v2.3.0.0 Old Integrating with LSF
The following manual steps will soon be updated with a simplified workflow for command line users and alternatively, the Mangement Console (Web UI) will be able to replace most of these steps, as well.
Connect to Your LSF Head Node
To integrate Infrastructure Optimizer to your LSF cluster we need to update the configuration and add assets to perform the integration tasks. To complete this root or sudo access on the LSF Master node is required.
Get a shell on the head node and navigate to the LSF_RC_CONF_DIR directory.
cd $LSF_RC_CONF_DIR
Make subdirectories here:
mkdir -p exostellar/json cd exostellar/json
Pull Down the Default LSF Environment Assets as a JSON Payload:
The packages for
jq
andcurl
are required:yum install -y jq curl
CentOS EoL: You may need to ensure yum can still function due to recent End of Life cycle from RedHat for CentOS 7. The following command is an exmple mitigation for an internet-dependent yum repository:
Pull down from the MGMT_SERVER default assets for customization:
The asset will look like:
Edit the LSF Environment JSON for Your Purposes:
Copy
default-lsf-env.json
to something convenient likeenv0.json
.Note Line numbers listed below reference the collapsible example file above. Once changes start being made on the system, the line numbers may change.
Line 2 :
"EnvName"
is set tolsf
by default, but you can specify something unique if needed.NOTE: Currently,
-
characters are not supported in values forEnvName
.
Lines 5-17 can be modified for a single pool of identical compute resources or they can be duplicated and then modified for each “hardware” configuration or “pool” you choose. When duplicating, be sure to add a comma after the brace on line 17, except when it is the last brace, or the final pool declaration.
PoolName
: This will be the apparent hostnames of the compute resources provided for LSF.It is recommended that all pools share a common trunk or base in each
PoolName
.
PoolSize
: This is the maximum number of these compute resources.ProfileName
: This is the default profile name,az1
: If this is changed, you will need to carry the change forward.CPUs
: This is the targeted CPU-core limit for this "hardware" configuration or pool.ImageName
: This is tied to the AMI that will be used for your compute resources. This name will be used in subsequent steps.MaxMemory
: This is the targeted memory limit for this "hardware" configuration or pool.MinMemory
: reserved for future use; can be ignored currently.UserData
: This string is a base64 encoded version of user_data.To generate it:
cat user_data.sh | base64 -w 0
To decode it:
echo "<LongBase64EncodedString>" | base64 -d
It’s not required to be perfectly fine-tuned at this stage; it will be refined and corrected later.
Example
user_data.sh
:
VolumeSize: reserved for future use; can be ignored currently.
All other fields/lines in this asset can be ignored currently.
Validate and Push the Customized Environment to the MGMT_SERVER
Validate the JSON asset with
jq
:You will see well-formatted JSON if
jq
can read the file, indicating no errors. If you see an error message, that means the JSON is not valid.
When the JSON is valid, the file can be pushed to the MGMT_SERVER:
Pull Down the Default Profile Assets as a JSON Payload:
The default is named
az1
.Copy it to faciliatate customization, leaving the default for future reference.
The asset will look like this:
Edit the Profile JSON for Your Purposes:
Tagging instances created by the backend is controlled by two sections, depending on the function of the asset:
Controllers are On-Demand instances that manage other instances. By default, they are tagged as seen on lines 6-9, above, and 1-4 below.
To add additional tags, duplicate lines 1-4 as 5-8 below (as many times as you need), noting that an additional comma is added on line 4.
Don’t forget the comma between tags.
Workers will be created by Controllers as needed and they can be On-Demand/Reserved instances or EC2 Spot. By default, they are tagged as seen on lines 26-30, above, and 1-4 below:
Add as many tags as needed.
Don’t forget the comma between tags.
Note Line numbers listed below reference the collapsible example file above. Once changes start being made on the system, the line numbers may change.
Line 11 -
InstanceType
: Controllers do not generally require large instances.In terms of performance, these On-Demand Instances can be set as
c5.xlarge
orm5.xlarge
with no adverse effect.
Line 20 -
MaxControllers
: This will define an upper bound for your configuration.Each controller will manage upto 80 workers.
The default upper bound is 800 nodes joining your production cluster: notice line 20
"MaxControllers": 10,
.If you plan to autoscale past 800 nodes joining your production cluster,
MaxControllers
should be increased.If you want to lower that upper bound,
MaxControllers
should be decreased.
Line 21 -
ProfileName
: This is used for your logical tracking, in the event you configure multiple profiles.Lines 31-34 -
InstanceTypes
here in the Worker section, this refers to On-Demand instances – if there is no EC2 Spot availability, what instances do you want to run on.Lines 38-43 -
SpotFleetTypes
: here in the Worker section, this refers to EC2 Spot instance types – because of the discounts, you may be comfortable with a much broader range of instance types.More types and families here, means more opportunities for cost optimization.
Priorities can be managed by appending a
:
and an integer, e.g.m5:1
is a higher priority thanc5:0
.
Line 48 -
EnableHyperthreading
: Settrue
for hyperthreaded cores andfalse
to disable hyperthreading.Line 49 -
EnableBalloon
: This will always be set to true. It increases migration efficiency. Setting to false may be useful in a troubleshooting scenario, but is not recommended under normal cicrcumstances.Line 52 -
NodeGroupName
: This string appears in Controller Name tagging <profile>-NGN-countAll other field/lines can be ignored in the asset.
Validate and Push the Customized Profile to the MGMT_SERVER
Validate the profile with the quick
jq
test.Push the changes live.
