Skip to content

esnet/sense-rm

Repository files navigation

sense-n-rm

SENSE Network Resource Manager

This is prototype software supporting the SENSE-RM API over an NSI network.

Contents

  • How-to configure and run the SENSE-N-RM application
  • How-to natively build the SENSE-N-RM
  • How-to install Java on CentOS 7
  • How-to install Maven on CentOS 7
  • How-to install Docker on CentOS 7
  • Using Docker tools to build the SENSE-N-RM

How-to configure and run the SENSE-N-RM application

The Java 1.8 runtime and Postgres database is required to run the SENSE-N-RM naitively on a server. In addition, maven is required to build the SENSE-N-RM from source.

Pre-configuration checklist

  1. Install the prerequisite runtime software
  • java 1.8 for runtime and build of source;
  • maven for building the source;
  • postgresql for runtime.
  1. Create a non-root user account to run the SENSE-N-RM.
  2. Download and build the SENSE-N-RM source code (will require java and maven).
  3. Create a Postgres account for use by the SENSE-N-RM.

Create a non-root user account

The SENSE-N-RM application should be run as a low-privilege user on the target production server. Ideally it should be run as a user created only for the purpose of running the set of software associated with the SENSE-N-RM application. However, an existing account can be used if available (i.e. opennsa). However, if an account other than "sense" is used to run the application make sure to create the SENSE-N-RM database user using the utilized id.

As an example, we create the following new user and user group for the SENSE-N-RM application if you have not already done so (for example, below we create a "sense" user and user group).

$ sudo groupadd sense
$ sudo useradd sense -g sense
$ sudo su - sense

Download and build the SENSE-N-RM source code

The SENSE-N-RM is a Java Spring-boot application the will require a Java 1.8 runtime and Maven to build. Please follow the "How-To" sections on installing both Java and Maven if not on your system.

We recommend pulling the current version of the main branch from github. Create a location to download and build the source. This can be done in the context of the application specific user.

$ mkdir src
$ cd src
$ git clone https://github.com/esnet/sense-rm.git

Into the sense-rm directory we go and build the source (skipping test cases).

$ cd sense-rm
$ mvn clean install -DskipTests=true

Now we want to collect the pieces in target/dist directory:

$ mvn antrun:run@package-runtime

Copy the contents of target/dist to the location you would like to use as the runtime directory for the SENSE-N-RM. For example, if you are running under a dedicated sense user id then place in a location in the home directory /home/sense/sense-rm. It is recommended that you do not run from the build directory as any new builds will overwrite the existing jar and configuration.

$ mv target/dist ~/sense-rm

Create a Postgres application account

The SENSE-N-RM requires a dedicated Postgres user and database to be created for storage of MRML related model information, and other runtime data needed to map requests from the SENSE-O through to underlying resources.

First we create new database user called "sense" using the Postgres interactive tools. You can use a different user name but remember it for when you configure the SENSE-N-RM runtime.

$ sudo -u postgres createuser --interactive --pwprompt

Here is an example output:

$ sudo -u postgres createuser --interactive --pwprompt
Enter name of role to add: sense
Enter password for new role: ******
Enter it again: *****
Shall the new role be a superuser? (y/n) n
Shall the new role be allowed to create databases? (y/n) y
Shall the new role be allowed to create more new roles? (y/n) n

Now we create the database "sense-n-rm" and assign ownership to the "sense" user we just created.

$ sudo -u postgres createdb -O sense sense-n-rm

The creation of database tables will be done dynamically by the SENSE-N-RM.

Creating Java key and trust stores

The SENSE-N-RM source tree contains a /certificates directory holding a set of common certificates and scripts writen to create your Java keystore and trustore needed to communicate with systems in the SENSE ecosystem.

To build the truststore we can use the build_truststore.sh script:

Usage: build_truststore.sh <filename> <password>

Here is an example where we create the a truststore.jks file with a default password of changeit. Once created move the your SENSE-N-RM runtime /config directory, or somewhere it can be accessed.

