Red Hat Partners With DOE Labs to Advance HPC Containers - Container Journal

2022-06-24 20:42:09 By : Ms. Amber Zhao

Red Hat this week announced it has allied with multiple U.S. Department of Energy laboratories to advance the adoption of containers in high-performance computing (HPC) environments.

Lawrence Berkeley National Laboratory, Lawrence Livermore National Laboratory and Sandia National Laboratories will collaborate with Red Hat to make sure that the same types of containers deployed in enterprise IT environments are used to drive HPC applications.

Red Hat and the National Energy Research Scientific Computing Center (NERSC) at Berkeley Lab are also collaborating on enhancements to Red Hat’s Podman, an open source daemonless container engine for developing, managing and running container images on a Linux system, that will replace the custom Shifter development runtime NERSC had developed.

Sandia National Laboratories, meanwhile, will extend an existing SuperContainers project to enable containers optimized for HPC applications to run on Kubernetes. That capability will enable those applications to scale up and down more easily.

Finally, Red Hat and Lawrence Livermore National Laboratory are collaborating to bring HPC job schedulers like Flux to Kubernetes environments via a standardized programmatic interface for highly parallel file systems that are widely used within HPC platforms.

Andrew Younge, Ph.D., research and development manager and computer scientist for Sandia National Laboratories, says the goal is to reduce dependency on the Singularity containers used within HPC environments today in favor of containers that are more widely used in other IT environments. That shift will ultimately make it easier to recruit IT talent to work in HPC application environments, he notes.

Shane Canon, a senior engineer for Lawrence Berkeley National Laboratory, adds that this effort will also provide additional ways to scale applications using architectures based on HPC platforms.

Finally, one of the major benefits of Podman is that it enables IT teams to provide different levels of privilege to better ensure cybersecurity, he notes.

Ultimately, this effort should make it possible to more easily manage applications across container runtime platforms running in both on-premises and cloud computing environments. HPC applications still largely run in on-premises IT environments. However, HPC in the cloud can eliminate on-premises infrastructure constraints in a way that makes it easier to pay only for the capacity used no matter how much is required. They enable organizations to innovate without constraint, improve flexibility and possibly deliver faster results using the latest generation of processors made available as a cloud service.

It’s not clear to what degree shifting HPC applications to containers might spur additional innovation. HPC platforms infused with graphical processor units (GPUs) are also driving the development of artificial intelligence (AI) models that require access to massive amounts of computing horsepower.

One way or another, advances in terms of how container-based HPC applications are built and run will eventually benefit a wide range of applications as new concepts are pioneered and then shared across platforms. In the meantime, the number of viable options for running containers at scale in HPC environments continues to increase.

Mike Vizard is a seasoned IT journalist with over 25 years of experience. He also contributed to IT Business Edge, Channel Insider, Baseline and a variety of other IT titles. Previously, Vizard was the editorial director for Ziff-Davis Enterprise as well as Editor-in-Chief for CRN and InfoWorld.

Mike Vizard has 1344 posts and counting. See all posts by Mike Vizard

Register today to join industry leaders from Techstrong, Microsoft, Atichson Technology, QUMU and Sumo Logic–along with our live, chat-enabled audience–as they discuss the journey from legacy to cloud-native architectures. The post Journey From Legacy to Cloud-Native Architectures appeared first on DevOps.com. [...]

Hard coding secrets–usernames, passwords, tokens, API keys and more–is a risky practice that’s been around for as long as developers have been writing code. This problem is far from solved. In fact, hardcoded secrets are increasing in prevalence due to modern microservice-based architectures in which comments and services need to authenticate with each other securely […] The post Effectively Tackling Hardcoded Secrets With a Secrets Management Maturity Model appeared first on DevOps.com. [...]

Kubernetes guardrails allow developers to work with Kubernetes securely, ensuring compliance and cost-effectiveness so their code can reach production without succumbing to common pitfalls. But where do you get started with Kubernetes guardrails? And why should you care? This talk will give an overview of why guardrails are important and explore common examples that your […] The post Kubernetes Guardrails and Why You Need Them appeared first on DevOps.com. [...]

Cloud-native architectures deliver speed, flexibility and faster innovation. But a considerable trade-off is an explosion of metrics data volume and cardinality that outpaces the growth of the business itself. A recent ESG study found that 71% of organizations feel their observability data is growing at a concerning rate. While the increasing cost of storage is […] The post Goldilocks and the 3 Levels of Cardinality: Getting it Just Right appeared first on DevOps.com. [...]

The webinar will feature a discussion of the key SQL Server release features and their implications for the enterprise, with a particular emphasis on MinIO technology, and include a demo showing how it works, how easy it is to deploy and what to expect from a performance perspective. The post Using External Tables to Store and Query Data on MinIO With SQL Server 2022 appeared first on DevOps.com. [...]

Join the CISO Talk Master Class live conversation. Part 6 brings all the elements into a cohesive, integrated strategy: continuous security strategy, leveraging frameworks, effective response strategies, growing next-gen security experts and communications that win and combat confusion. Join hosts Mitch Ashley and Mat Newfield and an elite panel of cybersecurity experts as they bring.. The post CISO Talk Master Class Episode: Catch Lightning in a Bottle – The Essentials: Bringing It All Together appeared first on Security Boulevard. [...]

Join us to learn how Bob has successfully worked with his development leaders to engineer software with security in mind along the pre-production software supply chain. Liav Caspi, CTO of Legit Security, will be joining Bob to share how new security methods and tools now enable teams to find security issues earlier in the development.. The post How to Shift Security Left: Best Practices From a Fortune 500 DevSecOps Leader appeared first on Security Boulevard. [...]

According to the 2022 Open Source Security and Risk Analysis (OSSRA) report, the overwhelming majority of software development organizations are leveraging open source to build their applications. However, the scale of use creates a growing management challenge. While development and risk management teams scramble to patch vulnerabilities, decipher complex license terms governing obligations associated with.. The post Applying the 2022 Open Source Findings to Software Supply Chain Risk Management appeared first on Security Boulevard. [...]

During this livestream, cybersecurity expert and president and CEO at BetterCyber Luciana Obregon will break down how you can lower RTO and RPO and create a reliable data recovery workflow. Modern backup data infrastructure must be immutable, isolated (air-gapped), scanned for and cleansed of malware and must be directly mounted (instant recovery). The post Finding the Ransomware Threat INSIDE Your Backups appeared first on Security Boulevard. [...]

Cybersecurity resilience is a priority for enterprises that have ramped up digital transformation and distributed workforces in the past few years. However, differences of opinion about the urgency of application security solutions can be detrimental to enterprises. According to the latest World Economic Forum research, “While 92% of business executives agree that cybersecurity resilience is.. The post Closing the Gap: Reducing Enterprise AppSec Risks Without Disrupting Deadlines appeared first on Security Boulevard. [...]