Difference between revisions of "Fedcloud-tf:CloudscapeVDemo"
(→TODOs) |
|||
(5 intermediate revisions by the same user not shown) | |||
Line 26: | Line 26: | ||
= TODOs = | = TODOs = | ||
== rOCCI client == | == <span style="color:green">rOCCI client</span> == | ||
====<span style="color:green"> | ====<span style="color:green">Get rOCCI client</span> ==== | ||
This was quite a hassle for MAC OS X 10.8 (Mountain Lion). I finally managed getting rOCCI client running natively on Mac OS X - [[rOCCI client on Mac OS X Mountain Lion (10.8)|here is how I did it]]. | This was quite a hassle for MAC OS X 10.8 (Mountain Lion). I finally managed getting rOCCI client running natively on Mac OS X - [[rOCCI client on Mac OS X Mountain Lion (10.8)|here is how I did it]]. | ||
Line 34: | Line 34: | ||
<span style="color:red">Action rOCCI team</span> - document usage on Mac OS X (issue filed on Github) (see https://github.com/gwdg/rOCCI/issues/59) | <span style="color:red">Action rOCCI team</span> - document usage on Mac OS X (issue filed on Github) (see https://github.com/gwdg/rOCCI/issues/59) | ||
====<span style="color:green" | ====<span style="color:green">rOCCI client and my Grid certificate </span>==== | ||
After sorting out the issues with Ruby and rOCCI client (see above), the certificate handling wasn't a problem anymore. However, I stand with my request to support PKCS#12 format for key and cert storage as this is *very* widely supported and does not need people to mess with OpenSSL cmd line hacking to get the authN sorted. | After sorting out the issues with Ruby and rOCCI client (see above), the certificate handling wasn't a problem anymore. However, I stand with my request to support PKCS#12 format for key and cert storage as this is *very* widely supported and does not need people to mess with OpenSSL cmd line hacking to get the authN sorted. | ||
Line 42: | Line 42: | ||
<span style="color:red">Action</span> - Please document '''in easy steps''' the whole process of acquiring a Grid certificate and how to configure command line systems (for PEM support) | <span style="color:red">Action</span> - Please document '''in easy steps''' the whole process of acquiring a Grid certificate and how to configure command line systems (for PEM support) | ||
==== <span style="color: | ==== <span style="color:Green;">Getting started with client</span> ==== | ||
Set up a couple of config scripts that make the command line very easy. See raw demo takes available at https://documents.egi.eu/document/1593) | |||
For longer term, a rOCCI client config file will be helpful. | |||
<span style="color:red">Action rOCCI team</span> - Support config files with endpoint profiling (https://github.com/gwdg/rOCCI/issues/46) | <span style="color:red">Action rOCCI team</span> - Support config files with endpoint profiling (https://github.com/gwdg/rOCCI/issues/46) | ||
== RP status == | == <span style="color:Orange;">RP status</span> == | ||
==== <span style="color:Green;">Getting started with client</span> ==== | |||
See rOCCI client configuration. Endpoint queries are stable and promising. Focusing on OCCI endpont queries. | |||
==== <span style="color:Orange;">Compute queries</span> ==== | |||
The OCCI command is (omitting authentication parameters): | |||
occi --endpoint $ENDPOINT --resource compute --action list | |||
RP status<br> | |||
<span style="color:Green;">CESGA, CESNET, GWDG, GRIF</span><br> | |||
The OCCI command | <span style="color:Orange;">JUELICH, GRNET, IN2P3, IFCA</span> all authentication errors<br> | ||
occi -- | <span style="color:Red;">CYFRONET, INFN</span> both no endpoint in GOCDB) <br> | ||
==== <span style="color:Orange;">Compute instantiations</span> ==== | |||
The OCCI command is (omitting authentication parameters): | |||
occi --endpoint $ENDPOINT --resource compute --action create --mixin os_tpl#$TPL -t "title" | |||
RP status<br> | |||
<span style="color:Green;">CESGA, CESNET, GWDG</span><br> | <span style="color:Green;">CESGA, CESNET, GWDG</span><br> | ||
<span style="color:Orange;"> | <span style="color:Orange;">GRIF</span> Fails to return resource identifier, no resource creatred<br> | ||
<span style="color: | <span style="color:Orange;">JUELICH, GRNET, IN2P3, IFCA</span> all authentication errors<br> | ||
<span style="color:Red;">CYFRONET, INFN</span> both no endpoint in GOCDB) <br> | |||
<span style="color: | |||
== <span style="color:Green;">GOC DB </span>== | |||
=====GocDB CA certificate ===== | |||
Add UK E Science certificate from the trust bundle into my browser config. For Mac OS X that translates to key chain access fun (for Google Chrome) | |||
== <span style="color:Green;"> SAM / Monitoring </span> == | |||
The SAM instance for FCTF is used: https://cloudmon.egi.eu/nagios | |||
My certificate is recognised, and the demo part for SAM is taken. | |||
== <span style="color:Green;">Accounting</span> == | |||
Done. Will take it, and cute the video to time shift. | |||
== | == VO support == | ||
No VO support for Cloudscape. | |||
[[Category:Technology]] [[Category:Fedcloud-tf]] | [[Category:Technology]] [[Category:Fedcloud-tf]] |
Latest revision as of 13:36, 20 February 2013
This Wiki entry describes the planned demonstration at Cloudscape V in Brussels (see FCTF Outreach section).
Demonstration script
- Check GOGDB for available Cloud endpoints
- --> demonstrates information system
- https://goc.egi.eu/portal/
- Check Nagios/SAM for status
- --> demonstrates monitoring
- http://cloudmon.egi.eu/myegi/
- Look up the image on the Marketplace
- --> demonstrate VM distribution and endorsement
- --> demonstrate vmcatcher based image distribution
- http://marketplace.egi.eu/metadata
- using rOCCI client, deploy a number of WeNMR instance on selected RPs
- --> federated consistent access using OCCI
- tentative RPs: INFN, JUELICH, GWDG, CESNET, CESGA, Cyfronet, In2P3
- refer to WeNMR page for info on this demo phase
- Go to the accounting page
- --> demonstrate that we account for Cloud compute consumption
- http://goc-accounting.grid-support.ac.uk/cloudtest/cloudsites.html
- http://goc-accounting.grid-support.ac.uk/cloudtest/vmshour.html
- http://goc-accounting.grid-support.ac.uk/cloudtest/vms.html
TODOs
rOCCI client
Get rOCCI client
This was quite a hassle for MAC OS X 10.8 (Mountain Lion). I finally managed getting rOCCI client running natively on Mac OS X - here is how I did it.
Action rOCCI team - document usage on Mac OS X (issue filed on Github) (see https://github.com/gwdg/rOCCI/issues/59)
rOCCI client and my Grid certificate
After sorting out the issues with Ruby and rOCCI client (see above), the certificate handling wasn't a problem anymore. However, I stand with my request to support PKCS#12 format for key and cert storage as this is *very* widely supported and does not need people to mess with OpenSSL cmd line hacking to get the authN sorted.
Any browser and OS key management supports PKCS#12 key management - no command line private key messing involved!
Action - Please document in easy steps the whole process of acquiring a Grid certificate and how to configure command line systems (for PEM support)
Getting started with client
Set up a couple of config scripts that make the command line very easy. See raw demo takes available at https://documents.egi.eu/document/1593)
For longer term, a rOCCI client config file will be helpful.
Action rOCCI team - Support config files with endpoint profiling (https://github.com/gwdg/rOCCI/issues/46)
RP status
Getting started with client
See rOCCI client configuration. Endpoint queries are stable and promising. Focusing on OCCI endpont queries.
Compute queries
The OCCI command is (omitting authentication parameters):
occi --endpoint $ENDPOINT --resource compute --action list
RP status
CESGA, CESNET, GWDG, GRIF
JUELICH, GRNET, IN2P3, IFCA all authentication errors
CYFRONET, INFN both no endpoint in GOCDB)
Compute instantiations
The OCCI command is (omitting authentication parameters):
occi --endpoint $ENDPOINT --resource compute --action create --mixin os_tpl#$TPL -t "title"
RP status
CESGA, CESNET, GWDG
GRIF Fails to return resource identifier, no resource creatred
JUELICH, GRNET, IN2P3, IFCA all authentication errors
CYFRONET, INFN both no endpoint in GOCDB)
GOC DB
GocDB CA certificate
Add UK E Science certificate from the trust bundle into my browser config. For Mac OS X that translates to key chain access fun (for Google Chrome)
SAM / Monitoring
The SAM instance for FCTF is used: https://cloudmon.egi.eu/nagios
My certificate is recognised, and the demo part for SAM is taken.
Accounting
Done. Will take it, and cute the video to time shift.
VO support
No VO support for Cloudscape.