Line: 1 to 1 | ||||||||
---|---|---|---|---|---|---|---|---|
|
Line: 1 to 1 | ||||||||
---|---|---|---|---|---|---|---|---|
|
Line: 1 to 1 | ||||||||
---|---|---|---|---|---|---|---|---|
| ||||||||
Line: 272 to 272 | ||||||||
In this directory, create the following HTCondor configuration file (99_condor_annex_passwd.config)
ALLOW_DAEMON = $(ALLOW_DAEMON), condor_pool@* | ||||||||
Changed: | ||||||||
< < | SEC_CLIENT_AUTHENTICATION = REQUIRED SEC_CLIENT_AUTHENTICATION_METHODS = $(SEC_CLIENT_AUTHENTICATION_METHODS), PASSWORD SEC_CLIENT_ENCRYPTION = OPTIONAL SEC_CLIENT_INTEGRITY = REQUIRED SEC_DAEMON_AUTHENTICATION = REQUIRED SEC_DAEMON_AUTHENTICATION_METHODS = $(SEC_DAEMON_AUTHENTICATION_METHODS), PASSWORD SEC_DAEMON_ENCRYPTION = OPTIONAL SEC_DAEMON_INTEGRITY = REQUIRED SEC_NEGOTIATOR_AUTHENTICATION = REQUIRED SEC_NEGOTIATOR_AUTHENTICATION_METHODS = $(SEC_NEGOTIATOR_AUTHENTICATION_METHODS), PASSWORD SEC_NEGOTIATOR_ENCRYPTION = OPTIONAL SEC_NEGOTIATOR_INTEGRITY = REQUIRED | |||||||
> > | SEC_DEFAULT_AUTHENTICATION = REQUIRED SEC_DEFAULT_AUTHENTICATION_METHODS = $(SEC_DEFAULT_AUTHENTICATION_METHODS), PASSWORD SEC_DEFAULT_ENCRYPTION = OPTIONAL SEC_DEFAULT_INTEGRITY = REQUIRED | |||||||
SEC_ENABLE_MATCH_PASSWORD_AUTHENTICATION = TRUE SEC_PASSWORD_FILE = /etc/condor/condor_pool_password | ||||||||
Line: 295 to 287 | ||||||||
Step 9. Install and configure AWS CLI | ||||||||
Changed: | ||||||||
< < | The AWS Command Line Interface (CLI) is a tool to manage your AWS services from the command line and automate your interaction with them via scripting. Remember, condor_annex itself is a Perl-based script that relies on the AWS CLI to automate the construction of an annex given the inputs provided by a user. As such, the AWS CLI must be installed and configured on any host that will run condor_annex. | |||||||
> > | The AWS Command Line Interface (CLI) is a tool to manage your AWS resources and services from the command line as well as automate your interaction with them via scripting. Remember, condor_annex itself is a Perl-based script that relies on the AWS CLI to automate the construction of an annex given the inputs provided by a user. As such, the AWS CLI must be installed and configured on any host that will run condor_annex. | |||||||
If you plan to let your users run condor_annex for themselves when they need additional resources, then you should install the AWS CLI on your HTCondor pool's SUBMIT node. To install the AWS CLI, login as root to your SUBMIT node and run the following commands. | ||||||||
Line: 315 to 307 | ||||||||
Step 10. Install and configure condor annex | ||||||||
Changed: | ||||||||
< < | yum install git yum install perl-JSON cd /opt git clone https://github.com/mkandes/condor_annex.git | |||||||
> > | Now that the AWS CLI is installed and configured on you local pool's SUBMIT node, you can also install condor_annex on it. Since condor_annex is not currently distributed via RPMs, you will have to clone one of the git repositories where it is stored. As such, you must begin by installing git. | |||||||
Added: | ||||||||
> > | [root@SUBMIT ~]$ yum install gitOnce git is installed, you should clone one of the repositories containing condor_annex into /opt. [root@SUBMIT ~]$ cd /optThe current development version of condor_annex from the HTCondor team is available in: [root@SUBMIT ~]$ git clone https://github.com/htcondor/htcondor.git -b V8_5-condor_annex-branchNote, however, this is the entire HTCondor project's development branch for condor_annex. The only components necessary to run condor_annex are actually self-contained within the directory /htcondor/src/condor_annex. A forked repository that only contains these condor_annex components as well as a few minor modifications to them is also available at: [root@SUBMIT ~]$ [root@SUBMIT ~]$ git clone https://github.com/mkandes/condor_annex.gitThis repository is intended to remain more stable while the HTCondor team continues to develop condor_annex into a HTCondor daemon. It would be our recommendation to use this repository while evaluating condor_annex. Finally, condor_annex requires the perl-JSON module. Don't forget to install it after you've cloned condor_annex from one of the repositories. [root@SUBMIT ~]$ yum install perl-JSON | |||||||
Step 11. Launch a condor_annex |
Line: 1 to 1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
| |||||||||
Line: 30 to 30 | |||||||||
Step 1: Install and Configure an HTCondor Pool | |||||||||
Changed: | |||||||||
< < | If you do not already have your own HTCondor Pool, you may want to first start by installing your own personal HTCondor pool to experiment with condor_annex. Please consult the HTCondor Manual and/or Wiki for more information: | ||||||||
> > | If you do not already have your own HTCondor Pool, you may want to first start by installing your own personal HTCondor pool to experiment with condor_annex. Please consult the HTCondor Manual and/or Wiki for more information. | ||||||||
Step 2: Obtain an Amazon Web Services Account | |||||||||
Changed: | |||||||||
< < | In order to use condor_annex, you must already have an AWS account. You may establish an AWS account under the UC-wide agreement by following the instructions provided by Blink: | ||||||||
> > | In order to use condor_annex, you must already have an AWS account. You may establish an AWS account under the UC-wide agreement by following the instructions provided by Blink. | ||||||||
Step 3: Obtain AWS Account Credentials | |||||||||
Line: 47 to 42 | |||||||||
To create access keys, you must have permissions to perform the required IAM actions. | |||||||||
Changed: | |||||||||
< < |
| ||||||||
> > |
| ||||||||
| |||||||||
Changed: | |||||||||
< < |
| ||||||||
> > |
| ||||||||
| |||||||||
Changed: | |||||||||
< < |
| ||||||||
> > |
| ||||||||
Changed: | |||||||||
< < | |||||||||
> > | Save your Access Key ID and Secret Access Key. You will need to provide them later when configuring the AWS CLI. If you need more information about AWS Security Credentials, please consult the AWS documentation. | ||||||||
Step 4: Select a Region for the Annex | |||||||||
Changed: | |||||||||
< < | Amazon Elastic Compute Cloud (EC2) instances are hosted in multiple locations world-wide. These locations are composed of Regions and Availability Zones. Each Region is a separate geographic area. However, each Region also has multiple, isolated locations known as Availability Zones (AZs). However, not all AWS Regions are created equal. Each Region may offer only a subset of AWS services. You can find out what services are offered in each Region from the table provided here: | ||||||||
> > | Amazon Elastic Compute Cloud (EC2) instances are hosted in multiple locations world-wide. These locations are composed of Regions and Availability Zones. Each Region is a separate geographic area. However, each Region also has multiple, isolated locations known as Availability Zones (AZs). However, not all AWS Regions are created equal. Each Region may offer only a subset of AWS services. You can find out what services are offered in each Region from the table provided here. | ||||||||
When selecting a Region for your annex, you must select a region that offers all of the AWS services required by condor_annex to function properly. These services are: | |||||||||
Changed: | |||||||||
< < |
| ||||||||
> > | |||||||||
Changed: | |||||||||
< < | AWS Lambda currently has the most limited deployment of any AWS service required by condor_annex. For example, AWS Lambda is only available in the following Regions within the United States at this time: | ||||||||
> > | AWS Lambda currently has the most limited deployment of any AWS service required by condor_annex. For example, AWS Lambda is only available in the following Regions within the United States at this time: | ||||||||
| |||||||||
Line: 94 to 85 | |||||||||
To create your key pair using the Amazon EC2 console | |||||||||
Changed: | |||||||||
< < |
| ||||||||
> > |
| ||||||||
| |||||||||
Changed: | |||||||||
< < | If you would like to create your SSH key pair using the AWS CLI or import your own key pair, please consult the AWS documentation at: | ||||||||
> > | If you would like to create your SSH key pair using the AWS CLI or import your own key pair, please consult the AWS documentation. | ||||||||
Step 6: Configure Default VPC Security Groupcondor_annex will automatically create and configure an AWS Security Group (i.e., a virtual firewall) around all of the instances within an annex. However, depending on your HTCondor pool configuration, it may also been useful to place some on-demand resources in AWS. For example, you may want to a separate HTCondor central manager instance located in AWS in order to flock user jobs over to the annex instead of connecting the annex instances back to your local central manager. | |||||||||
Changed: | |||||||||
< < | These on-demand resources may be placed in your AWS Region's default Virtual Private Cloud (VPC) Security Group. To configure the default VPC Security Group: | ||||||||
> > | Any such on-demand resources may be placed in your AWS Region's default Virtual Private Cloud (VPC) Security Group. To configure the default VPC Security Group: | ||||||||
Changed: | |||||||||
< < |
| ||||||||
> > |
| ||||||||
| |||||||||
Line: 140 to 129 | |||||||||
| |||||||||
Changed: | |||||||||
< < | Of course, you should try to restrict the size of the Source IP address space for these rules as much as possible. For example, you may want to limit them to inbound traffic from your home institution's public IP address space. | ||||||||
> > | Of course, you should try to restrict the Source IP address space for these rules as much as possible. For example, you may want to limit them to inbound traffic from your home institution's public IP address space. | ||||||||
By default, each Security Group, including the default VPC Security Group, allows ALL outbound traffic. | |||||||||
Line: 158 to 147 | |||||||||
| |||||||||
Changed: | |||||||||
< < | If these preconfigured AMIs cannot be successfully modified to suit your needs, you will need to create your own condor_annex-compatible AMI. We have do so for our own purposes by building a condor_annex-compatible CentOS? 6-based AMI. | ||||||||
> > | If these preconfigured AMIs cannot be successfully modified to suit your needs, you will need to create your own condor_annex-compatible AMI. We have done so for our own purposes by building a condor_annex-compatible CentOS? 6-based AMI. | ||||||||
Changed: | |||||||||
< < | To build your own condor_annex-compatible AMI, open the Elastic Compute Cloud (EC2) dashboard in the AWS Region where you will run your annex. Click on the Launch Instance button. This will open the instance launch configuration wizard. Follow these steps. | ||||||||
> > | To build your own condor_annex-compatible AMI, open the Elastic Compute Cloud (EC2) dashboard in the Region where you will run your annex. Click on the Launch Instance button. This will open the instance launch configuration wizard. Follow these steps. | ||||||||
| |||||||||
Changed: | |||||||||
< < |
| ||||||||
> > |
| ||||||||
| |||||||||
Line: 246 to 235 | |||||||||
If you are using a different base OS AMI, please see this link for some possible changes to the CloudFormation? Helper Script configuration. | |||||||||
Changed: | |||||||||
< < | Activate (or deactivate) the following services as indicated and then and then logout from the instance. | ||||||||
> > | Activate (or deactivate) the following services as indicated and then logout from the instance. | ||||||||
[root@ANNEX-PRIVATE-IP ~]$ chkconfig iptables off [root@ANNEX-PRIVATE-IP ~]$ service iptables stop | |||||||||
Line: 258 to 247 | |||||||||
[root@ANNEX-PRIVATE-IP ~]$ service condor start [root@ANNEX-PRIVATE-IP ~]$ exit | |||||||||
Changed: | |||||||||
< < | Return now to the AWS Management Console in your web browser and then go to the EC2 dashboard. In the navigation pane, under INSTANCES, choose Instances. There you will see a list of each individual instance available in the AWS Region. Select the instance you've just configured your condor_annex-compatible AMI on. Then from the dropdown menu Actions, go to Image and select Create Image. You will be prompted to make changes to the AMI before its creation. You'll likely want to add an Image name and check the Delete on Termination box. Make any other adjustments you find necessary and then click on the Create Image button. This will create an AMI from your instance that can be used with condor_annex. | ||||||||
> > | Now that you have prepared a condor_annex-compatible AMI on this instance, you'll need to save it for future use on other instances. To do so: | ||||||||
Changed: | |||||||||
< < | Go ahead and Close the Create Image request received dialog box to return to the EC2 Dashboard. In the navigation pain, under IMAGES, click on AMIs. There you will see a list of the your custom AMIs, including the condor_annex-compatible AMI that was just created from your instance. Note the AMI ID for this image as it will be one of the required inputs when calling condor_annex. | ||||||||
> > |
| ||||||||
Step 8: Configure HTCondor Pool for Password Authentication | |||||||||
Line: 274 to 269 | |||||||||
[root@CENTRAL_MANAGER ~]$ cd /etc/condor/config.d | |||||||||
Changed: | |||||||||
< < | In this directory, create the following HTCondor configuration file (99_condor_annex.config) | ||||||||
> > | In this directory, create the following HTCondor configuration file (99_condor_annex_passwd.config) | ||||||||
ALLOW_DAEMON = $(ALLOW_DAEMON), condor_pool@* | |||||||||
Changed: | |||||||||
< < | SEC_DEFAULT_AUTHENTICATION = REQUIRED SEC_DEFAULT_AUTHENTICATION_METHODS = $(SEC_DEFAULT_AUTHENTICATION_METHODS), PASSWORD SEC_DEFAULT_ENCRYPTION = OPTIONAL SEC_DEFAULT_INTEGRITY = REQUIRED | ||||||||
> > | SEC_CLIENT_AUTHENTICATION = REQUIRED SEC_CLIENT_AUTHENTICATION_METHODS = $(SEC_CLIENT_AUTHENTICATION_METHODS), PASSWORD SEC_CLIENT_ENCRYPTION = OPTIONAL SEC_CLIENT_INTEGRITY = REQUIRED SEC_DAEMON_AUTHENTICATION = REQUIRED SEC_DAEMON_AUTHENTICATION_METHODS = $(SEC_DAEMON_AUTHENTICATION_METHODS), PASSWORD SEC_DAEMON_ENCRYPTION = OPTIONAL SEC_DAEMON_INTEGRITY = REQUIRED SEC_NEGOTIATOR_AUTHENTICATION = REQUIRED SEC_NEGOTIATOR_AUTHENTICATION_METHODS = $(SEC_NEGOTIATOR_AUTHENTICATION_METHODS), PASSWORD SEC_NEGOTIATOR_ENCRYPTION = OPTIONAL SEC_NEGOTIATOR_INTEGRITY = REQUIRED | ||||||||
SEC_ENABLE_MATCH_PASSWORD_AUTHENTICATION = TRUE SEC_PASSWORD_FILE = /etc/condor/condor_pool_password |
Line: 1 to 1 | ||||||||
---|---|---|---|---|---|---|---|---|
| ||||||||
Line: 18 to 18 | ||||||||
Definitions | ||||||||
Changed: | ||||||||
< < |
| |||||||
> > |
| |||||||
| ||||||||
Line: 48 to 48 | ||||||||
To create access keys, you must have permissions to perform the required IAM actions.
| ||||||||
Changed: | ||||||||
< < |
| |||||||
> > |
| |||||||
| ||||||||
Changed: | ||||||||
< < |
| |||||||
> > |
| |||||||
| ||||||||
Changed: | ||||||||
< < | If you need more information about AWS Security Credentials, please consult the AWS documentation at: | |||||||
> > | Save your Access Key ID and Secret Access Key. You will need to provide them later when configuring the AWS CLI. If you need more information about AWS Security Credentials, please consult the AWS documentation at: | |||||||
Added: | ||||||||
> > | Step 4: Select a Region for the Annex | |||||||
Changed: | ||||||||
< < | Step 4: Select an Amazon Region for the AnnexAmazon Elastic Compute Cloud (EC2) instances are hosted in multiple locations world-wide. These locations are composed of Regions and Availability Zones. Each Region is a separate geographic area. However, each Region also has multiple, isolated locations known as Availability Zones (AZs), which are simply high-availability data centers. However, not all AWS Regions are created equal. Each Region may offer only a subset of AWS services. You can find out what services are offered in each Region from the table provided here: | |||||||
> > | Amazon Elastic Compute Cloud (EC2) instances are hosted in multiple locations world-wide. These locations are composed of Regions and Availability Zones. Each Region is a separate geographic area. However, each Region also has multiple, isolated locations known as Availability Zones (AZs). However, not all AWS Regions are created equal. Each Region may offer only a subset of AWS services. You can find out what services are offered in each Region from the table provided here: | |||||||
Changed: | ||||||||
< < | When selecting a Region for your HTCondor annex, you must select a region that offers all of the AWS services required by condor_annex to function properly. These services are: | |||||||
> > | When selecting a Region for your annex, you must select a region that offers all of the AWS services required by condor_annex to function properly. These services are: | |||||||
| ||||||||
Line: 89 to 88 | ||||||||
Select your desired Region accordingly from the drop-down menu in the upper-right-hand side of the AWS Management Console. | ||||||||
Changed: | ||||||||
< < | Step 5: Generate an Amazon EC2 Key Pair | |||||||
> > | Step 5: Generate an EC2 Key Pair | |||||||
Changed: | ||||||||
< < | After selecting a Region for your HTCondor annex, you will need to generate an SSH key pair that will allow you to login to your EC2 instances. You can create a key pair using the Amazon EC2 console or the command line. After you create a key pair, you will specify it when launching your instances from condor_annex. | |||||||
> > | After selecting a Region for your annex, you will need to generate an SSH key pair that will allow you to login to your EC2 instances in that Region. You can create a key pair using the EC2 console or the command line. You will specify this key pair when launching your instances with condor_annex. | |||||||
To create your key pair using the Amazon EC2 console | ||||||||
Changed: | ||||||||
< < |
| |||||||
> > |
| |||||||
| ||||||||
Changed: | ||||||||
< < |
| |||||||
> > |
| |||||||
If you would like to create your SSH key pair using the AWS CLI or import your own key pair, please consult the AWS documentation at: | ||||||||
Line: 108 to 107 | ||||||||
Step 6: Configure Default VPC Security Group | ||||||||
Changed: | ||||||||
< < | condor_annex will automatically create and configure an AWS Security Group (i.e., a virtual firewall) around each annex it builds. However, depending on your HTCondor pool configuration, it may also been useful to place some on-demand resources in AWS. For example, you may want to a separate HTCondor central manager instance in AWS in order to flock user jobs over to the annex instead of connecting the annex instances themselves all the way back to your local central manager. | |||||||
> > | condor_annex will automatically create and configure an AWS Security Group (i.e., a virtual firewall) around all of the instances within an annex. However, depending on your HTCondor pool configuration, it may also been useful to place some on-demand resources in AWS. For example, you may want to a separate HTCondor central manager instance located in AWS in order to flock user jobs over to the annex instead of connecting the annex instances back to your local central manager. | |||||||
These on-demand resources may be placed in your AWS Region's default Virtual Private Cloud (VPC) Security Group. To configure the default VPC Security Group: | ||||||||
Changed: | ||||||||
< < |
| |||||||
> > |
| |||||||
|
Line: 1 to 1 | ||||||||
---|---|---|---|---|---|---|---|---|
| ||||||||
Line: 292 to 292 | ||||||||
Your local HTCondor pool should now be ready to use Password Authentication with condor_annex.
Step 9. Install and configure AWS CLI | ||||||||
Added: | ||||||||
> > |
The AWS Command Line Interface (CLI) is a tool to manage your AWS services from the command line and automate your interaction with them via scripting. Remember, condor_annex itself is a Perl-based script that relies on the AWS CLI to automate the construction of an annex given the inputs provided by a user. As such, the AWS CLI must be installed and configured on any host that will run condor_annex.
If you plan to let your users run condor_annex for themselves when they need additional resources, then you should install the AWS CLI on your HTCondor pool's SUBMIT node. To install the AWS CLI, login as root to your SUBMIT node and run the following commands.
[root@SUBMIT ~]$ yum install python-pip [root@SUBMIT ~]$ pip install awscliOnce the AWS CLI is installed, each user who wants to run condor_annex will have to configure the CLI using their AWS Security Credentials. To configure the CLI, they must run the following command and enter the requested information. [user@SUBMIT ~]$ aws configure AWS Access Key ID [None]: ****************4FSQ AWS Secret Access Key [None]: ****************RbV6 Default region name [None]: us-east-1 Default output format [None]: jsonFor the Default region name and Default output format, please make sure to instruct your users to enter (1) the codename for the AWS Region that contains your pre-configured condor_annex-compatible AMI and (2) json, respectively. Once a user completes this AWS CLI configuration process, they should find the settings stored in the new .aws directory that has been created in their home directory. | |||||||
Step 10. Install and configure condor annex | ||||||||
Added: | ||||||||
> > | yum install git yum install perl-JSON cd /opt git clone https://github.com/mkandes/condor_annex.git | |||||||
Step 11. Launch a condor_annex\ No newline at end of file |
Line: 1 to 1 | ||||||||
---|---|---|---|---|---|---|---|---|
| ||||||||
Line: 265 to 265 | ||||||||
Step 8: Configure HTCondor Pool for Password Authentication | ||||||||
Changed: | ||||||||
< < | condor_annex currently assumes that your local HTCondor pool allows daemon-to-daemon communication via Password Authentication. If you local pool is not yet configured to use a pool password, you must first generate and store a password file on both the SUBMIT node and CENTRAL_MANAGER by running the following command on each: | |||||||
> > | condor_annex currently assumes that your local HTCondor pool allows daemon-to-daemon communication via Password Authentication. If your local pool is not yet configured to use a pool password, you must first generate and store a password file on both the SUBMIT node and CENTRAL_MANAGER by running the following command on each: | |||||||
[root@SUBMIT ~]$ condor_store_cred -c add |
Line: 1 to 1 | ||||||||
---|---|---|---|---|---|---|---|---|
| ||||||||
Added: | ||||||||
> > | ||||||||
Install and Configure condor_annex | ||||||||
Line: 16 to 18 | ||||||||
Definitions | ||||||||
Changed: | ||||||||
< < | Hostnames:
| |||||||
> > |
| |||||||
Requirements | ||||||||
Line: 164 to 159 | ||||||||
| ||||||||
Changed: | ||||||||
< < | If these preconfigured AMIs cannot be successfully modified to fit your needs, you will need to create your own condor_annex-compatible AMI. We have do so for our own purposes by building a condor_annex-compatible CentOS? 6-based AMI. | |||||||
> > | If these preconfigured AMIs cannot be successfully modified to suit your needs, you will need to create your own condor_annex-compatible AMI. We have do so for our own purposes by building a condor_annex-compatible CentOS? 6-based AMI. | |||||||
Changed: | ||||||||
< < | To build your own condor_annex-compatible AMI, open the Elastic Compute Cloud (EC2) dashboard in the AWS Region where you will run your annex. Click on the Launch Instance button. This will open the instance launch configuration wizard. Follow its steps. | |||||||
> > | To build your own condor_annex-compatible AMI, open the Elastic Compute Cloud (EC2) dashboard in the AWS Region where you will run your annex. Click on the Launch Instance button. This will open the instance launch configuration wizard. Follow these steps. | |||||||
Changed: | ||||||||
< < |
| |||||||
> > |
| |||||||
| ||||||||
Changed: | ||||||||
< < |
| |||||||
> > |
| |||||||
| ||||||||
Changed: | ||||||||
< < |
| |||||||
> > |
| |||||||
Changed: | ||||||||
< < | Once the instance has started up and enters a running Instance State, you will install and configure the software required to create a condor_annex-compatible AMI on the instance. To begin, log into the instance via SSH. | |||||||
> > | Once the instance has started up and enters a running Instance State, you will install and configure the software required to create a condor_annex-compatible AMI on the instance. To begin, open a terminal and login into the instance via SSH. | |||||||
Changed: | ||||||||
< < | [user@client ~]$ ssh -i ~/.ssh/HTCondorAnnex.pem centos@107.22.156.79 | |||||||
> > | [user@client ~]$ ssh -i ~/.ssh/HTCondorAnnex.pem centos@ANNEX.PUBLIC.IP | |||||||
Then switch to root. | ||||||||
Changed: | ||||||||
< < | [centos@ip-107-22-156-79 ~]$ sudo -i | |||||||
> > | [centos@ANNEX-PRIVATE-IP ~]$ sudo -i | |||||||
First, update the instance's base OS configuration. | ||||||||
Changed: | ||||||||
< < | [root@ip-107-22-156-79 ~]$ yum update | |||||||
> > | [root@ANNEX-PRIVATE-IP ~]$ yum update | |||||||
Then install the Extra Packages for Enterprise Linux (EPEL) repository. | ||||||||
Changed: | ||||||||
< < | [root@ip-107-22-156-79 ~]$ yum install epel-release | |||||||
> > | [root@ANNEX-PRIVATE-IP ~]$ yum install epel-release | |||||||
Next, install the yum priorities package | ||||||||
Changed: | ||||||||
< < | [root@ip-107-22-156-79 ~]$ yum install yum-plugin-priorities | |||||||
> > | [root@ANNEX-PRIVATE-IP ~]$ yum install yum-plugin-priorities | |||||||
and the appropriate Open Science Grid (OSG) repositories. | ||||||||
Changed: | ||||||||
< < | [root@ip-107-22-156-79 ~]$ rpm -Uvh https://repo.grid.iu.edu/osg/3.3/osg-3.3-el6-release-latest.rpm | |||||||
> > | [root@ANNEX-PRIVATE-IP ~]$ rpm -Uvh https://repo.grid.iu.edu/osg/3.3/osg-3.3-el6-release-latest.rpm | |||||||
Changed: | ||||||||
< < | Once the OSG repositories are available on the instance, install the CA certificates and fetch-crl. [root@ip-107-22-156-79 ~]$ yum install osg-ca-certs [root@ip-107-22-156-79 ~]$ yum install fetch-crl | |||||||
> > | Once the OSG repositories are available on the instance, install the CA certificates and fetch-crl. [root@ANNEX-PRIVATE-IP ~]$ yum install osg-ca-certs [root@ANNEX-PRIVATE-IP ~]$ yum install fetch-crl | |||||||
Next, install the OSG Worker Node Client. | ||||||||
Changed: | ||||||||
< < | [root@ip-107-22-156-79 ~]$ yum install osg-wn-client | |||||||
> > | [root@ANNEX-PRIVATE-IP ~]$ yum install osg-wn-client | |||||||
After the client software is installed, manually create both a condor group and user and then install HTCondor. | ||||||||
Changed: | ||||||||
< < | [root@ip-107-22-156-79 ~]$ groupadd condor [root@ip-107-22-156-79 ~]$ useradd condor -g condor [root@ip-107-22-156-79 ~]$ yum install condor.x86_64 | |||||||
> > | [root@ANNEX-PRIVATE-IP ~]$ groupadd condor [root@ANNEX-PRIVATE-IP ~]$ useradd condor -g condor [root@ANNEX-PRIVATE-IP ~]$ yum install condor.x86_64 | |||||||
This would complete the typical software installation of a standard OSG HTCondor execute node, except for CVMFS. However, in order to support condor_annex, several other software packages must be properly installed on the instance. In addition to the standard OSG software, you must also install cloud-init | ||||||||
Changed: | ||||||||
< < | [root@ip-107-22-156-79 ~]$ yum install yum install cloud-init | |||||||
> > | [root@ANNEX-PRIVATE-IP ~]$ yum install cloud-init | |||||||
and several other python packages, including pip. | ||||||||
Changed: | ||||||||
