-
Notifications
You must be signed in to change notification settings - Fork 0
Home
Martin Barker edited this page May 19, 2025
·
6 revisions
Welcome to the Rhapso wiki!
Here are links to download sample data for testing:
| Environment | CPU Compute Hours | Total Cost | Total Time | Input Data |
|---|---|---|---|---|
| Local | |
$ |
|
|
| Cloud | |
$ |
|
|
| SLURM | |
$ |
|
|
-
Install/setup Rhapso and sample data locally.
-
Ensure local input/output paths are correct inside
local_sample_pipeline.pyand run it:(venv) python Rhapso/Rhapso/pipelines/local_sample_pipeline.py
-
Create an AWS Glue 5.0 job.
-
Copy and paste the contents of the following file into the Glue job:
Rhapso/Rhapso/pipelines/cloud_sample_pipeline.py -
Run the Glue job.
-
Follow the Docker packaging instructions inside the following file:
Rhapso/Rhapso/pipelines/slurm_sample_pipeline.py -
Connect and run via SLURM.
-
Create an S3 Bucket:
- Go to the AWS Management Console.
- Navigate to S3 and create a new bucket (e.g.,
rhapso-deployments).
-
Set Up IAM Role and Policy:
- Create an IAM role with permissions to access the S3 bucket.
- Attach the following policy to the role:
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "s3:PutObject", "s3:GetObject", "s3:ListBucket" ], "Resource": [ "arn:aws:s3:::rhapso-deployments", "arn:aws:s3:::rhapso-deployments/*" ] } ] }
-
Configure GitHub Secrets:
- Go to your GitHub repository settings.
- Add the following secrets:
AWS_ACCESS_KEY_IDAWS_SECRET_ACCESS_KEY
-
GitHub Actions Workflow:
- Create a GitHub Actions workflow file (e.g.,
.github/workflows/deploy.yml) with the following content:name: Deploy to S3 on: push: branches: - main jobs: deploy: runs-on: ubuntu-latest steps: - name: Checkout code uses: actions/checkout@v4 - name: Configure AWS credentials uses: aws-actions/configure-aws-credentials@v1 with: aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }} aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }} aws-region: us-west-2 - name: Sync files to S3 run: | aws s3 sync . s3://rhapso-deployments --exclude ".git/*" --delete
- Create a GitHub Actions workflow file (e.g.,
-
Create IAM User:
- Go to the AWS Management Console.
- Navigate to IAM and create a new user (e.g.,
rhapso-deployer). - Attach the following policy to the user:
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "s3:PutObject", "s3:GetObject", "s3:ListBucket" ], "Resource": [ "arn:aws:s3:::rhapso-deployments", "arn:aws:s3:::rhapso-deployments/*" ] } ] }
-
Generate Access Keys:
- Generate access keys for the IAM user.
- Store the access keys securely and add them as GitHub secrets.
-
Revoking Credentials:
- To revoke credentials, go to the IAM user in the AWS Management Console.
- Delete the access keys or deactivate the user.
- Generate new access keys and update the GitHub secrets.
