--- layout: default navsection: installguide title: Prerequisites ... h2. Hardware (or virtual machines) This guide assumes you have seven systems available in the same network subnet:
table(table table-bordered table-condensed). |_Function_|_Number of nodes_| |Arvados API, Crunch dispatcher, Git, Websockets and Workbench|1| |Arvados Compute node|1| |Arvados Keepproxy server|1| |Arvados Keepstore servers|2| |Arvados Shell server|1| |Arvados SSO server|1|
The number of Keepstore, shell and compute nodes listed above is a minimum. In a real production installation, you will likely run many more of each of those types of nodes. In such a scenario, you would probably also want to dedicate a node to the Workbench server and Crunch dispatcher, respectively. For performance reasons, you may want to run the database server on a separate node as well. h2(#repos). Arvados package repositories On any host where you install Arvados software, you'll need to set up an Arvados package repository. They're available for several popular distributions. h3. CentOS Packages are available for CentOS 6. First, register the Curoverse signing key in RPM's database: {% include 'install_redhat_key' %} Then save this configuration block in @/etc/yum.repos.d/arvados.repo@:
[arvados]
name=Arvados
baseurl=http://rpm.arvados.org/CentOS/$releasever/os/$basearch/
h3. Debian and Ubuntu Packages are available for Debian 7 ("wheezy"), Debian 8 ("jessie"), Ubuntu 12.04 ("precise"), and Ubuntu 14.04 ("trusty"). First, register the Curoverse signing key in apt's database: {% include 'install_debian_key' %} Configure apt to retrieve packages from the Arvados package repository. This command depends on your OS vendor and version: table(table table-bordered table-condensed). |OS version|Command| |Debian 7 ("wheezy")|echo "deb http://apt.arvados.org/ wheezy main" | sudo tee /etc/apt/sources.list.d/arvados.list| |Debian 8 ("jessie")|echo "deb http://apt.arvados.org/ jessie main" | sudo tee /etc/apt/sources.list.d/arvados.list| |Ubuntu 12.04 ("precise")|echo "deb http://apt.arvados.org/ precise main" | sudo tee /etc/apt/sources.list.d/arvados.list| |Ubuntu 14.04 ("trusty")|echo "deb http://apt.arvados.org/ trusty main" | sudo tee /etc/apt/sources.list.d/arvados.list| {% include 'notebox_begin' %} Arvados packages for Ubuntu may depend on third-party packages in Ubuntu's "universe" repository. If you're installing on Ubuntu, make sure you have the universe sources uncommented in @/etc/apt/sources.list@. {% include 'notebox_end' %} Retrieve the package list:
~$ sudo apt-get update
h2. A unique identifier Each Arvados installation should have a globally unique identifier, which is a unique 5-character lowercase alphanumeric string. For testing purposes, here is one way to make a random 5-character string:
~$ tr -dc 0-9a-z </dev/urandom | head -c5; echo
You may also use a different method to pick the unique identifier. The unique identifier will be part of the hostname of the services in your Arvados cluster. The rest of this documentation will refer to it as your @uuid_prefix@. h2. SSL certificates There are six public-facing services that require an SSL certificate. If you do not have official SSL certificates, you can use self-signed certificates. {% include 'notebox_begin' %} Most Arvados clients and services will accept self-signed certificates when the @ARVADOS_API_HOST_INSECURE@ environment variable is set to @true@. However, web browsers generally do not make it easy for users to accept self-signed certificates from Web sites. Users who log in through Workbench will visit three sites: the SSO server, the API server, and Workbench itself. When a browser visits each of these sites, it will warn the user if the site uses a self-signed certificate, and the user must accept it before continuing. This procedure usually only needs to be done once in a browser. After that's done, Workbench includes JavaScript clients for other Arvados services. Users are usually not warned if these client connections are refused because the server uses a self-signed certificate, and it is especially difficult to accept those cerficiates: * JavaScript connects to the Websockets server to provide incremental page updates and view logs from running jobs. * JavaScript connects to the API and Keepproxy servers to upload local files to collections. In sum, Workbench will be much less pleasant to use in a cluster that uses self-signed certificates. You should avoid using self-signed certificates unless you plan to deploy a cluster without Workbench; you are deploying only to evaluate Arvados as an individual system administrator; or you can push configuration to users' browsers to trust your self-signed certificates. {% include 'notebox_end' %} By convention, we use the following hostname pattern:
table(table table-bordered table-condensed). |_Function_|_Hostname_| |Arvados API|@uuid_prefix@.your.domain| |Arvados Git server|git.@uuid_prefix@.your.domain| |Arvados Keepproxy server|keep.@uuid_prefix@.your.domain| |Arvados SSO Server|auth.your.domain| |Arvados Websockets endpoint|ws.@uuid_prefix@.your.domain| |Arvados Workbench|workbench.@uuid_prefix@.your.domain|