OpenSearch Community Meeting - 2023-0117

OpenSearch Community Meeting - 2023-0117 - Hope we see you all there!

Agenda:

Event page
Meetup page

Meeting Link

Meeting ID: 863 4082 8076
Passcode: 952752

Would you like to present? Tag @kris @dtaivpp @nateynate and we’ll work to get you added to the agenda!

Feel free to comment on this agenda before the meeting if you want to add an item or have a question.

After the meeting, we will post the chat log and any meeting notes. We welcome you to keep the conversation going here on the forum.

========
By joining the OpenSearch Community Meeting, you grant OpenSearch, and our affiliates the right to record, film, photograph, and capture your voice and image during the OpenSearch Community Meeting (the “Recordings”). You grant to us an irrevocable, nonexclusive, perpetual, worldwide, royalty-free right and license to use, reproduce, modify, distribute, and translate, for any purpose, all or any part of the Recordings and Your Materials. For example, we may distribute Recordings or snippets of Recordings via our social media outlets.

@kris @dtaivpp @nateynate Is there space for ~15 minutes to introduce and discuss the Identity feature during the meeting on the 17th? We will have a blog post, GitHub meta issue and project plan along side to share as well as get feedback on, would love to spend a couple minutes introducing the high level vision and then take questions.

1 Like

Sure is @peternied ! Looking forward to having you :smiley:

Absolutely! Will add you to the agenda - thanks!

@kris lets also add this one by Lukáš. Should be relatively short. It’s a sample plugin that is a test for an API to describe the available analyzers, tokenizers, and filters.

Excellent - thanks @dtaivpp! @lukas-vlcek - we’ll be looking forward to it!

Thank you to all who attended!

Chat log:

07:49:58 From David Tippett to Everyone:
- Chris - GitHub - opensearch-project/opensearch-migrations: All things migrations and upgrades for OpenSearch
- Peter - [META] Identity in OpenSearch · Issue #5834 · opensearch-project/OpenSearch · GitHub
- Lukáš - Get list of all available analyzers. Request for a new API? · Issue #5481 · opensearch-project/OpenSearch · GitHub
07:52:03 From Peter Nied to Everyone:
David could you replace my link with [Security] OpenSearch should support authentication and authorization natively · Issue #4514 · opensearch-project/OpenSearch · GitHub
07:52:06 From Chris Helma to Everyone:
Tracking Issue - [META] Upgrade Testing Framework Issue List · Issue #10 · opensearch-project/opensearch-migrations · GitHub

Tool README - https://github.com/opensearch-project/opensearch-migrations/blob/main/upgrades/README.md

07:56:38 From Kris Freedain to Waiting Room Participants:
Hello Everyone - we’ll get going in just a few minutes
07:56:57 From Nate Boot to Everyone:
Ohboyohboyohboy!
08:01:26 From Romain to Everyone:
o/
08:01:39 From Peter Nied to Everyone:
Cleaned the house, nearly spring cleaning!
08:01:55 From George Bridgeman to Everyone:
Laser tag for my kid’s birthday. I had more fun than the children!
08:02:12 From Kris Freedain to Everyone:
Worked in the garden a little
08:02:37 From Nate Boot to Everyone:
Introduce yourself!
08:02:46 From Nate Boot to Everyone:
:joy:
08:03:42 From David Tippett to Everyone:
[RFC] Search pipelines · Issue #80 · opensearch-project/search-processor · GitHub
08:04:14 From David Tippett to Everyone:
[RFC] Search pipelines · Issue #80 · opensearch-project/search-processor · GitHub
08:04:18 From Peter Nied to Everyone:
Or why you aren’t using the SQL Plugin!
08:04:34 From David Tippett to Everyone:
SQL A community call: share your mappings
08:04:58 From David Tippett to Everyone:
Finding the Right Things with OpenSearch, Tue, Jan 24, 2023, 7:00 PM | Meetup
08:05:17 From Daniel Doubrovkine to Everyone:
+ we’ve published some info on security reviews that we conduct before releasing software: .github/RELEASING.md at main · opensearch-project/.github · GitHub
08:05:58 From Nate Boot to Everyone:
Welcome Chris!
08:06:29 From David Tippett to Everyone:
Reacted to “+ we’ve published so…” with :heart:
08:06:31 From David Tippett to Everyone:
Reacted to “+ we’ve published so…” with :tada:
08:08:09 From Fernando Rejon Barrera to Everyone:
maybe it’s just me but I can’t see any slides (if there are any)
08:08:21 From David Tippett to Everyone:
Here is the tracking issue for OpenSearch Migrations - [META] Upgrade Testing Framework Issue List · Issue #10 · opensearch-project/opensearch-migrations · GitHub
08:09:06 From Fernando Rejon Barrera to Everyone:
never mind, I can see the screen now :+1
08:09:35 From Kris Freedain to Everyone:
Replying to “never mind, I can se…”

Chris was just doing an intro before - hadn’t shared his screen yet.

