HOWTO04 Site Certification Manual tests
This page provides instructions on how to test manually the functionality of the grid and cloud services offered by a site. These checks are executed by the EGI Operations Team for sites that want to be formally included into EGI Production infrastructure. The site must successfully pass either the grid or the cloud certification tests to become part of the EGI Production infrastructure.
Check the functionality of the grid elements
Be sure that the site’s GIIS URL is contained in the Top level BDII/Information System your NGI will use for your certification.
Note that the examples here use the Italian NGI and sites. Please substitute with YOUR OWN NGI and site credentials when running the test.
ARC CE checks
A first test can be done using ARC’s ngstat
command:
$ /usr/bin/ngstat -q -l -c <CE hostname> -t 20
...
... plenty of output
...
If a monitoring host of your NGI is available, then the probes can easily be executed from there:
Check the status of the CE with:
$ /usr/libexec/grid-monitoring/probes/org.ndgf/ARCCE-status \
-H <CE hostname> -x /etc/nagios/globus/userproxy.pem-ops
Status is active
Test gsiftp:
$ /usr/libexec/grid-monitoring/probes/org.ndgf/ARCCE-auth -H <CE hostname> \
-x /etc/nagios/globus/userproxy.pem-ops
gsiftp OK
Test the versions of the CA’s:
$ /usr/libexec/grid-monitoring/probes/org.ndgf/ARCCE-caver -H <CE hostname> \
-x /etc/nagios/globus/userproxy.pem-ops
version = 1.38 - All CAs present
Check the versions of ARC and Globus:
$ /usr/libexec/grid-monitoring/probes/org.ndgf/ARCCE-softver \
-H <CE hostname> \
-x /etc/nagios/globus/userproxy.pem-ops
nordugrid-arc-0.8.3.1, globus-5.0.3
Copy a file:
$ /usr/libexec/grid-monitoring/probes/org.ndgf/ARCCE-gridftp -H <CE hostname> \
-x /etc/nagios/globus/userproxy.pem-ops
Job finished successfully
Submit a test job:
$ /usr/libexec/grid-monitoring/probes/org.ndgf/ARCCE-jobsubmit \
-H <CE hostname> \
--vo ops -x /etc/nagios/globus/userproxy.pem-ops
Job submission successful
Check the LFC:
$ /usr/libexec/grid-monitoring/probes/org.ndgf/ARCCE-lfc -H <CE hostname> \
-x /etc/nagios/globus/userproxy.pem-ops
Job finished successfully
Check the SRM:
$ /usr/libexec/grid-monitoring/probes/org.ndgf/ARCCE-srm -H <CE hostname> \
-x /etc/nagios/globus/userproxy.pem-ops
Job finished successfully
Before continuing, you may want to make sure that the probes for all services which the CE intends to offer, do actually succeed.
Storage Element (SE) checks
Check if gridftp
server on SE works:
$ uberftp inaf-se-01.ct.pi2s2.it
For STORM SE: check if SRM client works (on the published information you can find the right port to use)
$ /opt/storm/srm-clients/bin/clientSRM \
ping -e httpg://sunstorm.cnaf.infn.it:8444
============================================================
Sending Ping request to: httpg://sunstorm.cnaf.infn.it:8444
============================================================ Request status:
statusCode="SRM_SUCCESS"(0) explanation="SRM server successfully contacted"
============================================================ SRM Response:
versionInfo="v2.2" otherInfo (size=2) [0] key="backend_type"
[0] value="StoRM" [1] key="backend_version"
[1] value="<FE:1.5.0-1.sl4><BE:1.5.3-4.sl4>"
============================================================
Try to write on SE. Be sure your UI is pointing to an IS the SE is contained in (you may use your certification BDII)
1) Setting a top-bdii that is publishing the SE you have to test
$ export LCG_GFAL_INFOSYS=<TopBDII hostname>:2170
2) Copy a file from the local filesystem to the SE, registering it in the LFC. This command output will return a SURL that you can use latter for other tests.
