Skip to content

Latest commit

 

History

History
250 lines (186 loc) · 11.5 KB

README.md

File metadata and controls

250 lines (186 loc) · 11.5 KB

Slurm Singularity SPANK Plugin

Build DOI

The Singularity SPANK plugin provides the users with an interface to launch an application within a Linux container. The plug-in adds multiple command-line options to the salloc, srun and sbatch commands. These options are then propagated to a shell script slurm-singularity-wrapper.sh customizable by the cluster administrator. This plugin is compatible to both Apptainer 1 and SinguarityCE 2 (Sylabs Inc.) as container engine.

The Slurm SPANK plug-in mechanisms 3 dynamically modifies the runtime behavior of Slurm jobs:

SPANK provides a very generic interface for stackable plug-ins which may be used to dynamically modify the job launch code in Slurm. SPANK plugins may be built without access to Slurm source code. They need only be compiled against Slurm's spank.h 4 header file, added to the SPANK config file plugstack.conf, and they will be loaded at runtime during the next job launch.

Build

File Description
main.cpp Singularity SPANK plug-in source code

All SPANK plug-ins should be recompiled when upgrading Slurm to a new major release. 3

Build this plug-in using g++ from the GNU Compiler Collection (GCC) version 8 or newer. The plug-ins are compiled against the header file <slurm/spank.h>. Fedora distributes this file in the slurm-devel RPM package 5. CMake is available via the cmake package.

Choose a <build-dir> to configure and build the plugin:

cmake -S <source-dir> -B <build-dir> # configure
cmake --build <build-dir> # build the Singularity SPANK plug-in

You may customize the configure phase further via the following CMake options:

CMake option Default Description
--install-prefix <install-dir> /usr Equivalent to -DCMAKE_INSTALL_PREFIX=<install-dir>
-DINSTALL_PLUGSTACK_CONF=ON OFF Whether to install a plugin config file
-DSLURM_SYSCONFDIR=... /etc/slurm Slurm sysconfdir
-DSLURM_PLUGSTACK_CONF_D=... ${SLURM_SYSCONFDIR}/plugstack.conf.d Slurm plugstack conf dir
-DPLUGIN_DEFAULT_ARG=... "" Plugin default= arg
-DPLUGIN_BIND_ARG=... ${SLURM_SYSCONFDIR},/var/spool/slurm,/var/run/munge Plugin bind= arg
-DPLUGIN_EXTRA_ARGS=... "" Plugin args= arg
-DSLURM_INCLUDE_DIR=... Detected by CMake, typically /usr/include Slurm include dir passed to compiler via -I so #include <slurm/spank.h> resolves
-DCMAKE_INSTALL_LIBEXECDIR=... libexec on RHEL-based systems FHS "internal binaries" directory 6

Install

[sudo] cmake --install <build-dir>

sudo is needed to install to system directories like /usr.

By default, installation directories are chosen to be FSH-compliant 6 as implemented by the CMake "GNUInstallDirs" module 7.

Configuration

File Description
singularity-exec.conf Configuration file for the plug-in, add this to the plugstack.conf.d directory
slurm-singularity-wrapper.sh Script executed by plug-in to launch a Singularity container

Basic configuration to enable the plug-in:

# configure the plug-in mechanism to load configurations from a sub-directory
mkdir /etc/slurm/plugstack.conf.d
cat > /etc/slurm/plugstack.conf <<EOF
include /etc/slurm/plugstack.conf.d/*.conf'
EOF
# reference the path to the plug-in and the wrapper script
cat > /etc/slurm/plugstack.conf.d/singularity-exec.conf <<EOF
required /usr/lib64/slurm/singularity-exec.so default= script=/usr/libexec/slurm-singularity-wrapper.sh bind= args=disabled
EOF

Note that the configuration illustrated above will be deployed by make install. Modification to the plug-in configuration described below does not required a restart of slurmd:

Option Description
default=<path> Path to the Singularity container launched by default. If this is set user require to explicitly use an empty --singularity-container= option to prevent the start of a container.
script=<path> Path to the wrapper script which consumes the input arguments and environment variables set by the plugin to launch the Singularity container.
bind=<spec> List of paths to bind-mount into the container by default. Please reference the section about User-defined bind paths in the Singularity User Documentation 8.
args=<string> List of command-line arguments passed to singularity exec. Disable support for this feature by setting args=disabled. This will prompt an error for an unrecognized option if the user adds the --singularity-args= option. Use an empty string args="" to enable support for singularity arguments without a default configuration. Supply default for all users by adding a list of options i.e. args="--home /network/$USER"

Passing -DINSTALL_PLUGSTACK_CONF=ON to the CMake configure command will automate the above configuration.

