First Steps Guide
After the server has booted the newly installed Qlustar OS, log in as root and start the post-install configuration process by running the command
0 root@cl-head ~ # /usr/sbin/qlustar-initial-config
This will first thoroughly check your network connectivity and then complete the installation by executing the remaining configuration steps as detailed below. During the package update process, you might be asked whether to keep locally modified configuration files. In this case always choose the option
keep the local version currently installed.
Remaining configuration steps run-through
If your chosen hostname can’t be resolved via DNS, you will see a non-fatal error message reminding you that the hostname should be registered in some (external) name service (typically DNS).
First, you will be asked for the name of the new cluster. This can be any string and is used in some places like the slurm or ganglia configuration.
Next is the setup of the LDAP infrastructure. Just enter the LDAP admin password when asked for it.
An ssh key for the root user is generated next. You can enter an optional pass-phrase for it. This key, will be used to enable login by root on the head-node to any net-boot node of the cluster without specifying a password.
Be aware, that having a non-empty pass-phrase means, that you will have to specify it any time you try to ssh to another host in the cluster. If you don’t want that, work without a pass-phrase.
The configuration of Nagios requires you to choose a password for the Nagios admin account. Please type in the password twice.
QluMan, the Qlustar management framework, requires a mysql (mariaDB) database. You will be asked for the password of the QluMan DB user next. After entering it, the QluMan database and configuration settings will be initialized. This can take a while, since a number of OS images and chroots (see Adding Software) will be generated during this step.
If HPC was selected as a package bundle during installation, slurm is installed as the cluster resource manager. Its configuration requires the generation of a munge key and the specification of a password for the slurm mysql account. Enter the chosen password twice when asked for it.
The slurm database daemon (slurmdbd) is also being configured by this process. Hence, you will be ready to take full advantage of the accounting features of slurm.
Configuring the virtual Demo Cluster
If you have chosen to setup some virtual demo nodes during installation, you will be asked for the user name of a test account that can be used to explore the cluster. Remember its password as printed on the screen.
Setting the MariaDB root password
To conclude the configuration procedure, you will be asked to set the password for the MariaDB/MySQL root account. Setting a password here is important. It prevents unauthorized access to the Qlustar or other databases on your head-node.
Reboot again once all the previous steps are complete by pressing Enter. After the head-node is up and running again, test its network connectivity by pinging its public IP address (hostname). Do the same for the virtual front-end node, if you have chosen to configure one. It should have booted as well, after the head-node is up and running. You can try to login to it using ssh.
A test mail should have been sent to the e-mail address(es) you specified during the
installation. If you didn’t receive one, review your settings in
/etc/postfix/main.cf. In case some of them are wrong, you can execute
0 root@cl-head ~ # dpkg-reconfigure postfix
to modify them.
If you have chosen to configure a virtual demo-cluster, you can start it by executing the command:
0 root@cl-head ~ # demo-system-start
and to stop it
0 root@cl-head ~ # demo-system-stop
These commands use the configuration file
/etc/qlustar/vm-configs/demo-system.conf. If you
find that the (automatically calculated) amount of RAM per VM is not right, you can change the
CN_MEM to some other value in that file. The consoles of the virtual nodes (and also
of the virtual front-end node if you chose to set one up) are accessible in a tmux
0 root@cl-head ~ # console-fe-vm
to attach to the console session of the virtual FE node and
0 root@cl-head ~ # console-demo-vms
to attach to the console sessions of the virtual demo cluster nodes. Note that the tmux command character is Ctrl-t. To detach from the tmux session, type Ctrl-t d, to switch to the next/previous window type Ctrl-t n / Ctrl-t p. More details on the usage of tmux is available in the corresponding man page. To check whether all nodes are up and running, type
0 root@cl-head ~ # dsh -a uptime
pdsh can be used to execute arbitrary commands on groups of nodes. Check their man
pages and the corresponding section in the QluMan guide for further information.
