Information Technology Reference
In-Depth Information
EGEE's ROC model has proven very successful, allowing the four-fold
growth of the infrastructure (in terms of sites) to happen without any
impact on the service.
ROCs are coordinated by the overall Operations Coordination located
at CERN. Coordination mainly happens through weekly operations meet-
ings where issues from the different ROCs are discussed and resolved. A
so-called “grid operator on duty” constantly monitors the health of the
EGEE infrastructure using a variety of monitoring tools and initiates
actions where services or sites are not in a good state. EGEE requires per-
sonnel at resource centers that manage the grid services offered and take
corrective measures in case of problems. Service-level agreements (SLAs)
are being set up between EGEE and the resource centers to fully dei ne the
required level of commitment, which may differ between centers. The
Operations Coordination is also responsible for releasing the middleware
distribution for deployment; individual sites are supported by their ROC
in installing and coni guring the middleware. The EGEE middleware dis-
tribution is discussed on p. 000.
Security is a cornerstone of EGEE's operation and the Operational
Security Coordination group coordinates the security-related operations at
all EGEE sites. In particular, the EGEE security ofi cer interacts with the
site's security contacts and ensures that security-related problems are
properly handled, security policies are adhered to, and the general aware-
ness of security-related issues is raised. EGEE's security policies are dei ned
by the Joint Security Policy Group, a group jointly operated by EGEE, the
U.S. Open Science Grid project (OSG, http://www.opensciencegrid.org),
and the Worldwide LHC Computing Grid project (LCG, http://cern.ch/
lcg). Further security-related policies are set by the EUGridPMA and IGTF
(http://www.gridpma.org/), the bodies approving certii cate authorities
and thus establishing trust between different actors on the EGEE infra-
structure. A dedicated Grid Security Vulnerability Group is proactively
analyzing the EGEE infrastructure and its services to detect potential secu-
rity problems early on and initiate their remedy: as discussed on p. 000 the
EGEE security infrastructure is based on X.509 proxy certii cates, which
allow are to implement the security policies both at site level and on grid-
wide services.
The EGEE infrastructure is federating resources and making them easily
accessible but does not own the resources itself. Instead, the resources acces-
sible belong to independent resource centers that procure their resources
and allow access to them based on their particular funding schemes and
policies. Federating the resources through EGEE allows the resource cen-
ters to offer seamless, homogeneous access mechanisms to their users as
well as to support a variety of application domains through the EGEE VOs.
Hence, EGEE on it s ow n ca n not t a ke a ny de c i sion on how to a s sig n re sou rce s
to VOs and applications. EGEE merely provides a marketplace where
Search WWH ::




Custom Search