Accelerating Debugging In A Highly Distributed Environment CHEP 2015 OIST Okinawa, Japan April 28, 2015 Andrew Hanushevsky, SLAC

Slides:



Advertisements
Similar presentations
Potential Data Access Architectures using xrootd OSG All Hands Meeting Harvard University March 7-11, 2011 Andrew Hanushevsky, SLAC
Advertisements

XRootD Release 4 And Beyond GSI Seminar Stanford University/SLAC July15, 2015 Andrew Hanushevsky, SLAC
Xrootd Roadmap Atlas Tier 3 Meeting University of Chicago September 12-13, 2011 Andrew Hanushevsky, SLAC
Web Filtering. ExchangeDefender Web Filtering provides policy-controlled protection from dangerous content on the web. Web Filtering is agent based, allowing.
Xrootd Update OSG All Hands Meeting University of Nebraska March 19-23, 2012 Andrew Hanushevsky, SLAC
Naming Computer Engineering Department Distributed Systems Course Asst. Prof. Dr. Ahmet Sayar Kocaeli University - Fall 2014.
Copyright B. Wilkinson, This material is the property of Professor Barry Wilkinson (UNC-Charlotte) and is for the sole and exclusive use of the students.
Hyrax Installation and Customization Dan Holloway James Gallagher.
Edwin Sarmiento Microsoft MVP – Windows Server System Senior Systems Engineer/Database Administrator Fujitsu Asia Pte Ltd
Windows Server MIS 424 Professor Sandvig. Overview Role of servers Performance Requirements Server Hardware Software Windows Server IIS.
Scalla Back Through The Future Andrew Hanushevsky SLAC National Accelerator Laboratory Stanford University 8-April-10
XRootD Roadmap To Start The Second Decade Root Workshop Saas-Fee March 11-14, 2013 Andrew Hanushevsky, SLAC
DONE-10: Adminserver Survival Tips Brian Bowman Product Manager, Data Management Group.
Guide to Linux Installation and Administration, 2e1 Chapter 3 Installing Linux.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Xrootd Authentication & Authorization Andrew Hanushevsky Stanford Linear Accelerator Center 6-June-06.
Chapter 9: Novell NetWare
Chapter 7: WORKING WITH GROUPS
The Next Generation Root File Server Andrew Hanushevsky Stanford Linear Accelerator Center 27-September-2004
Lawrence Livermore National Laboratory A system for strong local account management. SLAM David Frye Lawrence Livermore National Laboratory, P. O. Box.
11 MANAGING AND DISTRIBUTING SOFTWARE BY USING GROUP POLICY Chapter 5.
Xrootd Demonstrator Infrastructure OSG All Hands Meeting Harvard University March 7-11, 2011 Andrew Hanushevsky, SLAC
Samba Advanced System Administration Course James Lwali University computing Centre Ltd, University of Dar es salaam,
Multi-Tiered Storage with Xrootd at ATLAS Western Tier 2 Andrew Hanushevsky Wei Yang SLAC National Accelerator Laboratory 1CHEP2012, New York
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
Scalla/xrootd Introduction Andrew Hanushevsky, SLAC SLAC National Accelerator Laboratory Stanford University 6-April-09 ATLAS Western Tier 2 User’s Forum.
Dr. Mustafa Cem Kasapbaşı Security in ASP.NET. Determining Security Requirements Restricted File Types.
Linux Networking Security Sunil Manhapra & Ling Wang Project Report for CS691X July 15, 1998.
Xrootd Monitoring Atlas Software Week CERN November 27 – December 3, 2010 Andrew Hanushevsky, SLAC.
Support in setting up a non-grid Atlas Tier 3 Doug Benjamin Duke University.
SAM Installation Lauri Loebel Carpenter and the SAM Team February
Architecture and ATLAS Western Tier 2 Wei Yang ATLAS Western Tier 2 User Forum meeting SLAC April
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
CERN IT Department CH-1211 Geneva 23 Switzerland GT WG on Storage Federations First introduction Fabrizio Furano
Practical Distributed Authorization for GARA Andy Adamson and Olga Kornievskaia Center for Information Technology Integration University of Michigan, USA.
Performance and Scalability of xrootd Andrew Hanushevsky (SLAC), Wilko Kroeger (SLAC), Bill Weeks (SLAC), Fabrizio Furano (INFN/Padova), Gerardo Ganis.
Lecture 18 Page 1 CS 111 Online OS Use of Access Control Operating systems often use both ACLs and capabilities – Sometimes for the same resource E.g.,
Cyber Security Review, April 23-24, 2002, 0 Operated by the Southeastern Universities Research Association for the U.S. Depart. Of Energy Thomas Jefferson.
Xrootd Update Alice Tier 1/2 Workshop Karlsruhe Institute of Technology (KIT) January 24-26, 2012 Andrew Hanushevsky, SLAC
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Module 7: Implementing Security Using Group Policy.
ATLAS XRootd Demonstrator Doug Benjamin Duke University On behalf of ATLAS.
XRootD & ROOT Considered Root Workshop Saas-Fee September 15-18, 2015 Andrew Hanushevsky, SLAC
Office of Science U.S. Department of Energy Grid Security at NERSC/LBL Presented by Steve Chan Network, Security and Servers
Scalla Authorization xrootd /cmsd Andrew Hanushevsky SLAC National Accelerator Laboratory CERN Seminar 10-November-08
Xrootd Proxy Service Andrew Hanushevsky Heinz Stockinger Stanford Linear Accelerator Center SAG September-04
SRM Space Tokens Scalla/xrootd Andrew Hanushevsky Stanford Linear Accelerator Center Stanford University 27-May-08
Scalla As a Full-Fledged LHC Grid SE Wei Yang, SLAC Andrew Hanushevsky, SLAC Alex Sims, LBNL Fabrizio Furano, CERN SLAC National Accelerator Laboratory.
1 Andrew Hanushevsky - CHEP, February 7-11, 2000 Practical Security In Large Scale Distributed Object Oriented Databases
WLCG Authentication & Authorisation LHCOPN/LHCONE Rome, 29 April 2014 David Kelsey STFC/RAL.
Joe Budzyn Jeff Goeke-Smith Jeff Utter. Risk Analysis  Match the technologies used with the security need  Spend time and resources covering the most.
Federated Data Stores Volume, Velocity & Variety Future of Big Data Management Workshop Imperial College London June 27-28, 2013 Andrew Hanushevsky, SLAC.
Module 8 Implementing Security Using Group Policy.
Testing CernVM-FS scalability at RAL Tier1 Ian Collier RAL Tier1 Fabric Team WLCG GDB - September
12/3/98 Stanford Linear Accelerator Center Patrick R. Hancox
Associate ® Administration An Associate administrator has the ability to change the parameters for both the author and for the typist. There can be enterprise.
1 Use of AFS in the nanoCMOS project Christopher Bayliss
Geant4 GRID production Sangwan Kim, Vu Trong Hieu, AD At KISTI.
WARCS (Wide Area Remote Control for SPring-8)‏ A. Yamashita and Y.Furukawa SPring-8, Japan Control System Cyber-Security Workshop (CS)2/HEP Oct
Securing Network Servers
Guide to Linux Installation and Administration, 2e
Hadoop Architecture Mr. Sriram
Configuring ALSMS Remote Navigation
Global Data Access – View from the Tier 2
Monitoring Of XRootD Federation
INSTALLING AND SETTING UP APACHE2 IN A LINUX ENVIRONMENT
Lab 7 - Topics Establishing SSH Connection Install SSH Configure SSH
Installing Moodle Fantastico!.
SUSE Linux Enterprise Desktop Administration
Presentation transcript:

Accelerating Debugging In A Highly Distributed Environment CHEP 2015 OIST Okinawa, Japan April 28, 2015 Andrew Hanushevsky, SLAC

April 14, 20152CHEP 2015 Motivation Deploying a highly distributed system It’s federated across dozens of sites Sites are administratively independent The system competes with other site priorities Getting site attention can sometimes be difficult Site expertise is highly variable Sites span almost all time zones How do you resolve a site problem?

April 14, 20153CHEP 2015 Problematic Approaches ssh to the site’s problem node Multiple policies, accounts, password, etc This is not scalable May not even be given sufficient access the site admin Painfully slow iterative process The problem may disappear before you are done There must be a better way

April 14, 20154CHEP 2015 What Do You Really Need? Most of the time resolution simply needs Ability to look at the log files Check the configurations files Verify system settings Perhaps debug with a core file Remote access without site peculiarities That is, independent of the site’s setup File naming and locations

April 14, 20155CHEP 2015 Remote Debugging Is Not New Almost all browsers have this capability Standardization being attempted Windows remote desktop Remote gdb via gdbserver There are many more available schemes Usually overly intrusive Require expertise on both ends to use

April 14, 20156CHEP 2015 XRootD Minimalist XRootD Approach digFS An exportable pseudo file system - digFS Uniformly lays out all important information Site admin has complete control What information to export Who can actually see what Using strong authentication & authorization rules Detail logging of accesses and denials Information is strictly read-only Nothing in the site can be changed details

April 14, 20157CHEP 2015 digFS digFS Authorization digFS digFS consults an authorization file Created by the site and specified in config file xrootd.diglib * authfile all [-]conf [-]core [-]logs [-]proc allow gsi host krb5 pwd sss unix g=group h=host n=name o=org r=role ++   

April 14, 20158CHEP 2015 core/cmsd core/xrootd digFS The digFS View /=/ logs/cmsd logs/xrootd proc/cmsd proc/xrootd conf conf/etc Virtual exported path (Linux only) (Site specific) Configuration files Core files Log files /proc/self file system All independent of actual Internal layout details

April 14, 20159CHEP 2015 Adding Additional Files Special directive in the config file dig.addconf path [fname] Adds the file pointed to by path to namespace Specifically, appears as /=/conf/etc/fname Defaults to last component of path Useful for supplying site specific information E.g. dig.addconf /etc/init.d/xrootd init.d.xrootd

April 14, CHEP 2015 Deployment Not A Slam-Dunk Firewalls may interfere Standard proxies are of little help Looking to see what can be done here Resistance to even minimalistic scheme Some sites forbid any kind of remote access Some admins dislike any kind of intrusion But, whatever we get is better than nothing

April 14, CHEP 2015 What The Brave Would Like Additional useful abilities… Change certain directive settings Tracing; perhaps others for a specific duration Generate a gcore or pstack Restart the daemon(s) These would be subject to site admin rules

April 14, CHEP 2015 Acknowledgements Current Software Contributors ATLAS: Doug Benjamin, Patrick McGuigan, Ilija Vukotic CERN: Lukasz Janyst, Andreas Peters, Sebastien Ponce, Elvin Sindrilaru Fermi: Tony Johnson Root: Gerri Ganis SLAC: Andrew Hanushevsky, Wilko Kroeger, Daniel Wang, Wei Yang UCSD: Alja Mrak-Tadel, Matevz Tadel UNL: Brian Bockelman WLCG: Mattias Ellert, Fabrizio Furano, David Smith US Department of Energy Contract DE-AC02-76SF00515 with Stanford University Now For The Demo!