3 Self-contained development, demonstration and testing environment for Arvados.
8 $ bin/arvbox reboot localdemo
16 arvbox (build|start|run|open|shell|ip|stop|reboot|reset|destroy|log|svrestart)
18 build <config> build arvbox Docker image
19 start|run <config> start arvbox container
20 open open arvbox workbench in a web browser
21 shell enter arvbox shell
22 ip print arvbox ip address
23 stop stop arvbox container
24 restart <config> stop, then run again
25 reboot <config> stop, build arvbox Docker image, run
26 reset delete arvbox arvados data (be careful!)
27 destroy delete all arvbox code and data (be careful!)
28 log <service> tail log of specified service
29 svrestart <service> restart specified service inside arvbox
30 clone <from> <to> clone an arvbox
35 * Linux 3.x+ and Docker 1.9+
36 * Minimum of 3 GiB of RAM + additional memory to run jobs
37 * Minimum of 3 GiB of disk + storage for actual data
42 Development configuration. Boots a complete Arvados environment inside the
43 container. The "arvados", "arvado-dev" and "sso-devise-omniauth-provider" code
44 directories along data directories "postgres", "var", "passenger" and "gems"
45 are bind mounted from the host file system for easy access and persistence
46 across container rebuilds. Services are bound to the Docker container's
47 network IP address and can only be accessed on the local host.
49 In "dev" mode, you can override the default autogenerated settings of Rails
50 projects by adding "application.yml.override" to any Rails project (sso, api,
51 workbench). This can be used to test out API server settings or point
52 Workbench at an alternate API server.
55 Demo configuration. Boots a complete Arvados environment inside the container.
56 Unlike the development configuration, code directories are included in the demo
57 image, and data directories are stored in a separate data volume container.
58 Services are bound to the Docker container's network IP address and can only be
59 accessed on the local host.
65 Publicly accessible development configuration. Similar to 'dev' except that
66 service ports are published to the host's IP address and can accessed by anyone
67 who can connect to the host system. WARNING! The public arvbox configuration
68 is NOT SECURE and must not be placed on a public IP address or used for
72 Publicly accessible development configuration. Similar to 'localdemo' except
73 that service ports are published to the host's IP address and can accessed by
74 anyone who can connect to the host system. WARNING! The public arvbox configuration
75 is NOT SECURE and must not be placed on a public IP address or used for
78 ## Environment variables
81 The location of Dockerfile.base and associated files used by "arvbox build".
82 default: result of $(readlink -f $(dirname $0)/../lib/arvbox/docker)
85 The name of the Docker container to manipulate.
89 The base directory to store persistent data for arvbox containers.
90 default: $HOME/.arvbox
93 The base directory to store persistent data for the current container.
94 default: $ARVBOX_BASE/$ARVBOX_CONTAINER
97 The root directory of the Arvados source tree
98 default: $ARVBOX_DATA/arvados
101 The root directory of the Arvados-dev source tree
102 default: $ARVBOX_DATA/arvados-dev
105 The root directory of the SSO source tree
106 default: $ARVBOX_DATA/sso-devise-omniauth-provider
108 ### ARVBOX_PUBLISH_IP
109 The IP address on which to publish services when running in public
110 configuration. Overrides default detection of the host's IP address.
114 Services are designed to install and auto-configure on start or restart. For
115 example, the service script for keepstore always compiles keepstore from source
116 and registers the daemon with the API server.
118 Services are run with process supervision, so a service which exits will be
119 restarted. Dependencies between services are handled by repeatedly trying and
120 failing the service script until dependencies are fulfilled (by other service
121 scripts) enabling the service script to complete.