At this stage, the following services are configured and running on your head-node:
Nagios4 (monitoring/alerts) with its web interface at
<headnode>is the hostname of the head-node you have chosen during installation). You may login as user
nagiosadminwith the password you specified previously.
Ganglia (monitoring) at
DHCP/TFTP boot services and DNS name service provided by dnsmasq.
NTP time server as client and server
NFS server with exports defined in
Depending on your choice of software packages:
LDAP (slapd and sssd), Slurm (DB + control daemon), Corosync (HA), Munge (authentification for slurm), BeeGFS management daemon. Note that among the latter, only Slurm, Munge and BeeGFS are configured automatically during installation. Corosync requires a manual configuration.
Mail service Postfix
MariaDB server (MySQL fork)
QluMan server components (Qlustar Management)
You shouldn’t install the Ubuntu MySQL server packages on the head-node, since QluMan requires MariaDB and packages of the latter conflict with the MySQL packages. MariaDB is a complete and compatible substitute for MySQL.
As explained elsewhere, the RAM-based
root file-system of a Qlustar compute/storage node is typically supplemented by a global
NFS-exported chroot to allow access to software not already contained in the boot images
themselves. During installation, one chroot per
selected edge platform was automatically
created. The chroots are located at
/srv/apps/chroots/<chroot name>, where <chroot name> would
centos7. Each of them contains a full-featured installation of the
corresponding Qlustar edge platform. To change into a chroot, convenience bash shell aliases of
chroot-<chroot name> are defined for the root user on the head-node. You may use them
Example for Ubuntu/Focal, if it was selected at install
0 root@cl-head ~ # chroot-focal
Once you’re inside a chroot, you can use the standard Debian/Ubuntu tools to control its software packages, e.g.
(focal) 0 root@cl-head ~ # apt update (focal) 0 root@cl-head ~ # apt dist-upgrade (focal) 0 root@cl-head ~ # apt install package (focal) 0 root@cl-head ~ # exit
Example for CentOS 7, if it was selected at install
0 root@cl-head ~ # chroot-centos7
Once you’re inside a chroot, you can use the standard CentOS tools to control its software packages, e.g.
(centos7) 0 root@cl-head ~ # yum update (centos7) 0 root@cl-head ~ # yum install package (centos7) 0 root@cl-head ~ # exit
The Qlustar CentOS edge platform integrates four package sources via the corresponding yum
repository config files below
All four repositories are enabled per default, so you can easily install packages from any of them.
The nice thing about this overlay mechanism is that software from packages installed in a particular chroot will be available instantaneously on all compute/storage nodes that are configured to use that chroot.
Apart from the chroot, there is usually no need to install additional packages on the head-node itself, unless you want to add functionality specifically running just there. Be aware, that software packages installed directly on the head-node will not be visible cluster-wide.
The Qlustar management GUI qluman-qt uses public/private keys for both encryption and authentication of its connection with the QluMan server processes. For this to work, there needs to be an exchange of public keys between the GUI client and the QluMan server. Later, adding additional QluMan admin users and generating the required one-time login token can be done via the GUI. But for the first login of the default admin user, it must be accomplished using a root shell on the head-node as follows:
0 root@cl-head ~ # qluman-cli --gencert Generating one-time login token for user 'admin': Cluster = QL Hostname = beosrv-c Port = 6001 Pubkey = b'T)5o]@hsjB2qyY>eb:7)8@BA?idMf>kh%^cRhV/#' Enter new pin for one-time token: Server infos and one-time login token for user 'admin': ---[ CUT FROM HERE ]--- 00000191c2MAAcMuyCNQR0DPILx-y-BLCHpITepvG7R3I6452Cdqiu98u4PsM1VWFGqEAG V8YN9K5kyJKHtQHGTB1JqZIwt4q0PLArnyNmhCkGLS6VxWWBDtBB9_dGPqLH4OeQ7sZ725 6XDGgrKo4Dldc_wuCALegczjYV8oc_yZ07X0oIYlzhDlDpk-hTm5bfW8_x904YF0wcv-G- nK1ztRg854O7pC_p1YpEJuzWFqWv0e7ffi-ZgkxwfdGGKF3imp4d9yGY4h6Ixdn8TLG2gk Z4XQ4dymvSO9hp8mUabfq7prVUOTYeChB2pOrom8XSQxjOoe4Yll5yv6da_CdGq50KrO8Q C12Z4Pz2eSbvqXbo7c7DdLRjMc0v0Km3WyljgdsDYbKC5iT75Bgryc ---[ TO HERE ]---
The token can also be saved directly to a file using the
-o <filename> option. The user the
token is for can be specified by the
-u <username> option like this:
0 root@cl-head ~ # qluman-cli --gencert -u admin -o token Generating one-time login token for user 'admin': Cluster = QL Hostname = beosrv-c Port = 6001 Pubkey = b'T)5o]@hsjB2qyY>eb:7)8@BA?idMf>kh%^cRhV/#' Enter new pin for one-time token: Server infos and one-time login token for user 'admin' saved as 'token'
The server infos and one-time login token are protected by the pin you just entered. This is important when the data is sent via unencrypted channels (e.g. email or chat programs) to users or when it is stored on a shared filesystem like NFS. The pin does not need to be a strong password. It is only used to make it non-trivial to use an intercepted token.
The token can only be used once. So once you use it yourself, it becomes useless to anybody else. On the other hand, if somebody intercepts the token, guesses the pin and uses it for a connection, it will no longer work for you. If that happened, you’d know something went wrong.
Per default, the Qlustar management GUI qluman-qt is not installed on any node of the cluster. This is because the installation on the head-node (or a chroot) pulls and installs a lot of other packages that qluman-qt depends on, which will slow down updates. If you have the possibility, run qluman-qt on your workstation (see below) and work from there. If you really must have it available on the head-node, you may install it there like any other package:
0 root@cl-head ~ # apt install qluman-qt
Then you can launch it remotely on the head-node per ssh (with X11 forwarding enabled /
-X option) as follows:
0 user@workstation ~ $ ssh -X root@servername qluman-qt
This should bring up the GUI. Using the one-time token generated as explained above, you will now be able to add the cluster to the list of available connections.
Singularity container images with the QluMan GUI
are available on our Download page. They are the
recommended way to run qluman-qt. It makes it really easy to start the GUI as a non-root user
on any machine with Singularity installed (minimum Singularity version is 3.2 for QluMan 12
containers): Just download the desired version of the image, check its sha256sum, make it
executable and execute it (assuming you saved it as
0 user@workstation ~ $ sha256sum $HOME/qluman-220.127.116.11-singularity.sqsh 0 user@workstation ~ $ chmod 755 $HOME/qluman-18.104.22.168-singularity.sqsh 0 user@workstation ~ $ $HOME/qluman-22.214.171.124-singularity.sqsh
You can view the changelog of the QluMan version inside the container by executing the following command:
0 user@workstation ~ $ singularity exec $HOME/qluman-126.96.36.199-singularity.sqsh \ zless /usr/share/doc/qluman-qt-12/changelog.gz
The base version (e.g. 12.0.0) of the QluMan packages/containers on the workstation should be the same as on the head-node(s) to ensure correct operation. Some close unequal version combinations (e.g. 188.8.131.52 and 184.108.40.206) usually work too, but are not well tested.
Starting from Qlustar 12 adding users and groups can be conveniently done using the QluMan GUI. Please consult the corresponding section in the QluMan guide.
MPI (Message Passing Interface) is the de facto standard for distributed parallel programming on Linux clusters. The default MPI variant in Qlustar is OpenMPI and is automatically installed in the standard chroot during installation under Ubuntu and also under CentOS if OpenHPC has been selected.
