[b]Hello,
I’m running the /etc/init.d script as root
My log looks like this, now my master (fanae41) seems to work fine but all the other machines don’t…[/b]
080121 12:51:10 001 Scalla is starting. . .
Copr. 2007 Stanford University, xrd version 20071116-0000a
Config using configuration file /afs/fanae/code/Proof/xpd.cf
++++++ xrootd anon@fanae42.geol.uniovi.es initialization started.
=====> xrd.port 1094
=====> xrd.protocol xproofd:1092 /afs/fanae/scratch/root/root/lib/libXrdProofd.so
Config maximum number of connections restricted to 1024
080121 12:51:10 001 XrdSched: scheduling underused thread monitor in 780 seconds
080121 12:51:10 001 XrdSched: Starting with 2 workers
080121 12:51:10 001 XrdLink: Allocating 16 link objects at a time
080121 12:51:10 001 XrdPoll: Starting poller 0
080121 12:51:11 001 XrdPoll: Starting poller 1
080121 12:51:11 001 XrdPoll: Starting poller 2
080121 12:51:11 001 XrdProtocol: getting port from protocol xrootd
080121 12:51:11 001 XrdProtocol: getting port from protocol xproofd
— Proofd: : GetNumCPUs: # of cores found: 1
080121 12:51:11 001 XrdProtocol: getting protocol object xrootd
Copr. 2007 Stanford University, xrootd version 2.9.0 build 20071116-0000a
++++++ xrootd protocol initialization started.
=====> xrootd.export /scratch/proofpool
=====> xrootd.fslib /afs/fanae/scratch/root/root/lib/libXrdOfs.so
080121 12:51:11 001 XrootdAioReq: Max aio/req=8; aio/srv=4096; Quantum=131072
080121 12:51:11 001 XrootdAioReq: Adding 30 aioreq objects.
080121 12:51:11 001 XrootdAio: Adding 24 aio objects; 4096 pending.
Config warning: ‘xrootd.seclib’ not specified; strong authentication disabled!
080121 12:51:11 001 XrootdProtocol: Loading filesystem library /afs/fanae/scratch/root/root/lib/libXrdOfs.so
Copr. 2007 Stanford University, Ofs Version 20071116-0000a
++++++ File system initialization started.
Config warning: redirect directive is deprecated; use ‘all.role’.
=====> ofs.redirect target
=====> all.role server
++++++ Configuring server role. . .
=====> all.manager fanae41 3121
Config effective /afs/fanae/code/Proof/xpd.cf ofs configuration:
ofs.role server
ofs.fdscan 9 120 1200
ofs.maxdelay 60
ofs.trace bfcd
------ File system server initialization completed.
Copr. 2007, Stanford University, oss Version 20071116-0000a
++++++ Storage system initialization started.
=====> oss.cache public /scratch/cache*
=====> oss.path /scratch/proofpool r/w
080121 12:51:11 001 oss_AioInit: started AIO read signal thread; tid=3078785952
080121 12:51:11 001 oss_AioInit: started AIO write signal thread; tid=3077995424
Config effective /afs/fanae/code/Proof/xpd.cf oss configuration:
oss.alloc 0 0 0
oss.cachescan 600
oss.compdetect *
oss.fdlimit 512 1024
oss.maxdbsize 0
oss.trace fff
oss.xfr 1 9437184 30 10800
oss.memfile off max 397117440
oss.cache public /scratch/cache/
oss.defaults r/w nocheck nodread nomig norcreate nostage
oss.path /scratch/proofpool r/w nocheck nodread nomig norcreate nostage
------ Storage system initialization completed.
080121 12:51:11 001 XrdSched: scheduling xrootd protocol anchor in 3600 seconds
Config warning: ‘xrootd.prepare logdir’ not specified; prepare tracking disabled.
Config exporting /scratch/proofpool
------ xrootd protocol initialization completed.
