1 Setup a static PROOF cluster with PROOF on Demand
2 =================================================
7 Using PROOF on Demand is our current recommended way of running
a PROOF
8 cluster. The usage of PoD is in particular helpful
for the following
11 - **Sandboxing.** Each user
get their own personal PROOF cluster,
12 separated from the others:
a problem occurring on one personal
13 cluster does not affect the workflow of other users.
15 - **Easier administration and
self-servicing.**
A user can restart their
16 personal PROOF cluster in
case of troubles without waiting
for a
17 system administrator
's intervention.
19 - **Efficient multiuser scheduling.** PROOF on Demand makes PROOF run on
20 top of an existing resource management system, moving the problem of
21 scheduling many concurrent users outside of PROOF.
23 This guide particularly refers to the setup of a static PROOF cluster
24 running on physical hosts: the recommended setup is in practice the same
25 as the ready-to-go Virtual Analysis Facility. If you want to use PROOF
26 on the clouds there is no configuration to go through.
28 Setup a resource management system
29 ----------------------------------
31 Although PROOF on Demand can run on a cluster of nodes without using a
32 resource management system (using `pod-ssh`), it is recommended to setup a
33 dedicated one to benefit from the scheduling in a multiuser environment, or a
34 dedicated queue on an existing one.
36 As there's
a variety of resource management systems,
this guide does not cover
37 their setup. The
RMS preconfigured
for the Virtual Analysis Facility is
39 because it has dynamic addition of workers built in.
41 Configuration steps
for all nodes
42 ---------------------------------
47 on all machines
as the preferred method
for software distribution.
49 > Configuration instructions
for the latest CernVM-FS can be found
52 A brief step-by-step procedure to install CernVM-FS is hereby described.
54 - Download and install the latest stable version from
56 appropriate to your operating system. You need the `cvmfs` package,
57 you *don
't* need the `cvmfs-devel` or `cvmfs-server` ones.
63 - Start the `autofs` service: how to to this depends on your operating
66 On Ubuntu using Upstart:
70 On RHEL-based or older Ubuntus:
72 # service autofs restart
74 - Prepare a `/etc/cvmfs/default.local` file (create it if it does not
75 exists) with the following configuration bits:
78 CVMFS_HTTP_PROXY=http://your-proxy-server.domain.ch:3128,DIRECT
79 CVMFS_REPOSITORIES=your-experiment.cern.ch,sft.cern.ch
80 CVMFS_QUOTA_LIMIT=50000
83 You need to properly specify your closest HTTP caching proxy:
84 separate many of them via commas. The last fallback value, `DIRECT`,
85 tells cvmfs to connect directly without using any proxy at all.
87 Among the list of repositories (comma-separated), always specify
88 `sft.cern.ch` and the one containing the software to your experiment
89 (e.g., `cms.cern.ch`).
91 The quota limit is, in Megabytes, the amount of local disk space to
94 - Check the configuration and repositories with:
96 # cvmfs_config chksetup
99 Probing /cvmfs/cms.cern.ch... OK
100 Probing /cvmfs/sft.cern.ch... OK
102 > You might need special configurations for some custom software
103 > repositories! Special cases are not covered in this guide.
105 ### Firewall configuration
107 [PROOF on Demand](http://pod.gsi.de/) is very flexible in handling
108 various cases of network topologies. The best solution would be to allow
109 all TCP communications between the cluster machines.
111 No other incoming communication is required from the outside.
113 Configuration steps for the head node only
114 ------------------------------------------
116 ### Setup HTTPS+SSH (sshcertauth) authentication
118 > Latest recommended sshcertauth version is 0.8.5.
120 > [Download](https://github.com/dberzano/sshcertauth/archive/v0.8.5.zip)
122 > instructions](http://newton.ph.unito.it/~berzano/w/doku.php?id=proof:sshcertauth).
124 If you want your users to connect to the PROOF cluster using their Grid
125 user certificate and private key you might be interested in installing
126 sshcertauth. Please refer to the [installation
127 guide](http://newton.ph.unito.it/~berzano/w/doku.php?id=proof:sshcertauth)
128 for further information.
132 > Latest recommended PROOF on Demand version is 3.12.
134 > **On CernVM-FS:** `/cvmfs/sft.cern.ch/lcg/external/PoD/3.12`
136 > **Source code:** [PoD download page](http://pod.gsi.de/download.html)
138 > instructions](http://pod.gsi.de/doc/3.12/Installation.html)
140 [PROOF on Demand](http://pod.gsi.de/) is required on the head node and on the
143 In
case your experiment provides
a version of PoD on CernVM-FS you can use
144 that one. Experiment-independent versions are available from the PH-SFT
147 Only
if you have specific reasons
while you want to use
a customly built
148 PoD version, download the source code and compile it
using the
149 installation instructions.
151 Please note that [CMake](http:
154 - After you have built PoD, install it with:
158 - After installing PoD,
run:
162 This has to be done only once and downloads the binary packages that
163 will be dynamically transferred to the worker nodes
as binary
164 payload, and prevents us from installing PoD on each cluster node.
166 It is important to
do this step now, because in
case PoD has been
167 installed in
a directory where the user has no
write privileges,
as
168 in the
case of system-wide installations, the user won
't be able to
169 download those required packages in the PoD binary directory.
171 > There is no need to "configure" PoD for your specific cluster: it is
172 > just enough to install it on your head node.
174 > PoD does not have any system-wide persistent daemon running or any
175 > system-wide configuration to be performed. Also, no part of PoD will
176 > be ever run as root.
178 > Do not worry about environment or software configuration at this time:
179 > there is no system configuration for that. All the environment for
180 > your software dependencies will be set via proper scripts from the PoD
183 > PoD client configuration and running is properly covered in the
184 > appropriate manual page.
186 ### Firewall configuration
188 The head node only requires **TCP ports 22 (SSH) and 443 (HTTPS)** to accept
189 connections from the outside. Users will get an authentication "token"
190 from port 443 and all PROOF traffic will be automatically tunneled in a
191 SSH connection on port 22 by PoD.
193 In case you are not using the HTTPS+SSH token+authentication method, access to
194 the sole port 22 is all you need.
double write(int n, const std::string &file_name, const std::string &vector_type, int compress=0)
writing
constexpr std::array< decltype(std::declval< F >)(std::declval< int >))), N > make(F f)
Double_t RMS(Long64_t n, const T *a, const Double_t *w=0)
void run(bool only_compile=false)