Difference between revisions of "SAC Service Status"

From OSGeo
Jump to navigation Jump to search
m
Line 4: Line 4:
  
 
== Telascience Blades ==
 
== Telascience Blades ==
* osgeo.telascience.org (198.202.74.211): Solaris. Contains plone installation
+
 
* ldap.telascience.org (198.202.74.220): FC4 + Fedora Directory Server. Contains LDAP server.  
+
* xblade11-2 (198.202.74.216) FC4
* shell server (198.202.74.218): FC4. Lots of software installed, general use.
+
** new server: new install
 +
* xblade12-2 (198.202.74.217) FC4
 +
** new server: new install
 +
* xblade13-2 (198.202.74.218) FC4
 +
** shell.telascience.org: Lots of software installed, general use.
 +
* xblade14-2 (198.202.74.219) FC4
 +
** new server: new install
 +
* xblade15-2 (198.202.74.220) FC4
 +
** ldap.telascience.org: Fedora Directory Server. LDAP server.
 +
** osgeo.telascience.org: Plone
 +
** geodata.telascience.org: Apache2
 +
** txtmob.telascience.org: SMS Smart Mob system
 +
** gpstrack.telascience.org: Plone GPS / APRS / Cell tracking .... wishing ;)
  
 
= Services =  
 
= Services =  

Revision as of 23:29, 17 July 2006

System List

This page only describes some of the core systems and is not a full description of the telascience reality in any way

Telascience Blades

  • xblade11-2 (198.202.74.216) FC4
    • new server: new install
  • xblade12-2 (198.202.74.217) FC4
    • new server: new install
  • xblade13-2 (198.202.74.218) FC4
    • shell.telascience.org: Lots of software installed, general use.
  • xblade14-2 (198.202.74.219) FC4
    • new server: new install
  • xblade15-2 (198.202.74.220) FC4
    • ldap.telascience.org: Fedora Directory Server. LDAP server.
    • osgeo.telascience.org: Plone
    • geodata.telascience.org: Apache2
    • txtmob.telascience.org: SMS Smart Mob system
    • gpstrack.telascience.org: Plone GPS / APRS / Cell tracking .... wishing ;)

Services

  • LDAP (on .74.220)
  • Plone (on .74.211)

Known Issues

  • .74.211 is not using ldap authentication for shell access.
  • .74.220 is not using ldap authentication for shell access.
  • Access to LDAP server needs to be restricted to specific machines somehow?
  • We have to create userids on the LDAP server manually, can't be done through plone without a lot of work.
  • Plone instance is not using LDAP for authentication.

Service Groups

Currently, shell access is limited to users in the LDAP schema under the "Shell" group. No further group authorization/granularity exists at this time. It is desireable to have "Shell" be broken into groups like "Database", "Subversion Admin", etc to distribute the administration of those tasks.