Skip to content

2.4 updates#124

Merged
vsoch merged 12 commits intosingularityware:docs/2.4from
gmkurtzer:2.4-updates
Oct 6, 2017
Merged

2.4 updates#124
vsoch merged 12 commits intosingularityware:docs/2.4from
gmkurtzer:2.4-updates

Conversation

@gmkurtzer
Copy link
Copy Markdown
Member

Changed security, about, and faq with minor edits elsewhere.

### Can Singularity support daemon processes?
Singularity has container "instance" support which allows one to start a container process, within its own namespaces, and use that instance like it was a stand alone, isolated system.

At the moment (as above describes), the network (and UTS) namespace is not well supported, so if you spin up a process daemon, it will exist on your host's network. This means you can run a web server, or any other daemon, from within a container like and access it directly from your host.
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

(as described above)

Copy link
Copy Markdown
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ooops, is this redundant?

Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

no I think it's ok, I wanted to suggest changing (as above described) to (as described above) because it's more commonly used

Comment thread pages/info/about.md
2. **Mobility of compute:** Singularity must be able to transfer (and store) containers in a manner that works with standard data mobility tools (rsync, scp, gridftp, http, NFS, etc..) and maintain software and data controls compliancy (e.g. HIPPA, nuclear, export, classified, etc..)
3. **Compatibility with complicated architectures:** The runtime must be immediately compatible with existing HPC, scientific, compute farm and even enterprise architectures any of which maybe running legacy kernel versions (including RHEL6 vintage systems) which do not support advanced namespace features (e.g. the user namespace)
4. **Security model:** Unlike many other container systems designed to support trusted users running trusted containers we must support the opposite model of untrusted users running untrusted containers. This changes the security paradigm considerably and increases the breadth of use cases we can support.

Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is redundant from FAQ - does it read ok having the same text in two places? It seems more appropriate for about than FAQ, but it probably doesn't hurt to have in two places.

Copy link
Copy Markdown
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I am impartial on it. :)

Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ok let's leave until someone complains about it :)

Comment thread pages/info/about.md Outdated
Singularity containers are purpose built and can include a simple binary and library stack or a complicated work flow that includes both network and file system access (or anything in between). The Singularity container images are then completely portable to any binary compatible version of Linux with the only dependency being Singularity running on the target system.
Singularity has two primary roles:

1. **Container Image Management:** Singularity supports building different container image formats from scratch using your choice of Linux distribution bases or leveraging other container formats (e.g. Docker Hub). Container formats supported are the default compressed immutable (read only) image files, writable raw file system based images, and sandboxes (*chroot* style directories).
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Would we really call this management? When I think management I think of Singularity Registry (eg, an actual manager to organizer and control images). Singularity is the maker of the containers, but not really the organizer. This paragraph is getting more at Container Image Formats. But I see you want it to be a "role." Maybe just Container Image Generator? THE BEST Container Image ? lol

Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Strong Container Base

Copy link
Copy Markdown
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Image generator works too! I'm fine with it :)

Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

okay I like that too, let's change to that.

Comment thread pages/info/about.md
Singularity containers are designed to be as portable as possible, spanning many flavors and vintages of Linux. The only known i86 limitation is the version of Linux running on the host. Singularity has been ported to distributions going as far back as RHEL 5 (and compatibles) and works on all flavors of Debian, Gentoo and Slackware. Within the container, there are almost no limitations aside from basic binary compatibility.
<font color='red' size='+1'>Ascineimsasasessssss!</font>

Within the container, there could be an entire distribution of Linux or a very lightweight tuned set of packages to support a particular work-flow. The work-flow can be scripted to run completely within the container or interact with files and other programs outside the container. The container can also emulate a single program and can be executed directly (yes, you heard that right). Containers have the execute bit set such they can be executed and configured to run a defined script or program when executed in this manner.
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lol what ...

Copy link
Copy Markdown
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It is being removed.

@vsoch
Copy link
Copy Markdown
Member

vsoch commented Oct 5, 2017

hey @gmkurtzer if you want to update the header to Image Generator this guy is then ready for merge!

@gmkurtzer
Copy link
Copy Markdown
Member Author

Done :D

@vsoch vsoch merged commit 82a4261 into singularityware:docs/2.4 Oct 6, 2017
@vsoch
Copy link
Copy Markdown
Member

vsoch commented Oct 6, 2017

Awesome! Good teamwork!

@gmkurtzer
Copy link
Copy Markdown
Member Author

Wahoooooo!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants