Get started with EFA and MPI
This tutorial helps you to launch an EFA and MPI-enabled instance cluster for HPC workloads. In this tutorial, you will perform the following steps:
Contents
- Step 1: Prepare an EFA-enabled security group
- Step 2: Launch a temporary instance
- Step 3: Install the EFA software
- Step 4: Disable ptrace protection
- Step 5: (Optional) Install Intel MPI
- Step 6: Install your HPC application
- Step 7: Create an EFA-enabled AMI
- Step 8: Launch EFA-enabled instances into a cluster placement group
- Step 9: Terminate the temporary instance
- Step 10: Enable passwordless SSH
Step 1: Prepare an EFA-enabled security group
An EFA requires a security group that allows all inbound and outbound traffic to and from the security group itself. The following procedure allows all inbound and outbound traffic for testing purposes only. For other scenarios, see Security group rules for different use cases.
To create an EFA-enabled security group
-
Open the Amazon EC2 console at https://console.aws.amazon.com/ec2/
. -
In the navigation pane, choose Security Groups and then choose Create Security Group.
-
In the Create Security Group window, do the following:
-
For Security group name, enter a descriptive name for the security group, such as
EFA-enabled security group
. -
(Optional) For Description, enter a brief description of the security group.
-
For VPC, select the VPC into which you intend to launch your EFA-enabled instances.
-
Choose Create.
-
-
Select the security group that you created, and on the Description tab, copy the Group ID.
-
On the Inbound tab, do the following:
-
Choose Edit.
-
For Type, choose All traffic.
-
For Source, choose Custom and paste the security group ID that you copied into the field.
-
Choose Save.
-
-
On the Outbound tab, do the following:
-
Choose Edit.
-
For Type, choose All traffic.
-
For Destination, choose Custom and paste the security group ID that you copied into the field.
-
Choose Save.
-
Step 2: Launch a temporary instance
Launch a temporary instance that you can use to install and configure the EFA software components. You use this instance to create an EFA-enabled AMI from which you can launch your EFA-enabled instances.
To launch a temporary instance
-
Open the Amazon EC2 console at https://console.aws.amazon.com/ec2/
. -
Choose Launch Instance.
-
On the Choose an AMI page, choose Select for one of the supported AMIs.
-
On the Choose an Instance Type page, select one of the supported instance types and then choose Next: Configure Instance Details.
-
On the Configure Instance Details page, do the following:
-
For Subnet, choose the subnet in which to launch the instance.
-
For Elastic Fabric Adapter, choose Enable.
-
In the Network Interfaces section, for device eth0, choose New network interface.
-
Choose Next: Add Storage.
-
-
On the Add Storage page, specify the volumes to attach to the instances in addition to the volumes that are specified by the AMI (such as the root device volume). Then choose Next: Add Tags.
-
On the Add Tags page, specify a tag that you can use to identify the temporary instance, and then choose Next: Configure Security Group.
-
On the Configure Security Group page, for Assign a security group, select Select an existing security group, and then select the security group that you created in Step 1.
-
On the Review Instance Launch page, review the settings, and then choose Launch to choose a key pair and to launch your instance.
Step 3: Install the EFA software
Install the EFA-enabled kernel, EFA drivers, Libfabric, and Open MPI stack that is required to support EFA on your temporary instance.
The steps differ depending on whether you intend to use EFA with Open MPI, with Intel MPI, or with Open MPI and Intel MPI.
To install the EFA software
-
Connect to the instance you launched. For more information, see Connect to your Linux instance.
-
To ensure that all of your software packages are up to date, perform a quick software update on your instance. This process may take a few minutes.
-
Amazon Linux, Amazon Linux 2, RHEL, and CentOS
$
sudo yum update -y -
Ubuntu
$
sudo apt-get update$
sudo apt-get upgrade -y -
SUSE Linux Enterprise
$
sudo zypper update -y
-
-
Download the EFA software installation files. The software installation files are packaged into a compressed tarball (
.tar.gz
) file. To download the latest stable version, use the following command.$
curl -O https://efa-installer.amazonaws.com/aws-efa-installer-1.11.2.tar.gzYou can also get the latest version by replacing the version number with
latest
in the preceding command. -
(Optional) Verify the authenticity and integrity of the EFA tarball (
.tar.gz
) file. We recommend that you do this to verify the identity of the software publisher and to check that the file has not been altered or corrupted since it was published. If you do not want to verify the tarball file, skip this step.Note Alternatively, if you prefer to verify the tarball file by using an MD5 or SHA256 checksum instead, see Verify the EFA installer using a checksum.
-
Download the public GPG key and import it into your keyring.
$
wget https://efa-installer.amazonaws.com/aws-efa-installer.key$
gpg --import aws-efa-installer.keyThe command should return a key value. Make a note of the key value, because you need it in the next step.
-
Verify the GPG key's fingerprint. Run the following command and specify the key value from the previous step.
$
gpg --fingerprintkey_value
The command should return a fingerprint that is identical to
4E90 91BC BB97 A96B 26B1 5E59 A054 80B1 DD2D 3CCC
. If the fingerprint does not match, don't run the EFA installation script, and contact AWS Support. -
Download the signature file and verify the signature of the EFA tarball file.
$
wget https://efa-installer.amazonaws.com/aws-efa-installer-1.11.2.tar.gz.sig$
gpg --verify ./aws-efa-installer-1.11.2.tar.gz.sigThe following shows example output.
gpg: Signature made Wed 29 Jul 2020 12:50:13 AM UTC using RSA key ID DD2D3CCC gpg: Good signature from "Amazon EC2 EFA <ec2-efa-maintainers@amazon.com>" gpg: WARNING: This key is not certified with a trusted signature! gpg: There is no indication that the signature belongs to the owner. Primary key fingerprint: 4E90 91BC BB97 A96B 26B1 5E59 A054 80B1 DD2D 3CCC
If the result includes
Good signature
, and the fingerprint matches the fingerprint returned in the previous step, proceed to the next step. If not, don't run the EFA installation script, and contact AWS Support.
-
-
Extract the files from the compressed
.tar.gz
file and navigate into the extracted directory.$
tar -xf aws-efa-installer-1.11.2.tar.gz$
cd aws-efa-installer -
Install the EFA software. Do one of the following depending on your use case.
-
Open MPI and Intel MPI
If you intend to use EFA with Open MPI and Intel MPI, you must install the EFA software with Libfabric and Open MPI, and you must complete Step 5: (Optional) Install Intel MPI. To install the EFA software with Libfabric and Open MPI, run the following command.
$
sudo ./efa_installer.sh -yLibfabric is installed in the
/opt/amazon/efa
directory, while Open MPI is installed in the/opt/amazon/openmpi
directory. -
Open MPI only
If you intend to use EFA with Open MPI only, you must install the EFA software with Libfabric and Open MPI, and you can skip Step 5: (Optional) Install Intel MPI. To install the EFA software with Libfabric and Open MPI, run the following command.
$
sudo ./efa_installer.sh -yLibfabric is installed in the
/opt/amazon/efa
directory, while Open MPI is installed in the/opt/amazon/openmpi
directory. -
Intel MPI only
If you intend to use EFA with Intel MPI only, you can install the EFA software without Libfabric and Open MPI. In this case, Intel MPI uses its embedded Libfabric. If you choose to do this, you must complete Step 5: (Optional) Install Intel MPI.
To install the EFA software without Libfabric and Open MPI, run the following command.
$
sudo ./efa_installer.sh -y --minimal
-
-
If the EFA installer prompts you to reboot the instance, do so and then reconnect to the instance. Otherwise, log out of the instance and then log back in to complete the installation.
-
Confirm that the EFA software components were successfully installed.
$
fi_info -p efa -t FI_EP_RDMThe command should return information about the Libfabric EFA interfaces. The following example shows the command output.
provider: efa fabric: EFA-fe80::94:3dff:fe89:1b70 domain: efa_0-rdm version: 2.0 type: FI_EP_RDM protocol: FI_PROTO_EFA
Step 4: Disable ptrace protection
To improve your HPC application's performance, Libfabric uses the instance's local memory for interprocess communications when the processes are running on the same instance.
The shared memory feature uses Cross Memory Attach (CMA), which is not supported with ptrace protection. If you are using a Linux distribution that has ptrace protection enabled by default, such as Ubuntu, you must disable it. If your Linux distribution does not have ptrace protection enabled by default, skip this step.
To disable ptrace protection
Do one of the following:
-
To temporarily disable ptrace protection for testing purposes, run the following command.
$
sudo sysctl -w kernel.yama.ptrace_scope=0 -
To permanently disable ptrace protection, add
kernel.yama.ptrace_scope = 0
to/etc/sysctl.d/10-ptrace.conf
and reboot the instance.
Step 5: (Optional) Install Intel MPI
If you intend to only use Open MPI, skip this step. Perform this step only if you intend to use Intel MPI.
Intel MPI requires an additional installation and environment variable configuration.
Prerequisites
Ensure that the user performing the following steps has sudo permissions.
To install Intel MPI
-
To download the Intel MPI installation files, see the Intel Developer Zone website
. You must register before you can download the installation files. After you have registered, do the following:
-
For Product, choose Intel MPI Library for Linux.
-
For Version, choose 2019 Update 7, and then choose Full Product.
-
-
The installation files are packaged into a compressed
.tar.gz
file. Extract the files from the compressed.tar.gz
file and navigate into the extracted directory.$
tar -xffile_name
.tgz$
cddirectory_name
-
Open
silent.cfg
using your preferred text editor. In line 10, changeACCEPT_EULA=decline
toACCEPT_EULA=accept
. Save the changes and close the file. -
Run the installation script.
$
sudo ./install.sh -s silent.cfgIntel MPI is installed in the
/opt/intel/impi/
directory by default. -
Add the Intel MPI environment variables to the corresponding shell startup scripts to ensure that they are set each time that the instance starts. Do one of the following depending on your shell.
-
For bash, add the following environment variable to
/home/
andusername
/.bashrc/home/
.username
/.bash_profilesource /opt/intel/compilers_and_libraries/linux/mpi/intel64/bin/mpivars.sh
-
For csh and tcsh, add the following environment variable to
/home/
.username
/.cshrcsource /opt/intel/compilers_and_libraries/linux/mpi/intel64/bin/mpivars.csh
-
-
Log out of the instance and then log back in.
-
Run the following command to confirm that Intel MPI was successfully installed.
$
which mpiccEnsure that the returned path includes the
/opt/intel/
subdirectory.
If you no longer want to use Intel MPI, remove the environment variables from the shell startup scripts.
Step 6: Install your HPC application
Install the HPC application on the temporary instance. The installation procedure varies depending on the specific HPC application. For more information, see Manage software on your Amazon Linux instance.
You might need to refer to your HPC application’s documentation for installation instructions.
Step 7: Create an EFA-enabled AMI
After you have installed the required software components, you create an AMI that you can reuse to launch your EFA-enabled instances.
To create an AMI from your temporary instance
-
Open the Amazon EC2 console at https://console.aws.amazon.com/ec2/
. -
In the navigation pane, choose Instances.
-
Select the temporary instance that you created and choose Actions, Image, Create image.
-
For Create image, do the following:
-
For Image name, enter a descriptive name for the AMI.
-
(Optional) For Image description, enter a brief description of the purpose of the AMI.
-
Choose Create image.
-
-
In the navigation pane, choose AMIs.
-
Locate the AMI tht you created in the list. Wait for the status to change from
pending
toavailable
before continuing to the next step.
Step 8: Launch EFA-enabled instances into a cluster placement group
Launch your EFA-enabled instances into a cluster placement group using the EFA-enabled AMI that you created in Step 7, and the EFA-enabled security group that you created in Step 1.
It is not an absolute requirement to launch your EFA-enabled instances into a cluster placement group. However, we do recommend running your EFA-enabled instances in a cluster placement group as it launches the instances into a low-latency group in a single Availability Zone.
To launch your EFA-enabled instances into a cluster placement group
-
Open the Amazon EC2 console at https://console.aws.amazon.com/ec2/
. -
Choose Launch Instance.
-
On the Choose an AMI page, choose My AMIs, find the AMI that you created in Step 7, and then choose Select.
-
On the Choose an Instance Type page, select one of the supported instance types and then choose Next: Configure Instance Details.
-
On the Configure Instance Details page, do the following:
-
For Number of instances, enter the number of EFA-enabled instances that you want to launch.
-
For Network and Subnet, select the VPC and subnet into which to launch the instances.
-
For Placement group, select Add instance to placement group.
-
For Placement group name, select Add to a new placement group, enter a descriptive name for the placement group, and then for Placement group strategy, select cluster.
-
For EFA, choose Enable.
-
In the Network Interfaces section, for device eth0, choose New network interface. You can optionally specify a primary IPv4 address and one or more secondary IPv4 addresses. If you're launching the instance into a subnet that has an associated IPv6 CIDR block, you can optionally specify a primary IPv6 address and one or more secondary IPv6 addresses.
-
Choose Next: Add Storage.
-
-
On the Add Storage page, specify the volumes to attach to the instances in addition to the volumes specified by the AMI (such as the root device volume), and then choose Next: Add Tags.
-
On the Add Tags page, specify tags for the instances, such as a user-friendly name, and then choose Next: Configure Security Group.
-
On the Configure Security Group page, for Assign a security group, select Select an existing security group, and then select the security group that you created in Step 1.
-
Choose Review and Launch.
-
On the Review Instance Launch page, review the settings, and then choose Launch to choose a key pair and to launch your instances.
Step 9: Terminate the temporary instance
At this point, you no longer need the temporary instance that you launched. You can terminate the instance to stop incurring charges for it.
To terminate the temporary instance
-
Open the Amazon EC2 console at https://console.aws.amazon.com/ec2/
. -
In the navigation pane, choose Instances.
-
Select the temporary instance that you created and then choose Actions, Instance state, Terminate instance.
-
When prompted for confirmation, choose Terminate.
Step 10: Enable passwordless SSH
To enable your applications to run across all of the instances in your cluster, you must enable passwordless SSH access from the leader node to the member nodes. The leader node is the instance from which you run your applications. The remaining instances in the cluster are the member nodes.
To enable passwordless SSH between the instances in the cluster
-
Select one instance in the cluster as the leader node, and connect to it.
-
Disable
strictHostKeyChecking
and enableForwardAgent
on the leader node. Open~/.ssh/config
using your preferred text editor and add the following.Host * ForwardAgent yes Host * StrictHostKeyChecking no
-
Generate an RSA key pair.
$
ssh-keygen -t rsa -N "" -f ~/.ssh/id_rsaThe key pair is created in the
$HOME/.ssh/
directory. -
Change the permissions of the private key on the leader node.
$
chmod 600 ~/.ssh/id_rsa chmod 600 ~/.ssh/config -
Open
~/.ssh/id_rsa.pub
using your preferred text editor and copy the key. -
For each member node in the cluster, do the following:
-
Connect to the instance.
-
Open
~/.ssh/authorized_keys
using your preferred text editor and add the public key that you copied earlier.
-
-
To test that the passwordless SSH is functioning as expected, connect to your leader node and run the following command.
$
sshmember_node_private_ip
You should connect to the member node without being prompted for a key or password.