A SURL is a path of the type:
srm://srm01.ncg.ingrid.pt/ibergrid/iber/generated/2011-02-01/file4034a935-8d7a-48f4-914f-16f2634d4802
$ lcg-cr -v --vo <VO>-d<Your SE> \
-l lfn:/grid/<VO>/test.txt file:</path/to/your/local/file>
3) Create a new replica in other SE (to check the third-party transfer between 2 SEs)
$ lcg-rep -v --vo <VO>-d<Other SE> <SURL>
4) List Replicas
$ lcg-lr -v --vo <VO> lfn:/grid/<VO>/test.txt
5) Delete all replicas
$ lcg-del -v --vo <VO>-a<guid>
Job submission
Submit a test job to Cream-CE through the WMS, i.e. using the
glite-wms-job-submit
command. In case, submit a mpi test job. The NGI_IT
certification WMS is gridit-cert-wms.cnaf.infn.it
.
Registration into 1st level HLR
NOTE: this step is needed if your infrastructure uses DGAS as accounting system
After the site entered in production, it needs to register the site resources in the HLR. Ask the site admins to open a ticket towards the HLR administrators, passing them the following information:
- grid queues names, in the form:
gridit-ce-001.cnaf.infn.it:2119/jobmanager-lcgpbs-cert
- not-grid queues names, in the form:
hostname:queue
- Name, surname ad certificate subject of each site admin
- Certificate subject of Computing Element
Eventually, the site admins have to open a ticket to DGAS support unit asking to enable the forwarding of accounting data from the 2° level HLR to APEL.
Certification Job
The test job checks
several things, like the environment on WN and installed RPMs. Moreover it
performs some replica management tests. With a grep TEST
you may get a summary
of the results: in case of errors, you have to see in detail what is gone wrong!
Globus checks
These checks should be executed depending on the services registered in GOCDB under a Resource Centre. Not all services are compulsory for a RC, but upon registration of new ones, the corresponding tests should be executed.
GSISSH
Initialize grid proxy and check if GSISSH works:
$ grid-proxy-init
$ gsissh USER@HOST -p 2222 /bin/date
(Debug with: USER@HOST -vvv -p 2222 /bin/date)
GridFTP
Check if upload works:
$ globus-url-copy file:/tmp/test.txt gsiftp://HOST:2811/tmp/test.txt
(Debug with: globus-url-copy -dbg -v -vb file:/tmp/test.txt gsiftp://HOST:2811/tmp/test.txt)
Check if download works:
$ globus-url-copy gsiftp://HOST:2811/tmp/test.txt file:/tmp/test.txt
(Debug with: globus-url-copy -dbg -v -vb gsiftp://HOST:2811/tmp/test.txt file:/tmp/test.txt)
Delete the remote file:
$ uberftp HOST 'rm /tmp/test.txt'
(Debug with: uberftp HOST 'rm /tmp/test.txt' -debug 3)
GRAM
Check authentication:
$ globusrun -a -r HOST:2119
Check job submission:
$ globusrun -s -r HOST:2119 "&(executable="/bin/date")"
QCG checks
QCG Computhng checks
The presented tests of QCG-Computing service use the qcg-comp, the client program for QCG-Computing, that may be installed from provided RPMS. In order to connect to QCG-Computing the grid proxy must be created.
Generate user’s proxy:
$ grid-proxy-init
Your identity: /C=PL/O=GRID/O=PSNC/CN=Mariusz Mamonski
Enter GRID pass phrase for this identity:
Creating proxy ............................ Done
Your proxy is valid until: Fri Jun 10 06:23:32 2011
Query the QCG-Computing service:
# the xmllint is used only to present the result in more pleasant way
$ qcg-comp -G | xmllint --format -
<bes-factory:FactoryResourceAttributesDocument xmlns:bes-factory="http://schemas.ggf.org/bes/2006/08/bes-factory">
… a lot of information …
</bes-factory:FactoryResourceAttributesDocument>
Submit a sample job:
$ qcg-comp -c -J /opt/plgrid/qcg/share/qcg-comp/doc/examples/date.xml
Activity Id: ccb6b04a-887b-4027-633f-412375559d73
Query its status:
$ qcg-comp -s -a ccb6b04a-887b-4027-633f-412375559d73
status = Executing
$ qcg-comp -s -a ccb6b04a-887b-4027-633f-412375559d73
status = Finished
exit status = 0
QCG Notification checks
The tests of QCG-Notification require qcg-ntf-client
program to be installed
in a system. The program is provided in RPM package.
