has been supported for quite some time, the number of users using it has been minimal.
I got tired of Tumblr. So I’ve moved my blog to Ghost.
Probably the best and simplest intro to the Unix operating system and its principles. Straight from the guys who created it.
Even after watching another video describing the technique used, it’s hard to believe it. Update: Here’s the making video
Gogfapi A GoLang wrapper around gfapi. Something, I’ve been working on recently.
It’s been more than 2 years since I last updated this blog. Lots of things have happened since then. When I did the last post, I was just 1 month into my first job at Gluster. Now, I’ve completed 2 years at Red Hat (Red Hat acquired Gluster btw). Then, I had no clue about what Gluster did anything. Now, I know of most of the guts of Gluster. Back then I had yet to install Arch Linux for the first time.