|
@ extreme.indiana.edu
|
Portal Related Documentation
XDirectory Service - SecureThe XDirectory Service (XDRS) is currently running on rainier on 2020. It's init script is located at /etc/init.d/xdrs. The XDirectory Service runs as user apadmin, and the /u/apadmin/bin/xdrs_start.sh script is called by the init script to start the service. Note: to change the port number on which this service runs, or any other small changes, one can simply modify xdrs_start.sh as user apadmin. On rainier, with sudo privileges, one can start XDRS with: sudo /etc/init.d/xdrs start. Similarly, one can stop, restart, and check the status of XDRS. XDRS will also start up automatically whenever rainier boots. XDRS uses a copy of rainier's grid host certificate and key which are stored in /etc/grid-security/xdrs/host{cert,key}.pem. The host key is unencrypted and is only readable by user apadmin. XDirectory Service - Non SecureThe XDirectory Service (XDRS) is currently running in non secure mode on rainier on port 8047. It's init script is located at /etc/init.d/xdrs-nosec. The XDirectory Service runs as user apadmin, and the /u/apadmin/bin/xdrs-nosec_start.sh script is called by the init script to start the service. Note: to change the port number on which this service runs, or any other small changes, one can simply modify xdrs-nosec_start.sh as user apadmin. On rainier, with sudo privileges, one can start XDRS with: sudo /etc/init.d/xdrs-nosec start. Similarly, one can stop, restart, and check the status of XDRS. XDRS will also start up automatically whenever rainier boots. Proxy Certificate Test UsersWe have created a set of test user certificates which have been loaded directly into the myproxy repository. After generating the certificate and key for the test user (be sure to use the password of "temp" for the userkey), issue the following commands as root on rainier (where the MyProxy repository resides): bash-2.05a# cd /usr/local/globus-3.0.1 For GRID pass phrase enter "temp" or whatever temporary password you used when creating the certificate and key. The -l option specifies the username in the MyProxy repository; set this and the MyProxy pass phrase as you see fit. Here is a current list of test user proxies with user names and passwords. Note that these are all within the IUCS Certificate Authority and that the username and password apply to their MyProxy username and password.
Alliance DeploymentThe Alliance Portal is deployed under the home account of apadmin on linbox1. Here is the directory structure of ~/portal:
The current deployment is a modification of the latest OGCE CVS code. The modifications are stored under portal/current/alliance-nmi. The following is a list of some of the files with modifications differing from stock OGCE CVS:
If changes are made to any of these files, it will be necessary to redeploy CHEF. Here are the steps:
You can deploy individual components as usual, just remember to shutdown Tomcat first. This deployment is back-ended by MySQL. See the build.properties file in the chef directory for details. See the init script /etc/init.d/tomcat. It
calls the commands ~apadmin/bin/tcstart.sh
and ~apadmin/bin/tcstop.sh when starting and
stopping tomcat. See these files for more information. The
LEAD PortalThe LEAD Portal is deployed on lead under /home/lead-portal and executed as user apadmin. The current deployment is a modification of the latest OGCE CVS code. The modifications are stored under /home/lead-portal/lead-nmi (PORTAL_HOME). The following is a list of some of the files with modifications differing from stock OGCE CVS:
If changes are made to any of these files, it will be necessary to redeploy CHEF. Here are the steps:
You can deploy individual components as usual, just remember to shutdown Tomcat first. This deployment is back-ended by MySQL. See the build.properties file in the chef directory for details. See the init script /etc/init.d/tomcat. It calls the commands PORTAL_HOME/bin/tcstart.sh and PORTAL_HOME/bin/tcstop.sh when starting and stopping tomcat. See these files for more information. NOTE: The LEAD Portal is currently restarted each Sunday at 3:30 am to prevent degradation. Test/Development PortalThe development portal is installed under the ~/portal directory of user apadmin. The symlink ~/portal/dev points to the Jakarta Tomcat home of the current development portal. Use the dev symlink to determine which directory under ~/portal contains the development portal. The development portal is available here http://portal.extreme.indiana.edu:10081/nmi. Currently, the development portal consists of OGCE CVS snapshots with locally developed portlets added. To update the development portal to a more recent snapshot, as user apadmin do the following:
See the init script /etc/init.d/tomcat-dev. It
calls the commands PORTAL_HOME/bin/tcdevstart.sh
and PORTAL_HOME/bin/tcdevstop.sh when starting
and stopping tomcat. See these files for more information. To
start/shutdown the development portal, as root do service tomcat-dev [start|stop], or as user apadmin do tcdevstart.sh or tcdevstop.sh to stop it. The
Remote ServicesThe following remote services are running on linbox1:
These run under user apadmin, and are start with the ~apadmin/bin/remote-services-lb1.sh script. The following remote services are running on rainier:
These run under user apadmin, and are started with the ~apadmin/bin/remote-services-rainier.sh script. Generating a new SSL certificate for the portalFirst thing to do is to remove/rename the old
certificate: ssh -l apadmin linbox1 Now we need to generate a new certificate:
Note that we set the validity to 365 days, giving us a certificate good for a year. Also note that for the key password we just hit RETURN so it is the same as the keystore password.
|