- Overview
- Usage - Configuration options
- Reference - Parameter and detailed reference to all options
- Limitations - OS compatibility, etc.
Manage Open OnDemand installation and configuration.
The following are the versions of this module and the supported versions of Open OnDemand:
- Module 5.x and 6.x supports Open OnDemand 3.1 and 3.0
- Module 3.x and 4.x supports Open OnDemand 3.0
- Module 2.x supports Open OnDemand 2.x
- Module 1.x supports Open OnDemand 1.18.x
- Module <= 0.12.0 supports Open OnDemand <= 1.7
All configuration can be done through the openondemand
class. Example configurations will be done in Hiera format.
include openondemand
Install specific versions of OnDemand from 3.0 repo with OpenID Connect support.
openondemand::repo_release: '3.0'
openondemand::ondemand_package_ensure: "3.0.0-1.el7"
openondemand::mod_auth_openidc_ensure: "3.4.5-1.el7"
Configure OnDemand SSL certs
openondemand::servername: ondemand.osc.edu
openondemand::ssl:
- "SSLCertificateFile /etc/pki/tls/certs/%{lookup('openondemand::servername')}.crt"
- "SSLCertificateKeyFile /etc/pki/tls/private/%{lookup('openondemand::servername')}.key"
- "SSLCertificateChainFile /etc/pki/tls/certs/%{lookup('openondemand::servername')}-interm.crt"
If you already declare the apache class you may wish to only include apache in this module:
openondemand::declare_apache: false
apache::default_vhost: false
Add support for interactive apps
openondemand::host_regex: '[\w.-]+\.osc\.edu'
openondemand::node_uri: '/node'
openondemand::rnode_uri: '/rnode'
Setup OnDemand to use default Dex authentication against LDAP.
openondemand::servername: ondemand.example.org
openondemand::auth_type: dex
openondemand::dex_config:
connectors:
- type: ldap
id: ldap
name: LDAP
config:
host: ldap.example.org:636
insecureSkipVerify: true
bindDN: cn=admin,dc=example,dc=org
bindPW: admin
userSearch:
baseDN: ou=People,dc=example,dc=org
filter: "(objectClass=posixAccount)"
username: uid
idAttr: uid
emailAttr: mail
nameAttr: gecos
preferredUsernameAttr: uid
groupSearch:
baseDN: ou=Groups,dc=example,dc=org
filter: "(objectClass=posixGroup)"
userMatchers:
- userAttr: DN
groupAttr: member
nameAttr: cn
Setup OnDemand to authenticate with OpenID Connect system, in these examples the IdP is Keycloak.
openondemand::servername: ondemand.osc.edu
openondemand::auth_type: 'openid-connect'
openondemand::auth_configs:
- 'Require valid-user'
openondemand::user_map_match: '.*'
openondemand::logout_redirect: "/oidc?logout=https%3A%2F%2F%{lookup('openondemand::servername')}"
openondemand::oidc_uri: '/oidc'
openondemand::oidc_provider_metadata_url: 'https://idp.osc.edu/auth/realms/osc/.well-known/openid-configuration'
openondemand::oidc_scope: 'openid profile email groups'
openondemand::oidc_client_id: ondemand.osc.edu
openondemand::oidc_client_secret: 'SUPERSECRET'
openondemand::oidc_settings:
OIDCPassIDTokenAs: 'serialized'
OIDCPassRefreshToken: 'On'
OIDCPassClaimsAs: environment
OIDCStripCookies: 'mod_auth_openidc_session mod_auth_openidc_session_chunks mod_auth_openidc_session_0 mod_auth_openidc_session_1'
Configure OnDemand via git repo that contains app configs, locales, public, and annoucement files
openondemand::servername: ondemand.osc.edu
openondemand::apps_config_repo: https://github.com/OSC/osc-ood-config.git
openondemand::apps_config_revision: v30
openondemand::apps_config_repo_path: "%{lookup('openondemand::servername')}/apps"
openondemand::locales_config_repo_path: "%{lookup('openondemand::servername')}/locales"
openondemand::public_files_repo_paths:
- "%{lookup('openondemand::servername')}/public/logo.png"
- "%{lookup('openondemand::servername')}/public/favicon.ico"
openondemand::announcements_config_repo_path: "%{lookup('openondemand::servername')}/announcements"
Define a SLURM cluster:
openondemand::clusters:
pitzer-exp:
cluster_title: 'Pitzer Expansion'
url: https://www.osc.edu/supercomputing/computing/pitzer
acls:
- adapter: group
groups:
- oscall
type: whitelist
login_host: pitzer-exp.osc.edu
job_adapter: slurm
job_host: pitzer-slurm01.ten.osc.edu
job_cluster: pitzer
job_bin: /usr/bin
job_lib: /usr/lib64
job_conf: /etc/slurm/slurm.conf
