Locked History Actions

OPS/FAQs/CVMFS_PHYS_VO_IBERGRID_EU

How to Install the CVMFS clients

First you need to install 1 squid servers per site. The recommended number are two for the service to run smoothly.

  • Create 2 machines: squid0 and squid1 (just examples)
  • Configure in al ui's and WN's

Install to install the SQUID server

Please pay attention to the configuration file at /etc/squid/squid.conf

#
# Recommended minimum configuration:
#
acl manager proto cache_object
acl localhost src 127.0.0.1/32 ::1
acl to_localhost dst 127.0.0.0/8 0.0.0.0/32 ::1

# Example rule allowing access from your local networks.
# Adapt to list your (internal) IP networks from where browsing
# should be allowed
acl localnet src 10.0.0.0/8     # RFC1918 possible internal network
acl localnet src 172.16.0.0/12  # RFC1918 possible internal network
acl localnet src 192.168.0.0/16 # RFC1918 possible internal network
acl localnet src fc00::/7       # RFC 4193 local private network range
acl localnet src fe80::/10      # RFC 4291 link-local (directly plugged) machines

acl SSL_ports port 443
acl Safe_ports port 80          # http
acl Safe_ports port 21          # ftp
acl Safe_ports port 443         # https
acl Safe_ports port 70          # gopher
acl Safe_ports port 210         # wais
acl Safe_ports port 1025-65535  # unregistered ports
acl Safe_ports port 280         # http-mgmt
acl Safe_ports port 488         # gss-http
acl Safe_ports port 591         # filemaker
acl Safe_ports port 777         # multiling http
acl Safe_ports port 8000        # CVMFS 
acl CONNECT method CONNECT

#
# Recommended minimum Access Permission configuration:
#
# Only allow cachemgr access from localhost
http_access allow manager localhost
http_access deny manager

# Deny requests to certain unsafe ports
http_access deny !Safe_ports

# Deny CONNECT to other than secure SSL ports
http_access deny CONNECT !SSL_ports
# We strongly recommend the following be uncommented to protect innocent
# web applications running on the proxy server who think the only
# one who can access services on "localhost" is a local user
#http_access deny to_localhost

#
# INSERT YOUR OWN RULE(S) HERE TO ALLOW ACCESS FROM YOUR CLIENTS
#

# Example rule allowing access from your local networks.
# Adapt localnet in the ACL section to list your (internal) IP networks
# from where browsing should be allowed
http_access allow localnet
http_access allow localhost



# Squid normally listens to port 3128
http_port 3128

# We recommend you to use at least the following line.
hierarchy_stoplist cgi-bin ?

# Uncomment and adjust the following to add a disk cache directory.
#cache_dir ufs /var/spool/squid 100 16 256

# Leave coredumps in the first cache dir
coredump_dir /var/spool/squid

# Add any of your own refresh_pattern entries above these.
refresh_pattern ^ftp:           1440    20%     10080
refresh_pattern ^gopher:        1440    0%      1440
refresh_pattern -i (/cgi-bin/|\?) 0     0%      0
refresh_pattern .               0       20%     4320


# CVMFS Squid Config params
max_filedesc 8192
maximum_object_size 1024 MB
cache_mem 128 MB
maximum_object_size_in_memory 128 KB
cache_dir ufs /var/spool/squid 50000 16 256

 # ACLS local networks
acl GridServices src XXX.XXX.XXX.XXX

http_access allow GridServices

# ACLS
acl cvmfs dst cvmfs-stratum-one.cern.ch
acl cvmfs dst cernvmfs.gridpp.rl.ac.uk
acl cvmfs dst cvmfs.racf.bnl.gov
acl cvmfs dst cvmfs02.grid.sinica.edu.tw
acl cvmfs dst cvmfs.fnal.gov
acl cvmfs dst cvmfs-atlas-nightlies.cern.ch
acl cvmfs dst cvmfs-egi.gridpp.rl.ac.uk
acl cvmfs dst klei.nikhef.nl
acl cvmfs dst cvmfsrepo.lcg.triumf.ca
acl cvmfs dst cvmfsrep.grid.sinica.edu.tw
acl cvmfs dst cvmfs-s1bnl.opensciencegrid.org
acl cvmfs dst cvmfs-s1fnal.opensciencegrid.org
acl cvmfs dst cvmfs-egi.gridpp.rl.ac.uk
http_access allow cvmfs

# And finally deny all other access to this proxy
http_access deny all

How to configure CVMFS clients to support phys.vo.ibergrid.eu

How to publish CVMFS support to phys.vo.ibergrid.eu

We also would like to request that sites include the CVMFS-PHYS_VO_IBERGRID_EU tag in the CE Runtime Environment. This would make life easier for users. To perform, this change, you can use one of two options:

  • Include the tag directly in the /var/lib/bdii/gip/ldif/static-file-Cluster.ldif file of your CE (or of your glite-CLUSTER node), and then restart the bdii. Please be aware this will not make the change permanent. Next time you reconfigure your CE with yaim, this change will be lost (unless yaim is already changed as recommended in the following step).

# grep CVMFS-PHYS_VO_IBERGRID_EU /var/lib/bdii/gip/ldif/static-file-Cluster.ldif
GlueHostApplicationSoftwareRunTimeEnvironment: CVMFS-PHYS_VO_IBERGRID_EU
  • Include the tag in your yaim configuration files, and rerun yaim for the relevant node, either creamCE of Cluster (in principle, you just have to execute the config_cream_gip function):

    CE_RUNTIMEENV="
    CVMFS-PHYS_VO_IBERGRID_EU
    (...)
    "

    $ /opt/glite/yaim/bin/yaim -r -s site-info.def -f config_cream_gip -n creamCE -n (...)