Advanced Loading
This section describes advanced usage of Object Mount, including the user-mode library, scripting, containerisation, and high-performance computing (HPC) integration.
User-mode library
The $CUNO_ROOT
environment variable should be set to wherever your Object Mount installation is: /opt/cuno
for a system-wide installation, and usually $HOME/.local/opt/cuno
for a user-local installation. See user-guide-install-locations for more information on installation locations.
As mentioned in user-guide-overview, Object Mount provides cuno.so
which may be loaded into a running process using LD_PRELOAD
. Set the environment variable LD_PRELOAD="$CUNO_ROOT"/cuno.so
before executing a command, and Object Mount will be enabled for that command. To start a bash
instance with Object Mount loaded, run:
bash
and any command executed from within this instance will run with Object Mount enabled. However, other processes are not affected; this could be useful for unattended scripts.
Loading the library in this manner will {emphasis}not
apply the (cuno)
prefix to the prompt.
Environment variables
If Object Mount was not installed to a default location, first set the CUNO_ROOT
environment variable as described in user-guide-install-locations. Then, set the following environment variables for convenience:
Description | Environment Variable | Value |
---|---|---|
Load the Object Mount library | LD_PRELOAD | "${CUNO_ROOT}"/lib/cuno.so${LD_PRELOAD+:$LD_PRELOAD} |
Path-free access to Object Mount executables | PATH | "${CUNO_ROOT}"/bin:${PATH} |
Easy access to Object Mount manual pages | MANPATH | "${CUNO_ROOT}"/share/man:${MANPATH} |
Shell profiles
To always load Object Mount when starting a new interactive shell, append the following line to ~/.bashrc
or ~/.zshrc
:
/etc/profile.d
contains application-specific startup scripts, which are executed at user login by their respective login shells. A sample script is provided in ${CUNO_ROOT}/etc/profile.d/cunorc.sh
. Copy this to /etc/profile.d/
to enable Object Mount for all users.
Containerisation and HPC
Docker
There are multiple methods to use Object Mount from within Docker containers.
Automatic interception
Support for automatic Docker interception is currently experimental. For ways of running Docker with Object Mount interception manually, see user-guide-manual-docker-interception.
To enable automatic Docker interception, set the environment variable CUNO_INTERCEPT_DOCKER=1
and load Object Mount. Launching a Docker container via docker run …
will make Object Mount available inside the container. For instance, the following code will run a command inside an Ubuntu container with Object Mount enabled with the host's Object Mount credentials:
Object Mount options will be forwarded into the container. To override Object Mount options just for Docker containers, use the CUNO_DOCKER_OPTIONS
environment variable: if set, its value overrides that of CUNO_OPTIONS
inside Docker containers.
Manual interception
Besides automatic interception, the following methods can be used to enable Object Mount in Docker containers:
- Install Object Mount as part of the creation of the Docker image (see user-guide-download-and-install);
- Inject Object Mount at launch into an existing Docker image.
To inject Object Mount into a Docker container when it is launched:
Set
CUNO_CREDENTIALS
outside the container; see user-guide-credentials-management for details.Optionally, the
CUNO_OPTIONS
environment variable can be set using the--env
option ofdocker run
.Use the following options when using
docker run
:This uses the volume mount option (
-v
) to make Object Mount and other directories available to the container.This command requires Object Mount to already be installed and activated on the host system.
The
$CUNO_ROOT
environment variable should be set to wherever your Object Mount installation is:/opt/cuno
for a system-wide installation, and usually$HOME/.local/opt/cuno
for a user-local installation. See user-guide-install-locations for more information on installation locations.
The Object Mount credentials directory is only readable by the current user for security reasons. However, credentials may need to be accessed by processes run by other users (e.g. NGINX worker processes) within the Docker container. To enable this, bind mount the nested bindpoint
directory instead of the credentials directory:
Kubernetes
You can use Object Mount on Kubernetes clusters with the Object Mount Kubernetes CSI Driver. Please refer to the Object Mount K8s CSI Driver page.
Singularity
There are multiple methods for enabling Singularity images with Object Mount, allowing transparent access to cloud hosted files:
- Install Object Mount as part of the creation of the Singularity image
- Inject the Object Mount library at launch into an existing Singularity image
The following Singularity definition file will install Object Mount into an image:
The above will require that the Object Mount software package is available at the paths starting /home/admin/downloads
as listed in the %files
section.
Rather than modifying an existing Singularity image, another option is to pass-through the Object Mount library and binaries making them available inside the image. Optionally, the CUNO_OPTIONS
environment variable can also be set for a particular mode of operation.
The following commands demonstrate injecting Object Mount into a Singularity image:
This method requires Object Mount be installed and activated on the system that is used to execute the Singularity images.
The $CUNO_ROOT
environment variable should be set to wherever your Object Mount installation is: usually /opt/cuno
for a system-wide installation, and usually $HOME/.local/opt/cuno
for user-local installion. See user-guide-install-locations for more information on installation locations.
Alternatively, rather than using command options, the --bind
parameters can be specified as environment variables before the singularity
binary is called, making it easier to modify existing pipelines without changing the command line call, like so:
As another alternative, Object Mount can be used via a FUSE mount inside Singularity with the --fusemount
parameter:
This will allow software inside the container to access cloud buckets via the /cuno
path prefix.
Lmod
The Environment Modules system is a tool to help users manage shell environments, by allowing groups of related environment variable settings to be made or removed dynamically.
Many HPC environments incorporate module
as one of the means by which software can be loaded by their users.
A sample script has been provided within your Object Mount installation directory here: ${CUNO_ROOT}/share/modulefiles/cuno/{FULL-VERSION}.lua
, it is built specifically for the Lmod implementation in Lua, and uses values set to example paths (see the base
variable in particular) and default options that you might want to append to, modify or remove to suit your environment and your installation choices.
After adding the parent directory of the file to the MODULEPATH
with module use "${CUNO_ROOT}/share/modulefiles/cuno"
, a user should be able to run module load cuno
to add Object Mount to their environment.
Spectrum LSF
Depending on the exact requirements and setup, there are multiple ways of using Spectrum LSF with Object Mount.
First, assuming that Object Mount is installed on all compute nodes, that the cuno
executable is available in the PATH
, and that Object Mount credentials are configured for all nodes, jobs can be submitted by prefixing the submitted command with cuno run
(without quotes!), e.g.:
If further configuration of Object Mount is required, an LSF job starter can be created. The script should be created at the location $LSF_ENVDIR/cuno-starter.sh
, or some other location that is common to all LSF nodes (however, the queue template that ships with Object Mount assumes this location). The following script can be used as an outline for the job starter:
Make the job starter executable:
To configure a new LSF queue for Object Mount enabled jobs, fill in and append the LSF configuration template for Object Mount to lsb.queues
. Use the following command:
Afterwards, LSF needs to be reconfigured:
To check that the queue was set up correctly, run:
Regardless of whether an LSF queue was set up, the job starter can be used with the lsrun
command (but not bsub
!), e.g.:
To use the dedicated queue, specify it when invoking bsub
, e.g.: