HEPiX Virtualisation Working Group Status, February 10 th 2010 April 21 st 2010.

Slides:



Advertisements
Similar presentations
Wei Lu 1, Kate Keahey 2, Tim Freeman 2, Frank Siebenlist 2 1 Indiana University, 2 Argonne National Lab
Advertisements

CERN LCG Overview & Scaling challenges David Smith For LCG Deployment Group CERN HEPiX 2003, Vancouver.
Communicating Machine Features to Batch Jobs GDB, April 6 th 2011 Originally to WLCG MB, March 8 th 2011 June 13 th 2012.
HEPiX Virtualisation Working Group Status, July 9 th 2010
Password? CLASP Phase 2: Revised Proposal C5 Meeting, 16 February 2001 Denise Heagerty, IT/IS.
WLCG Cloud Traceability Working Group progress Ian Collier Pre-GDB Amsterdam 10th March 2015.
INFSO-RI An On-Demand Dynamic Virtualization Manager Øyvind Valen-Sendstad CERN – IT/GD, ETICS Virtual Node bootstrapper.
A Model for Grid User Management Rich Baker Dantong Yu Tomasz Wlodek Brookhaven National Lab.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Nine –
Apache : Installation, Configuration, Basic Security Presented by, Sandeep K Thopucherela, ECE Department.
1 Bridging Clouds with CernVM: ATLAS/PanDA example Wenjing Wu
© 2010 VMware Inc. All rights reserved VMware ESX and ESXi Module 3.
Networking Components Chad Benedict – LTEC
Windows Server 2008 R2 CSIT 320 (Blum) 1. Server Consolidation – Today’s chips have enhanced capabilities compared to those of the past. In particular.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Chapter 6 Operating System Support. This chapter describes how middleware is supported by the operating system facilities at the nodes of a distributed.
Assuring e-Trust always 1 Status of the Validation and Authentication service for TACAR and Grids.
SharePoint 2010 Development Environment A Guide to Setup SharePoint 2010 Development Environment on Windows 7 Machine.
11 MANAGING AND DISTRIBUTING SOFTWARE BY USING GROUP POLICY Chapter 5.
Event Management & ITIL V3
4061 Session 27 (4/23). Today Virtual Machines and Emulation.
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
WLCG Cloud Traceability Working Group face to face report Ian Collier 11 February 2015.
Cryptography and Network Security (CS435) Part One (Introduction)
出處 :2010 2nd International Conference on Signal Processing Systems (ICSPS) 作者 :Zhidong Shen 、 Qiang Tong 演講者 : 碩研資管一甲 吳俊逸.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
02/09/2010 Industrial Project Course (234313) Virtualization-aware database engine Final Presentation Industrial Project Course (234313) Virtualization-aware.
Pilot Jobs John Gordon Management Board 23/10/2007.
GAAIN Virtual Appliances: Virtual Machine Technology for Scientific Data Analysis Arihant Patawari USC Stevens Neuroimaging and Informatics Institute July.
Online Certificate Status Protocol ‘OCSP’ Dave Hirose July Outline: What is OCSP? Digital Signatures Certificate Revocation List Technical aspects.
Virtualised Worker Nodes Where are we? What next? Tony Cass GDB /12/12.
Operating System Organization Chapter 3 Michelle Grieco.
WSV Problem Background 3. Accelerated Protocols and Workloads 4. Deployment and Management 2. BranchCache Solution Modes 5. BranchCache Protocols.
Firewall Configurations Responses from the ETF (the names have been changed to protect the innocent..)
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Federated Cloud Security - what is needed Linda Cornwall (STFC) and the.
Improving Xen Security through Disaggregation Derek MurrayGrzegorz MilosSteven Hand.
Trusted Virtual Machine Images a step towards Cloud Computing for HEP? Tony Cass on behalf of the HEPiX Virtualisation Working Group October 19 th 2010.
Security Policy Update David Kelsey UK HEP Sysman, RAL 1 Jul 2011.
AliEn AliEn at OSC The ALICE distributed computing environment by Bjørn S. Nilsen The Ohio State University.
Workload management, virtualisation, clouds & multicore Andrew Lahiff.
Security Policy Update WLCG GDB CERN, 14 May 2008 David Kelsey STFC/RAL
11-Dec-00D.P.Kelsey, Certificates, WP6 meeting, Milan1 Certificates for DataGrid Testbed0 David Kelsey CLRC/RAL, UK
WLCG Authentication & Authorisation LHCOPN/LHCONE Rome, 29 April 2014 David Kelsey STFC/RAL.
8-Mar-01D.P.Kelsey, Certificates, WP6, Amsterdam1 WP6: Certificates for DataGrid Testbeds David Kelsey CLRC/RAL, UK
Microsoft ® Official Course Module 6 Managing Software Distribution and Deployment by Using Packages and Programs.
Module 11: Configuring and Managing Distributed File System.
HEPiX Virtualisation Working Group Status, February 10 th 2010 April 21 st 2010 May 12 th 2010.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Draft Security Virtualisation Policy (for Romain Wartel – CERN) EGI Technical.
Ian Collier, STFC, Romain Wartel, CERN Maintaining Traceability in an Evolving Distributed Computing Environment Introduction Security.
Software Security II Karl Lieberherr. What is Security Enforcing a policy that describes rules for accessing resources. Policy may be explicit or implicit.
Geant4 GRID production Sangwan Kim, Vu Trong Hieu, AD At KISTI.
Trusted Virtual Machine Images the HEPiX Point of View Tony Cass October 21 st 2011.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI /09/14 1 Appliance lifecycle services Marios Chatziangelou, et al.
15-Jun-04D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security Update (Report from the LCG Security Group) CERN 15 June 2004 David Kelsey CCLRC/RAL, UK
The HEPiX Virtualisation Working Group Towards a Grid of Clouds Tony Cass CHEP 2012 May 24 th 2012.
HEPiX Virtualisation working group Andrea Chierici INFN-CNAF Workshop CCR 2010.
Harvesting Free Windows CPU Cycles for Linux Applications using Sandboxing Rasmus Andersen Dept. of Computer Science, University of Copenhagen, Denmark.
CERN IT Department CH-1211 Genève 23 Switzerland The CERN internal Cloud Sebastien Goasguen, Belmiro Rodrigues Moreira, Ewan Roche, Ulrich.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI SVG F2F Virtual Machines VM images, software run on VMS. 3 rd March 2015.
Virtual Private Network Access for Remote Networks
Andrea Chierici Virtualization tutorial Catania 1-3 dicember 2010
Consulting Services JobScheduler Architecture Decision Template
Multi User Pilot Jobs update
HEPiX Virtualisation working group
Consulting Services JobScheduler Architecture Decision Template
Software Security II Karl Lieberherr.
WLCG Collaboration Workshop;
VMDIRAC status Vanessa HAMAR CC-IN2P3.
IIS.
Outline Chapter 2 (cont) OS Design OS structure
Presentation transcript:

HEPiX Virtualisation Working Group Status, February 10 th 2010 April 21 st 2010

CERN.ch Objective  Enable virtual machine images created at one site to be used at other HEPiX (and WLGC) sites.  Working assumptions –images are generated by some authorised or trusted process »Some sites may accept “random” user generated images, but most won’t –images are “contextualised” to connect to local site workload management system »But at least one site (other than CERN…) is interested in seeing images connect directly to experiment workload management system. 2 No root access by end user during image generation. Recipient site controls how “payload” ends up in the image

CERN.ch Working group areas & Status  Generation  Transmission  Expiry & Revocation  Contextualisation  Support for multiple Hypervisors 3 Image endorser required to revoke images in case of security issues and the like.

CERN.ch Working group areas & Status  Generation –Led by Dave Kelsey & Keith Chadwick –Likely to produce »Policy proposal for image generation process. If sites can demonstrate they meet the requirements of the policy then their images should be trusted for execution at remote sites »Recommendations for hypervisor configuration to ensure maximum security.  Transmission  Expiry & Revocation  Contextualisation  Support for multiple Hypervisors 4 Sites anyway expected to follow best practices. Current discussion is around roles and endorsers for the different components (“base” operating system and VO software) and about who can be trusted.

CERN.ch Working group areas & Status  Generation  Transmission –Led by Owen Synge –Likely to produce »Recommendation for basic transport protocol(s) to be supported  Prescriptive for sites wishing to generate images »Proposal for optional protocols to improve transmission efficiency  E.g. transmission of only differences w.r.t. a reference image  Status of “interesting” protocols such as bitTorrent likely to be an issue. –Unlikely to comment on intra-site image transmission  Expiry & Revocation  Contextualisation  Support for multiple Hypervisors 5 Will not Current model is tagged images distributed in manner akin to mechanism used for VO software today.

CERN.ch Working group areas & Status  Generation  Transmission  Expiry & Revocation –Status a little unclear »a mix of standalone area and generation policy? –“Image Revocation List” a la CRL? »Technical proposal required  Contextualisation  Support for multiple Hypervisors 6 Image endorser required to revoke images in case of security issues and the like.

CERN.ch Working group areas & Status  Generation  Transmission  Expiry & Revocation  Contextualisation –Led by Sebastien Goasguen –Likely to produce »Proposal for mechanism allowing site to configure image  File system mounted at image instantiation and automated invocation of scripts on the file system during the initialisation.  Final job/payload will not execute as root »Restrictions on aspects sites are allowed to configure  No changes to C compiler, perl, python, … to be allowed  Support for multiple Hypervisors 7 Only basic discussions so far. Contentious issue is kernel patching. Group conclusion is that this is not allowed; sites who have security concerns with an image must refuse to run this and must notify the endorser to allow wider revocation. This ensures that all sites are protected.

CERN.ch Working group areas & Status  Generation  Transmission  Expiry & Revocation  Contextualisation  Support for multiple Hypervisors –Led by Andrea Chierici –Produce, if possible, »Recommendations/recipe(s) to enable sites to generate images that can be used with a range of hypervisors  Perhaps a limited set of all possible, however,…  Poll underway to identify most popular hypervisors 8 Little discussion in the group so far. We have identified the hypervisors of interest (kvm and both Xen modes). Andrea is testing extensively at present.