Differences between revisions 11 and 13 (spanning 2 versions)
Revision 11 as of 2021-06-15 08:59:17
Size: 5047
Editor: stroth
Comment: Feedback von Günter
Revision 13 as of 2023-04-27 11:36:40
Size: 5272
Editor: stroth
Comment: Update to apptainer
Deletions are marked like this. Additions are marked like this.
Line 3: Line 3:
= Singularity =
This article explains the purpose and use of [[https://sylabs.io/singularity/|Singularity]].
= Apptainer =
This article explains the purpose and use of [[https://apptainer.org/|Apptainer]], a fork of [[https://sylabs.io/singularity/|Singularity]]. [[https://apptainer.org/docs/user/latest/singularity_compatibility.html|Compatibility is explained here]] in detail.
Line 7: Line 7:
Singularity is a container system for isolating software and computing environments from the host system. It allows to package software in '''highly portable''' and '''reproducible environments''' encapsulating all dependencies, including the operating system.<<BR>> Apptainer is a container system for isolating software and computing environments from the host system. It allows to package software in '''highly portable''' and '''reproducible environments''' encapsulating all dependencies, including the operating system.<<BR>>
Line 12: Line 12:
Docker is not secure as it provides a means to gain root access on the host it's running on, therefore we provide Singularity as a secure alternative. Docker is not secure as it provides a means to gain root access on the host it's running on, therefore we provide Apptainer as a secure alternative.
Line 16: Line 16:
[[https://www.sylabs.io/docs/|The official documentation]] for users is a great starting point to get up and running with Singularity.<<BR>>
The analogue of a ''Docker file'', a so-called ''Singularity recipe'' or ''Singularity Definition File'' is documented in detail section [[https://sylabs.io/guides/3.7/user-guide/definition_files.html|Definition Files]].
[[https://apptainer.org/docs/user/latest/|The official documentation]] for users is a great starting point to get up and running with Apptainer.<<BR>>
The analogue of a ''Docker file'', a so-called ''Apptainer recipe'' or ''Apptainer Definition File'' is documented in detail section [[https://apptainer.org/docs/user/latest/definition_files.html|Definition Files]].
Line 22: Line 22:
 * '''Singularity Image File (SIF)''': An immutable container runtime image containing the container's directory structure
 * '''!SingularityBuilder''': A [[Services/SingularityBuilder|virtual machine to allow Singularity operations with elevated privileges]]
 * '''Apptainer (Singularity) Image File (SIF)''': An immutable container runtime image containing the container's directory structure
 * '''!SingularityBuilder''': A [[Services/SingularityBuilder|virtual machine to allow Apptainer operations with elevated privileges]]
Line 38: Line 38:
singularity build lolcow.sif docker://godlovedc/lolcow apptainer build lolcow.sif docker://godlovedc/lolcow
Line 42: Line 42:
singularity build docker-image.sif docker-archive:///path/to/docker-image.tar apptainer build docker-image.sif docker-archive:///path/to/docker-image.tar
Line 48: Line 48:
singularity exec lolcow.sif cowsay "Mooh!" apptainer exec lolcow.sif cowsay "Mooh!"
Line 52: Line 52:
singularity exec lolcow.sif /usr/games/cowsay "Mooh!" apptainer exec lolcow.sif /usr/games/cowsay "Mooh!"
Line 57: Line 57:
A more complex use case is to install software on a specific Linux distribution with all its dependencies. This is easier with elevated privileges, as available step-by-step guides may be followed. To run Singularity operations as user `root` we provide [[Services/SingularityBuilder|SingularityBuilder]] . A more complex use case is to install software on a specific Linux distribution with all its dependencies. This is easier with elevated privileges, as available step-by-step guides may be followed. To run Apptainer operations as user `root` we provide [[Services/SingularityBuilder|SingularityBuilder]] .
Line 60: Line 60:
From the Singularity Library, where the example sandbox directory `ubuntu_16.04` is created in the current directory: From the Apptainer Library, where the example sandbox directory `ubuntu_16.04` is created in the current directory:
Line 62: Line 62:
singularity build --sandbox ubuntu_16.04 library://library/default/ubuntu:16.04 apptainer build --sandbox ubuntu_16.04 library://library/default/ubuntu:16.04
Line 66: Line 66:
singularity build --sandbox ubuntu docker://ubuntu:16.04 apptainer build --sandbox ubuntu docker://ubuntu:16.04
Line 71: Line 71:
To install the software according to an installation guide or as you see fit, start a shell in your sandbox: To install the software according to an installation guide or as you see fit, start a shell in your sandbox. The `--writable` option is necessary for file system modifications:
Line 73: Line 73:
singularity shell ubuntu_16.04 apptainer shell --writable ubuntu_16.04
Line 79: Line 79:
singularity build my_image.sif my_sandbox apptainer build my_image.sif my_sandbox
Line 85: Line 85:
singularity build --sandbox my_sandbox my_image.sif apptainer build --sandbox my_sandbox my_image.sif
Line 92: Line 92:
singularity exec --nv lolcow.sif cowsay "Mooh!" apptainer exec --nv lolcow.sif cowsay "Mooh!"
Line 98: Line 98:
singularity shell --bind /scratch/$USER lolcow.sif apptainer shell --bind /scratch/$USER lolcow.sif
Line 102: Line 102:
singularity shell --bind /scratch/$USER:/mnt/$USER lolcow.sif apptainer shell --bind /scratch/$USER:/mnt/$USER lolcow.sif

Apptainer

This article explains the purpose and use of Apptainer, a fork of Singularity. Compatibility is explained here in detail.

Description

Apptainer is a container system for isolating software and computing environments from the host system. It allows to package software in highly portable and reproducible environments encapsulating all dependencies, including the operating system.
It has similarities to Docker but it's security model is specifically engineered to be used in HPC environments and for easy integration in managed client environments.

A typical use case is to install a specific software with the latest tool versions and all its dependencies from third-party repositories in order to run the application in a batch job on our Slurm cluster. Providing such dependencies on our managed Linux systems would be time consuming in preparation and maintenance. On the other hand such installations can be quickly done with elevated (sudo or root) privileges in a container.

Docker is not secure as it provides a means to gain root access on the host it's running on, therefore we provide Apptainer as a secure alternative.

Official documentation

The official documentation for users is a great starting point to get up and running with Apptainer.
The analogue of a Docker file, a so-called Apptainer recipe or Apptainer Definition File is documented in detail section Definition Files.

Concepts

Image sources

Pre-built SIFs and Docker images are available in the Sylabs Cloud Library or on the Docker hub.

Common use cases

Using a Docker image

The simplest use case is to convert an existing Docker image, run commands inside it and customize it for personal requirements. A well made Docker image can be converted without elevated privileges.

Convert a Docker image to a SIF

Directly from Docker Hub:

apptainer build lolcow.sif docker://godlovedc/lolcow

Converting a Docker image stored locally as tar file:

apptainer build docker-image.sif docker-archive:///path/to/docker-image.tar

Run a command in a SIF

apptainer exec lolcow.sif cowsay "Mooh!"

If the command to be executed from the SIF is not found in the SIF's PATH variable, it's path needs to be specified explicitly:

apptainer exec lolcow.sif /usr/games/cowsay "Mooh!"

Build your own SIF

A more complex use case is to install software on a specific Linux distribution with all its dependencies. This is easier with elevated privileges, as available step-by-step guides may be followed. To run Apptainer operations as user root we provide SingularityBuilder .

Create a writeable sandbox

From the Apptainer Library, where the example sandbox directory ubuntu_16.04 is created in the current directory:

apptainer build --sandbox ubuntu_16.04 library://library/default/ubuntu:16.04

Or from the Docker Hub:

apptainer build --sandbox ubuntu docker://ubuntu:16.04

Sandbox directory paths may be relative or absolute paths.

Start a shell in a sandbox

To install the software according to an installation guide or as you see fit, start a shell in your sandbox. The --writable option is necessary for file system modifications:

apptainer shell --writable ubuntu_16.04

Convert a sandbox to a SIF

After a sandbox is set up and tested it can be converted to a SIF:

apptainer build my_image.sif my_sandbox

Convert a SIF to a sandbox

It's also possible to convert a SIF back to a sandbox.:

apptainer build --sandbox my_sandbox my_image.sif

Running commands from SIFs

Using GPU resources

For software packaged into a SIF which requires access to the GPU resources of its host, the option --nv can be added:

apptainer exec --nv lolcow.sif cowsay "Mooh!"

Accessing storage

A user's home directory is available per default from a SIF. To be able to access additional storage paths they need to be defined by using the option --bind, either by automatically creating the same path /scratch/$USER inside the SIF as it exists on the host:

apptainer shell --bind /scratch/$USER lolcow.sif

or mapping a specific path on the host /scratch/$USER to a different path /mnt/$USER inside the SIF:

apptainer shell --bind /scratch/$USER:/mnt/$USER lolcow.sif

Services/Apptainer (last edited 2024-05-31 12:12:46 by stroth)