Create a sample subscription:
$ qcg-ntf-client -d \
-S "cons=http://127.0.0.1:2212 top=http://schemas.qoscosgrid.org/comp/2011/04/notification/topic;//*;Full"
...
INF May 17 14:15:51 1128 0xa0262720 [qcg-client-gsoa] Subscribed, subRef: '810917963'
...
Remove the created subscription:
$ qcg-ntf-client -d -U "id=810917963"
...
INF May 17 14:41:48 3318 0xa0262720 [qcg-client-gsoa] Unsubscribed: '810917963'
…
Checking the connection with QCG-Computing: In one shell run ‘tail -f’ on the QCG-Computing log file and in the other try to submit a sample job using the qcg-comp program (as described above). Check the tail output if there are no error messages on sending notifications. E.g. the following lines means that the connection problems occurred:
$ tail -f /opt/qcg/var/log/qcg-comp/qcg-compd.log
INF Oct 04 10:55:33 18929 0x2adadc2abe30 [notification_ws] Sending notify: 320f014c-3181-4daf-bbd9-1824b7d8216a -> Queued
NOT Oct 04 10:55:33 18929 0x2adadc2abe30 [.....ntf_client] FaultCode: 'SOAP-ENV:Client'
NOT Oct 04 10:55:33 18929 0x2adadc2abe30 [.....ntf_client] FaultString: 'smcm:ActivityState'
NOT Oct 04 10:55:33 18929 0x2adadc2abe30 [.....ntf_client] FaultDetail: '<SOAP-ENV:Detail xmlns:SOAP-ENV="http://schemas.xmlsoap.org/soap/envelope/">connect failed in tcp_connect()</SOAP-ENV:Detail>'
ERR Oct 04 10:55:33 18929 0x2adadc2abe30 [notification_ws] Failed to send notification to http://grass1.man.poznan.pl:19011/
QCG Broker checks
The basic tests of QCG-Broker service may be proceeded with help of
qcg-simple-client
, the software that provides a set of commands for
interaction with QCG-Broker. qcg-simple-client
may be installed from RPMs.
Create a sample job description:
$ cat > sleep.qcg << EOF
#!/bin/bash
#QCG queue=plgrid
#QCG host=nova.wcss.wroc.pl
#QCG persistent
sleep 30
EOF
Submit a job:
$ qcg-sub sleep.qcg
https://qcg-broker.man.poznan.pl:8443/qcg/services/
/C=PL/O=GRID/O=PSNC/CN=qcg-broker/qcg-broker.man.poznan.pl
Your identity: C=PL,O=GRID,O=PSNC,CN=Bartosz Bosak
Enter GRID pass phrase for this identity:
Creating proxy, please wait...
Proxy verify OK
Your proxy is valid until Tue Mar 12 14:50:27 CET 2013
UserDN = /C=PL/O=GRID/O=PSNC/CN=Bartosz Bosak
ProxyLifetime = 24 Days 23 Hours 59 Minutes 58 Seconds
jobId = J1360936230540__0152
Check the job statuses:
$ qcg-info
https://qcg-broker.man.poznan.pl:8443/qcg/services/
/C=PL/O=GRID/O=PSNC/CN=qcg-broker/qcg-broker.man.poznan.pl
UserDN = /C=PL/O=GRID/O=PSNC/CN=Bartosz Bosak
ProxyLifetime = 24 Days 23 Hours 59 Minutes 49 Seconds
Command translated to:
"task_info" "J1360936230540__0152" "task"
Note:
UserDN: /C=PL/O=GRID/O=PSNC/CN=Bartosz Bosak
TaskType: SINGLE
SubmissionTime: Fri Feb 15 14:50:31 CET 2013
FinishTime:
ProxyLifetime: PT0S
Status: PREPROCESSING
StatusDesc:
StartTime: Fri Feb 15 14:50:33 CET 2013
Allocation:
HostName: nova.wcss.wroc.pl
ProcessesCount: 1
ProcessesGroupId:
Status: PREPROCESSING
StatusDescription:
SubmissionTime: Fri Feb 15 14:50:32 CET 2013
FinishTime:
LocalSubmissionTime: Fri Feb 15 14:50:37 CET 2013
LocalStartTime:
LocalFinishTime:
$ qcg-info
https://qcg-broker.man.poznan.pl:8443/qcg/services/
/C=PL/O=GRID/O=PSNC/CN=qcg-broker/qcg-broker.man.poznan.pl
UserDN = /C=PL/O=GRID/O=PSNC/CN=Bartosz Bosak
ProxyLifetime = 24 Days 23 Hours 59 Minutes 23 Seconds
Command translated to:
"task_info" "J1360936230540__0152" "task"
Note:
UserDN: /C=PL/O=GRID/O=PSNC/CN=Bartosz Bosak
TaskType: SINGLE
SubmissionTime: Fri Feb 15 14:50:31 CET 2013
FinishTime:
ProxyLifetime: PT0S
Status: RUNNING
StatusDesc:
StartTime: Fri Feb 15 14:50:33 CET 2013
Allocation:
HostName: nova.wcss.wroc.pl
ProcessesCount: 1
ProcessesGroupId:
Status: RUNNING
StatusDescription:
SubmissionTime: Fri Feb 15 14:50:32 CET 2013
FinishTime:
LocalSubmissionTime: Fri Feb 15 14:50:37 CET 2013
LocalStartTime: Fri Feb 15 14:50:47 CET 2013
LocalFinishTime:
$ qcg-info
https://qcg-broker.man.poznan.pl:8443/qcg/services/
/C=PL/O=GRID/O=PSNC/CN=qcg-broker/qcg-broker.man.poznan.pl
UserDN = /C=PL/O=GRID/O=PSNC/CN=Bartosz Bosak
ProxyLifetime = 24 Days 23 Hours 56 Minutes 10 Seconds
Command translated to:
"task_info" "J1360936230540__0152" "task"
Note:
UserDN: /C=PL/O=GRID/O=PSNC/CN=Bartosz Bosak
TaskType: SINGLE
SubmissionTime: Fri Feb 15 14:50:31 CET 2013
FinishTime: Fri Feb 15 14:52:17 CET 2013
ProxyLifetime: PT0S
Status: FINISHED
StatusDesc:
StartTime: Fri Feb 15 14:50:33 CET 2013
Allocation:
HostName: nova.wcss.wroc.pl
ProcessesCount: 1
ProcessesGroupId:
Status: FINISHED
StatusDescription:
SubmissionTime: Fri Feb 15 14:50:32 CET 2013
FinishTime: Fri Feb 15 14:52:12 CET 2013
LocalSubmissionTime: Fri Feb 15 14:50:37 CET 2013
LocalStartTime: Fri Feb 15 14:50:47 CET 2013
LocalFinishTime: Fri Feb 15 14:52:09 CET 2013
Check the functionality of the cloud elements
Sites can provide any (not necessarily all) of the interfaces listed below:
- OpenStack Compute for VM Management
- CDMI for Object Storage
Cloud Compute checks prerequisites
AppDB integration
Go to AppDB and look for a OS image member of the fedcloud.egi.eu
VO (all
sites should support), e.g.
EGI CentOS 7 image
Check that the site is visible in to the AppDB “Availability and Usage” panel for the image. If not, probably the site has not registered the FedCloud VO into their middleware (vmcatcher) or it did not properly configured the BDII provider script.
From that “Availability and Usage” panel, click on the Site name, then on the latest VM Image version, select a resource template (preferably with the smallest quantity of resources (RAM & CPU)) and click on the “get IDs” button on the right of the resource template. You will get the “Site Endpoint”, “Template ID” and “OCCI ID”. Save these values since they will be needed in the next steps.
Credentials
Generate a set of keys for your user (it is not required to set a phassphrase
for the keys, since these are just temporary keys for the test), make sure to
set key permissions to 400
:
$ ssh-keygen -t rsa -b 2048 -f tempkey
Generating public/private rsa key pair.
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in tempkey.
Your public key has been saved in tempkey.pub.
The key fingerprint is:
(...)
$ chmod 400 tempkey
Create a simple contextualization script, to setup access keys on the machine and test contextualization
$ cat << EOF > ctx.txt
Content-Type: multipart/mixed; boundary="===============4393449873403893838=="
MIME-Version: 1.0
--===============4393449873403893838==
Content-Type: text/x-shellscript; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename="deploy.sh"
#!/bin/bash
echo "OK" > /tmp/deployment.log
--===============4393449873403893838==
Content-Type: text/cloud-config; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename="userdata.txt"
#cloud-config
users:
- name: testadm
sudo: ALL=(ALL) NOPASSWD:ALL
lock-passwd: true
ssh-import-id: testadm
ssh-authorized-keys:
- `cat tempkey.pub`
--===============4393449873403893838==--
EOF
Create a proxy in RFC format for your tests:
$ voms-proxy-init -rfc -voms fedcloud.egi.eu
Your identity: /DC=es/DC=irisgrid/O=ifca/CN=Enol-Fernandez-delCastillo
Creating temporary proxy .......................................................................... Done
Contacting voms2.grid.cesnet.cz:15002 [/DC=org/DC=terena/DC=tcs/OU=Domain Control Validated/CN=voms2.grid.cesnet.cz] "fedcloud.egi.eu" Done
Creating proxy .............................................................................. Done
Your proxy is valid until Fri Nov 14 04:59:26 2014
OpenStack Compute checks (org.openstack.nova service type)
Export the following variables on your shell (keystone URL can be obtained from GOCDB URL of the endpoint)
$ export OS_AUTH_URL= <keystone URL>
$ export OS_AUTH_TYPE=v2voms
$ export OS_X509_USER_PROXY=$X509_USER_PROXY
Get the list of tenants supporting your proxy
$ keystone_tenants
Tenant id: 999f045cb1ff4684a15ebb338af69460
Tenant name: VO:fedcloud.egi.eu Enabled: True
Description: VO fedcloud.egi.eu
Export the tenant name as shown from the command in the following variable:
$ export OS_PROJECT_NAME="VO:fedcloud.egi.eu"
Describe the available flavors, check also that the template ID provided by AppDB is listed:
$ openstack flavor list
+----+-----------+-------+------+-----------+-------+-----------+
| ID | Name | RAM | Disk | Ephemeral | VCPUs | Is Public |
+----+-----------+-------+------+-----------+-------+-----------+
| 1 | m1.tiny | 512 | 0 | 0 | 1 | True |
| 2 | m1.small | 2000 | 10 | 20 | 1 | True |
| 3 | m1.medium | 4000 | 10 | 40 | 2 | True |
| 4 | m1.large | 7000 | 20 | 80 | 4 | True |
| 5 | m1.xlarge | 14000 | 30 | 160 | 8 | True |
+----+-----------+-------+------+-----------+-------+-----------+
Describe available images, again check that the ID provided by AppDb is listed
$ openstack image list
+--------------------------------------+----------------------------------------------+
| ID | Name |
+--------------------------------------+----------------------------------------------+
| 1414f242-d6d1-4a8c-8b26-8c0ada32f343 | IFCA Fedora Cloud 23 |
| 8a700834-04b4-4e91-a3d5-9246ef95167e | LW Jupyter-R Ubuntu 14.04 |
| 7f361fba-21d6-40ca-892d-17aa60b63a66 | IFCA CentOS 7 |
| f3544cc8-421f-4d93-ac35-eba7fdc75329 | IFCA CentOS 6 |
...
