Skip to end of metadata
Go to start of metadata
  • Meeting minutes 10/1/2018

    Attendees:
    Eric Wiggins, LSU
    Victor Hazlewood, XSEDE
    Derek Simmel, PSC
    Feng Chen, LSU
    JP Navarro, XSEDE

    XSEDE SP Software Call Agenda

    • Announcements
      • Discussed the OU data archive awarded by NSF.  See Link to Henry Neeman’s slides
      • XSEDE Duo at >5000
        Discussion was had and JP mentioned to double check that removing a user allows user to get added back to Duo and that we have the appropriate portal interface(s) for this.  Need to relay this to Gary Rogers.

    • XSEDE SW Engineering activities
      • Under review now: XCI-196 Deliver XSEDE user to OAuth identity mappings - Design/Security Review"
        Discussed Globus global identity mapping to SP users just like the X.509 grid mapfile mapping. Derek and JP discussed some of the review process and the issues associated with this particular design review.  Discussed the details and once it makes it through the design process have the XCI staff present it to a future SP Software call to give feedback and participate.
         
      • Discussed ipf 1.4-X progress; No updates

         
    • Victor working on the XSEDE system overview document that Eric Wiggins of LSU requested.  Pointed people at the google doc page that has this draft diagram and folks gave feedback.

  • Meeting minutes 9/10/2018
    Attendees:
    Stephane, Stanford
    Eric Wiggins, LSU
    Jeremey Fischer, IU
    Dave Carver, TACC
    Trevor Cooper, SDSC
    Shava Smallen, XSEDE
    Victor Hazlewood, XSEDE
    • Announcements
      • Some great papers at PEARC;  The MSI OpenStack cloud presentation/paper; Craig Stewart's Your Health is a Workforce Issue presentation/paper; Many went to PEARC and will have copies of the papers on USB.
    • XSEDE SW Engineering activities
      • Discussion about RDR and IPF: XSEDE has a draft recommendations for all SP Forum members about using RDR and IPF to describe XSEDE federated resources. There is an issue with some sites that they only put the  production start/end dates in an RDR entry for a Resource at the top level.  It should be there but should also be at the lower level "compute", "storage", "grid", and "other" level as well.  The portal team says this lower level is the date that is looked at for the production dates.

  • No meeting 8/6/2018
  • Meeting 7/2/2018
    Attendees:
    Stephane, Stanford
    Eric Wiggins, LSU
    Shava Smallen, XSEDE
    Victor Hazlewood,
    Jeremey Fischer, Steve Bird, IU
    George Turner, IU
    Jaimie Powell, TACC
    Dave Carver, TACC
    Trevor Cooper, SDSC

    XSEDE SP Software Call Meeting Minutes 

    https://pearc18.conference-program.com/?page_id=10&id=spec109&sess=sess196
    Thursday 2-7pm, Friday 8am-7pm 

    • XSEDE SW Engineering activities
    • Open Discussion
      • Victor mentioned he is working on the XSEDE Services diagram that Eric of LSU brought up in the LSU SuperMIC checklist review in Feb.
      • Had a short discussion about the Globus GCS and GSI-OpenSSH replacement.   Globus team is still in development on OpenSSH with Globus Auth authentication and GCS version 5 just came out.  Globus team is expected to keep support for XSEDE services they provide for up to six months after the new substitute versions come out is our understanding.   Will request a Globus update for a future call from the Globus team.

  • No meeting 6/4/2018
  • Meeting minutes 5/7/2018

    Attendees: 
    Trevor Cooper, SDSC
    Jeaime Powell, TACC
    Eric Wiggins, LSU
    Stephane Thiel, Stanford
    JP Navarro, XSEDE
    Victor Hazlewood, XSEDE
    Jeremy, IU
    Dave Carver, TACC
    Lee Liming, Globus
    Derek Simmel, PSC

    Meeting minutes:

    • XSEDE SW Engineering activities in the works or ready for deployment:

    o   XCI-143 “Incremental IPF fixes and enhancements” is close to deployment and delivers an enhanced IPF that

    §  publishes to new information servers

    §  has an improved ipf_configure_xsede script

    §  looks for module-whatis default: <yes|no> and publish it as a GLUE2 extension

    §  enables SPs to publish software/service support contact information; this provides some support for those community software areas to publish their community software info and therefore allow to point to the contact information for the community instead of the SP

    §  publishes itself into information services, and

    §  publishes GPU information when provided by SLURM. 

    o   There is also another activity, the “Campus Login through XSEDE Single Sign On (SSO) capability” that has been requested by some unallocated SPs.  Colorado has been working with this and NICS, which is no longer has an NSF funded allocated resources, will be implementing as well.

    • Reminder of Globus Toolkit succession plan
      https://software.xsede.org/news/xsede-response-globus-toolkit-end-support-announcement

      Note that the Globus team has said they plan to stop development of Globus Toolkit at the end of 2017 and stop providing support and patches by the end of 2018.  However, it was brought up by Lee to read the Details section of the announcement which also says the Globus team will continue to provide support and security patches until they offer replacements to the general public for six months. This may extend the deadline past the end of 2018.   The section under Details says the following:
      On plan step 1 we’ve received assurance from the Globus team that they will continue providing essential security patches for the Globus Toolkit components we use until they’ve offered replacements to the general public for a minimum of six months. In most cases, XSEDE will have had previews and beta versions under evaluation for longer than that. This support might extend beyond the original “end of 2018” period announced, depending on the availability of Globus’ replacements.

    Derek mentioned that the Globus Connect Server creates its own host certificate and was wondering if replacing that with a host certificate issued from an XSEDE trusted CA would still work or cause any problems.  JP said they will check and get back to us.  UTK-NICS has a server in this situation and can be used to test procedures for this.

    • SSO Hub Usage metrics info
      Many users use the XSEDE Single Sign On Hub to connect to SP resources in a single sign on way.   Will present the usage information of the SSO Hub and the Duo authentication usage info. See attached.
    • Victor working on a XSEDE Overview Diagram document draft (as a result of LSU’s request) that will be made available for people to review and update to have an overview of how all the pieces of XSEDE fit together.

Attendees:

 

Trevor Cooper, SDSC

Jeaime Powell, TACC

Eric Wiggins, LSU

Stephane Thiel, Stanford

JP Navarro, XSEDE

Victor Hazlewood, XSEDE

Jeremy, IU

Dave Carver, TACC

Lee Liming, Globus

Derek Simmel, PSC

 

 

Meeting minutes:

  • XSEDE SW Engineering activities in the works or ready for deployment:

o   XCI-143 “Incremental IPF fixes and enhancements” is close to deployment and delivers an enhanced IPF that

§  publishes to new information servers

§  has an improved ipf_configure_xsede script

§  looks for module-whatis default: <yes|no> and publish it as a GLUE2 extension

§  enables SPs to publish software/service support contact information; this provides some support for those community software areas to publish their community software info and therefore allow to point to the contact information for the community instead of the SP

§  publishes itself into information services, and

§  publishes GPU information when provided by SLURM. 

o   There is also another activity, the “Campus Login through XSEDE Single Sign On (SSO) capability” that has been requested by some unallocated SPs.  Colorado has been working with this and NICS, which is no longer has an NSF funded allocated resources, will be implementing as well.

  • Reminder of Globus Toolkit succession plan
    https://software.xsede.org/news/xsede-response-globus-toolkit-end-support-announcement

    Note that the Globus team has said they plan to stop development of Globus Toolkit at the end of 2017 and stop providing support and patches by the end of 2018.  However, it was brought up by Lee to read the Details section of the announcement which also says the Globus team will continue to provide support and security patches until they offer replacements to the general public for six months. This may extend the deadline past the end of 2018.   The section under Details says the following:
    On plan step 1 we’ve received assurance from the Globus team that they will continue providing essential security patches for the Globus Toolkit components we use until they’ve offered replacements to the general public for a minimum of six months. In most cases, XSEDE will have had previews and beta versions under evaluation for longer than that. This support might extend beyond the original “end of 2018” period announced, depending on the availability of Globus’ replacements.

Derek mentioned that the Globus Connect Server creates its own host certificate and was wondering if replacing that with a host certificate issued from an XSEDE trusted CA would still work or cause any problems.  JP said they will check and get back to us.  UTK-NICS has a server in this situation and can be used to test procedures for this.

  • SSO Hub Usage metrics info
    Many users use the XSEDE Single Sign On Hub to connect to SP resources in a single sign on way.   Will present the usage information of the SSO Hub and the Duo authentication usage info. See attached.
  • Victor working on a XSEDE Overview Diagram document draft (as a result of LSU’s request) that will be made available for people to review and update to have an overview of how all the pieces of XSEDE fit together.

 

  • No labels