Define a Torque cluster. The following example is based on a cluster at OSC using Torque
openondemand::clusters:
owens:
cluster_title: 'Owens'
url: 'https://www.osc.edu/supercomputing/computing/owens'
login_host: 'owens.osc.edu'
job_adapter: torque
job_host: 'owens-batch.ten.osc.edu'
job_bin: /opt/torque/bin
job_lib: /opt/torque/lib64
job_version: '6.0.1'
batch_connect:
basic:
script_wrapper: |
module restore
%s
vnc:
script_wrapper: |
module restore
module load ondemand-vnc
%s
Define a Linux Host Adapter cluster:
openondemand::clusters:
pitzer-login:
cluster_title: 'Pitzer Login'
url: https://www.osc.edu/supercomputing/computing/pitzer
hidden: true
job_adapter: linux_host
job_submit_host: pitzer.osc.edu
job_ssh_hosts:
- pitzer-login01.hpc.osc.edu
- pitzer-login02.hpc.osc.edu
- pitzer-login03.hpc.osc.edu
job_site_timeout: 7200
job_debug: true
job_singularity_bin: /usr/bin/singularity
job_singularity_bindpath: /etc,/media,/mnt,/run,/srv,/usr,/var,/users,/opt
job_singularity_image: /path/to/custom/image.sif
job_strict_host_checking: false
job_tmux_bin: /usr/bin/tmux
batch_connect:
vnc:
script_wrapper: |
module restore
module load ondemand-vnc
%s
Define a Kubernetes cluster:
openondemand::clusters:
kubernetes:
cluster_title: Kubernetes
hidden: true
job_adapter: kubernetes
job_bin: /usr/local/bin/kubectl
job_cluster: ood-prod
job_username_prefix: prod
job_namespace_prefix: 'user-'
job_server:
endpoint: "https://k8controler.example.com:6443"
cert_authority_file: /etc/pki/tls/kubernetes-ca.crt
job_mounts:
- name: home
destination_path: /users
path: /users
host_type: Directory
type: host
job_auth:
type: oidc
Add XDMoD support
Ensure the cluster definition has xdmod_resource_id
set to resource_id
of the cluster in XDMoD. Also must do something like the following to set the appropriate environment variable:
openondemand::nginx_stage_pun_custom_env:
OOD_XDMOD_HOST: http://xdmod.osc.edu
Add Support Ticket configuration:
openondemand::confs:
support_ticket:
data:
support_ticket:
email:
from: noreply@example.com
to: support@example.com
The above example will create /etc/ood/config/ondemand.d/support_ticket.yml
with the YAML defined in data
parameter.
Install additional apps of specific versions as well as hide some apps
openondemand::install_apps:
bc_osc_rstudio_server:
ensure: "0.8.2-1.el7"
bc_desktop:
mode: '0700'
Install additional apps from Git repos:
openondemand::install_apps:
bc_osc_rstudio_server:
ensure: latest
git_repo: https://github.com/OSC/bc_osc_rstudio_server.git
bc_osc_jupyter:
ensure: present
git_repo: https://github.com/OSC/bc_osc_jupyter
git_revision: v0.20.0
Install additional apps from Puppet sources:
openondemand::install_apps:
bc_osc_rstudio_server:
source: puppet:///modules/profile/bc_osc_rstudio_server
Add usr apps with a default group
openondemand::usr_app_defaults:
group: staff
openondemand::usr_apps:
user1:
gateway_src: /home/user1/ondemand/share
user2:
group: faculty
gateway_src: /home/user2/ondemand/share
Add dev app users
openondemand::dev_app_users:
- user1
- user2
Define some pinned apps and dashboard layout:
openondemand::pinned_apps:
- 'usr/*'
- 'sys/jupyter'
- type: dev
category: system
openondemand::pinned_apps_menu_length: 10
openondemand::pinned_apps_group_by: category
openondemand::dashboard_layout:
rows:
- columns:
- width: 8
widgets:
- pinned_apps
- motd
- width: 4
widgets:
- xdmod_widget_job_efficiency
- xdmod_widget_jobs
Define some configurations for /etc/ood/config/ondemand.d
.
This will generate /etc/ood/config/ondemand.d/pinned_apps.yml.erb
based on the source file as well as
/etc/ood/config/ondemand.d/dashboard_layout.yml
from a template file. The example for foobar
will generate the YAML file using data defined in Hiera.
openondemand::confs:
pinned_apps:
source: 'puppet:///modules/profile/openondemand/pinned_apps.yml.erb'
template: true
dashboard_layout:
content_template: 'profile/openondemand/dashboard_layout.yml.erb'
foobar:
data:
...hash of configuration data here...
http://osc.github.io/puppet-module-openondemand/
This module has been tested on:
- RedHat/CentOS 7 x86_64
- RedHat/Rocky Linux/Alma Linux 8
- RedHat/Rocky Linux/Alma Linux 9
- Amazon Linux 2023
- Ubuntu 20.04
- Ubuntu 22.04
- Debian 12