< < | [root@ip-107-22-156-79 ~]$ yum install pystache [root@ip-107-22-156-79 ~]$ yum install python-argparse [root@ip-107-22-156-79 ~]$ yum install python-daemon [root@ip-107-22-156-79 ~]$ yum install python-requests [root@ip-107-22-156-79 ~]$ yum install python-pip | |||||||
> > | [root@ANNEX-PRIVATE-IP ~]$ yum install pystache [root@ANNEX-PRIVATE-IP ~]$ yum install python-argparse [root@ANNEX-PRIVATE-IP ~]$ yum install python-daemon [root@ANNEX-PRIVATE-IP ~]$ yum install python-requests [root@ANNEX-PRIVATE-IP ~]$ yum install python-pip | |||||||
You may also want to make sure these packages are up-to-date. | ||||||||
Changed: | ||||||||
< < | [root@ip-107-22-156-79 ~]$ pip install --upgrade pip | |||||||
> > | [root@ANNEX-PRIVATE-IP ~]$ pip install --upgrade pipOnce these packages are installed, install the AWS CLI. [root@ANNEX-PRIVATE-IP ~]$ pip install awscliand the AWS CloudFormation Helper Scripts. [root@ANNEX-PRIVATE-IP ~]$ easy_install https://s3.amazonaws.com/cloudformation-examples/aws-cfn-bootstrap-latest.tar.gzSeveral standard directories and symbolic links found on Amazon Linux AMIs must be created to successfully use the CloudFormation? Helper Scripts on CentOS? 6. | |||||||
Changed: | ||||||||
< < | pip install awscli easy_install https://s3.amazonaws.com/cloudformation-examples/aws-cfn-bootstrap-latest.tar.gz ln -s /usr/bin/cfn-hup /etc/init.d/cfn-hup chmod 775 /usr/bin/cfn-hup mkdir /opt/aws mkdir /opt/aws/bin ln -s /usr/bin/cfn-hup /opt/aws/bin/cfn-hup ln -s /usr/bin/cfn-init /opt/aws/bin/cfn-init ln -s /usr/bin/cfn-signal /opt/aws/bin/cfn-signal ln -s /usr/bin/cfn-get-metadata /opt/aws/bin/cfn-get-metadata | |||||||
> > | [root@ANNEX-PRIVATE-IP ~]$ ln -s /usr/bin/cfn-hup /etc/init.d/cfn-hup [root@ANNEX-PRIVATE-IP ~]$ chmod 775 /usr/bin/cfn-hup [root@ANNEX-PRIVATE-IP ~]$ mkdir /opt/aws [root@ANNEX-PRIVATE-IP ~]$ mkdir /opt/aws/bin [root@ANNEX-PRIVATE-IP ~]$ ln -s /usr/bin/cfn-hup /opt/aws/bin/cfn-hup [root@ANNEX-PRIVATE-IP ~]$ ln -s /usr/bin/cfn-init /opt/aws/bin/cfn-init [root@ANNEX-PRIVATE-IP ~]$ ln -s /usr/bin/cfn-signal /opt/aws/bin/cfn-signal [root@ANNEX-PRIVATE-IP ~]$ ln -s /usr/bin/cfn-get-metadata /opt/aws/bin/cfn-get-metadata | |||||||
Added: | ||||||||
> > | If you are using a different base OS AMI, please see this link for some possible changes to the CloudFormation? Helper Script configuration. | |||||||
Added: | ||||||||
> > | Activate (or deactivate) the following services as indicated and then and then logout from the instance.
[root@ANNEX-PRIVATE-IP ~]$ chkconfig iptables off [root@ANNEX-PRIVATE-IP ~]$ service iptables stop [root@ANNEX-PRIVATE-IP ~]$ chkconfig fetch-crl-boot on [root@ANNEX-PRIVATE-IP ~]$ chkconfig fetch-crl-cron on [root@ANNEX-PRIVATE-IP ~]$ service fetch-crl-boot start [root@ANNEX-PRIVATE-IP ~]$ service fetch-crl-cron start [root@ANNEX-PRIVATE-IP ~]$ chkconfig condor on [root@ANNEX-PRIVATE-IP ~]$ service condor start [root@ANNEX-PRIVATE-IP ~]$ exitReturn now to the AWS Management Console in your web browser and then go to the EC2 dashboard. In the navigation pane, under INSTANCES, choose Instances. There you will see a list of each individual instance available in the AWS Region. Select the instance you've just configured your condor_annex-compatible AMI on. Then from the dropdown menu Actions, go to Image and select Create Image. You will be prompted to make changes to the AMI before its creation. You'll likely want to add an Image name and check the Delete on Termination box. Make any other adjustments you find necessary and then click on the Create Image button. This will create an AMI from your instance that can be used with condor_annex. Go ahead and Close the Create Image request received dialog box to return to the EC2 Dashboard. In the navigation pain, under IMAGES, click on AMIs. There you will see a list of the your custom AMIs, including the condor_annex-compatible AMI that was just created from your instance. Note the AMI ID for this image as it will be one of the required inputs when calling condor_annex. | |||||||
Step 8: Configure HTCondor Pool for Password Authentication | ||||||||
Changed: | ||||||||
< < | Step 9. Install and configure AWS CLI on HTCondor submit nodeStep 10. Install and configure condor annex on HTCondor submit node | |||||||
> > |
condor_annex currently assumes that your local HTCondor pool allows daemon-to-daemon communication via Password Authentication. If you local pool is not yet configured to use a pool password, you must first generate and store a password file on both the SUBMIT node and CENTRAL_MANAGER by running the following command on each:
[root@SUBMIT ~]$ condor_store_cred -c addThis command will prompt you to enter a pool password. Once entered, a password file will be stored on the local machine. By default, the password file created on each machine is /etc/condor/condor_pool_password. Make sure that you run this pool password command --- entering the same password --- on both the SUBMIT node and the CENTRAL_MANAGER of your local pool. You may also use Password Authentication with your local EXECUTE nodes. However, this is not required by condor_annex. Only the ANNEX instances require the use of Password Authentication. Once your SUBMIT node and CENTRAL_MANAGER have the pool password file, you must configure their HTCondor daemons to use Password Authentication. On both the machines, login as root and go to the HTCondor config.d directory. [root@CENTRAL_MANAGER ~]$ cd /etc/condor/config.dIn this directory, create the following HTCondor configuration file (99_condor_annex.config) ALLOW_DAEMON = $(ALLOW_DAEMON), condor_pool@* SEC_DEFAULT_AUTHENTICATION = REQUIRED SEC_DEFAULT_AUTHENTICATION_METHODS = $(SEC_DEFAULT_AUTHENTICATION_METHODS), PASSWORD SEC_DEFAULT_ENCRYPTION = OPTIONAL SEC_DEFAULT_INTEGRITY = REQUIRED SEC_ENABLE_MATCH_PASSWORD_AUTHENTICATION = TRUE SEC_PASSWORD_FILE = /etc/condor/condor_pool_passwordand then restart condor. [root@CENTRAL_MANAGER ~]$ service condor restartYour local HTCondor pool should now be ready to use Password Authentication with condor_annex. Step 9. Install and configure AWS CLIStep 10. Install and configure condor annex | |||||||
Step 11. Launch a condor_annex | ||||||||
Added: | ||||||||
> > |
Line: 1 to 1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
Install and Configure condor_annex | |||||||||
Line: 157 to 157 | |||||||||
Step 7: Create an condor_annex-compatible Amazon Machine Image | |||||||||
Changed: | |||||||||
< < | Each HTCondor execute instance within your annex must run a condor_annex-compatible Amazon Machine Image (AMI). At present, the HTCondor team provides a set of publicly available Amazon Linux AMIs with HTCondor 8.4.2 pre-installed in a few AWS Regions within the United States. These default condor_annex-compatible AMIs are: | ||||||||
> > | Each HTCondor execute instance within your annex must run a condor_annex-compatible Amazon Machine Image (AMI). By default, condor_annex will attempt to use one of the publicly available Amazon Linux AMIs with HTCondor 8.4.2 pre-installed currently provided by the HTCondor team. These condor_annex-compatible AMIs are available in the following AWS Regions within the United States: | ||||||||
| |||||||||
Added: | |||||||||
> > | If these preconfigured AMIs cannot be successfully modified to fit your needs, you will need to create your own condor_annex-compatible AMI. We have do so for our own purposes by building a condor_annex-compatible CentOS? 6-based AMI.
