1 DEGISCO Desktop Grids For International Scientific Collaboration Details on Roadmap (interoperation with gLite and EMI grids) Budapest, 14.07.2011 Sandor.

Slides:



Advertisements
Similar presentations
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks MyProxy and EGEE Ludek Matyska and Daniel.
Advertisements

EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Introduction to EGEE hands-on Gergely Sipos.
EDGI European Desktop Grid Initiative gLite job submission to EDGI EDGI is supported by the FP7 Capacities Programme under contract nr RI
P-GRADE and WS-PGRADE portals supporting desktop grids and clouds Peter Kacsuk MTA SZTAKI
1c.1 Assignment 2 Preliminaries Review Full details in assignment write-up. ITCS 4146/5146 Grid Computing, 2007, UNC-Charlotte, B. Wilkinson. Jan 24, 2007.
Summer School Certificates Diego Romano & Gilda Team.
Basic Grid Job Submission Alessandra Forti 28 March 2006.
Report Distribution Report Distribution in PeopleTools 8.4 Doug Ostler & Eric Knapp 7264.
Security Mechanisms The European DataGrid Project Team
Apache : Installation, Configuration, Basic Security Presented by, Sandeep K Thopucherela, ECE Department.
Amazon EC2 Quick Start adapted from EC2_GetStarted.html.
Linux Operations and Administration
Ch 8-3 Working with domains and Active Directory.
Eucalyptus Virtual Machines Running Maven, Tomcat, and Mysql.
Customized cloud platform for computing on your terms !
Pc Naming Configuration 1.WEB REGISTER 2.FIXNAME 3.MCAFEE AGENT SETUP ITC Training: Session 2.
Microsoft Internet Security and Acceleration (ISA) Server 2004 is an advanced packet checking and application-layer firewall, virtual private network.
1 Guide to Novell NetWare 6.0 Network Administration Chapter 13.
The EPIKH Project (Exchange Programme to advance e-Infrastructure Know-How) VOMS Installation and configuration Bouchra
The EDGeS project receives Community research funding 1 Specific security needs of Desktop Grids Desktop Grids Desktop Grids EDGeS project EDGeS project.
Integrating with UCSF’s Shibboleth system
The gLite API – PART I Giuseppe LA ROCCA INFN Catania ACGRID-II School 2-14 November 2009 Kuala Lumpur - Malaysia.
The EDGI project receives Community research funding 1 EDGI Brings Desktop Grids To Distributed Computing Interoperability Etienne URBAH
SCI-BUS is supported by the FP7 Capacities Programme under contract nr RI Creating the Autodock gateway from WS-PGRADE/gUSE and making it cloud-enabled.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
The EPIKH Project (Exchange Programme to advance e-Infrastructure Know-How) Workload Management System + Logging&Bookkeeping Installation.
The EDGeS project receives Community research funding 1 SG-DG Bridges Zoltán Farkas, MTA SZTAKI.
The EDGeS project receives Community research funding 1 Bridging EGEE to BOINC and XtremWeb GIN : From interoperation to interoperability.
GRID. Register Fill the form. Your IP (Juanjo) signature is needed and the one from the.
Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Usage of virtualization in gLite certification Andreas Unterkircher.
Getting started DIRAC Project. Outline  DIRAC information system  Documentation sources  DIRAC users and groups  Registration with DIRAC  Getting.
EGEE-II INFSO-RI Enabling Grids for E-sciencE The GILDA training infrastructure.
1 Andrea Sciabà CERN Critical Services and Monitoring - CMS Andrea Sciabà WLCG Service Reliability Workshop 26 – 30 November, 2007.