You can test the correct installation of MPI with two small hello world test programs (one in C, the other one in FORTRAN90) as the test user you created earlier. The procedure is slightly different depending on whether you’re on Ubuntu or CentOS. Login on the front-end node as this test user and if on Ubuntu execute
0 testuser@cl-front ~ $ mpicc.openmpi-gcc -o hello-world-c hello-world.c 0 testuser@cl-front ~ $ mpif90.openmpi-gcc -o hello-world-f hello-world.f90
On CentOS, you need to activate the correct compiler and openmpi stack from OpenHPC first via the modules infrastructure. For CentOS 7 / OpenHPC 1.3.x execute
0 testuser@cl-front ~ $ module load openmpi3/3.1.4 gnu8/8.3.0
and for CentOS 8 / OpenHPC 2
0 testuser@cl-front ~ $ module load openmpi4/4.0.4
Then you can compile as follows
0 testuser@cl-front ~ $ mpicc -o hello-world-c hello-world.c 0 testuser@cl-front ~ $ mpif90 -o hello-world-f hello-world.f90
After this you should have created two executables. Check it with
0 testuser@cl-front ~ $ ls -l hello-world-?
Now you’re prepared to test the queuing system with these two programs.
Before running a multi-node MPI job via slurm on the demo nodes, the slurm config might need to be updated with the exact RAM values available to these nodes for slurm jobs. This is due to the fact that Qlustar nodes report their available RAM during the boot process to the qlumand on the head-node, and these values can be different to the ones originally assumed by the installer. To accomplish this, write the slurm config as explained here.
It is also possible, that the demo nodes will still be in the slurm state DRAINED after
this. To check and possibly change their state, use the
Slurm Node State
Management dialog of the QluMan GUI. If the nodes are indeed in state DRAINED, first restart
slurmd on the nodes and then undrain them using this dialog.
Once all this is done and the nodes are in state IDLE you can proceed. Still being logged in as the test user and assuming at least two demo nodes are started, you can submit the two hello world programs created previously to slurm as follows:
0 testuser@cl-front ~ $ salloc -N 2 --ntasks-per-node=2 --mem=20 -p demo srun hello-world-c
This will run the job interactively on 2 nodes with 2 processes each (total of 4 processes). You should obtain an output like this:
salloc: Granted job allocation 3 Hello world from process 1 of 4 Hello world from process 2 of 4 Hello world from process 3 of 4 Hello world from process 0 of 4 salloc: Relinquishing job allocation 3 salloc: Job allocation 3 has been revoked.
Similarly, the F90 version can be submitted as a batch job using the script
hello-world-f90-slurm.sh (to check the output, execute
cat slurm-<job#>.out after the job
0 testuser@cl-front ~ $ sbatch -N 2 --ntasks-per-node=2 --mem=20 -p demo hello-world-f90-slurm.sh
The Linpack benchmark is used to classify supercomputers in the Top 500 list. That’s why on most clusters, it’s probably run as one of the first parallel programs to check functionality, stability and performance. Qlustar comes with an optimized pre-compiled version of Linpack (using a current version of the OpenBlas library), and a script to auto-generate the necessary input file given the number of nodes, processes per node and total amount of RAM for the run.
The test user has some pre-defined shell aliases to simplify the submission of Linpack
alias to see what’s available. They are defined in
submission (assuming you have 4 running demo nodes):
0 testuser@cl-front ~ $ linp-4-demo-nodes
Check that the job is started (output should be similar):
0 testuser@cl-front ~ $ squeue JOBID PARTITION NAME USER ST TIME NODES NODELIST(REASON) 27 demo linstres test R 2:46 4 beo-[201-204]
Now ssh to one of the nodes in the NODELIST and check with
top that Linpack is running at
full steam, like:
0 testuser@beo-201 ~ $ top PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND 18307 test 20 0 354m 280m 2764 R 100 28.0 6:42.92 xhpl-openblas 18306 test 20 0 354m 294m 2764 R 99 29.3 6:45.09 xhpl-openblas
You can control the output of each Linpack run in the files:
<jobid> is the
slurm JOBID (see the
squeue command above) and
<run#> is an integer starting from 1. The
way the script is designed, it will run indefinitely, restarting Linpack in an infinite
loop. So to stop it, you need to cancel the job like
0 testuser@cl-front ~ $ scancel <jobid>