Difference between revisions of "CyberShake Training"
(10 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
This page is the entry point to documentation on the CyberShake software platform. | This page is the entry point to documentation on the CyberShake software platform. | ||
+ | |||
+ | If you are looking for the code: | ||
+ | *The workflow tools are available in the [https://github.com/SCECcode/cybershake-tools cybershake-tools Github repo] | ||
+ | *The science code is available in the [https://github.com/SCECcode/cybershake-core cybershake-core Github repo] | ||
We divide CyberShake training into the following elements: | We divide CyberShake training into the following elements: | ||
Line 24: | Line 28: | ||
CyberShake relies on Pegasus-WMS, HTCondor, and the Globus Toolkit running on shock.usc.edu, as well as code to generate a DAX description of the workflow. The workflow framework for CyberShake is described in detail at [[CyberShake Workflow Framework]]. | CyberShake relies on Pegasus-WMS, HTCondor, and the Globus Toolkit running on shock.usc.edu, as well as code to generate a DAX description of the workflow. The workflow framework for CyberShake is described in detail at [[CyberShake Workflow Framework]]. | ||
+ | |||
+ | == Workflow Monitoring == | ||
+ | |||
+ | There are multiple ways to monitor a CyberShake workflow, both locally and remotely. We describe the different ways at [[CyberShake Workflow Monitoring]]. | ||
== Study Framework == | == Study Framework == | ||
Line 30: | Line 38: | ||
== CyberShake utilities == | == CyberShake utilities == | ||
+ | |||
+ | == Extending CyberShake == | ||
+ | |||
+ | The steps required to add new elements CyberShake are here: [[Adding to CyberShake]]. | ||
+ | |||
+ | == CyberShake Glossary == | ||
+ | |||
+ | A glossary defining terms as used in CyberShake is available here: [[CyberShake Glossary]]. | ||
+ | |||
+ | == Training Videos == | ||
+ | |||
+ | In 2017-18, Scott Callaghan led a 12-part series trainings for Kevin Milner and Phil Maechling, roughly following the order of the links above. These videos are available below. | ||
+ | |||
+ | *[https://g-c662a6.a78b8.36fe.data.globus.org/cybershake/training/CyberShake_training_part_1_2017-11-02T12_11.mp4 CyberShake training, part 1] | ||
+ | *[https://g-c662a6.a78b8.36fe.data.globus.org/cybershake/training/CyberShake_training_part_2_2017-11-09T12_11.mp4 CyberShake training, part 2] | ||
+ | *[https://g-c662a6.a78b8.36fe.data.globus.org/cybershake/training/CyberShake_training_part_3_2018-01-18T15_01.mp4 CyberShake training, part 3] | ||
+ | *[https://g-c662a6.a78b8.36fe.data.globus.org/cybershake/training/CyberShake_training_part_4_2018-02-01T14_02.mp4 CyberShake training, part 4] | ||
+ | *[https://g-c662a6.a78b8.36fe.data.globus.org/cybershake/training/CyberShake_training_part_5_2018-02-08T14_02.mp4 CyberShake training, part 5] | ||
+ | *[https://g-c662a6.a78b8.36fe.data.globus.org/cybershake/training/CyberShake_training_part_6_2018-02-14T15_02.mp4 CyberShake training, part 6] | ||
+ | *[https://g-c662a6.a78b8.36fe.data.globus.org/cybershake/training/CyberShake_training_part_7_2018-03-02T14_03.mp4 CyberShake training, part 7] | ||
+ | *[https://g-c662a6.a78b8.36fe.data.globus.org/cybershake/training/CyberShake_training_part_8_2018-04-06T15_04.mp4 CyberShake training, part 8] | ||
+ | *[https://g-c662a6.a78b8.36fe.data.globus.org/cybershake/training/CyberShake_training_part_9_2018-04-13T12_04.mp4 CyberShake training, part 9] | ||
+ | *[https://g-c662a6.a78b8.36fe.data.globus.org/cybershake/training/CyberShake_training_part_10_2018-05-09T13_05.mp4 CyberShake training, part 10] | ||
+ | *[https://g-c662a6.a78b8.36fe.data.globus.org/cybershake/training/CyberShake_training_part_11_2018-09-27T16_09.mp4 CyberShake training, part 11] | ||
+ | *[https://g-c662a6.a78b8.36fe.data.globus.org/cybershake/training/CyberShake_training_part_12_2018-10-04T13_10.mp4 CyberShake training, part 12] | ||
== Related Entries == | == Related Entries == | ||
*[[CyberShake]] | *[[CyberShake]] | ||
*[[CME Project]] | *[[CME Project]] |
Latest revision as of 05:11, 19 January 2024
This page is the entry point to documentation on the CyberShake software platform.
If you are looking for the code:
- The workflow tools are available in the cybershake-tools Github repo
- The science code is available in the cybershake-core Github repo
We divide CyberShake training into the following elements:
- CyberShake data overview
- CyberShake code base
- CyberShake rupture file set
- CyberShake workflow middleware
- CyberShake utilities
Contents
CyberShake data
CyberShake produces a variety of output data products. A description of each kind of data product, and how to access them, is available at CyberShake Data.
CyberShake code base
A detailed description of all the pieces of the CyberShake scientific simulation codes is available at CyberShake Code Base.
CyberShake rupture files
Rupture files serve as a key input to CyberShake simulations. More information on their role, location, and format is available at CyberShake Rupture Files.
Workflow Framework
CyberShake relies on Pegasus-WMS, HTCondor, and the Globus Toolkit running on shock.usc.edu, as well as code to generate a DAX description of the workflow. The workflow framework for CyberShake is described in detail at CyberShake Workflow Framework.
Workflow Monitoring
There are multiple ways to monitor a CyberShake workflow, both locally and remotely. We describe the different ways at CyberShake Workflow Monitoring.
Study Framework
During CyberShake study execution, we use an additional layer of automation and monitoring around the workflow framework. These components are described at CyberShake Study Framework.
CyberShake utilities
Extending CyberShake
The steps required to add new elements CyberShake are here: Adding to CyberShake.
CyberShake Glossary
A glossary defining terms as used in CyberShake is available here: CyberShake Glossary.
Training Videos
In 2017-18, Scott Callaghan led a 12-part series trainings for Kevin Milner and Phil Maechling, roughly following the order of the links above. These videos are available below.
- CyberShake training, part 1
- CyberShake training, part 2
- CyberShake training, part 3
- CyberShake training, part 4
- CyberShake training, part 5
- CyberShake training, part 6
- CyberShake training, part 7
- CyberShake training, part 8
- CyberShake training, part 9
- CyberShake training, part 10
- CyberShake training, part 11
- CyberShake training, part 12