Greg Thain HTCondor Week 2015

Slides:



Advertisements
Similar presentations
ITR3 lecture 7: more introduction to UNIX Thomas Krichel
Advertisements

Putting your users in a Box Greg Thain Center for High Throughput Computing.
Lightweight virtual system mechanism Gao feng
Setting up of condor scheduler on computing cluster Raman Sehgal NPD-BARC.
Kat Passen.  Open source platform to manage deployment  Acts as a layer between an OS and an application  Images not dependent on system – similar.
HTCondor / HEP Partnership and Activities HEPiX Fall 2014 Todd Tannenbaum Center for High Throughput Computing Department of Computer Sciences University.
2000 Copyrights, Danielle S. Lahmani UNIX Tools G , Fall 2000 Danielle S. Lahmani Lecture 12.
Docker Martin Meyer Agenda What is Docker? –Docker vs. Virtual Machine –History, Status, Run Platforms –Hello World Images and Containers.
Linux Operating System
Operating Systems Concepts 1. A Computer Model An operating system has to deal with the fact that a computer is made up of a CPU, random access memory.
CVMFS: Software Access Anywhere Dan Bradley Any data, Any time, Anywhere Project.
Condor Project Computer Sciences Department University of Wisconsin-Madison Virtual Machines in Condor.
Jaime Frey Computer Sciences Department University of Wisconsin-Madison Virtual Machines in Condor.
UNIX Processes. The UNIX Process A process is an instance of a program in execution. Created by another parent process as its child. One process can be.
Chapter 3.1:Operating Systems Concepts 1. A Computer Model An operating system has to deal with the fact that a computer is made up of a CPU, random access.
Linux Filesystem Management
Booting and boot levels
Guide to Linux Installation and Administration, 2e1 Chapter 8 Basic Administration Tasks.
Condor Tugba Taskaya-Temizel 6 March What is Condor Technology? Condor is a high-throughput distributed batch computing system that provides facilities.
Working with Ubuntu Linux Track 2 Workshop June 2010 Pago Pago, American Samoa.
Section 3.1: Operating Systems Concepts 1. A Computer Model An operating system has to deal with the fact that a computer is made up of a CPU, random.
Linux in a Virtual Environment Nagarajan Prabakar School of Computing and Information Sciences Florida International University.
Grid Computing I CONDOR.
Guide to Linux Installation and Administration, 2e1 Chapter 10 Managing System Resources.
Write-through Cache System Policies discussion and A introduction to the system.
Building a Real Workflow Thursday morning, 9:00 am Greg Thain University of Wisconsin - Madison.
Hands On UNIX II Dorcas Muthoni. Processes A running instance of a program is called a "process" Identified by a numeric process id (pid)‏  unique while.
The Roadmap to New Releases Derek Wright Computer Sciences Department University of Wisconsin-Madison
Chapter 3 & 6 Root Status and users File Ownership Every file has a owner and group –These give read,write, and execute priv’s to the owner, group, and.
Derek Wright Computer Sciences Department University of Wisconsin-Madison New Ways to Fetch Work The new hook infrastructure in Condor.
Condor Week 2004 The use of Condor at the CDF Analysis Farm Presented by Sfiligoi Igor on behalf of the CAF group.
Breaking Barriers Exploding with Possibility Breaking Barriers Exploding with Possibility The Cloud Era Unveiled.
HTCondor Recent Enhancement and Future Directions HTCondor Recent Enhancement and Future Directions HEPiX Fall 2015 Todd Tannenbaum Center for High Throughput.
Docker and Container Technology
System Administration. Logging in as System Administrator System Admin login (aka superuser, aka root) –login id: root –Default PS1 prompt: # –Home directory:
UNIX File System By Vishal Desai. Introduction Basic purpose of file system: Represent and organize the system resources. But UNIX File System also maps.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Docker Overview Automating.
CSC414 “Introduction to UNIX/ Linux” Lecture 6. Schedule 1. Introduction to Unix/ Linux 2. Kernel Structure and Device Drivers. 3. System and Storage.
Lecture 02 File and File system. Topics Describe the layout of a Linux file system Display and set paths Describe the most important files, including.
The Kernel At a high level, the kernel in an operating system serves as the bridge between applications and the actual data processing of the hardware.
CVMFS: Software Access Anywhere Dan Bradley Any data, Any time, Anywhere Project.
Agenda The Bourne Shell – Part I Redirection ( >, >>,
Building the International Data Placement Lab Greg Thain Center for High Throughput Computing.
HTCondor’s Grid Universe Jaime Frey Center for High Throughput Computing Department of Computer Sciences University of Wisconsin-Madison.
Five todos when moving an application to distributed HTC.
Putting your users in a Box John (TJ) Knoeller Center for High Throughput Computing.
...looking a bit closer under the hood
Linux Containers and Docker
Containing HTCondor Greg Thain INFN 2016.
SYSTEM ADMINISTRATION PART I by İlker Korkmaz and Kaya Oğuz
Dockerize OpenEdge Srinivasa Rao Nalla.
...looking a bit closer under the hood
Intermediate HTCondor: Workflows Monday pm
Linux Commands Help HANDS ON TRAINING Author: Muhammad Laique
Linux Containers Overview & Roadmap
Hands On UNIX AfNOG 2010 Kigali, Rwanda
Containers and Virtualisation
The Linux Operating System
Hands On UNIX AfNOG X Cairo, Egypt
Troubleshooting Your Jobs
Haiyan Meng and Douglas Thain
Unix : Introduction and Commands
...looking a bit closer under the hood
IS3440 Linux Security Unit 7 Securing the Linux Kernel
Docker Some slides from Martin Meyer Vagrant Box:
Azure Container Service
Troubleshooting Your Jobs
PU. Setting up parallel universe in your pool and when (not
Putting your users in a Box
Presentation transcript:

Greg Thain HTCondor Week 2015 Docker and HTCondor Greg Thain HTCondor Week 2015

Start with the Basics… HTCondor is designed to: Allow a machine “owner” to loan it out The machine must be protected from job

Ancient History: Chroot HTCondor used to chroot every job: No job could touch the file system Private files in host machine stayed private

Chroot: more trouble than value Increasingly difficult to work: Shared libraries /dev /sys /etc /var/run pipes for syslog, etc. How to create root filesystem? Easier now with yum, apt get, etc., but still hard:

Repos make images Easier* $ dnf -y --releasever=21 –nogpg installroot=/srv/mycontainer --disablerepo='*' --enablerepo=fedora install systemd passwd dnf fedora-release vim-minimal $ debootstrap --arch=amd64 unstable ~/debian-tree/ $ pacstrap -c -d ~/arch-tree/ base

We gave up! HTCondor no longer chroots all jobs But you can optionally do so. Very few site sites do… NAMED_CHROOT = /foo

Enter Docker!

This is Docker Docker manages Linux containers. Containers give Linux processes a private: Root file system Process space NATed network UID space

Examples This is an “ubuntu” container Processes in other containers on this machine can NOT see what’s going on in this “ubuntu” container This is my host OS, running Fedora

At the Command Line $ hostname whale $ cat /etc/redhat-release Fedora release 20 (Heisenbug) $ docker run ubuntu cat /etc/debian_version jessie/sid $ time docker run ubuntu sleep 0 real 0m1.825s user 0m0.017s sys 0m0.024s

More CLI detail $ docker run ubuntu cat /etc/debian_version “cat” is the Unix process, from the image we will run (followed by the arguments) “ubuntu” is the base filesystem for the container an “image” “How do images get made”? More on that later. “run” command runs a process in a container All docker commands are bound into the “docker” executable

Images Images provide the user level filesystem Doesn’t contain the linux kernel Or device drivers Or swap space Very small: ubuntu: 200Mb. Images are READ ONLY

Docker run two step Every image that docker run must be local How to get $ docker search image-name $ docker pull image-name Docker run implies pull first! run can fail if image doesn’t exist or is unreachable

Where images come from Docker, inc provides a public-access hub Contains 10,000+ publically usable images behind a CDN What’s local? $ docker images REPOSITORY TAG IMAGE ID CREATED VIRTUAL SIZE new_ubu latest b67902967df7 8 weeks ago 192.7 MB <none> <none> dd58b0ec6b9a 8 weeks ago 192.7 MB <none> <none> 1d19dc9e2e4f 8 weeks ago 192.7 MB rocker/rstudio latest 14fad19147b6 8 weeks ago 787 MB ubuntu latest d0955f21bf24 8 weeks ago 192.7 MB busybox latest 4986bf8c1536 4 months ago 2.433 MB How to get $ docker search image-name $ docker pull image-name

Image name hub.demo.org:8080/user/image:ver Image name and version: (default: “latest”) Name of the user (default: system user) Name of the hub (default docker-io)

Wait! I don’t want my images public! Easy to make your own images (from tar files) The docker hub is open source Straightforward to start your own How is it distributed?

Docker hub is an image! $ docker run docker/docker-registry (and a bunch of setup – google for details) Any production site will want to run own hub Or put a caching proxy in front of the public one

Under the hood of images Images are composed of layers Images can share base layers: ubuntu : 200 Mb ubuntu + R : 250 Mb ubuntu + matlab : 250 Mb All three: 300 Mb.

Container vs. Image Image is like Unix program on disk read only, static Container is like Unix process Docker run starts a container from an image Container states: like a condor job: Running Stopped

Containers $ docker ps shows running containers $ docker ps –a CONTAINER ID IMAGE COMMAND NAMES b71fff77e7b9 ubuntu:latest /bin/sleep owly_tannenba shows running containers $ docker ps –a 7eff0a4dd0b4 debian:jessie /bin/sleep owly_tannenba

Operations on Containers $ docker ps –a $ docker run … $ docker stop containerId $ docker restart containerId $ docker rm containerId

Where is my output? $ docker diff containerId $ sudo docker diff 7bbb C /dev A /dev/kmsg C /etc D /foo $ docker cp containerId:/path /host Works on running or stopped containers

Or, use “volumes” $ docker run –v /host:/container … Volume is a directory that isn’t mapped Output to volume goes directly to host Fast: just a local mount

Why should you care? Reproducibilty Packaging How many .so’s in /usr/lib64 do you use? Will a RHEL 6 app run on RHEL 9 in five years? Packaging Image is a great to package large software stacks Ease of inspection and management Imagine an OSG with container support!

I Know What You Are Thinking!

Isn’t this a Virtual Machine? Containers share Linux kernel with host Host can “ps” into container One-way mirror, not black box Docker provides namespace for images Docker containers do not run system daemons CUPS, email, cron, init, fsck, (think about security!) Docker images much smaller than VM ones Just a set of files, not a disk image Much more likely to be universally available

Semantics: VM vs. Container VMs provide ONE operation: Boot the black box Run until poweroff Containers provide process interface: Start this process within the contain Run until that process exits Much more Condor-like

Docker and HTCondor Package HTCondor as docker image Add new “docker universe” (not actually new universe id)

Installation of docker universe Need condor 8.3.6+ Need docker (maybe from EPEL) $ yum install docker-io Docker is moving fast: docker 1.6+, ideally odd bugs with older dockers! Condor needs to be in the docker group! $ useradd –G docker condor $ service docker start

What? No Knobs? Default install should require no condor knobs! But we have them anyway: DOCKER = /usr/bin/docker

Condor startd detects docker $ condor_status –l | grep –i docker HasDocker = true DockerVersion = "Docker version 1.5.0, build a8a31ef/1.5.0“ $ condor_status –const HasDocker Check StarterLog for error messages

Docker Universe universe = docker executable = /bin/my_executable arguments = arg1 docker_image = deb7_and_HEP_stack transfer_input_files = some_input output = out error = err log = log queue

Docker Universe Job Is still a job Docker containers have the job-nature condor_submit condor_rm condor_hold Write entries to the user log event log condor_dagman works with them Policy expressions work. Matchmaking works User prio / job prio / group quotas all work Stdin, stdout, stderr work Etc. etc. etc.*

Docker Universe universe = docker executable = /bin/my_executable Executable comes either from submit machine or image NEVER FROM execute machine!

Docker Universe Executable can even be omitted! universe = docker # executable = /bin/my_executable Executable can even be omitted! trivia: true for what other universe? (Images can name a default command)

Docker Universe If executable is transferred, universe = docker executable = ./my_executable input_files = my_executable If executable is transferred, Executable copied from submit machine (useful for scripts)

Docker Universe universe = docker executable = /bin/my_executable docker_image =deb7_and_HEP_stack Image is the name of the docker image stored on execute machine. Condor will fetch it if needed.

Docker Universe universe = docker transfer_input_files= some_input HTCondor can transfer input files from submit machine into container (same with output in reverse)

Condor’s use of Docker Condor volume mounts the scratch dir Condor sets the cwd of job to the scratch dir Can’t see NFS mounted filesystems! Condor runs the job with the usual uid rules. Sets container name to HTCJob_$(CLUSTER) _$(PROC)_slotName

Scratch dir == Volume Means normal file xfer rules apply transfer in, transfer out subdirectory rule holds condor_tail works RequestDisk applies to scratch dir, not container Any changes to the container are not xfered Container is removed on job exit

Docker Resource limiting RequestCpus = 4 RequestMemory = 1024M RequestDisk = Somewhat ignored… RequestCpus translated into cgroup shares RequestMemory enforced If exceeded, job gets OOM killed job goes on hold RequestDisk applies to the scratch dir only 10 Gb limit rest of container

Why is my job on hold? Docker couldn’t find image name: $ condor_q -hold -- Submitter: localhost : <127.0.0.1:49411?addrs=127.0.0.1:49411> : localhost  ID      OWNER          HELD_SINCE  HOLD_REASON                                                                     286.0   gthain          5/10 10:13 Error from slot1@localhost: Cannot start container: invalid image name: debain Exceeded memory limit? Just like vanilla job with cgroups  297.0   gthain          5/19 11:15 Error from slot1@localhost: Docker job exhaused 128 Mb memory

Surprises with Docker Universe Condor_ssh_to_job doesn’t work Condor_chirp doesn’t work Suspend doesn’t work Can’t access NFS/shared filesystems Job not a child of the condor_starter: Request_disk doesn’t work resource usage is funky Networking is only NAT

Coming soon… Advertise images we already have Garbage collection of used images Report resource usage

Potential Features? Network support? Better than NAT? LARKy? Support for shared filesystems? Mapping other directories to containers? Get entire container diff back? Run containers as root? Mount fake /proc/cpuinfo and friends condor_ssh_to_job Automatic checkpoint and restart of containers!

Surprises with Docker Moving fast – bugs added/removed quickly 10 Gb limit on container growth Security concerns Adding new hub requires ssl cert on client Containers don’t nest by default Docker needs root – problem for glidein  No support for Windows/Mac/BSD or other Everyone shares a linux kernel The “init” problem

The “init” problem Or, “How come my docker job isn’t exiting” Docker process runs as pid 1 in pid namespace Linux blocks all unhandled catchable signals Soft kills usually don’t work shell wrapper fixes condor_pid_ns_init

Alternatives to docker RedHat: Rocket Systemd: nspawn

Summary THANK YOU! Docker universe coming to Condor Could be game-changing Very interested in user feedback THANK YOU!