$ cd certificates
$ ./build_truststore.sh truststore.jks changeit
Adding 179-132_research_maxgigapop_net.pem as alias 179-132_research_maxgigapop_net
Certificate was added to keystore
Adding agg_netherlight_net.pem as alias agg_netherlight_net
Certificate was added to keystore
Adding nsi-aggr-west_es_net.pem as alias nsi-aggr-west_es_net
Certificate was added to keystore
Adding nsi-am-sl_northwestern_edu.pem as alias nsi-am-sl_northwestern_edu
Certificate was added to keystore
Adding nsi0_lsanca_pacificwave_net.pem as alias nsi0_lsanca_pacificwave_net
Certificate was added to keystore
Adding nsi0_snvaca_pacificwave_net.pem as alias nsi0_snvaca_pacificwave_net
Certificate was added to keystore
Adding nsi0_sttlwa_pacificwave_net.pem as alias nsi0_sttlwa_pacificwave_net
Certificate was added to keystore
Adding nsi_ampath_net.pem as alias nsi_ampath_net
Certificate was added to keystore
Adding pmri061_it_northwestern_edu.pem as alias pmri061_it_northwestern_edu
Certificate was added to keystore
Adding southernlight_net_br.pem as alias southernlight_net_br
Certificate was added to keystore

For creating the Java keystore you will need the host SSL key, certificate, and signing CA file. To build the keystore we can use the build_keystore.sh script:

Usage: build_keystore.sh <keystorefile> <passwd> <keyfile> <certfile> <ca-file>

Here is an example where we create the a keystore.p12 file with a password of changeit. Once created move the your SENSE-N-RM runtime /config directory, or somewhere it can be accessed.

$ ./build_keystore.sh keystore.jks changeit test.key test.crt test-ca.crt 
Entry for alias 1 successfully imported.
Import command completed:  1 entries successfully imported, 0 entries failed or cancelled
[Storing keystore.jks]

Now move these to the SENSE-N-RM runtime configuration directory.

$ mv keystore.jks truststore.jks ~/sense-rm/config

Configuring OpenNSA

If the SENSE-N-RM is being configured to use OpenNSA as am NSI Resource Manager then we need to configure OpenNSA to accept requests from the SENSE-N-RM. This will require the SENSE-N-RM x.509 certificate to be added to the OpenNSA SSL certificate store, and the SENSE-N-RM host name added to the /etc/opennsa.conf file as follows:

sudo vi /etc/opennsa.conf 

Find the "allowedhosts=" configuration attribute and add the SENSE-N-RM host to the list of allowed hosts. Now restart OpenNSA as follows:

$ sudo systemctl restart opennsa

Configuring the SENSE-N-RM

There are two configuration files that will need to be modified before you can run your SENSE-N-RM instance. We will start with the simple configuration file first.

Configuring the log subsystem (logback.xml)

The SENSE-N-RM utilizes the java log4j logging subsystem to collect and maintain logs. The config/logback.xml file can be modified to control the location of the generated log files. By default logs will be written to the SENSE-N-RM home directory under $HOME/var/log/sense-rm/. If you would like to change this location to somewhere more standard like /var/log then edit the following two lines in the config/logback.xml file to point to the desired location.

...
<file>var/log/sense-rm/sense-n-rm.log</file>
...
<fileNamePattern>var/log/sense-rm/sense-n-rm.%d{yyyy-MM-dd}.log</fileNamePattern>
...

Also, if using the system /var/log directory you will need to create a dedicated directory for SENSE-N-RM to write logs and change owenership the the user underwhich you are running the java process.

$ sudo mkdir /var/log/sense-rm
$ sudo chown sense.sense /var/log/sense-rm

Configuring the SENSE-N-RM runtime (application.yaml)

The SENSE-N-RM currently supports adaptation between the SENSE protocol and the standardized OGF NSI protocol. To run an instance of the SENSE-N-RM we need to confiugure both attributes relating to operation within the SENSE environment, and attributes relating to operation within the NSI environment. Also, the SENSE-N-RM can be deployed behind an HTTP reverse proxy to provide additional security. All this configuration is specified through the config/application.yaml file.

#########################################
# SENSE-N-RM specific configuration.    #
#########################################
#
# sense.root - the root of our URL context for building REST URL.  If we are behind
#        a proxy this is the URL of that proxy. [Not currently used]
#
# sense.proxy - A simple mechanism that allows for URL manupulation on returned
#         resources to map any localized URL to URL externalized by a proxy.
#         Proper configuration of the Spring-boot web environment should mean
#         this proxy value is left empty.  Here is an example:
#
#             "(http://localhost:8401|https://nsi0.snvaca.pacificwave.net/sense-rm)"
#
#         This will change the URL:
#
#               http://localhost:8401/api/sense/v1/models
#         to:
#               https://nsi0.snvaca.pacificwave.net/sense-rm/api/sense/v1/models
#
#         Allowing for a reverse proxy with address "nsi0.snvaca.pacificwave.net"
#         and component URI "sense-rm" to point to "localhost:8401/api".
#
# sense.driver - the RM driver to use for this runtime instance.  By default this is
#          the NsiDriver class. [Should be left as is unless new southbound
#          driver has been added.
#
sense:
  root:
  proxy:
  driver: net.es.sense.rm.driver.nsi.NsiDriver

Now we need to configure the web server for our specific deployment. If we are exposing the SENSE-N-RM directly then we will need to set up TLS with client authentication enabled.

specifying both the key and trust stores.

#########################################
# Spring HTTP server configuration      #
#########################################
#
# server.address - The local IP address to bind the web server.  Use localhost if
#          behind a reverse proxy on only local connectivity is required.
#
# server.port - The local TCP port to bind for the web server.
#
# server.contextPath - The URI underwhich to anchor all discoverd REST endpoints.
#          If behind a reverse proxy then set this to the URI used to map though
#          to this SENSE-N-RM instance, otherwise use "/".
#
# server.packageName - This is the java package name underwhich to search for
#          exposed REST endpoints.  Do not change this value.
#
# server.ssl - If behind an HTTPS reverse proxy then disable the ssl configuration,
#          otherwise set parameters as needed.
server:
  address: nsi0.snvaca.pacificwave.net
  port: 8443
  contextPath: /
  packageName: net.es.sense.rm.driver.nsi
  ssl:
    enabled: true
    protocol: TLS
    enabled-protocols: TLSv1.2
    client-auth: "NEED"
    key-store: /home/sense/sense-rm/config/keystore.jks
    key-store-password: changeit
    trust-store: /home/sense/sense-rm/config/truststore.jks
    trust-store-password: changeit

How-to install Java on CentOS 7

If you decide to use the java runtime on CentOS 7 then we will need to install the Java 8 runtime to execute our SENSE-N-RM jar file.

Reference: [https://www.liquidweb.com/kb/install-java-8-on-centos-7/](Install Java 8 on CentoOS 7)

Step 1: As root up-to-date OS before we install.

$ sudo yum -y update

Step 2: As root install Java 8 OpenJDK development kit.

$ sudo yum install java-1.8.0-openjdk java-1.8.0-openjdk-devel

Step 3: Verify Java is installed

$ java -version

Example output:

$ java -version
openjdk version "1.8.0_232"
OpenJDK Runtime Environment (build 1.8.0_232-b09)
OpenJDK 64-Bit Server VM (build 25.232-b09, mixed mode)

Step 4: Set up your Java environment

Determine the JAVA_HOME location:

$ sudo update-alternatives --config java

Output will look like:

$ sudo update-alternatives --config java

There is 1 program that provides 'java'.

  Selection    Command
-----------------------------------------------
*+ 1           java-1.8.0-openjdk.x86_64 (/usr/lib/jvm/java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7.x86_64/jre/bin/java)

Enter to keep the current selection[+], or type selection number: 

Finally, setup the JAVA_HOME environment variable for the system. If you would rather restrict this to a single user then install in user's .bash_profile.