Glite. Architecture Applications have access both to Higher-level Grid Services and to Foundation Grid Middleware Higher-Level Grid Services are supposed.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Enabling Grids for E-sciencE Workload Management System on gLite middleware - commands Matthieu Reichstadt CNRS/IN2P3 ACGRID School, Hanoi.
Development of e-Science Application Portal on GAP WeiLong Ueng Academia Sinica Grid Computing
SAM Sensors & Tests Judit Novak CERN IT/GD SAM Review I. 21. May 2007, CERN.
Linux Operations and Administration
SCI-BUS is supported by the FP7 Capacities Programme under contract nr RI Accessing Cloud Systems from WS-PGRADE/gUSE Zoltán Farkas MTA SZTAKI LPDS.
11 Introduction to EDGI Peter Kacsuk, MTA SZTAKI Start date: Duration: 27 months EDGI.
WLCG Authentication & Authorisation LHCOPN/LHCONE Rome, 29 April 2014 David Kelsey STFC/RAL.
12th EELA TUTORIAL - USERS AND SYSTEM ADMINISTRATORS FP6−2004−Infrastructures−6-SSA E-infrastructure shared between Europe and Latin.
TP: Grid site installation BEINGRID site installation.
OpenNebula: Experience at SZTAKI Peter Kacsuk, Sandor Acs, Mark Gergely, Jozsef Kovacs MTA SZTAKI EGI CF Helsinki.
User Interface UI TP: UI User Interface installation & configuration.
Grid Execution Management for Legacy Code Architecture Exposing legacy applications as Grid services: the GEMLCA approach Centre.
Hands on Security, Authentication and Authorization Virginia Martín-Rubio Pascual RedIRIS/Red.es Curso Grid y e-Ciencia.
EGI-InSPIRE RI Grid Training for Power Users EGI-InSPIRE N G I A E G I S Grid Training for Power Users Institute of Physics Belgrade.
Enabling Grids for E-sciencE gLite security pratical tutorial Dario Russo INFN Catania Catania,
Tutorial on Science Gateways, Roma, Catania Science Gateway Framework Motivations, architecture, features Riccardo Rotondo.
EMI is partially funded by the European Commission under Grant Agreement RI Argus Policies Tutorial Valery Tschopp (SWITCH) – Argus Product Team.
RI EGI-TF 2010, Tutorial Managing an EGEE/EGI Virtual Organisation (VO) with EDGES bridged Desktop Resources Tutorial Robert Lovas, MTA SZTAKI.
11 Extending EMI middleware with DGs Peter Kacsuk, MTA SZTAKI Start date: Duration:
Claudio Grandi INFN Bologna Virtual Pools for Interactive Analysis and Software Development through an Integrated Cloud Environment Claudio Grandi (INFN.
1 Globe adapted from wikipedia/commons/f/fa/ Globe.svg IDGF-SP International Desktop Grid Federation - Support Project SZTAKI.
INFN/IGI contributions Federated Clouds Task Force F2F meeting November 24, 2011, Amsterdam.
SCI-BUS is supported by the FP7 Capacities Programme under contract nr RI CloudBroker usage Zoltán Farkas MTA SZTAKI LPDS
The EPIKH Project (Exchange Programme to advance e-Infrastructure Know-How) gLite Grid Introduction Salma Saber Electronic.
Windows Server 2003 { First Steps and Administration} Benedikt Riedel MCSE + Messaging
Enabling Grids for E-sciencE Claudio Cherubino INFN DGAS (Distributed Grid Accounting System)
EDGI European Desktop Grid Initiative Have you ever submitted jobs to gLite in one run? If not, I will show.
ArcGIS for Server Security: Advanced
The EDGI (European Desktop Grid Initiative) infrastructure and its usage for the European Grid user communities József Kovács (MTA SZTAKI)
How to connect your DG to EDGeS? Zoltán Farkas, MTA SZTAKI
Unit 27: Network Operating Systems
INSTALLING AND SETTING UP APACHE2 IN A LINUX ENVIRONMENT
Configuring Internet-related services
Grid Engine Diego Scardaci (INFN – Catania)
Presentation transcript:

1 DEGISCO Desktop Grids For International Scientific Collaboration Details on Roadmap (interoperation with gLite and EMI grids) Budapest, Sandor Acs, MTA SZTAKI DEGISCO is supported by the FP7 Capacities Programme under contract nr RI

2 DEGISCO WP2 13/07/ Presentation outline 1.Short overview from BOINC 2.EDGI Virtual Images 3.SG->3G Bridge ->BOINC 4.Live Demo

3 DEGISCO WP2 13/07/ BOINC Middleware designed for volunteer Desktop grid computing Used for the largest Grid in the world: More than 4 million computers world wide have BOINC installed Many other projects use BOINC

4 DEGISCO WP2 13/07/ BOINC Structure BOINC is organised around projects: a project is typically one application Resource computers (BOINC clients) can connect to one or more projects A Grid server can run more projects User interface can be integrated with the project

5 DEGISCO WP2 13/07/ BOINC Server Installation Installing a BOINC Grid is not click and play Collection of C++ programs, PHP scripts and other sources, with many dependencies on operating system, the database, and other tools Easiest way: get one of the distributions. For instance the SZTAKI BOINC distribution. This installs relatively fast if you start with a Debian/Linux system

6 6 BOINC Client on resource Customisable, easy-to-install Easy view and complex view with a lot of details on what is happening

7 7 BOINC applications BOINC applications have to be compiled with calls to a special BOINC API. There are some wrappers for executables, like genwrapper (developed by MTA SZTAKI) More extensive API’s exist for instance for master worker-applications: DC-API (developed by MTA SZTAKI)

8 Job source WS submitter Job source WS submitter Job Handler Interface DB Queue Manager Grid Handler Interface DC-API plugin Job submission from gLite to BOINC via 3G-Bridge

9 VOMS LBWMSBDII LBWMSBDII AR* Local BOINC DG LB WMS BDII UI CE Figure of the virtualized infrastructure CA*

10 Purpose of virtual infrastructure The purpose of these VMs is to provide a base to easily set up local test or development infrastructure to be used for:  getting to know these services or  devel  developing and testing applications and  new middleware components in a local usage scenario.

11 Overview Virtual machine (VM) images are set up as a test infrastructure for EDGI project. Available “ Virtual machines are configured to function as:  a minimal,  self contained, test infrastructure of the SG ⇒ DG (service grid to desktop grid) infrastructure.

12 Warning! The components are similar to those used in the EDGeS/EDGI production infrastructure however, these VMs are not meant to be used for setting up a public production infrastructure. The focus while creating these VMs were on: easy installation and simple local usage as opposed to :  performance and  security which in this setup do not meet the requirements of production usage.

13 Overview of Virtual machines  testui.edgitest UI, BDII_top SL5 (x86_64, gLite 3.2)  testvoms.edgitest VOMS, BDII_site, CA (SL5 x86_64, gLite 3.2)  testwms.edgitest WMS, LB (SL4 i386, gLite 3.1)  testce.edgitest lcg-CE, bridge-CE BOINC, 3gbridge (SL4 i386, gLite 3.1)  testboinc.edgitest SZDG 6.11 (Debian 6)

14 Virtualization technology and starting the VMs  Images come in the qcow2 format:  native format of QEMU,  Compressed.  Qemu-img tool can covert these files to all widely used virtual machine monitor formats.  Images are compatible with XEN, KVM and QEMU out of the box.  Some VMs need x86_64 capable CPU.  VM instances should be started in the order indicated by their IP addresses (testui first).

15 Network Configuration The VMs have their networking preconfigured to use IP addresses in the /24 network because:  Grid Security Infrastructure used by gLite requires fixed host names for host certificates,  to avoid the need for DHCP and DNS service configuration simple static IP assignment is used (and the name mapping is done in /etc/hosts).  If the network configuration is changed /etc/hosts has to be synchronized on all VMs.

16 Security  The VMs are intended for local use and not configured with security in mind and should be protected by a firewall controlling access to the subnet they live in.  Trusted Certification Authority a simple local CA was created on testvoms to serve only this infrastructure. The CA certificates are installed on testui and also shared by all VMs.  This local CA is not in any way secure because its private key comes with the VM images and thus accessible to anyone so it should only be used for these VMs where access to the VM instances are secured by other means (e.g. using a firewall to control access to the instances).

17 TestVO and test user  A local VO named “test” was created and it is hosted on the testvoms VM.  This setup makes it simple to use the infrastructure in a local setting and allows independent management of users and hosts (and allowed us to ship the VMs with pre-installed host certificates so you don’t have to care about them).  In the following, the procedure is described needed to create a new user and add it to the VO. This has already been done for the testuser so you can use this account for testing.

18 Create user 1. First create the user account on testui as root: ~]# useradd testuser ~]# passwd testuser 2. Change to the new user and create a certificate request for this user (enter the user name and a password when prompted): ~]# su - testuser ~]$ grid-cert-request 3. Now disregard the instructions printed about mailing the certificate request and instead just copy the certificate request to ~]# scp ~/.globus/usercert_request.pem

19 Create user (2) 4. Leave and log in to On testvoms sign the request: ~]# /opt/globus/bin/grid-ca-sign -dir simpleCA \ -in usercert_request.pem -out usercert.pem -days This will put the new certificate in usercert.pem (check that CN part in the Subject: line matches the user name), copy this certificate back to and then remove the files from testvoms: ~]# grep Subject: usercert.pem Subject: O=Grid, OU=simpleCA, OU=EDGI, OU=edgitest, CN=testuser ~]# scp usercert.pem ~]# rm usercert.pem usercert_request.pem