To build your own condor_annex-compatible AMI, open the Elastic Compute Cloud (EC2) dashboard in the AWS Region where you will run your annex. Click on the Launch Instance button. This will open the instance launch configuration wizard. Follow its steps.
[user@client ~]$ ssh -i ~/.ssh/HTCondorAnnex.pem centos@107.22.156.79Then switch to root. [centos@ip-107-22-156-79 ~]$ sudo -iFirst, update the instance's base OS configuration. [root@ip-107-22-156-79 ~]$ yum updateThen install the Extra Packages for Enterprise Linux (EPEL) repository. [root@ip-107-22-156-79 ~]$ yum install epel-releaseNext, install the yum priorities package [root@ip-107-22-156-79 ~]$ yum install yum-plugin-prioritiesand the appropriate Open Science Grid (OSG) repositories. [root@ip-107-22-156-79 ~]$ rpm -Uvh https://repo.grid.iu.edu/osg/3.3/osg-3.3-el6-release-latest.rpmOnce the OSG repositories are available on the instance, install the CA certificates and fetch-crl. [root@ip-107-22-156-79 ~]$ yum install osg-ca-certs [root@ip-107-22-156-79 ~]$ yum install fetch-crlNext, install the OSG Worker Node Client. [root@ip-107-22-156-79 ~]$ yum install osg-wn-clientAfter the client software is installed, manually create both a condor group and user and then install HTCondor. [root@ip-107-22-156-79 ~]$ groupadd condor [root@ip-107-22-156-79 ~]$ useradd condor -g condor [root@ip-107-22-156-79 ~]$ yum install condor.x86_64This would complete the typical software installation of a standard OSG HTCondor execute node, except for CVMFS. However, in order to support condor_annex, several other software packages must be properly installed on the instance. In addition to the standard OSG software, you must also install cloud-init [root@ip-107-22-156-79 ~]$ yum install yum install cloud-initand several other python packages, including pip. [root@ip-107-22-156-79 ~]$ yum install pystache [root@ip-107-22-156-79 ~]$ yum install python-argparse [root@ip-107-22-156-79 ~]$ yum install python-daemon [root@ip-107-22-156-79 ~]$ yum install python-requests [root@ip-107-22-156-79 ~]$ yum install python-pipYou may also want to make sure these packages are up-to-date. [root@ip-107-22-156-79 ~]$ pip install --upgrade pippip install awscli easy_install https://s3.amazonaws.com/cloudformation-examples/aws-cfn-bootstrap-latest.tar.gz ln -s /usr/bin/cfn-hup /etc/init.d/cfn-hup chmod 775 /usr/bin/cfn-hup mkdir /opt/aws mkdir /opt/aws/bin ln -s /usr/bin/cfn-hup /opt/aws/bin/cfn-hup ln -s /usr/bin/cfn-init /opt/aws/bin/cfn-init ln -s /usr/bin/cfn-signal /opt/aws/bin/cfn-signal ln -s /usr/bin/cfn-get-metadata /opt/aws/bin/cfn-get-metadata | ||||||||
Step 8: Configure HTCondor Pool for Password AuthenticationStep 9. Install and configure AWS CLI on HTCondor submit nodeStep 10. Install and configure condor annex on HTCondor submit nodeStep 11. Launch a condor_annex | |||||||||
Deleted: | |||||||||
< < | -- MartinKandes - 2016/11/01 |
Line: 1 to 1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
Install and Configure condor_annex | |||||||||
Line: 153 to 153 | |||||||||
| |||||||||
Changed: | |||||||||
< < | If you would like to restrict outbound traffic from the default VPC Security Group, select the Outbound Rules tab, click on the Edit button, and configure the outbound rules accordingly. | ||||||||
> > | If you would like to restrict outbound traffic from the default VPC Security Group, select the Outbound Rules tab, click on the Edit button, and then configure the outbound rules accordingly. | ||||||||
Step 7: Create an condor_annex-compatible Amazon Machine Image | |||||||||
Added: | |||||||||
> > |
Each HTCondor execute instance within your annex must run a condor_annex-compatible Amazon Machine Image (AMI). At present, the HTCondor team provides a set of publicly available Amazon Linux AMIs with HTCondor 8.4.2 pre-installed in a few AWS Regions within the United States. These default condor_annex-compatible AMIs are:
| ||||||||
Step 8: Configure HTCondor Pool for Password AuthenticationStep 9. Install and configure AWS CLI on HTCondor submit nodeStep 10. Install and configure condor annex on HTCondor submit node |
Line: 1 to 1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
Install and Configure condor_annex | |||||||||
Line: 127 to 127 | |||||||||
| |||||||||
Changed: | |||||||||
< < | For the default VPC Security Group, we recommend the following set of inbound rules: | ||||||||
> > | We recommend the following set of inbound rules be used for the default VPC Security Group: | ||||||||
|
Line: 1 to 1 | |||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Install and Configure condor_annex | |||||||||||||||||||||||||||||||||||||
Line: 86 to 86 | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
Changed: | |||||||||||||||||||||||||||||||||||||
< < | AWS Lambda currently has the most limited deployment of any AWS service required by condor_annex. For example, in the US, AWS Lambda is only available in the following Regions at this time: | ||||||||||||||||||||||||||||||||||||
> > | AWS Lambda currently has the most limited deployment of any AWS service required by condor_annex. For example, AWS Lambda is only available in the following Regions within the United States at this time: | ||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
Changed: | |||||||||||||||||||||||||||||||||||||
< < | Please select your desired Region accordingly from the drop-down menu in the upper-right-hand side of the AWS Management Console. | ||||||||||||||||||||||||||||||||||||
> > | Select your desired Region accordingly from the drop-down menu in the upper-right-hand side of the AWS Management Console. | ||||||||||||||||||||||||||||||||||||
Step 5: Generate an Amazon EC2 Key Pair | |||||||||||||||||||||||||||||||||||||
Line: 113 to 113 | |||||||||||||||||||||||||||||||||||||
Step 6: Configure Default VPC Security Group | |||||||||||||||||||||||||||||||||||||