$ sudo echo "JAVA_HOME=$(readlink -f /usr/bin/java | sed "s:bin/java::")" | sudo tee -a /etc/profile
$ source /etc/profile

New modify to this:

~/.bash_profile

export JAVA_HOME=/etc/alternatives/jre_openjdk

~/.cshrc

setenv JAVA_HOME /etc/alternatives/jre_openjdk

As stated, you could add this location to the "sense" runtime user by copying this location into the .bash_profile of the user using your favorite text editor.

$ vim ~/.bash_profile

Add the following line:

$ export JAVA_HOME=/usr/lib/jvm/java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7.x86_64/jre

Load the new value into your environment"

$ source ~/.bash_profile

Now we should see the following:

$ echo $JAVA_HOME
/usr/lib/jvm/java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7.x86_64/jre

How-to install Maven on CentOS 7

The SENSE-N-RM requires Maven to download, build, and package all dependencies. See "Using Docker tools" if you would rather use a Docker image for Maven instead of a loacl install.

Step 1: Download Apache Maven 3.8.3

First, download and extract the Apache Maven 3.8.3 archive.

$ cd /tmp
$ wget https://dlcdn.apache.org/maven/maven-3/3.8.3/binaries/apache-maven-3.8.3-bin.tar.gz
$ tar -zxvf apache-maven-3.8.3-bin.tar.gz

Step 2: Install Maven in a common location

Move all Apache Maven 3.6.2 files to a reasonable location and change their ownership to root:root.

$ sudo mv /tmp/apache-maven-3.8.3 /opt
$ sudo chown -R root:root /opt/apache-maven-3.8.3

Create a version-irrelevant symbolic link pointing to the original Apache Maven 3.6.2 directory.

$ sudo ln -s /opt/apache-maven-3.8.3 /opt/apache-maven

Add the path /opt/apache-maven to the PATH environment variable.

$ sudo echo 'export PATH=$PATH:/opt/apache-maven/bin' | sudo tee -a /etc/profile
$ source /etc/profile

Finally, use the command below to verify the installation.

$ mvn --version

The output should resemble the following.

$ mvn --version
Apache Maven 3.5.0 (ff8f5e7444045639af65f6095c62210b5713f426; 2017-04-03T19:39:06Z)
Maven home: /opt/maven
Java version: 1.8.0_141, vendor: Oracle Corporation
Java home: /usr/lib/jvm/java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3.x86_64/jre
Default locale: en_US, platform encoding: UTF-8
OS name: "linux", version: "3.10.0-514.26.2.el7.x86_64", arch: "amd64", family: "unix"

Finally we clean up.

$ rm /tmp/apache-maven-3.8.3-bin.tar.gz

How-to install Postrges on CentOS 7

The default CentOS repository contain a postgresql package we can install using the yum package system. If you require a specific version then follow published instructions.

Reference: [https://www.digitalocean.com/community/tutorials/how-to-install-and-use-postgresql-on-centos-7](How To Install and Use PostgreSQL on CentOS 7))

If we have not yet updated the yum package database do that now:

$ sudo yum check-update

Install the postgresql-server package and the “contrib” package, that adds some additional utilities and functionality:

$ sudo yum install postgresql-server postgresql-contrib

Accept the prompt, by responding with a y.

Now that our software is installed, we have to perform a few steps before we can use it.

Create a new PostgreSQL database cluster:

$ sudo postgresql-setup initdb

Now we will need to configure Postgres authentication of the SENSE-N-RM. There are two options for this depending on how you have configured the runtime environment. If you have created a dedicated OS user id (say "sense") and have created a dedicated postgres user that matches the OS user id (i.e. "sense") then the default Postgres "ident" authentication mechanism should work out of the box. However, if this does not work, or if you are running the SENSE-N-RM under a different user id than the Postgres user you created, then you should change the Postrges authentication mechanism from "ident" to the password authentication mechanism "md5". We can change the authentication mechanism by editing the Postgres host-based authentication (HBA) configuration.

Open the HBA configuration with your favorite text editor. We will use vi:

$ sudo vi /var/lib/pgsql/data/pg_hba.conf

If you cannot locate this file check under the specific version of Postgres you installed (i.e. /var/lib/pgsql/9.6/data/pg_hba.conf).

Find the lines that looks like this, near the bottom of the file:

pg_hba.conf excerpt (original)

host    all             all             127.0.0.1/32            ident
host    all             all             ::1/128                 ident

Then replace “ident” with “md5”, so they look like this:

pg_hba.conf excerpt (updated)

host    all             all             127.0.0.1/32            md5
host    all             all             ::1/128                 md5

Save and exit. PostgreSQL is now configured to allow password authentication.

Now start and enable PostgreSQL:

$ sudo systemctl start postgresql
$ sudo systemctl enable postgresql

or if already running:

$ systemctl list-units|grep postgresql
  postgresql-9.6.service                                                                    loaded active running   PostgreSQL 9.6 database server
$ sudo systemctl restart postgresql-9.6.service
PostgreSQL is now ready to be used.

How-to install Apache HTTPD on CentOS 7

If you would like to protect the SENSE-N-RM behind httpd as a reverse proxy then it will need to be installed and configured. Start by installing the current version of httpd:

$ sudo yum clean all
$ sudo yum -y update
$ sudo yum -y install httpd

If you are running a host based firewall then open up the standard httpd ports:

$ sudo firewall-cmd --permanent --add-port=80/tcp
$ sudo firewall-cmd --permanent --add-port=443/tcp
$ sudo firewall-cmd --reload

Configure httpd for your specific needs then start the service:

$ sudo systemctl start httpd

Now we enable it across restarts:

$ sudo systemctl enable httpd

Similarly useful commands:

  • Check the status $ sudo systemctl status httpd
  • Stop the service $ sudo systemctl stop httpd
  • Restart the service $ sudo systemctl restart httpd

Configuring HTTPD as a reverse proxy

How-to install Docker on CentOS 7

For this section we download the CentOS 7 installationb package from the Docker repository directly to get the most recent version. (Liberated from https://www.digitalocean.com/community/tutorials/how-to-install-and-use-docker-on-centos-7)

If we have not yet updated the yum package database do that now:

$ sudo yum check-update

Now run this command to add the official Docker repository, download the latest version of Docker, and install it:

$ curl -fsSL https://get.docker.com/ | sh

After installation has completed, start the Docker daemon:

$ sudo systemctl start docker

Verify that it’s running:

$ sudo systemctl status docker

The output should be similar to the following, showing that the service is active and running:

$ sudo systemctl status docker
● docker.service - Docker Application Container Engine
   Loaded: loaded (/usr/lib/systemd/system/docker.service; disabled; vendor preset: disabled)
   Active: active (running) since Tue 2019-10-29 15:00:46 PDT; 7s ago
     Docs: https://docs.docker.com
 Main PID: 29476 (dockerd)
    Tasks: 8
   Memory: 42.1M
   CGroup: /system.slice/docker.service
           └─29476 /usr/bin/dockerd -H fd:// --containerd=/run/containerd/containerd.sock

Lastly, make sure it starts at every server reboot:

$ sudo systemctl enable docker

Using Docker tools to build the SENSE-N-RM

To build the SENSE-N-RM java runtime image using Docker tools we can do the following...

First we create a maven-repo to reuse during our build phases:

$ docker volume create --name maven-repo

Then we build the SENSE-N-RM jar file:

$ docker run -it --rm --name sense-rm -v "$(pwd)":/usr/src/mymaven -v "$HOME/.m2":/root/.m2  -w /usr/src/mymaven maven:3.6.2-jdk-8 mvn clean install

Now collect the components together under ${builddir}/target/dist:

$ docker run -it --rm --name sense-rm -v "$(pwd)":/usr/src/mymaven -v "$HOME/.m2":/root/.m2  -w /usr/src/mymaven maven:3.6.2-jdk-8 mvn antrun:run@package-runtime

Useful debug commands

$ openssl s_client -debug -connect nsi0.snvaca.pacificwave.net:9443 -no_ssl2 -no_ssl3 -no_tls1
$ nohup ./run.sh </dev/null >/dev/null 2>&1 &

Releases

No releases published

Packages

No packages published

Contributors 4

  •  
  •  
  •  
  •  

Languages