20 Create user (3) 6. Register the user in the test VO (use the Subject printed above replacing commas with slashes for the user DN): ~]# voms-admin --nousercert --vo test create-user \ "/O=Grid/OU=simpleCA/OU=EDGI/OU=edgitest/CN=testuser" \ "/O=Grid/OU=simpleCA/OU=EDGI/CN=EDGI Test CA" \ "testuser" You can check the new user in the list of users: ~]# voms-admin --vo test list-users 7. VOMS requires new users to accept an AUP via a web form for their registration to remain valid. To do this go back to where you can use a text mode browser to do this. First get an old style grid proxy from your certificate and use that to authenticate to VOMS: ~]$ grid-proxy-init -old Your identity: /O=Grid/OU=simpleCA/OU=EDGI/OU=edgitest/CN=testuser Enter GRID pass phrase for this identity: Creating proxy Done

21 Create user (4) 8. Then start the text mode browser telling it to use your proxy for authentication: ~]$ X509_CLIENT_CERT=/tmp/x509up_u$(id -u) elinks In elinks go to the URL below, scroll down to the bottom of the page with arrow keys, check the box using the X key and then press Enter on the submit button. After that you can leave elinks with the Q key. [X] I declare I have read and agree with the AUP terms displayed above [ Submit ] 9. This concludes the user creation and registering in the VO. You can destroy the proxy created above: ~]$ grid-proxy-destroy

22 Testing the infrastructure 1. Create a voms proxy: ~]$ voms-proxy-init --voms test 2. Submit a job: ~]$ cd DSP_Test DSP_Test]$ glite-wms-job-submit -a -o id dsp.jdl 3. You can check the status of the job with the following command: DSP_Test]$ glite-wms-job-status -i id 4. You can get more detailed information about the state changes of the job with the following command: DSP_Test]$ glite-wms-job-logging-info -v 2 -i id

23 Testing the infrastructure (2) 5. When the job reached the Done(Success) state you can download the output of the job: DSP_Test]$ glite-wms-job-status -i id 6. Finally, check the output, remove the files created and destroy proxy when finished using the infrastructure: DSP_Test]$ cat testuser_XXXXXXXX/cost.txt DSP_Test]$ rm -rf id testuser_XXXXXXXX ~]$ voms-proxy-destroy

24 Configuration of the VMs The gLite VMs are configured with YAIM.  On each machine the configuration is stored in the /root/glite directory.  The main configuration file is called site-info.def.  This file is not exactly the same on every component.  Additionally to the main config file the /root/glite/vo.d directory contains the VO configuration and other files or a services subdirectory may have other configuration files for some node types. The correct YAIM command can be found in the file /root/glite/confcmd on each VM.  For example (on testui): glite]# cat confcmd /opt/glite/yaim/bin/yaim -c -s site-info.def -n glite-UI -n BDII_top

25 Configuration of the VMs (2) The BOINC project called edgitest was installed from the SZDG BOINC distribution to “testboinc” VM.  It contains 3G-Bridge and  the DSP application for testing. (3G-Bridge related configuration files can be found at /var/lib/boinc/edgitest/master/3g-bridge/.) The EDGeS SG ⇒ DG bridging requires an Application Repository  but for brevity this is not included in this set of VMs.  Instead a local, static ARCache pre-loaded with the necessary values was created on testce in the /srv/www/lighttpd/Repository directory and the CE is configured to use this local ARCache.  This means that the infrastructure is independent of any other infrastructures and does not require connection to an ARCache (as is the case for normal CEs).  Also note that the local ARCache is not updated from the AR as the regular ARCache thus, adding new applications requires editing of this local ARCache instance by hand.

26 Troubleshooting If something goes wrong then the logs can be checked for errors.  Generally the log files are kept in the /var/log/ directory on Linux systems but some services do not follow this and put their logs elsewhere.  Some gLite services (including the gLite part of the EDGeS bridge) are logging to /opt/*/var/log/ under their installation root (the bridge logs are on testce in /opt/edges/var/log/). On testboinc log files of the BOINC project are located at /var/lib/boinc/edgitest/project/log_testboinc/. The logs of the BOINC client is at /var/lib/boinc- client/stdoutdae.txt.

27 Globe adapted from wikipedia/commons/f/fa/ Globe.svg DEGISCO Desktop Grids For International Scientific Collaboration