Changed: | |||||||||||||||||||||||||||||||||||||
< < | condor_annex will create and configure an AWS Security Group (i.e., a virtual firewall) around each annex it builds. However, depending on your HTCondor pool configuration, it may also been useful to place some (static, non-preemptable) on-demand resources in AWS. For example, you may want to a separate HTCondor central manager instance in AWS in order to flock user jobs over to the annex instead of connecting the annex instances all the way back to your local central manager. | ||||||||||||||||||||||||||||||||||||
> > | condor_annex will automatically create and configure an AWS Security Group (i.e., a virtual firewall) around each annex it builds. However, depending on your HTCondor pool configuration, it may also been useful to place some on-demand resources in AWS. For example, you may want to a separate HTCondor central manager instance in AWS in order to flock user jobs over to the annex instead of connecting the annex instances themselves all the way back to your local central manager. | ||||||||||||||||||||||||||||||||||||
Changed: | |||||||||||||||||||||||||||||||||||||
< < | Any such resources may be placed in your AWS Region's default Virtual Private Cloud (VPC) Security Group. To configure this default VPC Security Group: | ||||||||||||||||||||||||||||||||||||
> > | These on-demand resources may be placed in your AWS Region's default Virtual Private Cloud (VPC) Security Group. To configure the default VPC Security Group: | ||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
Changed: | |||||||||||||||||||||||||||||||||||||
< < | By default, only inbound rule for the default VPC Security Group should be | ||||||||||||||||||||||||||||||||||||
> > | By default, the only inbound rule should be one allowing all traffic from instances assigned to the default VPC Security Group. | ||||||||||||||||||||||||||||||||||||
Changed: | |||||||||||||||||||||||||||||||||||||
< < | (sg-xxxxxxxx | ||||||||||||||||||||||||||||||||||||
> > |
| ||||||||||||||||||||||||||||||||||||
Changed: | |||||||||||||||||||||||||||||||||||||
< < |
| ||||||||||||||||||||||||||||||||||||
> > | For the default VPC Security Group, we recommend the following set of inbound rules: | ||||||||||||||||||||||||||||||||||||
Changed: | |||||||||||||||||||||||||||||||||||||
< < | Source Protocol Port Range Comments The security group ID (sg-xxxxxxxx) All All Allow inbound traffic from instances assigned to the same security group Type Protocol Port Range Source ---- -------- ---------- ------ All traffic All All sg-5437332d (default) All traffic All All 172.31.0.0/20 SSH TCP 22 0.0.0.0/0 Custom UDP Rule UDP 9618 0.0.0.0/0 Custom TCP Rule TCP 9618 0.0.0.0/0 All ICMP All N/A 0.0.0.0/0 | ||||||||||||||||||||||||||||||||||||
> > |
| ||||||||||||||||||||||||||||||||||||
Added: | |||||||||||||||||||||||||||||||||||||
> > | In their most permissive form, these inbound rules for the default VPC security group will look something like this:
| ||||||||||||||||||||||||||||||||||||
Step 7: Create an condor_annex-compatible Amazon Machine ImageStep 8: Configure HTCondor Pool for Password Authentication |
Line: 1 to 1 | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
Install and Configure condor_annex | |||||||||||
Line: 113 to 113 | |||||||||||
Step 6: Configure Default VPC Security Group | |||||||||||
Changed: | |||||||||||
< < | condor_annex will create and configure an AWS Security Group (i.e., a Firewall) around each HTCondor annex it builds. However, depending on your pool configuration, it may also been useful to place some static, on-demand resources in AWS for testing and even production purposes --- e.g., you may want to spin-up up a separate central manager to flock jobs to instead of connecting the instances back to your local central manager. | ||||||||||
> > | condor_annex will create and configure an AWS Security Group (i.e., a virtual firewall) around each annex it builds. However, depending on your HTCondor pool configuration, it may also been useful to place some (static, non-preemptable) on-demand resources in AWS. For example, you may want to a separate HTCondor central manager instance in AWS in order to flock user jobs over to the annex instead of connecting the annex instances all the way back to your local central manager. | ||||||||||
Changed: | |||||||||||
< < | These static, on-demand resources may be placed in your Region's default Virtual Private Cloud (VPC) Security Group. To configure this default VPC Security Group: | ||||||||||
> > | Any such resources may be placed in your AWS Region's default Virtual Private Cloud (VPC) Security Group. To configure this default VPC Security Group: | ||||||||||
| |||||||||||
Changed: | |||||||||||
< < |
| ||||||||||
> > |
| ||||||||||
| |||||||||||
Changed: | |||||||||||
< < |
| ||||||||||
> > |
| ||||||||||
Changed: | |||||||||||
< < | By default, each Security Group, including the default VPC Security Group, | ||||||||||
> > | By default, only inbound rule for the default VPC Security Group should be | ||||||||||
Changed: | |||||||||||
< < |
| ||||||||||
> > | (sg-xxxxxxxx
| ||||||||||
Type Protocol Port Range Source |
Line: 1 to 1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
Install and Configure condor_annex | |||||||||
Line: 113 to 113 | |||||||||
Step 6: Configure Default VPC Security Group | |||||||||
Changed: | |||||||||
< < | Step 7: Create an condor_annex-compatible Amazon Machine Image (AMI) | ||||||||
> > | condor_annex will create and configure an AWS Security Group (i.e., a Firewall) around each HTCondor annex it builds. However, depending on your pool configuration, it may also been useful to place some static, on-demand resources in AWS for testing and even production purposes --- e.g., you may want to spin-up up a separate central manager to flock jobs to instead of connecting the instances back to your local central manager.
These static, on-demand resources may be placed in your Region's default Virtual Private Cloud (VPC) Security Group. To configure this default VPC Security Group:
Step 7: Create an condor_annex-compatible Amazon Machine Image | ||||||||
Step 8: Configure HTCondor Pool for Password AuthenticationStep 9. Install and configure AWS CLI on HTCondor submit nodeStep 10. Install and configure condor annex on HTCondor submit node |
Line: 1 to 1 | ||||||||
---|---|---|---|---|---|---|---|---|
Install and Configure condor_annex | ||||||||
Line: 6 to 6 | ||||||||
About this Document | ||||||||
Changed: | ||||||||
< < | condor_annex is a Perl-based script that utilizes the Amazon Web Services (AWS) command-line interface (CLI) and other AWS services to orchestrate the delivery of HTCondor execute nodes to an HTCondor pool. This document describes how to install, configure, and run condor_annex successfully from your own local HTCondor pool. | |||||||
> > | condor_annex is a Perl-based script that utilizes the Amazon Web Services (AWS) command-line interface (CLI) and other AWS services to orchestrate the delivery of HTCondor execute nodes running on AWS Elastic Compute Cloud (EC2) instances to an HTCondor pool. This document describes how to install, configure, and run condor_annex successfully from your own local HTCondor pool. | |||||||
This document follows the general Open Science Grid (OSG) documentation conventions: | ||||||||
Line: 20 to 20 | ||||||||
| ||||||||
Changed: | ||||||||
< < |
| |||||||
> > |
| |||||||
Usernames:
| ||||||||
Line: 33 to 33 | ||||||||
| ||||||||
Changed: | ||||||||
< < | Install and Configure an HTCondor Pool | |||||||
> > | Step 1: Install and Configure an HTCondor Pool | |||||||
If you do not already have your own HTCondor Pool, you may want to first start by installing your own personal HTCondor pool to experiment with condor_annex. Please consult the HTCondor Manual and/or Wiki for more information: | ||||||||
Changed: | ||||||||
< < | Obtain an Amazon Web Services Account | |||||||
> > | Step 2: Obtain an Amazon Web Services Account | |||||||
In order to use condor_annex, you must already have an AWS account. You may establish an AWS account under the UC-wide agreement by following the instructions provided by Blink: | ||||||||
Changed: | ||||||||
< < | Obtain Your AWS Account Credentials | |||||||
> > | Step 3: Obtain AWS Account Credentials | |||||||
Changed: | ||||||||
< < | condor_annex issues programmatic requests to AWS services via the AWS command-line interface (CLI). In order to issues these requests, the AWS CLI must sign them using your AWS account credentials. These credentials consist of an Access Key ID and a Secret Access Key. If you do not have these access keys, you may create them using the AWS Management Console. AWS recommends that you use Identity and Access Management (IAM) access keys instead of your root account access keys. | |||||||
> > | condor_annex issues programmatic requests to AWS services via the AWS command-line interface (CLI). In order to issue these requests, the AWS CLI must sign them using your AWS account credentials. These credentials consist of an Access Key ID and a Secret Access Key. If you do not have these access keys, you may create them using the AWS Management Console. AWS recommends that you use Identity and Access Management (IAM) access keys instead of your root account access keys. | |||||||
To create access keys, you must have permissions to perform the required IAM actions.
| ||||||||
Changed: | ||||||||
< < |
| |||||||
> > |
| |||||||
| ||||||||
Line: 67 to 67 | ||||||||
Changed: | ||||||||
< < | Select an Amazon Region for Your AnnexGenerate an Amazon EC2 Key PairCreate an condor_annex-compatible Amazon Machine Image (AMI)Configure your HTCondor Pool to Use a Password AuthenticationInstall and configure AWS CLI on HTCondor submit node.Install and configure condor annex on HTCondor submit node.http://docs.aws.amazon.com/cli/latest/userguide/cli-chap-getting-started.html
| |||||||
> > | Step 4: Select an Amazon Region for the Annex | |||||||
Added: | ||||||||
> > | Amazon Elastic Compute Cloud (EC2) instances are hosted in multiple locations world-wide. These locations are composed of Regions and Availability Zones. Each Region is a separate geographic area. However, each Region also has multiple, isolated locations known as Availability Zones (AZs), which are simply high-availability data centers. However, not all AWS Regions are created equal. Each Region may offer only a subset of AWS services. You can find out what services are offered in each Region from the table provided here:
When selecting a Region for your HTCondor annex, you must select a region that offers all of the AWS services required by condor_annex to function properly. These services are:
Step 5: Generate an Amazon EC2 Key PairAfter selecting a Region for your HTCondor annex, you will need to generate an SSH key pair that will allow you to login to your EC2 instances. You can create a key pair using the Amazon EC2 console or the command line. After you create a key pair, you will specify it when launching your instances from condor_annex. To create your key pair using the Amazon EC2 console
Step 6: Configure Default VPC Security GroupStep 7: Create an condor_annex-compatible Amazon Machine Image (AMI)Step 8: Configure HTCondor Pool for Password AuthenticationStep 9. Install and configure AWS CLI on HTCondor submit nodeStep 10. Install and configure condor annex on HTCondor submit nodeStep 11. Launch a condor_annex | |||||||
-- MartinKandes - 2016/11/01 |
Line: 1 to 1 | ||||||||
---|---|---|---|---|---|---|---|---|
Added: | ||||||||
> > |
Install and Configure condor_annex
About this Documentcondor_annex is a Perl-based script that utilizes the Amazon Web Services (AWS) command-line interface (CLI) and other AWS services to orchestrate the delivery of HTCondor execute nodes to an HTCondor pool. This document describes how to install, configure, and run condor_annex successfully from your own local HTCondor pool. This document follows the general Open Science Grid (OSG) documentation conventions:
DefinitionsHostnames:
Requirements
Install and Configure an HTCondor PoolIf you do not already have your own HTCondor Pool, you may want to first start by installing your own personal HTCondor pool to experiment with condor_annex. Please consult the HTCondor Manual and/or Wiki for more information:
Obtain an Amazon Web Services AccountIn order to use condor_annex, you must already have an AWS account. You may establish an AWS account under the UC-wide agreement by following the instructions provided by Blink:Obtain Your AWS Account Credentialscondor_annex issues programmatic requests to AWS services via the AWS command-line interface (CLI). In order to issues these requests, the AWS CLI must sign them using your AWS account credentials. These credentials consist of an Access Key ID and a Secret Access Key. If you do not have these access keys, you may create them using the AWS Management Console. AWS recommends that you use Identity and Access Management (IAM) access keys instead of your root account access keys. To create access keys, you must have permissions to perform the required IAM actions.
Select an Amazon Region for Your AnnexGenerate an Amazon EC2 Key PairCreate an condor_annex-compatible Amazon Machine Image (AMI)Configure your HTCondor Pool to Use a Password AuthenticationInstall and configure AWS CLI on HTCondor submit node.Install and configure condor annex on HTCondor submit node.http://docs.aws.amazon.com/cli/latest/userguide/cli-chap-getting-started.html
|