Base Users Guide

Total Page:16

File Type:pdf, Size:1020Kb

Base Users Guide Base Users Guide 7.0 Edition Base Users Guide: 7.0 Edition Published Dec 01 2017 Copyright © 2017 University of California This document is subject to the Rocks® License (see Rocks Copyright). Table of Contents Preface...................................................................................................................................................................vii 1. Overview.............................................................................................................................................................1 2. Attributes............................................................................................................................................................2 3. Installing a Rocks Cluster.................................................................................................................................5 3.1. Getting Started.........................................................................................................................................5 3.2. Rocks 7: Install and Configure Your Frontend........................................................................................6 3.3. Rocks 6: Install and Configure Your Frontend......................................................................................20 3.4. Install Your Compute Nodes.................................................................................................................34 3.5. Upgrade or Reconfigure Your Existing Frontend..................................................................................37 3.6. Installing a Frontend over the Network.................................................................................................41 3.7. Enabling Public Web Access to Your Frontend....................................................................................43 4. Defining and Modifying Networks and Network Interfaces........................................................................46 4.1. Networks, Subnets, VLANs and Interfaces...........................................................................................46 4.2. Named Networks/Subnets.....................................................................................................................46 4.3. Host Interfaces.......................................................................................................................................46 4.4. Virtual LANs (VLANs) and Logical VLAN Bridges...........................................................................47 4.5. Configuring IPMI interfaces..................................................................................................................49 4.6. Networking Configuration Examples....................................................................................................51 5. Customizing your Rocks Installation.............................................................................................................53 5.1. Adding Packages to Compute Nodes....................................................................................................53 5.2. Customizing Configuration of Compute Nodes....................................................................................54 5.3. Adding Applications to Compute Nodes..............................................................................................55 5.4. Configuring Additional Ethernet Interfaces..........................................................................................55 5.5. Compute Node Disk Partitioning..........................................................................................................56 5.6. Creating a Custom Kernel RPM............................................................................................................64 5.7. Enabling RSH on Compute Nodes........................................................................................................66 5.8. Hostbased vs. Key-base SSH Authentication........................................................................................66 5.9. Adding a New Appliance Type to the Cluster.......................................................................................67 5.10. Adding a Device Driver.......................................................................................................................69 5.11. Extending DNS...................................................................................................................................71 5.12. Changing the Root password...............................................................................................................71 5.13. The insert-ethers command line..........................................................................................................72 6. Community Resources.....................................................................................................................................74 6.1. Access to Rocks Source Code...............................................................................................................74 6.2. All Past Rocks Releases........................................................................................................................74 6.3. Email Discussion List............................................................................................................................74 7. Administration Examples................................................................................................................................76 7.1. Introduction to the Rocks Command Line............................................................................................76 7.2. Boot Order and PXE First.....................................................................................................................76 7.3. Support for PXE First............................................................................................................................77 7.4. Forcing a Re-install at Next PXE Boot.................................................................................................77 7.5. Inspecting and Changing PXE Behaviour.............................................................................................77 7.6. Working with and Modifying Network Configuration..........................................................................79 7.7. Reinstall All Compute Nodes with SGE...............................................................................................79 iii 8. Advanced Tasks................................................................................................................................................81 8.1. Managing the Firewall on the Cluster Nodes........................................................................................81 8.2. Enabling Two-Factor Authentication with Google Authenticator........................................................85 8.3. Flashing BIOS on Compute Nodes Using PXE....................................................................................92 8.4. Adding a Login Appliance to Your Cluster...........................................................................................93 8.5. Channel Bonding Interfaces..................................................................................................................94 8.6. Frontend Central Server........................................................................................................................95 8.7. Cross Kickstarting.................................................................................................................................95 8.8. Adding Kernel Boot Parameters............................................................................................................97 8.9. Controlling Bootloader Parameters.......................................................................................................99 8.10. System Update...................................................................................................................................100 8.11. Reconfigure a Cluster........................................................................................................................102 9. Command Reference.....................................................................................................................................105 9.1. No Commands Installed at BUILD.....................................................................................................105 A. Frequently Asked Questions........................................................................................................................106 A.1. Installation..........................................................................................................................................106 A.2. Configuration......................................................................................................................................108 A.3. System Administration.......................................................................................................................110 B. Release Notes.................................................................................................................................................112 B.1. Release 6.2 - changes from 6.1.1........................................................................................................112 B.2. Release
Recommended publications
  • Freenas® 11.0 User Guide
    FreeNAS® 11.0 User Guide June 2017 Edition FreeNAS® IS © 2011-2017 iXsystems FreeNAS® AND THE FreeNAS® LOGO ARE REGISTERED TRADEMARKS OF iXsystems FreeBSD® IS A REGISTERED TRADEMARK OF THE FreeBSD Foundation WRITTEN BY USERS OF THE FreeNAS® network-attached STORAGE OPERATING system. VERSION 11.0 CopYRIGHT © 2011-2017 iXsystems (https://www.ixsystems.com/) CONTENTS WELCOME....................................................1 TYPOGRAPHIC Conventions...........................................2 1 INTRODUCTION 3 1.1 NeW FeaturES IN 11.0..........................................3 1.2 HarDWARE Recommendations.....................................4 1.2.1 RAM...............................................5 1.2.2 The OperATING System DeVICE.................................5 1.2.3 StorAGE Disks AND ContrOLLERS.................................6 1.2.4 Network INTERFACES.......................................7 1.3 Getting Started WITH ZFS........................................8 2 INSTALLING AND UpgrADING 9 2.1 Getting FreeNAS® ............................................9 2.2 PrEPARING THE Media.......................................... 10 2.2.1 On FreeBSD OR Linux...................................... 10 2.2.2 On WindoWS.......................................... 11 2.2.3 On OS X............................................. 11 2.3 Performing THE INSTALLATION....................................... 12 2.4 INSTALLATION TROUBLESHOOTING...................................... 18 2.5 UpgrADING................................................ 19 2.5.1 Caveats:............................................
    [Show full text]
  • Working with DHCP in Oracle® Solaris 11.2
    ® Working With DHCP in Oracle Solaris 11.2 Part No: E36812 July 2014 Copyright © 1999, 2014, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT END USERS. Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. No other rights are granted to the U.S. Government. This software or hardware is developed for general use in a variety of information management applications.
    [Show full text]
  • Seminar HPC Trends Winter Term 2017/2018 New Operating System Concepts for High Performance Computing
    Seminar HPC Trends Winter Term 2017/2018 New Operating System Concepts for High Performance Computing Fabian Dreer Ludwig-Maximilians Universit¨atM¨unchen [email protected] January 2018 Abstract 1 The Impact of System Noise When using a traditional operating system kernel When running large-scale applications on clusters, in high performance computing applications, the the noise generated by the operating system can cache and interrupt system are under heavy load by greatly impact the overall performance. In order to e.g. system services for housekeeping tasks which is minimize overhead, new concepts for HPC OSs are also referred to as noise. The performance of the needed as a response to increasing complexity while application is notably reduced by this noise. still considering existing API compatibility. Even small delays from cache misses or interrupts can affect the overall performance of a large scale In this paper we study the design concepts of het- application. So called jitter even influences collec- erogeneous kernels using the example of mOS and tive communication regarding the synchronization, the approach of library operating systems by ex- which can either absorb or propagate the noise. ploring the architecture of Exokernel. We sum- Even though asynchronous communication has a marize architectural decisions, present a similar much higher probability to absorb the noise, it is project in each case, Interface for Heterogeneous not completely unaffected. Collective operations Kernels and Unikernels respectively, and show suffer the most from propagation of jitter especially benchmark results where possible. when implemented linearly. But it is hard to anal- yse noise and its propagation for collective oper- ations even for simple algorithms.
