Running plugins on the MOC (ppc64le direct) - FNNDSC/pfcon GitHub Wiki
Running plugins on the MOC (ppc64le direct)
Overview
This page documents some pfcon
related commands for executing plugins on the Massachusetts Open Cloud by talking directly to pman
and pfioh
exposed on a specific PPC64 machine for testing purposes.
Service access
Set the access IP to the machine running pfcon
export HOST_IP=localhost
Call
pfurl --verb POST --raw \
--http ${HOST_IP}:5005/api/v1/cmd \
--httpResponseBodyParse \
--jsonwrapper 'payload' \
--msg \
'{ "action": "internalctl",
"meta": {
"var": "/service/mocppc64",
"set": {
"compute": {
"addr": "128.31.28.109:5010",
"baseURLpath": "api/v1/cmd/",
"status": "undefined",
"authToken": "{Bu7H)FyWp{,e<"
},
"data": {
"addr": "128.31.28.109:5055",
"baseURLpath": "api/v1/cmd/",
"status": "undefined",
"authToken": "{Bu7H)FyWp{,e<"
}
}
}
}'
Set an optional proxy if in a proxied network:
pfurl --verb POST --raw \
--http ${HOST_IP}:5005/api/v1/cmd \
--httpResponseBodyParse \
--jsonwrapper 'payload' \
--msg \
'{ "action": "internalctl",
"meta": {
"var": "/self",
"set": {
"httpProxy": {
"httpSpec": "http://proxy.tch.harvard.edu:3128",
"use": true
}
}
}
}'
Test with a hello
pfurl --verb POST --raw --http ${HOST_IP}:5005/api/v1/cmd \
--httpResponseBodyParse --jsonwrapper 'payload' --msg \
'{ "action": "hello",
"meta": {
"askAbout": "sysinfo",
"echoBack": "Hi there!",
"service": "mocppc64"
}
}'
-30-