+--------------------------------------+----------------------------------------------+
Start a VM (using the flavor and images checked above and the context file created previously). The returned ID will be used in the following commands:
$ openstack server create \
--flavor <flavor> --image <image id> \
--user-data ctx.txt test
+--------------------------------------+------------------------------------------------------+
| Field | Value |
+--------------------------------------+------------------------------------------------------+
| OS-DCF:diskConfig | MANUAL |
| OS-EXT-AZ:availability_zone | nova |
| OS-EXT-STS:power_state | 0 |
| OS-EXT-STS:task_state | None |
| OS-EXT-STS:vm_state | building |
| OS-SRV-USG:launched_at | None |
| OS-SRV-USG:terminated_at | None |
| accessIPv4 | |
| accessIPv6 | |
| addresses | |
| config_drive | |
| created | 2016-03-01T13:07:10Z |
| flavor | m1.tiny (1) |
| hostId | |
| id | 5d3ed7d6-d5ac-4f09-a353-0c2bd0fbd0ea |
| image | IFCA CentOS 7 (7f361fba-21d6-40ca-892d-17aa60b63a66) |
| key_name | None |
| name | test |
| os-extended-volumes:volumes_attached | [] |
| progress | 0 |
| project_id | 999f045cb1ff4684a15ebb338af69460 |
| properties | |
| security_groups | [{u'name': u'default'}] |
| status | BUILD |
| updated | 2016-03-01T13:07:11Z |
| user_id | a31b8c452b594369a49a8329103e241a |
+--------------------------------------+------------------------------------------------------+
Check that the VM is active by describing it (it may take a few minutes):
$ openstack server show <vm id>
+---------------------+--------+
| Field | Value |
+---------------------+--------+
(...)
| OS-EXT-STS:vm_state | active |
(...)
+---------------------+--------+
If the VM does not have a public IP, you will need to get an IP for it
$ openstack ip floating pool list
+-------------+
| Name |
+-------------+
| nova |
+-------------+
$ openstack ip floating pool create <pool name>
+-------------+----------------+
| Field | Value |
+-------------+----------------+
| fixed_ip | None |
| id | 1265 |
| instance_id | None |
| ip | 193.146.75.245 |
| pool | nova |
+-------------+----------------+
$ openstack ip floating add <ip> <vm id>
The VM should have now a public IP available when shown:
$ openstack server show <vm id>
+-----------+-------------------------------------+
| Field | Value |
+-----------+-------------------------------------+
(...)
| addresses | private=172.16.8.14, 193.146.75.245 |
(...)
+-----------+-------------------------------------+
ssh to the machine to the provided IP (the options avoid problems when different VMs have the same IP, don’t use them in production) and check that contextualization script was executed:
$ ssh -i tempkey -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null \
testadm@ <ip> "cat /tmp/deployment.log"
Warning: Permanently added '193.146.75.245' (ECDSA) to the list of known hosts.
OK
Create a storage volume:
$ openstack volume create --size 1 test
+---------------------+--------------------------------------+
| Field | Value |
+---------------------+--------------------------------------+
| attachments | [] |
| availability_zone | nova |
| bootable | false |
| created_at | 2016-03-01T13:29:44.392423 |
| display_description | None |
| display_name | test |
| id | 8f46046d-cd9b-4219-9ce7-f0abe30ad992 |
| properties | |
| size | 1 |
| snapshot_id | None |
| source_volid | None |
| status | creating |
| type | None |
+---------------------+--------------------------------------+
And show its status:
$ openstack volume show <vol id>
Attach it to the running VM:
$ openstack server add volume <vm id> <vol id>
And check it’s attached:
$ openstack volume show 8f46046d-cd9b-4219-9ce7-f0abe30ad992
+---------------------+---------------------------------------------------------+
| Field | Value |
+---------------------+---------------------------------------------------------+
| attachments | [{u'device': u'/dev/vdb', |
| | u'server_id': u'21f6123f-926c-4816-b4fb-53df91907a63', |
| | u'id': u'8f46046d-cd9b-4219-9ce7-f0abe30ad992', |
| | u'volume_id': u'8f46046d-cd9b-4219-9ce7-f0abe30ad992'}] |
| availability_zone | nova |
| bootable | false |
| created_at | 2016-03-01T13:29:44.000000 |
| display_description | None |
| display_name | test |
| id | 8f46046d-cd9b-4219-9ce7-f0abe30ad992 |
| properties | |
| size | 1 |
| snapshot_id | None |
| source_volid | None |
| status | in-use |
| type | None |
+---------------------+---------------------------------------------------------+
And login into the machine to create a filesystem, mount it, create a file, and umount:
$ ssh -i tempkey -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null \
testadm@ <ip_addr>
testadm $ sudo mke2fs <device_id>
(...)
testadm $ sudo mount <device_id> /mnt
testadm $ touch /mnt/test
testadm $ ls -l /mnt/
total 16 drwx------ 2 root root 16384 Nov 13 17:43 lost+found
-rw-r--r-- 1 root root 0 Nov 13 17:45 test
testadm $ sudo umount /mnt
testadm $ exit
Delete the VM:
$ openstack server delete <vm id>
And create a new one with the volume attached directly (substitute vdb for the same device name shown above):
$ openstack server create \
--flavor <flavor> --image <image id> \
--block-device-mapping vdb= <volume id> \
--user-data ctx.txt test
+-----------------------------+---------------------------------------------+
| Field | Value |
+-----------------------------+---------------------------------------------+
| OS-DCF:diskConfig | MANUAL |
| OS-EXT-AZ:availability_zone | nova |
| OS-EXT-STS:power_state | 0 |
| OS-EXT-STS:task_state | scheduling |
| OS-EXT-STS:vm_state | building |
| accessIPv4 | |
| accessIPv6 | |
| addresses | |
| adminPass | 9imSRC9EZhhX |
| config_drive | |
| created | 2016-03-01T13:45:21Z |
| flavor | m1.tiny (1) |
| hostId | |
| id | 10000d50-239b-4e86-bbd8-224143d6d346 |
| image | Image for EGI Centos 6 [CentOS/6/KVM]_egi |
| key_name | None |
| name | test |
| progress | 0 |
| project_id | fffd98393bae4bf0acf66237c8f292ad |
| properties | |
| security_groups | [{u'name': u'default'}] |
| status | BUILD |
| updated | 2016-03-01T13:45:23Z |
| user_id | 6c254b295af64644904a813db0d3d88a |
+-----------------------------+---------------------------------------------+
Assign the public IP (if it does not have one already):
$ openstack ip floating add <ip> <vm id>
And check that the volume is attached and usable:
$ ssh -i tempkey -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null \
testadm@ <new_vm_ip_addr>
testadm $ sudo mount <device_id> /mnt
testadm $ ls -ltr /mnt/
total 16
drwx------ 2 root root 16384 Nov 13 17:43 lost+found
-rw-r--r-- 1 root root 0 Nov 13 17:45 test
testadm $ sudo umount /mnt
testadm $ exit
Finally delete VM, volume and IP address (NOTE: use the id of the IP as returned
by openstack ip floating list\!):
$ openstack server delete <vm id>
$ openstack volume delete <volume id>
$ openstack ip floating delete <ip id>
Cloud Storage (CDMI) checks (eu.egi.cloud.storage-management.cdmi service type)
List the content of the repository:
$ bcdmi -e <cdmi_endpoint> list /
Create a test directory:
$ bcdmi -e <cdmi_endpoint> mkdir test
{
"completionStatus": "Complete",
"objectName": "test/",
"capabilitiesURI": "/cdmi/AUTH_df37f5b1ebc94604964c2854b9c0551f/cdmi_capabilities/container/",
"parentURI": "/cdmi/AUTH_df37f5b1ebc94604964c2854b9c0551f/",
"objectType": "application/cdmi-container",
"metadata": {}
}
Create a test file and upload it to the created directory:
$ echo "TEST OK" > testfile
$ bcdmi -e <cdmi_endpoint> put -T testfile
test/test.txt**
Try to download back the file and compare to previous:
$ bcdmi -e <cdmi_endpoint> get test/test.txt -o testfile.downloaded
$ diff testfile testfile.downloaded && echo "Files are equal" \
|| echo "Files differ"
Files are equal
Delete the file:
$ bcdmi -e <cdmi_endpoint> delete test/test.txt
Check that the file is not present anymore
$ bcdmi -e <cdmi_endpoint> list test/
Upload the file again and recursively delete the directory:
$ bcdmi -e <cdmi_endpoint> put -T testfile test/test.txt
$ bcdmi -e <cdmi_endpoint> delete -r test/
Check that the folder does not exist anymore
$ bcdmi -e <cdmi_endpoint> list /
See Site Certification GIIS Check HOWTO03.
See to Resource Centre registration and certification procedure PROC09.