Skip to content

Installing the OSDF Cache

This document describes how to install an Open Science Data Federation (OSDF) cache service. This service allows a site or regional network to cache data frequently used on the OSG, reducing data transfer over the wide-area network and decreasing access latency.

Minimum version for this documentation

This document describes features introduced in XCache 3.3.0, released on 2022-12-08. When installing, ensure that your version of the stash-cache RPM is at least 3.3.0.

Note

The OSDF cache was previously named "Stash Cache" and some documentation and software may use the old name.

Before Starting

Before starting the installation process, consider the following requirements:

  • Operating system: Ensure the host has a supported operating system
  • User IDs: If they do not exist already, the installation will create the Linux user IDs condor and xrootd
  • Host certificate: Required for authentication. See our host certificate documentation for instructions on how to request and install host certificates.
  • Network ports: Your host may run a public cache instance (for serving public data only), an authenticated cache instance (for serving protected data), or both.

    • A public cache instance requires the following ports open:
      • Inbound TCP port 1094 for file access via the XRootD protocol
      • Inbound TCP port 8000 for file access via HTTP(S)
      • Outbound UDP port 9930 for reporting to xrd-report.osgstorage.org and xrd-mon.osgstorage.org for monitoring
    • An authenticated cache instance requires the following ports open:
      • Inbound TCP port 8443 for authenticated file access via HTTPS
      • Outbound UDP port 9930 for reporting to xrd-report.osgstorage.org and xrd-mon.osgstorage.org for monitoring
    • Hardware requirements: We recommend that a cache has at least 10Gbps connectivity, 1TB of disk space for the cache directory, and 12GB of RAM.

As with all OSG software installations, there are some one-time steps to prepare in advance:

Registering the Cache

To be part of the OSDF, your cache must be registered with the OSG. You will need basic information like the resource name, hostname, host certificate DN, and the administrative and security contacts.

Initial registration

To register your cache host, follow the general registration instructions here. The service type is XRootD cache server.

Info

This step must be completed before installation.

In your registration, you must specify which VOs your cache will serve by adding an AllowedVOs list, with each line specifying a VO whose data you are willing to cache.

There are special values you may use in AllowedVOs:

  • ANY_PUBLIC indicates that the cache is willing to serve public data from any VO.
  • ANY indicates that the cache is willing to serve data from any VO, both public and protected. ANY implies ANY_PUBLIC.

There are extra requirements for serving protected data:

  • In addition to the cache allowing a VO in the AllowedVOs list, that VO must also allow the cache in its AllowedCaches list. See the page on getting your VO's data into OSDF.
  • There must be an authenticated XRootD instance on the cache server.
  • There must be a DN attribute in the resource registration with the subject DN of the host certificate

This is an example registration for a cache server that serves all public data:

  MY_OSDF_CACHE:
    FQDN: my-cache.example.net
    Services:
      XRootD cache server:
        Description: OSDF cache server
    AllowedVOs:
      - ANY_PUBLIC

This is an example registration for a cache server that only serves protected data for the Open Science Pool:

  MY_AUTH_OSDF_CACHE:
    FQDN: my-auth-cache.example.net
    Services:
      XRootD cache server:
        Description: OSDF cache server
    AllowedVOs:
      - OSG
    DN: /DC=org/DC=opensciencegrid/O=Open Science Grid/OU=Services/CN=my-auth-cache.example.net

This is an example registration for a cache server that serves all public data and protected data from the OSG VO:

  MY_COMBO_OSDF_CACHE:
    FQDN: my-combo-cache.example.net
    Services:
      XRootD cache server:
        Description: OSDF cache server
    AllowedVOs:
      - OSG
      - ANY_PUBLIC
    DN: /DC=org/DC=opensciencegrid/O=Open Science Grid/OU=Services/CN=my-combo-cache.example.net

Non-standard ports

By default, an unauthenticated cache instance serves public data on port 8000, and an authenticated cache instance serves protected data on port 8443. If you change the ports for your cache instances, you must specify the new endpoints under the service, as follows:

  MY_COMBO_OSDF_CACHE2:
    FQDN: my-combo-cache2.example.net
    Services:
      XRootD cache server:
        Description: OSDF cache server
        Details:
          endpoint_override: my-combo-cache2.example.net:8080
          auth_endpoint_override: my-combo-cache2.example.net:8444

Finalizing registration

Once initial registration is complete, you may start the installation process. In the meantime, open a help ticket with your cache name. Mention in your ticket that you would like to "Finalize the cache registration."

Installing the Cache

The OSDF software consists of an XRootD server with special configuration and supporting services. To simplify installation, OSG provides convenience RPMs that install all required packages with a single command:

root@host # yum install stash-cache

Configuring the Cache

First, you must create a "cache directory", which will be used to store downloaded files. By default this is /mnt/stash. We recommend using a separate file system for the cache directory, with at least 1 TB of storage available.

Note

The cache directory must be writable by the xrootd:xrootd user and group.

The stash-cache package provides default configuration files in /etc/xrootd/xrootd-stash-cache.cfg and /etc/xrootd/config.d/. Administrators may provide additional configuration by placing files in /etc/xrootd/config.d/1*.cfg (for files that need to be processed BEFORE the OSG configuration) or /etc/xrootd/config.d/9*.cfg (for files that need to be processed AFTER the OSG configuration).

You must configure every variable in /etc/xrootd/config.d/10-common-site-local.cfg.

The mandatory variables to configure are:

  • set rootdir = /mnt/stash: the mounted filesystem path to export. This document refers to this as /mnt/stash.
  • set resourcename = YOUR_RESOURCE_NAME: the resource name registered with the OSG.

Ensure the xrootd service has a certificate

The service will need a certificate for reporting and to authenticate to origins. The easiest solution for this is to use your host certificate and key as follows:

  1. Copy the host certificate to /etc/grid-security/xrd/xrd{cert,key}.pem
  2. Set the owner of the directory and contents /etc/grid-security/xrd/ to xrootd:xrootd:
    root@host # chown -R xrootd:xrootd /etc/grid-security/xrd/
    

Note

You must repeat the above steps whenever you renew your host certificate. If you automate certificate renewal, you should automate copying as well. In addition, you will need to restart the XRootD services (xrootd@stash-cache and/or xrootd@stash-cache-auth) so they load the updated certificates. For example, if you are using Certbot for Let's Encrypt, you should write a "deploy hook" as documented on the Certbot site.

Configuring Optional Features

Adjust disk utilization

To adjust the disk utilization of your cache, create or edit a file named /etc/xrootd/config.d/90-local.cfg and set the values of pfc.diskusage.

pfc.diskusage 0.90 0.95

The two values correspond to the low and high usage water marks, respectively. When usage goes above the high water mark, the XRootD service will delete cached files until usage goes below the low water mark.

Enable remote debugging

XRootD provides remote debugging via a read-only file system named digFS. This feature is disabled by default, but you may enable it if you need help troubleshooting your server.

Warning

Remote debugging should only be enabled for long as it is needed to troubleshoot your server.

To enable remote debugging, edit /etc/xrootd/digauth.cfg and specify the authorizations for reading digFS. An example of authorizations:

all allow gsi g=/glow h=*.cs.wisc.edu
This gives access to the config file, log files, core files, and process information to anyone from *.cs.wisc.edu in the /glow VOMS group.

See the XRootD manual for the full syntax.

Remote debugging should only be enabled for as long as you need assistance. As soon as your issue has been resolved, revert any changes you have made to /etc/xrootd/digauth.cfg.

Enable HTTPS on the unauthenticated cache

By default, the unauthenticated cache instance uses plain HTTP, not HTTPS. To use HTTPS:

  1. Add a certificate according to the instructions above

  2. Uncomment set EnableVoms = 1 in /etc/xrootd/config.d/10-osg-xrdvoms.cfg

Upgrading from OSG 3.5

If upgrading from OSG 3.5, you may have a file with the following contents in /etc/xrootd/config.d:

   # Support HTTPS access to unauthenticated cache
   if named stash-cache
     http.cadir /etc/grid-security/certificates
     http.cert /etc/grid-security/xrd/xrdcert.pem
     http.key /etc/grid-security/xrd/xrdkey.pem
     http.secxtractor /usr/lib64/libXrdLcmaps.so
   fi

You must delete this config block or XRootD will fail to start.

Manually Setting the FQDN (optional)

The FQDN of the cache server that you registered in Topology may be different than its internal hostname (as reported by hostname -f). For example, this may be the case if your cache is behind a load balancer such as LVS. In this case, you must manually tell the cache services which FQDN to use for topology lookups.

  1. Create the file /etc/systemd/system/[email protected]/override.conf (note the @ in the directory name) with the following contents:

    [Service]
    Environment=CACHE_FQDN=<Topology-registered FQDN>
    
  2. Run systemctl daemon-reload after modifying the file.

Adding to Authorization Files (Optional)

The stash-authfile services on the cache generate files that configure authorization for XRootD. Put local additions to this configuration into separate files, according to this table:

Purpose Generated file Local additions file
VOMS/SSL/X.509 auth config for unauthenticated cache instance /run/stash-cache/Authfile /etc/xrootd/stash-cache-Authfile.local
VOMS/SSL/X.509 auth config for authenticated cache instance /run/stash-cache-auth/Authfile /etc/xrootd/stash-cache-auth-Authfile.local
SciTokens config for authenticated cache instance /run/stash-cache-auth/scitokens.conf /etc/xrootd/stash-cache-auth-scitokens.conf.local

Note

Use of these local additions files require XCache 3.5.0 and newer.

Managing OSDF services

These services must be managed by systemctl and may start additional services as dependencies. As a reminder, here are common service commands (all run as root):

To... Run the command...
Start a service systemctl start <SERVICE-NAME>
Stop a service systemctl stop <SERVICE-NAME>
Enable a service to start on boot systemctl enable <SERVICE-NAME>
Disable a service from starting on boot systemctl disable <SERVICE-NAME>

Public cache services

Software Service name Notes
XRootD [email protected] The XRootD daemon, which performs the data transfers
XCache xcache-reporter.timer Reports usage information to collector.opensciencegrid.org
Fetch CRL EL8: fetch-crl.timer
EL7: fetch-crl-boot and fetch-crl-cron
Required to authenticate monitoring services. See CA documentation for more info
[email protected] Generate authentication configuration files for XRootD (public cache instance)
[email protected] Periodically run the above service (public cache instance)

Authenticated cache services

Software Service name Notes
XRootD xrootd-renew-proxy.service Renew a proxy for authenticated downloads to the cache
[email protected] The xrootd daemon which performs authenticated data transfers
xrootd-renew-proxy.timer Trigger daily proxy renewal
[email protected] Generate the authentication configuration files for XRootD (authenticated cache instance)
[email protected] Periodically run the above service (authenticated cache instance)

Validating the Cache

The cache server functions as a normal HTTP server and can interact with typical HTTP clients, such as curl.

user@host $ curl -O http://cache_host:8000/ospool/uc-shared/public/OSG-Staff/validation/test.txt

curl may not correctly report a failure, so verify that the contents of the file are:

hello world!

Test cache server reporting to the central collector

To verify the cache is reporting to the central collector, run the following command from the cache server:

user@host $ condor_status -any -pool collector.opensciencegrid.org:9619 \
                          -l -const "Name==\"xrootd@`hostname`\""

The output of the above command should detail what the collector knows about the status of your cache. Here is an example snippet of the output:

AuthenticatedIdentity = "[email protected]"
AuthenticationMethod = "GSI"
free_cache_bytes = 868104454144
free_cache_fraction = 0.8022261674321525
LastHeardFrom = 1552002482
most_recent_access_time = 1551997049
MyType = "Machine"
Name = "[email protected]"
ping_elapsed_time = 0.00763392448425293
ping_response_code = 0
ping_response_message = "[SUCCESS] "
ping_response_status = "ok"
STASHCACHE_DaemonVersion = "1.0.0"
...

Updating to OSG 3.6

The OSG 3.5 series reached end-of-life on May 1, 2022. Admins are strongly encouraged to move their caches to OSG 3.6.

See general update instructions.

Unauthenticated caches (xrootd@stash-cache service) do not need any configuration changes, unless HTTPS access has been enabled. See the "enable HTTPS on the unauthenticated cache" section) for the necessary configuration changes.

Authenticated caches (xrootd@stash-cache-auth service) may need the configuration changes described in the updating to OSG 3.6 section of the XRootD authorization configuration document.

Getting Help

To get assistance, please use the this page.

Back to top