1582165 : Automation of NAF data upload and access for CMS HGCAL upgrade¶
Created: 2026-03-06T09:53:02Z - current status: open¶
Here is the anonymized and summarized version of the reported issue:
Summary of the Issue¶
A research group working on the [EXPERIMENT] upgrade is generating ~10 GB of data per module during daily testing (10–20 modules/day, scaling to ~2000 modules over 12 months). The workflow involves:
1. Data storage: Test stations store data locally, then manually upload it to the NAF via rsync.
2. Data access: Successive test stations fetch input data from the NAF (via sshfs mounts) for multi-step testing.
Problems Identified:¶
- Manual uploads: Requires manual
rsyncoperations by team members, with credentials stored insecurely on test station PCs. - File ownership: Data uploaded by different team members splits ownership, complicating administration (e.g., moving/deleting files).
- Data access:
sshfsmounts rely on personal accounts, posing security risks.
Proposed Solution:¶
Create a functional account with:
- Limited access (read/write to a dedicated NAF folder, e.g., naf:/data/dust/[PROJECT]).
- Credentials stored on test station PCs for automated uploads/access.
- Unified file ownership to simplify administration.
Questions:¶
- Is this approach feasible, and what limitations might apply?
- Are there alternative solutions to address these issues more efficiently?
Suggested Solution¶
Based on the NAF documentation, the following steps could resolve the issues:
- Functional Account:
- Request a dedicated NAF account for the project via the UCO (or experiment-specific support, e.g.,
naf-[EXPERIMENT]-support@desy.de). - Specify the need for:
- A shared folder (e.g.,
/data/dust/[PROJECT]) with group permissions. - Automated access (e.g., Kerberos keytabs or SSH keys) for test stations.
- A shared folder (e.g.,
-
Limitation: Functional accounts may require approval and adherence to DESY’s security policies.
-
Automated Uploads:
- Use Kerberos authentication (instead of passwords) for
rsync/sshfs:- Configure test stations to use
kinitwith a keytab file (stored securely). - Example cron job:
bash 0 2 * * * kinit -k -t /path/to/keytab [FUNCTIONAL_ACCOUNT] && rsync -avz /local/data/ [FUNCTIONAL_ACCOUNT]@naf:/data/dust/[PROJECT]/
- Configure test stations to use
-
Alternative: Use GridFTP or xrootd if the data is grid-accessible (see WAN Reads).
-
File Ownership:
- Set up a group (e.g.,
naf-[EXPERIMENT]-group) with write permissions for the shared folder. - Use
chmod g+s(setgid) to ensure new files inherit group ownership. -
Example:
bash chgrp naf-[EXPERIMENT]-group /data/dust/[PROJECT] chmod 2770 /data/dust/[PROJECT] # rwxrws--- -
Data Access:
- Replace
sshfswith NFS/AFS mounts (if available) or automatedrsyncpulls using the functional account.
Next Steps¶
- Contact the [EXPERIMENT] support team (e.g.,
naf-[EXPERIMENT]-support@desy.de) or UCO to: - Request a functional account and shared folder.
- Discuss Kerberos/keytab setup for automation.
- Test the workflow with a small subset of data before full deployment.