Skip to main content

Switching of container runtimes

The container runtime is software that makes it easy to create, manage and destroy containers. Common container runtimes are containerd, runc (the Docker runtime) or crun (the Podman runtime).

While these runtimes meet the OCI specifications perfectly, we have some requirements to optimize for task scheduling in a HPC environment:

  • Rootless and unprivileged by default
  • GPU and MPI compatible
  • No performance overhead, no network overhead

Therefore, Apptainer and Enroot are the best candidates, which are the standards container runtimes in an HPC environment.

Apptainer

Apptainer, also known as Singularity, defaults to integration over isolation, making it easier to integrate GPUs and high-speed networks. It also mounts the container image as a read-only file system by default.

Apptainer downloads and extracts the layers from the container and builds a Singularity Image Format (SIF) file from the extracted layers. Then, Apptainer can mount the SIF file and run the container entrypoint.

One of the main features of apptainer is the ability to load an "unpacked" container image. In fact, it can load the rootfs of a container image from a directory. Coupled with CVMFS, the distributed file system with aggressive caching, apptainer is able to download the container files dynamically without having to download the entire container. This is very useful when the container is filled with a large number of files that are useless at runtime. This is basically a Just-in-time file loading.

DeepSquare-hosted images are shared and executed across every clusters in this manner.

Enroot

Although apptainer fits most use cases, the default DeepSquare runtime is Enroot.

Enroot is incredibly simpler than apptainer and is maintained by NVIDIA. Enroot uses hooks to embed devices on containers, and mount the container image with write permissions.

Enroot extracts layers and creates a squashfs file from the extracted layers. Then, Enroot can extract the squashfs file to a runtime directory and execute the container entry point. As a result, Enroot can mount the rootfs from any squashfs.

Since the behavior is very similar to Docker while being dead simple, this is the reason why DeepSquare chose Enroot as the default container runtime.

Using Enroot and/or Apptainer locally

Installation

Enroot and Apptainer can be both installed easily from their releases:

Building an image for Enroot and Apptainer

There are a lot of ways to build a container image for Enroot and Apptainer.

You can :

  • Build a squashfs file from scratch.
  • Build a SIF using a Apptainer Definition File
  • Use Buildah/Podman/Docker to build a Docker image.

We highly recommend Podman to build a Docker image.

For this guide, we will build a simple hello world:

Dockerfile
FROM alpine

ENTRYPOINT [ "echo", "hello world" ]
user@~/examples/
podman build -t localhost/hello-world .
note

Enroot and Apptainer can execute the entrypoint. However, the implementation on DeepSquare doesn't execute the entrypoint when filling the command field.

The entrepoint must be re-specified. In this example, the value of the command field would be echo "hello world".

Testing locally

While the Podman have similar constraints to those of enroot (rootless, unprivileged, uid map), you may want to test on Enroot or Apptainer.

user@~/examples/
# Pull the image
enroot import --output "localhost+hello-world+latest.sqsh" "podman://localhost/hello-world:latest"
# enroot can also pull from the Docker daemon with dockerd:// or from a Docker registry with docker://
enroot create --name "localhost+hello-world+latest" "localhost+hello-world+latest.sqsh"

# Run the image
enroot start localhost+hello-world+latest

# Remove the image
enroot remove "localhost+hello-world+latest"
rm "localhost+hello-world+latest.sqsh"

Examples of usage with DeepSquare

If your container works with podman, enroot and/or apptainer, your probability of success is very high for running on DeepSquare!

To run a container on DeepSquare, you must distribute your image on a Container Registry like the GitHub Container Registry or with a self-hosting solution like Harbor.

You can also use S3 to host your squashfs/SIF file and use the Workflow input field to extract the image... but this is much more complicated than deploying a registry or just pushing on a public registry like Docker Hub.

Example: Public registry
Workflow
resources:
tasks: 1
gpus: 0
cpusPerTask: 1
memPerCpu: 1024

steps:
- command: echo 'hello world'
container:
image: my-user/hello-world:latest
registry: registry-1.docker.io
Example: Private registry
Workflow
resources:
tasks: 1
gpus: 0
cpusPerTask: 1
memPerCpu: 1024

steps:
- command: echo 'hello world'
container:
image: my-user/hello-world:latest
registry: registry-1.docker.io
# Specify credentials here.
username: my-user
password: my-password
Example: Using the apptainer container runtime
Workflow
resources:
tasks: 1
gpus: 0
cpusPerTask: 1
memPerCpu: 1024

steps:
- command: echo 'hello world'
container:
image: my-user/hello-world:latest
registry: registry-1.docker.io
apptainer: true