Download Scheduler Assets from the Management Server
If the EnvName was changed (above in Edit the LSF Environment JSON for Your Purposes - Step 2 ), then the following command can be used with your CustomEnvironmentName
:
Unpack them into the exostellar
folder:
Ensure lsb.modules is prepared for Resource Connector
schmod_demand
plugin must be enabled in${LSF_TOP}/conf/lsbatch/<cluster-name>/configdir/lsb.modules
.
Add New Queue and Resource Definitions to LSF for Resource Connector
Add a new queue to
lsb.queues
:
Insert a Queue Declaration as in the collapsible example above.
NOTE: The
xiohost
strings are required in the queue declaration: this is not modifiable.
Add resources to the Resource Definitions in
${LSF_TOP}/conf/lsf.shared:
Resource Connector leverages
xiohost
,rc_account
, andtemplateID
when provisioning compute capacity.NOTE: The
xiohost
string required in this file; this is not modifiable.
Add Required Lines to lsf.conf
You might find that adding these settings to
lsf.conf
faciliates reading output fromlshosts
andbhosts
commands. Note: this is optional and the changes may have unintended consequences in your environment.The values assigned for variables with
TIME
andDELAY
may be tuned for the best timing scenario of your cluster and assets. The LSF Admin may opt for different timing than above.
NOTE: When adding a new provider to an already functioning Resource Connector, the LSB_RC_EXTERNAL_HOST_FLAG
variable takes white-space separated strings, so line 3 from the above might be changed as follows when the awshost provider is already configured:
LSB_RC_EXTERNAL_HOST_FLGAG="awshost xiohost"
Update the Host Providers for Resource Connector
${LSF_TOP}/10.1/resource_connector
and ${LSF_TOP}/conf/resource_connector
folders appear very similar and can be a source of confusion. This tutorial has focused on a fully patched (fix pack 14) LSF 10.1 installation. Exostellar assets were downloaded into ${LSF_TOP}/10.1/resource_connector/exostellar
.
Both locations, under 10.1
or under conf
, may contain a hostProviders.json
. To simplify and reduce confusion, you may want to consider linking them:
The hostProviders.json
needs an entry for any host providers Resource Connector will make available to LSF. An Exostellar-only example will look like this:
and an example for both AWS and Exostellar providers in Resrouce Connector:
Python Dependencies
Install required python components: yum -y install python3 python3-requests
Restart Select Services on the LSF Master
Following directions from the files modified:
Validate configuration changes with several additional commands:
Verify your new queue exists:
You should see the queue you defined in the list of available queues.
Verify Resource Connector’s xioProvider has templates available for job run:
Resource Connector cycles every 30 seconds by default, and this command may need to be rerun after 30 seconds.
You should now see as many templates defined in the output as
PoolNames
were configured in earlier steps.
LSF and Resource Connector are now configured for use with Exostellar’s Infrastructure Optimizer.
Compute AMI Import
During Prepping the LSF Integration an AMI for compute nodes was identified or created. This step will import that AMI into Infrastructure Optimizer. Ideally, this AMI is capable of booting quickly.
Note: If SELINUX is not already disabled in the target AMI, it will need to be disabled. Step 5. below offers a script argument to make the change.
The AMI-ID should be based on a LSF compute node from your cluster, capable of running your workloads.
The AMI should be created by this account.
The AMI should not have product codes.
The Image Name was specified in the environment set up previously and will be used in this command.
Additionally, we can pass
-s script.sh
if troubleshooting is required.
Validation of Migratable VM Joined to Your LSF Cluster
The script test_createVm.sh
exists for a quick validation that new compute resources can successfully connect and register with the scheduler.
The hostname specified with
-h xvm0
is arbitrary.The Image Name specified with
-i <IMAGE_NAME>
should correspond to the Image Name from theparse_helper.sh
command and the environment setup earlier.The
-u user_data.sh
is available for any customization that may be required: temporarily changing a password to faciliate logging in, for example.The
test_createVm.sh
script will continuously output updates until the VM is created. When the VM is ready, the script will exit and you’ll see all the fields in the output are now filled with values:With the
Vm IP
above,ssh
to the node and to inspect the compute node. This step is meant to provide a migratable VM so that sanity checking may occur:Have network mounts appeared as expected?
Is authentication working as intended?
What commands are required to finish bootstrapping?
Et cetera.
Iterate and validate as many times as required to satisfy all requirements.
Lastly, LSF services should be started at the end of bootstrapping.
It may take 5 minutes or longer for the LSF services to register with the LSF Master Host.
When the RC Execution Host is properly registered, it will be visible via the
lshost
command.
To remove this temporary VM:
Replace VM_NAME with the name of the VM ,
-h xvm0
example above.
When totally satisfied, place final versions of the
user_data
scripts in the${LSF_RC_CONF_DIR}/exostellar/conf
directory.There needs to be a per-pool
user_data
script in that folder. It can be overwritten at any time a change is needed and the next time a node is instantiated from that pool, the node will get the changes.A common scenario is that all the
user_data
scripts are identical, but it could be beneficial for different pools to have differentuser_data
bootstrapping assets. If they are identical, links can be placed in the${LSF_RC_CONF_DIR}/exostellar/conf
directory instead of individual files.The auto-generated
user_data
scripts are initially located in${LSF_RC_CONF_DIR}/exostellar/scripts
. After copying them to${LSF_RC_CONF_DIR}/exostellar/conf
and modifying them, be sure to set their permissions so LSF can use them, e.g.:
Validate Integration with LSF
Integration steps are complete and a job submission to the new queue is the last validation:
As a user, navigate to a valid job submission directory and launch a job as normal, but be sure to specifiy the new queue:
bsub -q xio < job-script.sh
Â