Restart slurmd in order to load the plug-in after installation and configuration.

Usage

The plugin adds following command-line options to salloc, srun and sbatch:

Option Description
--singularity-container= Path to the Singularity container. Equivalent to using the environment variable SLURM_SINGULARITY_CONTAINER.
--singularity-bind= User-defined bind paths will be appended to the defaults specified in the plug-in configuration. Equivalent to using the environment variable SLURM_SINGULARITY_BIND.
--singularity-args= List of singulairy exec command-line arguments.
--singularity-no-bind-defaults Disable the bind mount defaults specified in the plug-in configuration.

The implementation of slurm-singularity-wrapper.sh adds additional environment variables:

Env. Variable Description
SLURM_SINGULARITY_DEBUG Set true to enable debugging output
SLURM_SINGULARITY_GLOBAL Optional global options to the singularity command

Following srun command use the options and environment variables described above:

SLURM_SINGULARITY_DEBUG=true SLURM_SINGULARITY_GLOBAL=--silent \
      srun --singularity-container=/tmp/debian10.sif \
           --singularity-bind=/srv \
           --singularity-args="--no-home" \
           -- /bin/grep -i pretty /etc/os-release

Executing it will generate output similar to:

Start Singularity container /tmp/debian10.sif
Debug: SLURM_SINGULARITY_CONTAINER=/tmp/debian10.sif
Debug: SLURM_SINGULARITY_ARGS=--no-home
Debug: SLURM_SINGULARITY_BIND=/etc/slurm,/var/run/munge,/var/spool/slurm
Debug: SLURM_SINGULARITY_GLOBAL=--silent
Debug: singularity --silent exec --bind=/etc/slurm,/var/run/munge,/var/spool/slurm,/srv --no-home /tmp/debian10.sif /bin/grep -i pretty /etc/os-release
PRETTY_NAME="Debian GNU/Linux 10 (buster)"

Similar use with the sbatch command:

cat > job.sh <<EOF
#!/usr/bin/env bash
#SBATCH --singularity-container /tmp/debian10.sif
#SBATCH --singularity-bind=/srv
#SBATCH --singularity-args="--no-home"
/bin/grep -i pretty /etc/os-release
EOF
SLURM_SINGULARITY_DEBUG=true SLURM_SINGULARITY_GLOBAL=--silent sbatch job.sh

RPM Packaging

While these packages are tailored to the GSI HPC Cluster environment, you may still find them interesting for reference or to fork from:

Development

Build the required singularity containers with the script containers.sh. (This requires the singularity command installed on the host). The containers generated by the script are stored under /tmp/*.sif.

Start a test environment using the included Vagrantfile:

  • Installs the apptainer package from Fedora EPEL
  • Copies the SIF container images to /tmp
  • Builds, installs and configures the Slurm Singularity plug-in

Start a Vagrant box to build an RPM package:

./containers.sh && vagrant up el8 && vagrant ssh el8 # for example...

# synced from the host
cd /vagrant

cmake -S . -B build # configure the project and choose a build dir
cmake --build build # build the Singularity SPANK plug-in
sudo cmake --install build # install the binary and configuration files

sudo systemctl enable --now munge slurmctld slurmd

License

Copyright © 2020-2024 GSI Helmholtzzentrum fuer Schwerionenforschung GmbH
                      Matthias Kretz <[email protected]>

This program is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.

This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
GNU General Public License for more details.

You should have received a copy of the GNU General Public License
along with this program.  If not, see <http://www.gnu.org/licenses/>.

References

Footnotes

  1. Apptainer, Linux Foundation https://apptainer.org

  2. SingularityCE, Sylabs Inc. https://sylabs.io

  3. SPANK - Slurm Plug-in Architecture https://slurm.schedmd.com/spank.html 2

  4. Slurm SPANK Header File https://github.com/SchedMD/slurm/blob/master/slurm/spank.h

  5. Fedora Slurm RPM Package https://src.fedoraproject.org/rpms/slurm

  6. Filesystem Hierarchy Standard https://refspecs.linuxfoundation.org/fhs.shtml 2

  7. CMake "GNUInstallDirs" module https://cmake.org/cmake/help/latest/module/GNUInstallDirs.html

  8. Apptainer Documentation https://apptainer.org/documentation