Managing Ensembles Nilesh M. Bhide. System Access Models The Stand-alone System –Beowulf system unattached to any external network The Universally Accessible.

Slides:



Advertisements
Similar presentations
1 Linux IP Masquerading Brian Vargyas XNet Information Systems.
Advertisements

Information and Communications Theory Labs, School of Computer & Communication Sciences FILE: kickstart.sxi / 24/01/03 / Page 1
DHCP -Ameeta and Haripriya -cmsc 691x. DHCP ► Dynamic Host Configuration Protocol ► It controls vital networking parameters of hosts with the help of.
INSTALLING LINUX.  Identify the proper Hardware  Methods for installing Linux  Determine a purpose for the Linux Machine  Linux File Systems  Linux.
Chapter 2 Booting and Shutting Down Kim Grempler (Sections 2.0 to 2.3) Leon Dague (Sections 2.4 to 2.7)
Unix Refresher This presentation is an amalgam of presentations by Mark Michael, Randy Marchany and Ed Skoudis. I have edited and added material. Dr. Stephen.
Securing Network using Linux. Lesson Outline Setting up a secure system TCP Wrapper configuration Firewalls in Linux Authentication Systems –NIS –Kerberos.
Exploring the UNIX File System and File Security
Linux+ Guide to Linux Certification, Second Edition Chapter 15 Configuring Network Services and Security.
PC Cluster Setup on Linux Fedora Core 5 High Performance Computing Lab Department of Computer Science and Information Engineering Tunghai University, Taichung,
Linux Intro Linux, the do it yourself OS Linux, successor to MINIX Linux, Unix for the masses (PC users) History:
GNU/Linux Filesystem 1 st AUT GNU/Linux Festival Computer Engineering & IT Department Bahador Bakhshi.
Lesson 22 – Introduction to Linux Systems Administration.
The UNIX File System.
Guide To UNIX Using Linux Third Edition
Network Performance Toolkit (NPToolkit) A Knoppix Live-CD Rich Carlson Tools Tutorial 12/4/06.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
© 2010 VMware Inc. All rights reserved VMware ESX and ESXi Module 3.
Remote Disk Access with NFS
Linux System Administration LINUX SYSTEM ADMINISTRATION.
1. This presentation covers :  User Interface Administration  Files System and Services Management 2.
File System and Directory Structure in Linux. What is File System In a computer, a file system is the way in which files are named and where they are.
Guide To UNIX Using Linux Fourth Edition
1 The Solaris Distributed Computing Solution The operating system is a set of programs that manages all computer operations and provides an interface between.
Linux & Library – Web Kiosks for Peanuts Sam Deeljore Pius XII Memorial/HSC Libraries Saint Louis University LITA 2004 National Forum St. Louis, Missouri.
Linux Networking #2 Dr. Michael L. Collard 1.
1 Network File Sharing. 2 Module - Network File Sharing ♦ Overview This module focuses on configuring Network File System (NFS) for servers and clients.
Linux Security Anthony Albrecht – Services & Accounts
IT:NETWORK:MICROSOFT SERVER 2 DHCP AND WINDOWS DEPLOYMENT SERVICES.
Guide to Linux Installation and Administration, 2e1 Chapter 8 Basic Administration Tasks.
ITI-481: Unix Administration Meeting 3. Today’s Agenda Hands-on exercises with booting and software installation. Account Management Basic Network Configuration.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
Linux Services Muhammad Amer. 2 xinetd Programs  In computer networking, xinetd, the eXtended InterNET Daemon, is an open-source super-server daemon.
Chapter Two Exploring the UNIX File System and File Security.
INTRODUCTION TO LINUX Jacob Chan. GNU/Linux Consists of Linux kernel, GNU utilities, and open source and commercial applications Works like Unix –Multi-user.
RDC R32xx/HB30x Web UI & System Configuration Design March. 23, 2006 draft version 0.99 RDC Semiconductor Co., Ltd. All Rights Reserved.
USING YOUR INSTALLED LINUX SYSTEM.  Common Linux Tasks  Installing Custom Packages  Common GUI Applications  Command Line Shell  Directory Structure/Navigation.
User Management Burgess, Ch.5.
Manage Directories and Files in Linux. 2 Objectives Understand the Filesystem Hierarchy Standard (FHS) Identify File Types in the Linux System Change.
Chapter Two Exploring the UNIX File System and File Security.
CIS 192B – Lesson 3 Network Information Services.
Linux Security. Module 13 – Linux Security ♦ Overview Linux is more prone today to security loopholes and attacks, both inside and outside the network.
Networking in Linux: a brief overview. TCP/IP  TCP/IP concepts we have seen are applicable to Linux (a version of UNIX, where TCP/IP started)  Some.
UNIX History - joint venture between MIT and Bell Labs (originally called Multics) – Ken Thompson (AT&T) created an operating system to run Space.
PTA Linux Series Copyright Professional Training Academy, CSIS, University of Limerick, 2006 © Workshop V Files and the File System Part B – File System.
User Management. User Registration Policy The issues of creation and management often clash in distributed organisations Central creation and management.
Chapter 10: File-System Interface Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Jan 1, 2005 File-System Interface.
Filesystem Management and Backups. 2 Section Overview Devices and Files Filesystem Management Network Filesystems Backups.
Linux Operations and Administration
The 2001 Tier-1 prototype for LHCb-Italy Vincenzo Vagnoni Genève, November 2000.
Beowulf Design and Setup Section 2.3.4~2.7: Adam.
ORAFACT The Linux File System. ORAFACT Filesystem Support Support for dozens of filesystem types including: Minix, ext2, MS-DOS, UMSDOS, VFAT, NTFS, NFS,
Memory management. Linux Memory Management Total memory available for processes = real memory + paging space - 1MB. First megabyte of real memory is used.
Linux Administration – Finding You Way on the Command Line The Linux File Directory or Tree.
Filesystem Management and Backups
Welcome to Linux Chap#1 Hanin Abdulrahman.
UBUNTU INSTALLATION
Chapter 6 File Systems CSNB113 SYSTEM ADMINISTRATION
Basic Commands ls cp ls –l (in detail format) echo ls –a
Security Tips for James Eyrich Manager Security Operations and Incident Response
9 Linux on the Desktop.
Overview of Unix Jagdish S. Gangolly School of Business
IS3440 Linux Security Unit 6 Using Layered Security for Access Control
Exploring the UNIX File System and File Security
IS3440 Linux Security Unit 4 Securing the Linux Filesystem
Chapter 7 File and file System structure
SUSE Linux Enterprise Desktop Administration
Welcome to Linux Chap#1 Hanin Abdulrahman.
Welcome to Linux Chap#1.
Presentation transcript:

Managing Ensembles Nilesh M. Bhide

System Access Models The Stand-alone System –Beowulf system unattached to any external network The Universally Accessible Machine –Every node is accessible from the entire Internet The Guarded Beowulf –A single front-end (“worldly node”)

Assigning Names Internal host names of the format – Reserved IP addresses – – – Dynamically assigned Address –DHCP, BOOTP

Cloning Nodes Configure one internal node and clone rest of them Advantages –Quick and easy configuration of internal nodes –Facilitates major system upgrades –Easy recovery from disk failures, accidental file system corruption

Cloning Nodes (contd.) Steps involved –Manual configuration of a single internal node Install NFS automounter –Creation of tar images for each partition omit /proc, which is not a physical disk partition tar zclf /worldly/nfsroot/partition-name.tgz.

Cloning Nodes (contd.) –Setting up a clone root partition Create a root directory for cloning on the worldly node. This should we exported via NFS This directory should contain bin, dev, etc, lib, mnt, proc, sbin, tmp subdirectories –tar -C / -c -f - dev | tar xf - –tmp and etc subdirectories should be empty –etc/fstab enrty : “none /proc proc default 0 0” Replace NFS root sbin/init script Export NFS root directory

Cloning Nodes (contd.) –Setting up BOOTP set up /etc/bootptab file.default:\ :sm= :\ :ht=ether:\ :gw= \ :rp=/export/nfsroot/: b002:ip= :ha=0080c8638a2c=.default b003:ip= :ha=0080c86359d9=.default Enable bootpd daemon on the worldly node –/etc/inetd.conf

Cloning Nodes (contd.) –Building a boot clone floppy CACR Beowulf cloning software – Building NFSROOT kernel –/usr/src/linux –mknod /dev/nfsroot b –rdev zImage /dev/nfsroot –dd if=zImage of=/dev/fd0 bs=512

Basic System Administration Booting and Shutting Down –/sbin/shutdown -h now (using prsh) –ATX power supplies /sbin/shutdown -p now The node file system –/ :The root partition, containig system configuration and log files –/boot : An optional partition for storing kernel images

Basic System Administration –/home : A partition containing all user directories –/opt : An optional partition for additional software –/usr : A partition containing all standard system software –/scratch : A partition used as scratch space for large temporary data files

Basic System Administration Account Management –NIS, NIS+ –useradd, adduser, linuxconf –Replicating /etc/passwd, /etc/group –NIS vs. Replication

Basic System Administration PRSH - Parallel Remote Shell – –e.g., prsh -- killall amok

Security Strategies CERT: System Configuration –Stand-alone, Universally accessible, Guarded IP Masquerading –NAT (Network Address Translation) –Client node set up route add default gw or /etc/sysconfig/network configuration ( GATEWAY, GATEWAYDEV )

Security Strategies (Contd.) – Worldly node set up IP Masquerade HOWTO in /usr/doc/HOWTO/mini FORWARD_IPV4=true in /etc/sysconfig/network Configure IP masquerading rules using ipfwadm –ipfwadm -F -p deny –ipfwadm -F -a masq -S /24 -D /0 –/etc/rc.d/rc.local or /etc/rc.d/init.d ipfwadm-wrapper for 2.2 Linux kernels

Security Strategies (Contd.) Restricting host access –TCP wrappers package –tcpd daemon invoked by inetd and listed in /etc/inetd.conf –/etc/hosts.deny and /etc/hosts.allow e.g., in.rshd: / – Placing worldly node behind firewall SSH:

Job Scheduling Keeps user-developed applications from interfering with each other. Currently no standard exists for job schedulers BPROC (Beowulf Distributed Process Space) –