080121 12:51:11 001 XrdProtocol: getting protocol object xproofd
080121 12:51:11 001 xpd : ProofdManager: Config: file: /afs/fanae/code/Proof/xpd.cf
080121 12:51:11 001 xpd : ProofdManager: Config: time of last modification: 1200914419
— Proofd: : DoDirectiveString: set seclib to /afs/fanae/scratch/root/root/lib/libXrdSec.so
080121 12:51:11 001 xpd : XrdROOT::ValidatePrgmSrv: forking test and protocol retrieval
080121 12:51:11 001 xpd : XrdROOT::ValidatePrgmSrv: forking external proofsrv
xpd:child: : SetProofServEnv: enter: ROOT dir: /cms/slc4_ia32_gcc345/lcg/root/5.14.00f-CMS3q
080121 12:51:11 001 xpd : XrdROOT::ValidatePrgmSrv: test server launched: wait for protocol
080121 12:51:12 001 xpd : DoDirectiveRootSys: validation OK for: 5.14/00f 5.14/00f /cms/slc4_ia32_gcc345/lcg/root/5.14.00f-CMS3q 12
— Proofd: : DoDirectiveString: set workdir to /scratch/proofbox
080121 12:51:12 001 xpd : DoDirectiveResource: configuration file cannot be read: /afs/fanae/user/lara/CMSSW_1_6_7/all
— Proofd: : >>> Warning: ‘if’ conditions at the end of the directive are deprecated
— Proofd: : >>> Please use standard Scalla/Xrootd ‘if-else-fi’ constructs
— Proofd: : >>> (see xrootd.slac.stanford.edu/doc/xrd … config.htm)
— Proofd: : CheckIf: : fanae*
— Proofd: : >>> Warning: ‘if’ conditions at the end of the directive are deprecated
— Proofd: : >>> Please use standard Scalla/Xrootd ‘if-else-fi’ constructs
— Proofd: : >>> (see xrootd.slac.stanford.edu/doc/xrd … config.htm)
— Proofd: : CheckIf: : fanae41
— Proofd: : DoDirectiveString: set poolurl to root://fanae41
— Proofd: : DoDirectiveString: set namespace to /scratch/proofpool
080121 12:51:12 001 ProofdManager: ParseConfig: configuring
080121 12:51:12 001 ProofdManager: ParseConfig: working directories under: /scratch/proofbox
++++++ Authentication system initialization started.
080121 12:51:12 001 secgsi_Init: option CACheck: 1
080121 12:51:12 001 secgsi_Init: testing CA dir(s): /etc/grid-security/certificates
080121 12:51:12 001 secgsi_Init: using CA dir(s): /etc/grid-security/certificates/
080121 12:51:12 001 secgsi_Init: option CRLCheck: 2
080121 12:51:12 001 secgsi_Init: using CRL dir(s): /etc/grid-security/certificates/
080121 12:51:12 001 crypto_Factory::GetCryptoFactory: loading ssl crypto factory object from libXrdCrypto.so
080121 12:51:12 001 crypto_Factory::GetCryptoFactory: loading ssl crypto factory object from libXrdCryptossl.so
080121 12:51:12 001 sut_Rndm::GetBuffer: enter: len: 32
080121 12:51:12 001 sut_Rndm::Init: taking seed from /dev/urandom
080121 12:51:12 001 cryptossl_sslCipher::XrdCryptosslCipher: generate DH full key
080121 12:51:12 001 sut_Cache::Init: cache allocated for 100 entries
080121 12:51:12 001 sut_Cache::Rehash: Hash table updated (found 0 active entries)
080121 12:51:12 001 secgsi_LoadCADir: analysing entry /etc/grid-security/certificates/.
080121 12:51:12 001 secgsi_LoadCADir: Entry /etc/grid-security/certificates/. does not contain a valid CA
080121 12:51:12 001 secgsi_LoadCADir: analysing entry /etc/grid-security/certificates/…
080121 12:51:12 001 secgsi_LoadCADir: Entry /etc/grid-security/certificates/… does not contain a valid CA
080121 12:51:12 001 secgsi_LoadCADir: analysing entry /etc/grid-security/certificates/9b59ecad.signing_policy
080121 12:51:12 001 secgsi_LoadCADir: Entry /etc/grid-security/certificates/9b59ecad.signing_policy does not contain a valid CA
080121 12:51:12 001 secgsi_LoadCADir: analysing entry /etc/grid-security/certificates/3d5be7bc.r0
080121 12:51:12 001 secgsi_LoadCADir: Entry /etc/grid-security/certificates/3d5be7bc.r0 does not contain a valid CA
080121 12:51:12 001 secgsi_LoadCADir: analysing entry /etc/grid-security/certificates/82b36fca.crl_url
080121 12:51:12 001 secgsi_LoadCADir: Entry /etc/grid-security/certificates/82b36fca.crl_url does not contain a valid CA
080121 12:51:12 001 secgsi_LoadCADir: analysing entry /etc/grid-security/certificates/8a047de1.r0
080121 12:51:12 001 secgsi_LoadCADir: Entry /etc/grid-security/certificates/8a047de1.r0 does not contain a valid CA
080121 12:51:12 001 secgsi_LoadCADir: analysing entry /etc/grid-security/certificates/ff94d436.r0
080121 12:51:12 001 secgsi_LoadCADir: Entry /etc/grid-security/certificates/ff94d436.r0 does not contain a valid CA
080121 12:51:12 001 secgsi_LoadCADir: analysing entry /etc/grid-security/certificates/d1b603c3.r0
080121 12:51:12 001 secgsi_LoadCADir: Entry /etc/grid-security/certificates/d1b603c3.r0 does not contain a valid CA
080121 12:51:12 001 secgsi_LoadCADir: analysing entry /etc/grid-security/certificates/a317c467.info
080121 12:51:12 001 secgsi_LoadCADir: Entry /etc/grid-security/certificates/a317c467.info does not contain a valid CA
080121 12:51:12 001 secgsi_LoadCADir: analysing entry /etc/grid-security/certificates/11b4a5a2.0
080121 12:51:12 001 cryptossl_X509::IsCA: certificate has 11 extensions
080121 12:51:12 001 cryptossl_X509::IsCA: CA certificate
080121 12:51:12 001 cryptossl_X509ParseFile: certificate added to the chain - ord: 1
080121 12:51:12 001 cryptossl_X509ParseFile: no RSA private key found in file /etc/grid-security/certificates/11b4a5a2.0
080121 12:51:12 001 secgsi_LoadCRL: target file: /etc/grid-security/certificates/11b4a5a2.r0
080121 12:51:12 001 cryptossl_X509Crl::XrdCryptosslX509Crl_file: CRL successfully loaded
080121 12:51:12 001 cryptossl_LoadCache: 78certificates have been revoked
080121 12:51:12 001 sut_Cache::Init: cache allocated for 78 entries
080121 12:51:12 001 sut_Cache::Rehash: Hash table updated (found 0 active entries)
080121 12:51:12 001 sut_Cache::Rehash: Hash table updated (found 1 active entries)
…
080121 12:51:19 001 cryptossl_X509Crl::XrdCryptosslX509Crl_file: CRL successfully loaded
080121 12:51:19 001 cryptossl_LoadCache: 1certificates have been revoked
080121 12:51:19 001 sut_Cache::Init: cache allocated for 1 entries
080121 12:51:19 001 sut_Cache::Rehash: Hash table updated (found 0 active entries)
080121 12:51:19 001 sut_Cache::Rehash: Hash table updated (found 1 active entries)
080121 12:51:19 001 sut_Cache::Rehash: Hash table updated (found 1 active entries)
080121 12:51:19 001 sut_Cache::Rehash: Hash table updated (found 73 active entries)
080121 12:51:19 001 secgsi_LoadCADir: analysing entry /etc/grid-security/certificates/98ef0ee5.crl_url
080121 12:51:19 001 secgsi_LoadCADir: Entry /etc/grid-security/certificates/98ef0ee5.crl_url does not contain a valid CA
080121 12:51:19 001 sut_Cache::Rehash: Hash table updated (found 73 active entries)
080121 12:51:19 001 sut_Cache::Init: cache allocated for 10 entries
080121 12:51:19 001 sut_Cache::Rehash: Hash table updated (found 0 active entries)
080121 12:51:19 001 cryptossl_X509::XrdCryptosslX509_file: certificate successfully loaded
080121 12:51:19 001 cryptossl_X509::IsCA: certificate has 13 extensions
080121 12:51:19 001 cryptossl_X509::XrdCryptosslX509_file: cannot open file /etc/grid-security/hostkey.pem (errno: 13)
080121 12:51:19 001 secgsi_Init: problems loading srv cert: invalid PKI
080121 12:51:19 001 sut_Cache::Rehash: Hash table updated (found 0 active entries)
080121 12:51:19 001 secgsi_ErrF: Secgsi: ErrError: no valid server certificate found
080121 12:51:19 001 secgsi_Init: Secgsi: ErrError: no valid server certificate found
080121 12:51:19 001 sec_Config: Secgsi: ErrError: no valid server certificate found
=====> sec.protocol gsi -dlgpxy:1 -d:1 -certdir:/etc/grid-security/certificates -cert:/etc/grid-security/hostcert.pem -key:/etc/grid-security/hostkey.pem
Config 1 authentication directives processed in /tmp/xpdcfn_oUEMcL
------ Authentication system initialization failed.
080121 12:51:19 001 xpdLoadSecurity: Unable to create security service object via /afs/fanae/scratch/root/root/lib/libXrdSec.so
080121 12:51:19 001 xpd: ProofdManager: ParseConfig: unable to load security system.
080121 12:51:19 001 XrdProtocol: Protocol xproofd could not be loaded
------ xrootd anon@fanae42.geol.uniovi.es:1094 initialization failed.
080121 12:51:19 001 XrdSched: scheduling midnight runner in 40121 seconds
And…my xpd.cf file looks like this:
setenv LD_LIBRARY_PATH /afs/fanae/scratch/root/root/lib/
XRD port
xrd.port 1094
if exec xrootd
xrd.protocol xproofd:1092 /afs/fanae/scratch/root/root/lib/libXrdProofd.so
fi
xpd.seclib /afs/fanae/scratch/root/root/lib/libXrdSec.so
xpd.sec.protocol gsi -dlgpxy:1 -d:1 -certdir:/etc/grid-security/certificates -cert:/etc/grid-security/hostcert.pem -key:/etc/grid-security/hostkey.pem
Export /scratch/proofpool
xrootd.export /scratch/proofpool
FS lib
xrootd.fslib /afs/fanae/scratch/root/root/lib/libXrdOfs.so
OpenFS section
if fanae41
ofs.redirect remote
ofs.forward all
else
ofs.redirect target
fi
OSS section
oss.cache public /scratch/cache*
oss.path /scratch/proofpool r/w
OLB / ODC section
Port
olb.port 3121
Paths
olb.path w /scratch/proofpool
Role
if fanae41
all.role manager
else
all.role server
fi
Manager location (ignored by managers)
all.manager fanae41 3121
Delay client requests at manager startup
olb.delay startup 30
PROOF part
(xrootd only: the ‘xpd.’ directives are ignored if the protocol is not loaded)
Load the XrdProofd protocol:
using absolute paths (<ROOT_sys> with the path to the ROOT distribution)
#if exec xrootd
#xrd.protocol xproofd:1092 /afs/fanae/scratch/root/root/lib/libXrdProofd.so
#fi
ROOTSYS
xpd.rootsys /cms/slc4_ia32_gcc345/lcg/root/5.14.00f-CMS3q
Working directory for sessions [<User_Home>/proof]
xpd.workdir /scratch/proofbox
Resource finder
NB: 'if ’ not supported for this directive.
xpd.resource static [<cfg_file>] [ucfg:<user_cfg_opt>] [wmx:<max_workers>]
[selopt:<selection_mode>]
“static”, i.e. using a config file
<cfg_file> path alternative config file
[$ROOTSYS/proof/etc/proof.conf]
<user_cfg_opt> if “yes”: enable user private config files at
$HOME/.proof.conf or $HOME/.<usr_def>, where
<usr_cfg> is the second argument to
TProof::Open("","<usr_cfg>") [“no”]
<max_workers> Maximum number of workers to be assigned to user
session [-1, i.e. all]
<selection_mode> If <max_workers> != -1, specify the way workers
are chosen:
“roundrobin” round-robin selection in bunches
of n(=<max_workers>) workers.
Example:
N = 10 (available workers), n = 4:
1st (session): 1-4, 2nd: 5-8,
3rd: 9,10,1,2, 4th: 3-6, …
“random” random choice (a worker is not
assigned twice)
xpd.resource static /cms/slc4_ia32_gcc345/lcg/root/5.14.00f-CMS3q/etc/proof.conf all
Server role (master, submaster, worker) [default: any]
Allows to control the cluster structure.
The following (commented) example will set lxb6046 as master, and all
the others lxb* as workers
xpd.role worker if fanae*
xpd.role master if fanae41
Master(s) allowed to connect. Directive active only for Worker or
Submaster session requests. Multiple ‘allow’ directives can
be specified. By default all connections are allowed.
xpd.allow fanae41
URL and namespace for the local storage if different from defaults.
By the default it is assumed that the pool space on the cluster is
accessed via a redirector running at the top master under the common
namespace /proofpool.
Any relevant protocol specification should be included here.
xpd.poolurl root://fanae41
xpd.namespace /scratch/proofpool
And my /etc/init.d/xrootd file is as follows:
#! /bin/sh
xrootd Start/Stop the XROOTD daemon
chkconfig: 345 20 80
description: The xrootd daemon is used to as file server and starter of
the PROOF worker processes.
processname: xrootd
pidfile: /var/run/xrootd.pid
config:
XROOTD=/afs/fanae/scratch/root/root/bin/xrootd
XRDLIBS=/afs/fanae/scratch/root/root/lib
Source function library.
. /etc/init.d/functions
Get config.
. /etc/sysconfig/network
Get xrootd config
[ -f /etc/sysconfig/xrootd ] && . /etc/sysconfig/xrootd
Read user config
[ ! -z “$XRDUSERCONFIG” ] && [ -f “$XRDUSERCONFIG” ] && . $XRDUSERCONFIG
Check that networking is up.
if [ ${NETWORKING} = “no” ]
then
exit 0
fi
[ -x $XROOTD ] || exit 0
RETVAL=0
prog=“xrootd”
start() {
echo -n $"Starting $prog: "
# Options are specified in /etc/sysconfig/xrootd .
# See $ROOTSYS/etc/daemons/xrootd.sysconfig for an example.
# $XRDUSER must be the name of an existing non-privileged user.
export LD_LIBRARY_PATH=$XRDLIBS:$LD_LIBRARY_PATH
daemon $XROOTD -l $XRDLOG -R $XRDUSER -c $XRDCF $XRDDEBUG
RETVAL=$?
echo
[ $RETVAL -eq 0 ] && touch /var/lock/subsys/xrootd
return $RETVAL
}
stop() {
[ ! -f /var/lock/subsys/xrootd ] && return 0 || true
echo -n $"Stopping $prog: "
killproc xrootd
RETVAL=$?
echo
[ $RETVAL -eq 0 ] && rm -f /var/lock/subsys/xrootd
return $RETVAL
}
See how we were called.
case “$1” in
start)
start
;;
stop)
stop
;;
status)
status xrootd
RETVAL=$?
;;
restart|reload)
stop
start
;;
condrestart)
if [ -f /var/lock/subsys/xrootd ]; then
stop
start
fi
;;
*)
echo $"Usage: $0 {start|stop|status|restart|reload|condrestart}"
exit 1
esac
exit $RETVAL
Which file do I have to edit if I want to set my .globus/user authentication???
Lara