Skip to content

Work in progress: temporary Spark course environment in CSC's cPouta

License

Notifications You must be signed in to change notification settings

tourunen/pouta-spark-course

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

56 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Pouta Spark Course example

Work in progress

Overview

This repository is an example of how to setup a temporary course environment with Apache Spark and Jupyter notebooks in CSC's cPouta environment.

Software and technologies used

The procedure will use:

  • Ansible for setting up and configuring a basic cluster with one master and multiple slaves.
  • Apache Ambari to set up Hortonworks Data Platform
  • Docker and tmpnb to serve Jupyter notebooks for the students

Prerequisites

To use CSC cPouta cloud environment you will need

  • credentials for Pouta
  • basic knowledge of Pouta and OpenStack

See https://research.csc.fi/pouta-user-guide for details

Depending on your needs, you may need to apply for more resources in your cPouta project.

What will be deployed

The system will consist of the following VMs:

  • bastion
  • cluster-master
  • cluster-node-[1..n]
  • cluster-notebook

bastion

  • acts as a ssh jump host

cluster-master

  • runs Ambari
  • runs HDP master processes (HDFS, MapReduce, YARN, Monitoring)
  • will have a volume (=persistent storage) mounted on /hadoop

cluster-nodes

  • run HDFS storage
  • run MapReduce and YARN workers
  • will have a volume mounted on /hadoop

cluster-notebook

  • will run Docker
  • will run tmpfs for orchestrating on-demand notebooks
  • has a volume configured for Docker storage as thin-provisioned LVM pool

Public IPs (floating IPs in OpenStack) are assigned to bastion and cluster-notebook. Cluster master and nodes are accessed only internally, through bastion.

All VMs will the default CentOS 7 image provided by CSC.

Security implications, recommendations and shortcomings

  • If possible, limit the IP range where the notebooks can be accessed. A denial of service by continuously claiming all notebooks in the pool is trivial
  • The notebooks will share the same account in Spark and HDFS, so the users need to be trusted to behave.
  • A misbehaving user can hog all the resources in the cluster
  • You must protect Ambari admin account with a proper password, the notebooks have network access to it
  • When the event is done, tear the resources down (with the possible exclusion of bastion)
  • Keep a keen eye on the resources while they are active

Step 0: Set up a bastion host

NOTE: This whole step (Step 0) has to be done only once!

http://en.wikipedia.org/wiki/Bastion_host

In case you don't have a readily available host for running OpenStack command line tools and Ansible, you can set one up in your cPouta project through https://pouta.csc.fi

Log into https://pouta.csc.fi

If you are member of multiple projects, select the desired one from the drop down list on top left

Create a new security group called, for example, 'bastion'

  • go to Access and Security -> Security groups -> Create Security Group
  • add rules to allow ssh for yourself and other admins
  • normal users do not need to access this hosts
  • keep the access list as small as possible to minimize exposure

Create an access key if you don't already have one

  • go to Access and Security -> Keypairs -> Create/Import Keypair

Boot a new VM from the latest CentOS 7 image that is provided by CSC

  • go to Instances -> Launch Instance
  • pick a name for the VM, for example 'bastion'
  • Flavor: mini
  • Instance boot source: Image
  • Image Name: Latest public Centos image (CentOS-7.0 at the time of writing)
  • Keypair: select your key
  • Security Groups: select default and bastion
  • Network: select the desired network (you probably only have one, which is the default)
  • Launch

Associate a floating IP (allocate one for the project if you don't already have a spare)

Log in to the bastion host with ssh as cloud-user

ssh cloud-user@86.50.1XX.XXX:

Install dependencies and otherwise useful packages

sudo yum install -y \
    dstat lsof bash-completion time tmux git xauth \
    screen nano vim bind-utils nmap-ncat git \
    xauth firefox \
    centos-release-openstack python-novaclient \
    python-devel python-setuptools python-virtualenvwrapper \
    libffi-devel openssl-devel

sudo yum groupinstall -y "Development Tools"

update the system and reboot to bring the host up to date. Bonus: virtualenvwrapper gets activated

sudo yum update -y && sudo reboot

Step 1: Set up the virtual cluster

In this step we launch VMs in our cPouta project and configure them to act as a basis for a simple cluster. You can run this on your management host, be it the bastion or your laptop.

Enable / Check if you already have a virtualenv by workon ansible. If yes, then skip this section.

Make a python virtualenv called 'ansible2' and populate it

mkvirtualenv ansible2
pip install "ansible>=2.0.1" shade dnspython funcsigs functools32

Source your OpenStack cPouta access credentials (actual filename will vary)::

source ~/openrc.sh
nova image-list

Create a new key for the cluster (adapt the name) and upload it to OpenStack (NOTE: Only to be done if doing it for the first time!)

ssh-keygen -f ~/.ssh/id_rsa_mycluster
nova keypair-add --pub-key ~/.ssh/id_rsa_mycluster.pub my_key

Clone this example repo

git clone https://github.com/tourunen/pouta-spark-course.git

Disable ssh host key checking (http://docs.ansible.com/ansible/intro_getting_started.html#host-key-checking). Add an entry for all the hosts in your cPouta subnet. Use ip command to figure out your network address range.

ip a

vi ~/.ssh/config

Host 192.168.1.*

    StrictHostKeyChecking no

Change the permissions on the config file

chmod 600 ~/.ssh/config

Now there are 2 ways of modifying the configurations and then setting up the cluster:

a. Examine pouta-spark-course/playbooks/cluster.yml, and edit to taste. And run:

ansible-playbook -v pouta-spark-course/playbooks/cluster.yml

OR

b. Or override the variables in the command line, like in the example below and run:

ansible-playbook -v \
    -e cluster_name=my-hdp -e ssh_key=my_key -e bastion_secgroup=bastion \
    -e num_nodes=3 -e master_flavor=small -e node_flavor=small \
    pouta-spark-course/playbooks/cluster.yml

Step 2: Install HDP with Ambari

Next we need to access the Ambari web interface to install HDP. There are a few options for this.

Option 1. You can open a SOCKS proxy tunnel through bastion host with

ssh -D 9999 cloud-user@<your-bastion-public-ip>

If you get this warning (even though you manage to login to bastion) bind: Cannot assign requested address, then please use the following command instead (which forces the SSH mechanism to use ipv4)

ssh -4 -D 9999 cloud-user@<your-bastion-public-ip>

and then configure your (secondary) browser to use localhost:9999 as a SOCKS proxy server in proxy settings

Option 2. You can open the browser itself on the bastion host, and make use of X forwarding.

ssh -Y cloud-user@<your-bastion-public-ip> firefox --no-remote

After setting up either forwarding option, navigate to http://<private-ip-of-the-cluster-master>:8080

Login to the Ambari dashboard using default credentials

username: admin
password: admin

Change the default password right away by selecting User + Group Management -> Users -> admin -> Change Password.

Login to your cluster master by using the internal IP of cluster master (Check Openstack UI). Copy the auto-generated SSH Private Key, which we will use in the following section.

cat ~/.ssh/id_rsa

On the Ambari dashboard click 'Launch Install Wizard'

  1. Getting Started : Name your cluster (We won't use this name in the following instructions. We will use the name defined earlier when ran cluster setup from bastion host)
  2. Select Stack : Choose the latest HDP version (i.e. 2.3)
  3. Install Options :
  • Target Hosts : Write down the following configuration
<your-cluster-name>-master.novalocal
<your-cluster-name>-notebook.novalocal
<your-cluster-name>-node-[1-<num_nodes-defined-by-you>].novalocal
  • Host Registration Information : Paste the SSH Private Key from the cluster (Discussed earlier), including BEGIN and END lines.
  • SSH User Account: cloud-user
  1. Choose Services : Just select HDFS, Yarn + MapReduce2, Zookeeper, Ambari Metrics and Spark. Uncheck every other option.
  2. Assign Masters: Move every component to cluster master. Remove extra zookeepers
  3. Assign Slaves and Clients :
  • Check Client for master and notebook.
  • Check DataNode and NodeManager for the nodes (excluding master and notebook)
  1. Customize Services : Change to the specified tabs
  • Spark : Go to 'Advanced spark-env' -> 'spark-env template' and replace export JAVA_HOME={{java_home}} by #export JAVA_HOME={{java_home}}

    Now Go to custom-spark-defaults section and click on add property for each of these entries (each entry has a 'key' and corresponding 'value'):

    • Key: spark.master Value: yarn-client
    • Key: spark.executor.instances Value: 5
    • Key: spark.executor.memory Value: 512m

Click Next and then Click Proceed anyway on any pop-up dialog warning. 7. Review : Check the configurations and then press Deploy 8. Install, Start and Test : Wait for the installations to finish. If done, press Next 9. Summary : Press Complete

Now you have the Spark Cluster running and you can proceed with the next step.

Step 3: Run notebooks with custom tmpnb

We are ready to prepare the notebook host, that will serve users with temporary notebook instances.

First, open network access to your current IP for testing the setup internally. If you want to serve the notebooks to users over plain http, open port 80. If you would like to use https, use open 443. You can also open both ports by creating two rules. Go to cPouta www-interface and add security group rules to your cluster's -notebook -group.

  • protocol: TCP
  • port 80 or 443
  • CIDR: your IP x.y.z.t/32 (take a look at 'ip a' or check it online, search for "what is my ipv4")

SSH in to the notebook host using its private IP from your bastion host.

There is an nginx proxy process forwarding traffic from ports 80 (http) and 443 (https) to tmpnb at port 8000. The proxy also takes care of authentication. Add user/password to nginx htaccess file on the notebook host

sudo htpasswd -c /etc/nginx/.htpasswd example_user

On the notebook host, Add a directory to HDFS for the notebook user

sudo -u hdfs hadoop fs -mkdir /user/jovyan
sudo -u hdfs hadoop fs -chown -R jovyan /user/jovyan

NOTE: If it says user exists, then skip

Pull the jupyter/pyspark-notebook image to use with tmpnb

sudo docker pull jupyter/pyspark-notebook

Build the docker image for a patched version of tmpnb

sudo docker build -t csc/tmpnb https://github.com/apurva3000/tmpnb.git

Setup the proxy first to run tmpnb

export TOKEN=$( head -c 30 /dev/urandom | xxd -p )

sudo docker run --net=host -d -e CONFIGPROXY_AUTH_TOKEN=$TOKEN --name=proxy jupyter/configurable-http-proxy --default-target http://127.0.0.1:9999

Now run the image which we just built and tagged. This runs 2 notebook containers (pool_size), the inactivity timeout (cull_timeout) is set to 15 minutes. The option -it keeps tmpnb in the foreground - good for debugging.

sudo docker run -it \
    --net=host \
    -e CONFIGPROXY_AUTH_TOKEN=$TOKEN \
    -v /var/run/docker.sock:/docker.sock \
    csc/tmpnb \
    python orchestrate.py \
        --pool_size=2 \
        --cull_timeout=900 \
        --host_directories=/usr/hdp/:/usr/hdp/:ro,/etc/hadoop/:/etc/hadoop/:ro,/etc/spark/:/etc/spark/:ro \
        --host_network=True \
        --image='jupyter/pyspark-notebook' \
        --command='start-notebook.sh \
            "--NotebookApp.base_url={base_path} \
            --ip=0.0.0.0 \
            --port={port} \
            --NotebookApp.allow_origin=* \
            --NotebookApp.trust_xheaders=True"'

After the containers start running (Can be checked by sudo docker ps -a), open the browser and point it to http://<public-ip-of-the-notebook-host>

Now open a Jupyter Python3 notebook and write the following code.

import os
os.environ["PYSPARK_PYTHON"]="/opt/conda/bin/python3"
os.environ["SPARK_HOME"]="/usr/hdp/current/spark-client"
os.environ["HDP_VERSION"]="current"

import pyspark
sc = pyspark.SparkContext() 

sc.version

Don't forget to stop the SparkContext when done with sc.stop()

When you are happy with the setup, open the access for desired range of IP address the users are coming from.

Additional security: limit outgoing traffic from notebook host

If the notebooks that the users are going to run don't need access to arbitrary addresses in the internet, it is a good idea to limit the outgoing traffic from the notebooks. This is done by removing the default egress (=outbound) security group rules that allow all outbound IPv4 and IPv6 traffic from the -notebook security group.

In Horizon, security groups, find your -notebook group, select manage rules and remove these two rules:

Egress	IPv4	Any	-	0.0.0.0/0 (CIDR) 
Egress	IPv6	Any	-	::/0 (CIDR)

There is already a rule that allows traffic destined to internal networks, that is created by the installation playbook.

Step 4: Clean up

To clean up the resources after the course is done, or to have a clean slate for another deployment, there is a playbook called cluster_destroy.yml. By default it does not do anything, all the actions have to be enabled from the command line, just to be on a safe side.

Run these on your management/bastion host.

To remove the nodes and the master, but leave the HDFS data volumes and security groups:

ansible-playbook -v \
    -e cluster_name=my-hdp -e num_nodes=4 \ 
    -e remove_master=1 \
    -e remove_nodes=1 \
    pouta-spark-course/playbooks/cluster_destroy.yml

To remove the nodes, master, all volumes and security groups:

ansible-playbook -v \
    -e cluster_name=my-hdp -e num_nodes=4 \
    -e remove_master=1 -e remove_master_volumes=1 \
    -e remove_nodes=1 -e remove_node_volumes=1 \
    -e remove_security_groups=1 \
    pouta-spark-course/playbooks/cluster_destroy.yml

About

Work in progress: temporary Spark course environment in CSC's cPouta

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages