gLite Information System
For up to date documentation, please refer to the IS web page
Products
The gLite Information System Product Team is responsible for the following EMI products:
- BDII
- Glue model
- Service info provider
- Site info provider
- lcg-info and lcg-infosites clients
BDII site and top Service Reference Card
Daemons running
- BDII site:
/usr/sbin/slapd -f /etc/bdii/bdii-slapd.conf -h ldap://0.0.0.0:2170 -u ldap
- BDII top:
/usr/sbin/slapd -f /etc/bdii/bdii-top-slapd.conf -h ldap://0.0.0.0:2170 -u ldap
- Both:
/usr/bin/python /usr/sbin/bdii-update -c /opt/bdii/etc/bdii.conf -d
Init scripts and options (start|stop|restart|...)
-
/etc/init.d/bdii (start|stop|restart|condrestart|status)
Configuration files location with example or template
Logfile locations (and management) and other useful audit information
-
/var/log/bdii/bdii-update.log
, the verbosity is set using a configuration parameter. See the Configuration section
in the BDII Documentation
.
Open ports
Possible unit test of the service
- Unit tests and functionality tests are available. See the BDII Tests
.
Where is service state held (and can it be rebuilt)
-
/etc/init.d/bdii status
- For more detailed metrics on the status of the BDII:
ldapsearch -LLL -x -h localhost -p 2170 -b o=Infosys
Cron jobs
- BDII top:
-
generate-fcr-exclude-file
: cron job that generates the file for the FCR mechanism.
-
glite-info-update-endpoints
: cron job that updates the URLs of the site BDIIs that are being published by the top level BDII.
Security information
Access control Mechanism description (authentication & authorization)
- The database is world readable but only the root user can make modifications.
How to block/ban a user
* The database is world readable. All users can be blocked/banned by stopping the service.
Network Usage
- The slapd service running requires network access. The service can have a high network usage, due to the amount of information about the infrastructure they keep and provide.
Firewall configuration
- Port 2170/TCP port needs to be open. The firewall configuration should allow to access this port from everywhere in the Internet. A example for IPTABLES configuration is:
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 2170 -j ACCEPT
Security recommendations
Security incompatibilities
None currently known
List of externals packages that are not maintained by the supported OS.
None
Members