08:12:44 From Kris Freedain to Everyone:
Reacted to “+ we’ve published so…” with :tada:
08:13:48 From Amitai Stern to Everyone:
Wow!
08:14:50 From David Tippett to Everyone:
Here is the readme for the tool: opensearch-migrations/README.md at main · opensearch-project/opensearch-migrations · GitHub
08:15:00 From Kris Freedain to Everyone:
Reacted to “Here is the readme f…” with :+1:t2:
08:18:04 From Mark Cohen to Everyone:
Reacted to “o (Osman) · GitHub…” with :+1:
08:18:28 From David Tippett to Everyone:
Here is the tracking issue for OpenSearch Migrations - [META] Upgrade Testing Framework Issue List · Issue #10 · opensearch-project/opensearch-migrations · GitHub
08:22:38 From Charlotte to Everyone:
Oh just rub it in for those of us drowning in rain, Peter :wink:
08:22:49 From David Tippett to Everyone:
Reacted to “Oh just rub it in fo…” with :stuck_out_tongue:
08:22:54 From Nate Boot to Everyone:
I bet those blue clouds are really confusing.
08:23:03 From Kris Freedain to Everyone:
[Security] OpenSearch should support authentication and authorization natively · Issue #4514 · opensearch-project/OpenSearch · GitHub
08:23:30 From Kris Freedain to Everyone:
Peter is looking for feedback on that one
08:28:39 From Kris Freedain to Everyone:
Good blog post on plugins: Introduction to OpenSearch Plugins · OpenSearch
08:34:02 From Sam Herman to Everyone:
Thanks for the clarification DB!
08:34:25 From Daniel Doubrovkine to Everyone:
JSM = [RFC] Replace Java Security Manager (JSM) · Issue #1687 · opensearch-project/OpenSearch · GitHub
08:34:44 From David Tippett to Everyone:
hahaha
08:34:45 From Daniel Doubrovkine to Everyone:
Office office office office …
08:36:24 From Sander to Everyone:
We have a layer in front of the security plugin as well, to do ip filtering. We know which backend roles come from which ip’s, but opensearch doesn’t provide this so we put a Yarp (.net) proxy in front of opensearch. Would be nice if we had this out of the box and could remove the reverse proxy
08:42:42 From Stephen Crawford to Everyone:
Replying to “We have a layer in f…”

Hi Sander, it sounds like you are looking for a way to be able to natively determine the IP origin for different backend roles? Is that right? If you have not made an issue on the security repo about it then I would encourage that here: https://github.com/opensearch-project/security/issues

08:42:46 From David Tippett to Everyone:
[Security] OpenSearch should support authentication and authorization natively · Issue #4514 · opensearch-project/OpenSearch · GitHub
08:42:47 From Dave Lago (OpenSearch) to Everyone:
Thanks Peter!!
08:43:06 From Nate Boot to Everyone:
Thanks Peter. Enjoy your sunshine. :wink:
08:44:37 From Sander to Everyone:
Replying to “We have a layer in…”

Thanks, created it in the past https://github.com/opensearch-project/security/issues/987 Just remembered because of your hint

08:44:53 From Stephen Crawford to Everyone:
Replying to “We have a layer in f…”

Great, I will take a look at that for you.

08:45:43 From Sander to Everyone:
Replying to “We have a layer in…”

Thanks Stephen!

08:46:33 From Sander to Everyone:
Replying to “We have a layer in…”

If you need more details, no problem, can provide them in the issue or with a call.

08:47:50 From Stephen Crawford to Everyone:
Replying to “We have a layer in f…”

Sounds great. I will take a look at what is on the issue already and follow up on the issue with any immediate questions. I can also join a call at your convenience if there ends up being a lot to discuss for the issue. I will keep you updated as things progress 🙂

08:49:19 From Sander to Everyone:
Replying to “We have a layer in…”

Cool thanks, really appreciate the interactivity that you guys provide. 

08:52:45 From Stephen Crawford to Everyone:
Reacted to “Cool thanks, really …” with :+1:
08:54:44 From David Tippett to Everyone:
Here is where you can find the meta issue for the Analyzers API.
Get list of all available analyzers. Request for a new API? · Issue #5481 · opensearch-project/OpenSearch · GitHub
08:57:50 From Fernando Rejon Barrera to Everyone:
Is it possible to organize/host local community events? If so, who should I contact regarding this? We would like to organize something in Amsterdam.
08:58:31 From Chris Helma to Everyone:
Oh, physical coins. I was thinking crypto! :sweat_smile:
08:58:32 From Sander to Everyone:
`great to see that the community is growing, keep it up :slight_smile:
08:58:52 From Sander to Everyone:
@fernando, would be interested as well, working at the University of Wageningen
08:59:38 From Fernando Rejon Barrera to Everyone:
thanks

09:00:05 From Nate Boot to Everyone:
:partying_face:
09:00:12 From Peter Nied to Everyone:
Great meeting, thanks for the vibrant discussion!

09:02:18 From Nate Boot to Everyone:
I know sometimes people have asked “What is the actual tokenizer string you type in for your index mapping to use it?” - I: can see how a bit of extra reflection mightg make this information self-discoverable.
09:03:59 From Kris Freedain to Everyone:
Reminder - the Security team holds their triage meetings publicly = next one is happening today: Development Backlog & Triage Meeting - Security - 2023-01-17 · OpenSearch
09:04:20 From Stephen Crawford to Everyone:
Reacted to “Reminder - the Secur…” with :eyes:
09:04:47 From Sam Herman to Everyone:
Thank you all, have to drop.
09:04:52 From Nate Boot to Everyone:
Thanks for coming Sam!
09:05:01 From David Tippett to Everyone:
Thanks Sam!
09:07:03 From Fernando Rejon Barrera to Everyone:
thanks all
09:07:22 From Lukáš Vlček (@Aiven.io) to Everyone:
LOL, thanks!
09:07:25 From eliatra Excelerate Technology Ltd. to Everyone:
Thanks!
09:07:28 From Arnav Das to Everyone:
Thanks

Slide1
Slide2
Slide4
Slide5








Slide6
Slide7
Slide8
Slide10