Changes between Version 6 and Version 7 of GENI-Infrastructure-Portal/MonitoringReqts
- Timestamp:
- 12/14/11 14:35:03 (12 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
GENI-Infrastructure-Portal/MonitoringReqts
v6 v7 113 113 * [[Color(red,not implemented and no plan (NOT STARTED))]]. 114 114 115 * A.4 Requirement: Cross-GENI Monitoring115 * Requirement A.4: Cross-GENI Monitoring 116 116 * ''GENI monitoring is more than the sum of the monitoring at GENI’s parts. In order to know if GENI is working properly, additional monitoring is required beyond that done by each of its constituent pieces.'' 117 117 * Must collect and synthesize additional operational statistics which indicate whether GENI is working … … 120 120 * Must make cross-GENI stats available when needed 121 121 122 * A.5 Requirement: Privacy122 * Requirement A.5: Privacy 123 123 * Preserve privacy of users (opt-in, experimenters, other users of resources) 124 124 * [[Color(red,TBD – This is an area needing major discussion (NOT STARTED))]] 125 125 126 * B.1 Requirement: Troubleshooting & Event Escalation126 * Requirement B.1: Troubleshooting & Event Escalation 127 127 * For both debugging and security problems: 128 * B.1.1Must be possible to escalate events129 * B.1.2Meta-operations and aggregate operators must work together to resolve problems128 * Requirement B.1.1: Must be possible to escalate events 129 * Requirement B.1.2: Meta-operations and aggregate operators must work together to resolve problems 130 130 * Aggregates must advertise resources accurately 131 131 * (threshold) statically --> [[Color(green,Fill out aggregate page (DONE))]] … … 137 137 138 138 139 * B.2 Requirement: Emergency Stop139 * Requirement B.2: Emergency Stop 140 140 * Must be possible to do an emergency stop in case of a problem 141 141 * Must maintain POC information at meta-operations … … 147 147 * --> [[Color(orange,Has been dry run (IN PROGRESS))]] 148 148 149 * Requirement : Policy150 * B.3Organizations must manage GENI resources consistent with local policy and best practices (e.g security procedures, logging, backups, etc)151 * In general, follow local policy and procedures152 * Follow best practices which if not followed would affect other members of the GENI community153 * B.4Develop policies for monitoring154 * B.5All parties should implement agreed upon policies149 * Requirements B.3, B.4, B.4: Policy 150 * Requirement B.3: Organizations must manage GENI resources consistent with local policy and best practices (e.g security procedures, logging, backups, etc) 151 * In general, follow local policy and procedures 152 * Follow best practices which if not followed would affect other members of the GENI community 153 * Requirement B.4: Develop policies for monitoring 154 * Requirement B.5: All parties should implement agreed upon policies 155 155 * Follow Aggregate Provider Agreement 156 156 * Follow LLR 157 157 * Follow other GENI policies as they come into effect 158 158 159 * B.6 Requirement: Security159 * Requirement B.6: Security 160 160 * Secure GENI as a whole and secure the pieces of GENI 161 161 * Two things we want to prevent: … … 166 166 * Detect and respond to compromise 167 167 * Allow interesting research for which experimenters and operations have to coordinate for security and management reasons 168 * Security experimentation BOF tonightand session at GEC13!!!168 * Security experimentation BOF at GEC12 and session at GEC13!!! 169 169 * --> [[Color(red,TBD – This is an area needing major discussion (NOT STARTED))]] 170 170 171 * Requirement : Info must be shareable/collected/available172 * A.1Information must be shareable171 * Requirement A.1, A.2, A.3: Info must be shareable/collected/available 172 * Requirement A.1: Information must be shareable 173 173 * Consistent definitions of data 174 174 * Consistent data exchange format … … 177 177 * The following benefit from shared common processes: 178 178 * Accessing data, finding data, visualizing data 179 * A.2Information must be collected179 * Requirement A.2: Information must be collected 180 180 * Verify continued successful data collection 181 181 * Debug collection and reliability outages 182 * A.3Information must be available when needed182 * Requirement A.3: Information must be available when needed 183 183 * Privacy of data must be maintained 184 184