In this webinar we will introduce the different runtimes available for executing containers in EGI infrastructure and will show how to manage Kubernetes clusters to get your containers under control executed on EGI cloud providers.
This webinar will help new services to integrate with Check-in, the EGI Authentication & Authorisation Infrastructure enabling secure access to relying parties. The target group of the training are developers and administrators of services that want to connect to Check-in for user authentication and authorisation.
It will showcase the use of the EGI Check-In Federation Registry tool for managing the lifecycle of a relying party, i.e. registration, reconfiguration and de-registration. The training will include hands-on sessions for the participants to integrate their own relying party to Check-In.
Good, clean data is hard to come by. The EGI provides scientists and researchers access to a large collection of public datasets from data centers globally. These data can be accessed using the EGI Jupyter Notebook service. MATLAB users can now analyze this data using the familiar MATLAB desktop, via a web browser, on the EGI’s resources.
In this webinar, you will learn how to
ARGO is a lightweight service for Service Level Monitoring designed for medium and large sized Research Infrastructures. In this webinar we are going to show the process we follow to monitor a new service with ARGO. In addition, the real time computations and the results via the alerts, API and UI will be shown.
In this webinar we will focus the usage of the IM Dashboard an easy to use web interface designed to enable not advanced users to deploy a set of predefined and well tested customizable virtual infrastructures (Kubernetes, SLURM, Mesos, Galaxy, …) in top of a wide range of cloud providers (AWS, Google Cloud, Azure, EGI Cloud Compute, OpenStack, OpenNebula, …) with a single set of mouse clicks.
In this webinar Miguel will present how end-users can deploy complex and customized virtual infrastructures on top of IaaS Cloud deployments (such as AWS, OpenStack, EGI FedCloud, etc.).
Udocker enables the execution of docker containers in user space without requiring root privileges for installation or use. Udocker implements the pull, load, import and execution of containers by non-privileged users in Linux systems where docker is not available. It can be used in Linux batch systems and interactive clusters that are managed by other entities, such as grid infrastructures or externally managed batch or interactive systems. udocker does not require any type of privileges nor the deployment of services by system administrators. It can be downloaded and executed entirely by the end user.
Udocker offers several execution modes exploiting system call interception, library call interception and namespaces. udocker integrates several tools to provide a subset of the docker capabilities aimed at container execution.
In this webinar we will explain the udocker fundamentals, how to use udocker to execute Linux containers and how to best exploit the several execution engines.
Please email email@example.com if you’d like to request a specific webinar topic or contribute by presenting a webinar.
Every webinar is recorded and added to the EGI Community Webinar Programme playlist on our YouTube channel, make sure to subscribe!
Or watch the videos directly in the preview below.