xwhep 5 7 5 xtremweb by high energy physics
play

XWHEP 5.7.5 : XtremWeb by High Energy Physics jeudi 15 octobre - PowerPoint PPT Presentation

XWHEP 5.7.5 : XtremWeb by High Energy Physics jeudi 15 octobre 2009 XWHEP Introduction Architecture Rights Objects management Compilation, installation Coordinator service Worker service Client service


  1. XWHEP 5.7.5 : XtremWeb by High Energy Physics jeudi 15 octobre 2009

  2. XWHEP • Introduction • Architecture • Rights • Objects management • Compilation, installation • Coordinator service • Worker service • Client service • Benchmark • Pilot Jobs • Perspective jeudi 15 octobre 2009

  3. Introduction XWHEP is developped by IN2P3. It is based on XtremWeb 1.8.0. by INRIA. jeudi 15 octobre 2009

  4. Introduction XWHEP is a generic multi purposes desktop grid platform ( DG ) enabling eSciences computations over volatile nodes. Main features are : • three tiers architecture • multi platforms (win32, linux, mac os x) • virtual stable cluster over volatile volunteers individual PCs • multi applications • multi users • firewall bypassing • automatic load balancing • fault tolerance jeudi 15 octobre 2009

  5. Goals XWHEP main goals: • full production platform • inter grids connexions (especially focusing on EGEE). To achieve this goal, XWHEP proposes a secured DG: • certified server; • X509 user proxy usage; • access rights; • uage levels including two major ones : “public” and “private”: ➡ “public”, intrinsically secured, enabling inter grid sharings; ➡ “private”, intrinsically secured. jeudi 15 octobre 2009

  6. XWHEP Vs XtremWeb 1/2 XWHEP XtremWeb 1.8 Inter-grids connexions + - User rights ++ + Data management + - enabling inter grid Access rights + - sharings Multi transport protocols UDP UDP, TCP implemented Multi communication layers - XW, HTTP & tested User application management + admin only User worker management + - not fully implemented SSL / certificates + - Proxy + - ACL + - jeudi 15 octobre 2009

  7. XWHEP Vs XtremWeb 2/2 XtremWeb 1.8 XWHEP Dynamically linked applications + - Avg. ping + - Avg. bandwidth usage implemented + - & tested Custom scheduler + - Worker launcher not fully tested + - Input files / job + + not fully implemented Input files / app + - Match making OS, CPU, RAM, DISK OS, CPU CPU/RAM requirements + + per job CPU/RAM requirements + - per app jeudi 15 octobre 2009

  8. XWHEP • Introduction • Architecture • Rights • Objects management • Compilation, installation • Coordinator service • Worker service • Client service • Benchmark • Pilot Jobs • Perspective jeudi 15 octobre 2009

  9. XWHEP : Architecture Services are signed; communications are encrypted. Distributed parts (clients, workers) must present valid credentials. XWHEP Services Server certificate XWHEP XWHEP Serveur public key scheduler data repository Credentials Job Mgt Data Mgt Computing XWHEP Local I/O service client ( worker ) Dynamically downloaded user PC data and binary. User Job User data & binary Sandbox Volunteer PC External Volunteer PC data server integrity : sandbox 9 jeudi 15 octobre 2009

  10. Faut Tolerant Model Server certificate XW Services Server public key XW-Coordinator service replica Job Mgt FI Heartbeat signal FI Fault Inspector XW-Coordinator XW-Coordinator service replica service replica Logging FI FI Management of FI FI stateless application Deployed XW-Client UI Deployed XW-Computing Service PC Volunteer PC 10 jeudi 15 octobre 2009

  11. XWHEP • Introduction • Architecture • Rights • Objects management • Compilation, installation • Coordinator service • Worker service • Client service • Benchmark • Pilot Jobs • Perspective jeudi 15 octobre 2009

  12. Access rights Any object in XWHEP is associated with an access rights. Access rights are linux fs like : they are defined for the user (owner), the group and others : 0400 Allow read by owner. 0200 Allow write by owner. 0100 For applications, allow execution by owner. 0040 Allow read by group members. 0020 Allow write by group members. 0010 For applications, allow execution by group members. 0004 Allow read by others. 0002 Allow write by others. 0001 For applications, allow execution by others. Default access rights is 0x755 The xwchmod command helps to change access rights. jeudi 15 octobre 2009

  13. Access rights Access rights help to define access types Access Types Default Access Rights Private 700 Group 750 Public 755 jeudi 15 octobre 2009

  14. Access rights Some sensitive datas are private with no ay to change their access rights. This is typically the case of X509 proxy which may be temporary stocked on XWHEP data repository. This ensures access to data owner only. O. Lodygensky «Recherche en Grille - Laboratoire de Grille de Production» 14 l’Accélérateur Linéaire Lyon - 13/10/2009 jeudi 15 octobre 2009

  15. Access rights Public applications: - can only be inserted with administrator user rights Public application - all users can submit jobs for such applications - referring jobs are public jobs Group applications: - can only be inserted with administrator user rights Group application - only group users can submit jobs for such applications - referring jobs are group jobs Private applications: - any user can insert private applications Private application - only application owner can submit jobs for such applications - referring jobs are private jobs jeudi 15 octobre 2009

  16. Access rights Public Public Public job Public application job Public job job Jobs access rights depend of the level of the referenced application. Group Group Group job Group job application Group job job There is no way to extend job access rights Private Private Private job Private job application Private job job jeudi 15 octobre 2009

  17. Authorization Credentials define usage level stacked rights • manage users and usergroups super user • manage public and group applications advanced user • manage workers this level permits to • manage applications/data/jobs/sessions/groups standard user insert private • use objects accordingly to their access rights applications only • override job access rights (e.g. : set status to COMPLETED) this very special level is worker explained in next slide • insert job results on job owner behalf • none none O. Lodygensky «Recherche en Grille - Laboratoire de Grille de Production» 17 l’Accélérateur Linéaire Lyon - 13/10/2009 jeudi 15 octobre 2009

  18. Authorization Public and group workers have WORKER_USER credentials. This make workers able to compute jobs. No other action is allowed with such credentials: it is not permit to insert application or submit jobs. This is due to the fact that worker (with their credentials) are widely distributed to untrusted volunteer PCs and it would be too easy to hack worker credentials. O. Lodygensky «Recherche en Grille - Laboratoire de Grille de Production» 18 l’Accélérateur Linéaire Lyon - 13/10/2009 jeudi 15 octobre 2009

  19. Confidentiality User rights associated to access rights permit to confine deployment and executions with three levels: • public • group • private O. Lodygensky «Recherche en Grille - Laboratoire de Grille de Production» 19 l’Accélérateur Linéaire Lyon - 13/10/2009 jeudi 15 octobre 2009

  20. Confidentiality Deployment confinement: public worker has WORKER_USER credentials. Execution confinement: public worker can execute any public job, and public jobs only. Public job Public worker O. Lodygensky «Recherche en Grille - Laboratoire de Grille de Production» 20 l’Accélérateur Linéaire Lyon - 13/10/2009 jeudi 15 octobre 2009

  21. Confidentiality Deployment confinement: group worker has WORKER_USER credentials. Execution confinement: group worker can execute any public job, any jobs of its group, and its group only. Public job Group job Group worker O. Lodygensky «Recherche en Grille - Laboratoire de Grille de Production» 21 l’Accélérateur Linéaire Lyon - 13/10/2009 jeudi 15 octobre 2009

  22. Confidentiality Execution confinement: group worker can also be strictly confined to its group. Public job Group job Group worker O. Lodygensky «Recherche en Grille - Laboratoire de Grille de Production» 22 l’Accélérateur Linéaire Lyon - 13/10/2009 jeudi 15 octobre 2009

  23. Confidentiality Deployment confinement: private worker has STANDARD_USER credentials. Execution confinement: private worker can execute any job of its owner, and its owner only. Public job of the worker owner. Group job of the worker owner. Private worker Private job of the worker owner. O. Lodygensky «Recherche en Grille - Laboratoire de Grille de Production» 23 l’Accélérateur Linéaire Lyon - 13/10/2009 jeudi 15 octobre 2009

  24. XWHEP • Introduction • Architecture • Rights • Objects management • Compilation, installation • Coordinator service • Worker service • Client service • Benchmark • Pilot Jobs • Perspective jeudi 15 octobre 2009

  25. O bjects management XWHEP defines a set of different objects. Here we detail : • users and user groups • datas • applications • jobs • workers All objects are identified by an UID composed of five hexadecimal values. Example : 81c6e97a-9d85-4aeb-ae07-593980fb611f Null value: 00000000-0000-0000-0000-000000000000 jeudi 15 octobre 2009

  26. Users and user groups calculated mandatory optional Partial view of the internal user structure. Partial view of the internal user group structure. uid login string uid password string label string rights e.g : STANDARD USER usergroupuid jeudi 15 octobre 2009

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend