File: using-annex-first-time.rst

package info (click to toggle)
condor 25.7.2%2Bdfsg-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 60,272 kB
  • sloc: cpp: 524,592; perl: 81,285; python: 56,681; ansic: 29,537; sh: 11,460; javascript: 4,024; ada: 2,319; java: 619; xml: 613; makefile: 583; awk: 281; yacc: 78; csh: 16
file content (168 lines) | stat: -rw-r--r-- 7,584 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
Using EC2 with ``htcondor annex`` for the First Time
====================================================

Using :tool:`htcondor annex` with AWS' EC2 requires authenticating to EC2.
If you're running `htcondor annex` from an EC2 instance, you can use
instance credentials; otherwise, you'll need to obtain an access key and
its corresponding secret key.

Using Instance Credentials
''''''''''''''''''''''''''

If you will not be running :tool:`htcondor annex` on an EC2 instance, skip
to `Obtaining an Access Key`_.

When you start an instance on EC2 [1]_, you can grant it some of your AWS
privileges, for instance, for starting instances.  This (usually) means that
any user logged into the instance can, for instance, start instances (as
you).  A given collection of privileges is called an "instance profile"; a
full description of them is outside the scope of this document.  If, however,
you'll be the only person who can log into the instance you're creating and
on which you will be running :tool:`htcondor annex`, it may be simpler to start an
instance with your privileges than to deal with `Obtaining an Access Key`_.

You will need a privileged instance profile; if you don't already have one,
you will only need to create it once.  When launching an instance with
the `EC2 console <https://console.aws.amazon.com/ec2/>`_, step 3
(labelled 'Configure Instance Details') includes an entry for 'IAM role';
the AWS web interface creates the corresponding instance profile for you
automatically.  If you've already created a privileged role, select it here
and carry on launching your instance as usual.  If you haven't:

#. Follow the 'Create new IAM role' link.
#. Click the 'Create Role' button.
#. Select 'EC2' under "the service that will use this role".
#. Click the 'Next: Permissions' button.
#. Select 'Administrator Access' and click the 'Next: Tags' button.
#. Click the 'Next: Review' button.
#. Enter a role name; 'HTCondorAnnexRole' is fine.
#. Click the 'Create role' button.

When you switch back to the previous tab, you may need to click the circular
arrow (refresh) icon before you can select the role name you entered in the
second-to-last step.

If you'd like step-by-step instructions for creating a HTCondor-in-the-Cloud,
see :ref:`condor_in_the_cloud`.

You can skip to :ref:`configure_condor_annex` once you've completed these steps.

.. _obtain_an_access_key:

Obtaining an Access Key
'''''''''''''''''''''''

In order to use AWS, :tool:`htcondor annex` needs a pair of security tokens
(like a user name and password). Like a user name, the "access key" is
(more or less) public information; the corresponding "secret key" is
like a password and must be kept a secret. To help keep both halves
secret, :tool:`htcondor annex` (and HTCondor) are never told these keys
directly; instead, you tell HTCondor which file to look in to find each
one.

Create those two files now; we'll tell you how to fill them in shortly.
By convention, these files exist in your ``~/.condor`` directory, which is
where ``htcondor annex setup`` will store the rest of the data it needs.

.. code-block:: console

    $ mkdir ~/.condor
    $ cd ~/.condor
    $ touch publicKeyFile privateKeyFile
    $ chmod 600 publicKeyFile privateKeyFile

The last command ensures that only you can read or write to those files.

To download a new pair of security tokens for :tool:`htcondor annex` to use,
go to the IAM console at the following URL; log in if you need to:

`https://console.aws.amazon.com/iam/home?region=us-east-1#/users <https://console.aws.amazon.com/iam/home?region=us-east-1#/users>`_

The following instructions assume you are logged in as a user with the
privilege to create new users. (The 'root' user for any account has this
privilege; other accounts may as well.)  If you don't have this privilege,
ask your AWS/EC2 administrator for help.

#. Click the "Add User" button.
#. Enter name in the **User name** box; "annex-user" is a fine choice.
#. Click the check box labelled "Programmatic access".
#. Click the button labelled "Next: Permissions".
#. Select "Attach existing policies directly".
#. Type "AdministratorAccess" in the box labelled "Filter".
#. Click the check box on the single line that will appear below
   (labelled "AdministratorAccess").
#. Click the "Next: review" button (you may need to scroll down).
#. Click the "Create user" button.
#. From the line labelled "annex-user", copy the value in the column
   labelled "Access key ID" to the file publicKeyFile.
#. On the line labelled "annex-user", click the "Show" link in the
   column labelled "Secret access key"; copy the revealed value to the
   file privateKeyFile.
#. Hit the "Close" button.

The 'annex-user' now has full privileges to your account.

.. _configure_condor_annex:

Configure ``htcondor annex``
''''''''''''''''''''''''''''

The following command will setup your AWS account. It will create a
number of persistent components, none of which will cost you anything to
keep around. These components can take quite some time to create;
:tool:`htcondor annex` checks each for completion every ten seconds and prints
an additional dot (past the first three) when it does so, to let you
know that everything's still working.

.. code-block:: console

    $ htcondor annex setup
    Creating configuration bucket (this takes less than a minute)....... complete.
    Creating Lambda functions (this takes about a minute)........ complete.
    Creating instance profile (this takes about two minutes)................... complete.
    Creating security group (this takes less than a minute)..... complete.
    Setup successful.

Checking the Setup
''''''''''''''''''

You can verify at this point (or any later time) that the setup
procedure completed successfully by running the following command.

.. code-block:: console

    $ htcondor annex checksetup
    Checking for configuration bucket... OK.
    Checking for Lambda functions... OK.
    Checking for instance profile... OK.
    Checking for security group... OK.

You're ready to run :tool:`htcondor annex`!

Undoing the Setup Command
'''''''''''''''''''''''''

There is not as yet a way to undo the setup command automatically, but
it won't cost you anything extra to leave your account setup for
:tool:`htcondor annex` indefinitely. If, however, you want to be tidy, you may
delete the components setup created by going to the CloudFormation
console at the following URL and deleting the entries whose names begin
with 'HTCondorAnnex-':

`https://console.aws.amazon.com/cloudformation/home?region=us-east-1#/stacks?filter=active <https://console.aws.amazon.com/cloudformation/home?region=us-east-1#/stacks?filter=active>`_

The setup procedure also creates an SSH key pair which may be useful
for debugging; the private key was stored in
~/.condor/HTCondorAnnex-KeyPair.pem. To remove the corresponding public
key from your AWS account, go to the key pair console at the following
URL and delete the 'HTCondorAnnex-KeyPair' key:

`https://console.aws.amazon.com/ec2/v2/home?region=us-east-1#KeyPairs:sort=keyName <https://console.aws.amazon.com/ec2/v2/home?region=us-east-1#KeyPairs:sort=keyName>`_

.. rubric:: Footnotes

.. [1] You may assign an instance profile to an EC2 instance when you launch it,
   or at any subsequent time, through the AWS web console (or other interfaces
   with which you may be familiar). If you start the instance using HTCondor's
   EC2 universe, you may specify the IAM instance profile with the
   :subcom:`ec2_iam_profile_name` or :subcom:`ec2_iam_profile_arn` submit commands.