Set up a compute node

Install dependencies

First, add the appropriate package repository for your distribution.

Note:

On CentOS and RHEL, these packages require a more recent version from Software Collections. The Software Collection will be installed automatically as long as Software Collections are enabled on your system.

To enable Software Collections on CentOS, run:

~$ sudo yum install centos-release-scl scl-utils

To enable Software Collections on RHEL:

~$ sudo yum-config-manager --enable rhel-server-rhscl-7-rpms

See also section 2.1 of Red Hat’s Installation chapter .

On Red Hat-based systems:

~$ echo 'exclude=python2-llfuse' | sudo tee -a /etc/yum.conf
~$ sudo yum install python-arvados-fuse crunch-run arvados-docker-cleaner

On Debian-based systems:

~$ sudo apt-get install python-arvados-python-client crunch-run arvados-docker-cleaner

Install Docker

Compute nodes must have Docker installed to run containers. This requires a relatively recent version of Linux (at least upstream version 3.10, or a distribution version with the appropriate patches backported). Follow the Docker Engine installation documentation for your distribution.

For Debian-based systems, the Arvados package repository includes a backported docker.io package with a known-good version you can install.

Configure the Docker daemon

Crunch runs Docker containers with relatively little configuration. You may need to start the Docker daemon with specific options to make sure these jobs run smoothly in your environment. This section highlights options that are useful to most installations. Refer to the Docker daemon reference for complete information about all available options.

The best way to configure these options varies by distribution.

  • If you’re using our backported docker.io package, you can list these options in the DOCKER_OPTS setting in /etc/default/docker.io.
  • If you’re using another Debian-based package, you can list these options in the DOCKER_OPTS setting in /etc/default/docker.
  • On Red Hat-based distributions, you can list these options in the other_args setting in /etc/sysconfig/docker.

Default ulimits

Docker containers inherit ulimits from the Docker daemon. However, the ulimits for a single Unix daemon may not accommodate a long-running Crunch job. You may want to increase default limits for compute containers by passing --default-ulimit options to the Docker daemon. For example, to allow containers to open 10,000 files, set --default-ulimit nofile=10000:10000.

DNS

Your containers must be able to resolve the hostname of your API server and any hostnames returned in Keep service records. If these names are not in public DNS records, you may need to specify a DNS resolver for the containers by setting the --dns address to an IP address of an appropriate nameserver. You may specify this option more than once to use multiple nameservers.

Configure Linux cgroups accounting

Linux can report what compute resources are used by processes in a specific cgroup or Docker container. Crunch can use these reports to share that information with users running compute work. This can help pipeline authors debug and optimize their workflows.

To enable cgroups accounting, you must boot Linux with the command line parameters cgroup_enable=memory swapaccount=1.

On Debian-based systems, open the file /etc/default/grub in an editor. Find where the string GRUB_CMDLINE_LINUX is set. Add cgroup_enable=memory swapaccount=1 to that string. Save the file and exit the editor. Then run:

~$ sudo update-grub

On Red Hat-based systems, run:

~$ sudo grubby --update-kernel=ALL --args='cgroup_enable=memory swapaccount=1'

Finally, reboot the system to make these changes effective.

Configure FUSE

FUSE must be configured with the user_allow_other option enabled for Crunch to set up Keep mounts that are readable by containers. Install this file as /etc/fuse.conf:

# Set the maximum number of FUSE mounts allowed to non-root users.
# The default is 1000.
#
#mount_max = 1000

# Allow non-root users to specify the 'allow_other' or 'allow_root'
# mount options.
#
user_allow_other

Configure the Docker cleaner

The arvados-docker-cleaner program removes least recently used Docker images as needed to keep disk usage below a configured limit.

Note:

This also removes all containers as soon as they exit, as if they were run with docker run --rm. If you need to debug or inspect containers after they stop, temporarily stop arvados-docker-cleaner or configure it with "RemoveStoppedContainers":"never".

Create a file /etc/arvados/docker-cleaner/docker-cleaner.json in an editor, with the following contents.

{
    "Quota": "10G",
    "RemoveStoppedContainers": "always"
}

Choosing a quota: Most deployments will want a quota that’s at least 10G. From there, a larger quota can help reduce compute overhead by preventing reloading the same Docker image repeatedly, but will leave less space for other files on the same storage (usually Docker volumes). Make sure the quota is less than the total space available for Docker images.

Restart the service after updating the configuration file.

~$ sudo systemctl restart arvados-docker-cleaner

If you are using a different daemon supervisor, or if you want to test the daemon in a terminal window, run arvados-docker-cleaner. Run arvados-docker-cleaner --help for more configuration options.

Set up SLURM

Install SLURM on the compute node using the same process you used on the API server in the previous step.

The slurm.conf and /etc/munge/munge.key files must be identical on all SLURM nodes. Copy the files you created on the API server in the previous step to each compute node.


Previous: Set up SLURM Next: Install the SLURM dispatcher

The content of this documentation is licensed under the Creative Commons Attribution-Share Alike 3.0 United States licence.
Code samples in this documentation are licensed under the Apache License, Version 2.0.