    [Show full text]
  • Java Cheat Sheet
    Java Cheat Sheet Mosh Hamedani Code with Mosh (codewithmosh.com) 1st Edition About this Cheat Sheet This cheat sheet includes the materials I’ve covered in my Java tutorial for Beginners on my YouTube channel: https://www.youtube.com/user/programmingwithmosh Both the YouTube tutorial and this cheat cover the core language constructs and they are not complete by any means. If you want to learn everything Java has to offer and become a Java expert, check out my Ultimate Java Mastery Series. https://codewithmosh.com/courses/the-ultimate-java-mastery-series About the Author Hi! My name is Mosh Hamedani. I’m a software engineer with two decades of experience and I’ve taught over three million people how to code or how to become a professional software engineer. It’s my mission to make software engineering simple and accessible to everyone. https://codewithmosh.com https://youtube.com/user/programmingwithmosh https://twitter.com/moshhamedani https://facebook.com/programmingwithmosh/ Basics ...................................................................6 Java Development Kit ..............................................................................6 Java Editions ............................................................................................6 How Java Code Gets Executed ................................................................6 Architecture of Java Applications ..........................................................6 5 Interesting Facts about Java ................................................................7
    [Show full text]
  • The Linux Device File-System
    The Linux Device File-System Richard Gooch EMC Corporation [email protected] Abstract 1 Introduction All Unix systems provide access to hardware via de- vice drivers. These drivers need to provide entry points for user-space applications and system tools to access the hardware. Following the \everything is a file” philosophy of Unix, these entry points are ex- posed in the file name-space, and are called \device The Device File-System (devfs) provides a power- special files” or \device nodes". ful new device management mechanism for Linux. Unlike other existing and proposed device manage- This paper discusses how these device nodes are cre- ment schemes, it is powerful, flexible, scalable and ated and managed in conventional Unix systems and efficient. the limitations this scheme imposes. An alternative mechanism is then presented. It is an alternative to conventional disc-based char- acter and block special devices. Kernel device drivers can register devices by name rather than de- vice numbers, and these device entries will appear in the file-system automatically. 1.1 Device numbers Devfs provides an immediate benefit to system ad- ministrators, as it implements a device naming scheme which is more convenient for large systems Conventional Unix systems have the concept of a (providing a topology-based name-space) and small \device number". Each instance of a driver and systems (via a device-class based name-space) alike. hardware component is assigned a unique device number. Within the kernel, this device number is Device driver authors can benefit from devfs by used to refer to the hardware and driver instance.
    [Show full text]
  • Pf3e Index.Pdf
    INDEX Note: Pages numbers followed by f, n, priority-based queues, 136–145 or t indicate figures, notes, and tables, match rule for queue assignment, respectively. 137–138 overview, 134–135 Symbols performance improvement, 136–137 # (hash mark), 13, 15 queuing for servers in DMZ, ! (logical NOT) operator, 42 142–144 setting up, 135–136 A on FreeBSD, 135–136 on NetBSD, 136 Acar, Can Erkin, 173 on OpenBSD, 135 ACK (acknowledgment) packets transitioning to priority and class-based bandwidth allocation, queuing system, 131–133 139–140 anchors, 35–36 HFSC algorithm, 124, 126, 142 authpf program, 61, 63 priority queues, 132, 137–138 listing current contents of, 92 two-priority configuration, loading rules into, 92 120–121, 120n1 manipulating contents, 92 adaptive.end value, 188 relayd daemon, 74 adaptive firewalls, 97–99 restructuring rule set with, 91–94 adaptive.start value, 188 tagging to help policy routing, 93 advbase parameter, 153–154 ancontrol command, 46n1 advskew parameter, 153–154, 158–159 antispoof tool, 27, 193–195, 194f aggressive value, 192 ARP balancing, 151, 157–158 ALTQ (alternate queuing) framework, atomic rule set load, 21 9, 133–145, 133n2 authpf program, 59–63, 60 basic concepts, 134 basic authenticating gateways, class-based bandwidth allocation, 60–62 139–140 public networks, 62–63 overview, 135 queue definition, 139–140 tying queues into rule set, 140 B handling unwanted traffic, 144–145 bandwidth operating system-based queue actual available, 142–143 assignments, 145 class-based allocation of, 139–140 overloading to
    [Show full text]
  • Install and Setup DHCP Service
    Install and setup DHCP Service Synopsis: DHCP or Dynamic Host Configuration Protocol allows for automatic management of IP addresses on your internal network. By providing DHCP on your LAN, you eliminate the bother of having to configure manually PCs, laptops, or smart phones. They will automatically get an IP address and be configured with default gateway and DNS server information. It is important that only one DHCP server be active on a network. So, check carefully any other network devices on your network, especially wireless Access Points, to be sure their DHCP service is disabled. I. Installation Log into the Freebsd system as root. (Assumes networking is already configured.) # # cd /usr/ports/net/isc-dhcp44-server && make install clean # II. Startup Configuration Enable DHCP daemon at startup and assign the internal LAN (sk0 in this project) interface; # # echo 'dhcpd_enable="YES"' >> /etc/rc.conf # echo 'dhcpd_ifaces="sk0"' >> /etc/rc.conf # III. Setup configuration file # # cd /usr/local/etc # If there is a dhcpd.conf file, rename it; # # mv dhcpd.conf dhcpd.conf.original # Copy the following text, modify for your personal use, and paste it into a new dhcpd.conf file. You will need to modify the subnet (i.e., your network zero) and mask, the IP pool range, the DNS server (in this case 8.8.8.8 is the Google DNS server), the domain name, the router/gateway and the broadcast address (i.e., your network 255). The settings shown assumes our LAN subnet will be the private range 192.168.1.0 to 192.168.1.255. This machine will have LAN address configured as 192.168.1.254 and will be the default gateway for the LAN network.
    [Show full text]
  • The Complete Freebsd
    The Complete FreeBSD® If you find errors in this book, please report them to Greg Lehey <grog@Free- BSD.org> for inclusion in the errata list. The Complete FreeBSD® Fourth Edition Tenth anniversary version, 24 February 2006 Greg Lehey The Complete FreeBSD® by Greg Lehey <[email protected]> Copyright © 1996, 1997, 1999, 2002, 2003, 2006 by Greg Lehey. This book is licensed under the Creative Commons “Attribution-NonCommercial-ShareAlike 2.5” license. The full text is located at http://creativecommons.org/licenses/by-nc-sa/2.5/legalcode. You are free: • to copy, distribute, display, and perform the work • to make derivative works under the following conditions: • Attribution. You must attribute the work in the manner specified by the author or licensor. • Noncommercial. You may not use this work for commercial purposes. This clause is modified from the original by the provision: You may use this book for commercial purposes if you pay me the sum of USD 20 per copy printed (whether sold or not). You must also agree to allow inspection of printing records and other material necessary to confirm the royalty sums. The purpose of this clause is to make it attractive to negotiate sensible royalties before printing. • Share Alike. If you alter, transform, or build upon this work, you may distribute the resulting work only under a license identical to this one. • For any reuse or distribution, you must make clear to others the license terms of this work. • Any of these conditions can be waived if you get permission from the copyright holder. Your fair use and other rights are in no way affected by the above.
    [Show full text]
  • The Saratoga Falcon the Saratoga Falcon 2 NEWS December 13, 2019 December 13, 2019 NEWS 3 Picturethis Maintenance, Green Team to Start Composting
    LIFESTYLE 9 SCHOOL SCOPE 12-13 SPORTS 19 Reporters Students Cultural Non-Profit discuss their explore art activities Organization U.S. Postage strangest in a STEM- connect PAID superstitions focused school students to Saratoga, CA Permit No. 41 and beliefs. environment. heritage. THE saratogafalconAN INDEPENDENT HIGH SCHOOL PUBLICATION Friday, December 13, 2019 Saratoga High School Saratoga, CA saratogafalcon.org Vol. 60, No. 6 Applying Mosh madness: admin to 30+ combats aggressive colleges UPHILL clustering at dances no longer BY SofiaJones ing. Eventually the dozens on & KavitaSundaram the dance floor began moshing even though administrators have unheard of Last Saturday, about 560 stu- banned it last year. dents walked into the Large Gym Moshing is an aggressive style BY SelenaLiu BATTLE and were greeted with of dance where partici- & KevinSze decorations that included pants push or slam into oversized white curtains, each other. It usually hap- After most early-decision and “It’s letting chandeliers, flashing pens in the center of a early-action college deadlines parents know, ‘I lights and gold and white crowd. Although deeply came and went on Nov. 1, many couches for the Roaring discouraged by the ad- seniors are now halfway com- know you were 20s themed Winter For- ministration, it has oc- plete with the college application mal. A photo booth with curred numerous times process and are finishing college great at physics, a silver sparkly backdrop in on-campus dances, essays for their regular decision but it doesn’t provided students with Torrens despite the physical harm schools. on-theme photo oppor- it can cause.
    [Show full text]
  • Minutes of 15-May-2021 Board Meeting on 05/15/2021 Summary of Matters Arising
    Seattle Pups and Handlers 15-May-2021 Board Meeting Take this opportunity to join your board of Dire ctors for SEA-PAH's monthly Board Me e ting and take an active role in your community. This is, hands-down, the BEST way to know what is curre ntly happe ning in the SEA-PAH community and to offe r your ide as and input for future plans and e ve nts! Important! since this me e ting will be using Goog le , ple ase take care to e dit your use rname to your liking PRIOR to joining the me e ting ! Who is our Board of Dire ctors? Click He re to me e t the m online ! This is a 18 + e ve nt Whe n 0 5/15/20 21 at 11:0 0 Location: Z oom, Z oom Confe re ncing Join via Z oom https://z oom.us/j/9 8 240 18 49 52? pwd=UjJXaW1FSjZ SNk9 6 Y29 sdVBCe jJz dz 0 9 (ID: 9 8 240 18 49 52) Chairpe rson Nig htcat Cat Minute take r Ste ve n Lokie Minutes 1. Meeting Called to Order Calle d to Orde r at 11:0 1a 2. Roll call Nig htcat Rosco Baus Yukon Ste ve n Lokie Care ssa *PupWinston 3. Approve of Aprils Meeting minuets https://docs.g oog le.com/document/d/1j89 g 8IoDejWeabyVnfeUwwyf6 GXq2raxZ Pok- vudxhc/edit# Rosco / Care ssa No discussion Yay 5 Decisio n Approve d 4 . Open floor to g uests None 5.
    [Show full text]
  • Cielo Computational Environment Usage Model
    Cielo Computational Environment Usage Model With Mappings to ACE Requirements for the General Availability User Environment Capabilities Release Version 1.1 Version 1.0: Bob Tomlinson, John Cerutti, Robert A. Ballance (Eds.) Version 1.1: Manuel Vigil, Jeffrey Johnson, Karen Haskell, Robert A. Ballance (Eds.) Prepared by the Alliance for Computing at Extreme Scale (ACES), a partnership of Los Alamos National Laboratory and Sandia National Laboratories. Approved for public release, unlimited dissemination LA-UR-12-24015 July 2012 Los Alamos National Laboratory Sandia National Laboratories Disclaimer Unless otherwise indicated, this information has been authored by an employee or employees of the Los Alamos National Security, LLC. (LANS), operator of the Los Alamos National Laboratory under Contract No. DE-AC52-06NA25396 with the U.S. Department of Energy. The U.S. Government has rights to use, reproduce, and distribute this information. The public may copy and use this information without charge, provided that this Notice and any statement of authorship are reproduced on all copies. Neither the Government nor LANS makes any warranty, express or implied, or assumes any liability or responsibility for the use of this information. Bob Tomlinson – Los Alamos National Laboratory John H. Cerutti – Los Alamos National Laboratory Robert A. Ballance – Sandia National Laboratories Karen H. Haskell – Sandia National Laboratories (Editors) Cray, LibSci, and PathScale are federally registered trademarks. Cray Apprentice2, Cray Apprentice2 Desktop, Cray C++ Compiling System, Cray Fortran Compiler, Cray Linux Environment, Cray SHMEM, Cray XE, Cray XE6, Cray XT, Cray XTm, Cray XT3, Cray XT4, Cray XT5, Cray XT5h, Cray XT5m, Cray XT6, Cray XT6m, CrayDoc, CrayPort, CRInform, Gemini, Libsci and UNICOS/lc are trademarks of Cray Inc.
    [Show full text]
  • Utilising Configuration Management Node Data for Network Infrastructure
    Aalto University School of Science Degree Programme in Computer Science and Engineering Lauri Tirkkonen Utilising configuration management node data for network infrastructure man- agement Master's Thesis Espoo, May 4, 2016 Supervisor: Professor Heikki Saikkonen Advisor: Jaakko Kotim¨akiM.Sc. (Tech.) Aalto University School of Science ABSTRACT OF Degree Programme in Computer Science and Engineering MASTER'S THESIS Author: Lauri Tirkkonen Title: Utilising configuration management node data for network infrastructure man- agement Date: May 4, 2016 Pages: 38 Major: Software Technology Code: T-106 Supervisor: Professor Heikki Saikkonen Advisor: Jaakko Kotim¨akiM.Sc. (Tech.) Configuration management software running on nodes solves problems such as configuration drift on the nodes themselves, but the necessary node configura- tion data can also be utilised in managing network infrastructure, for example to reduce configuration errors by facilitating node life cycle management. Many configuration management software systems depend on a working network, but we can utilise the data to create large parts of the network infrastructure config- uration itself using node data from the configuration management system before the nodes themselves are provisioned, as well as remove obsolete configuration as nodes are decommissioned. Keywords: configuration management, network infrastructure configura- tion, life cycle management Language: English 2 Aalto-yliopisto Perustieteiden korkeakoulu DIPLOMITYON¨ Tietotekniikan koulutusohjelma TIIVISTELMA¨ Tekij¨a: Lauri Tirkkonen
    [Show full text]