Difference between revisions of "SAC Service Status"
Jump to navigation
Jump to search
m (crosslink) |
m (ISO mirroring) |
||
Line 1: | Line 1: | ||
+ | Infrastructure of OSGeo System Administration Committee ([[SAC]]) | ||
+ | |||
= System List = | = System List = | ||
Line 21: | Line 23: | ||
** txtmob.telascience.org: SMS Smart Mob system | ** txtmob.telascience.org: SMS Smart Mob system | ||
** gpstrack.telascience.org: Plone GPS / APRS / Cell tracking .... wishing ;) | ** gpstrack.telascience.org: Plone GPS / APRS / Cell tracking .... wishing ;) | ||
+ | ** ISO mirroring | ||
* sparcblade8 (198.202.74.213) Solaris 2.9 | * sparcblade8 (198.202.74.213) Solaris 2.9 | ||
** civicspace.telascience.org: experimental community portal | ** civicspace.telascience.org: experimental community portal |
Revision as of 03:16, 18 September 2006
Infrastructure of OSGeo System Administration Committee (SAC)
System List
This page only describes some of the core systems and is not a full description of the telascience reality in any way
Telascience Blades
- xblade11-2 (198.202.74.216) FC4
- new server: new install, ldap enabled, yum updated July 20th/2006.
- geodata.telascience.org; Assigned for geodata work for now, and to be named dev.geodata.osgeo.org or something similar. Binaries on geodata:
- all GIS binaries are installed into /usr/local/*
- /usr/local/lib was added to /etc/ld.so.conf
- xblade12-2 (198.202.74.217) FC4
- new server: new install, ldap enabled.
- xblade13-2 (198.202.74.218) FC4
- shell.telascience.org: Lots of software installed, general use.
- xblade14-2 (198.202.74.219) FC4
- new server: new install, ldap enabled, yum updated July 19th/2006.
- xblade15-2 (198.202.74.220) FC4
- ldap.telascience.org: Fedora Directory Server. LDAP server.
- osgeo.telascience.org: Plone
- txtmob.telascience.org: SMS Smart Mob system
- gpstrack.telascience.org: Plone GPS / APRS / Cell tracking .... wishing ;)
- ISO mirroring
- sparcblade8 (198.202.74.213) Solaris 2.9
- civicspace.telascience.org: experimental community portal
Services
- LDAP (on .74.220)
- Plone (on .74.220)
- HTTPD (on .74.220)
Known Issues
- .216/.217/.218/.219: need Admin group in sudoers file.
- .74.220 is not using ldap authentication for shell access.
- Access to LDAP server needs to be restricted to specific machines somehow?
- We have to create userids on the LDAP server manually, can't be done through plone without a lot of work.
- Plone instance is not using LDAP for authentication.
Service Groups
Currently, shell access is limited to users in the LDAP schema under the "Shell" group. No further group authorization/granularity exists at this time. It is desireable to have "Shell" be broken into groups like "Database", "Subversion Admin", etc to distribute the administration of those tasks.