Skip to main content

AWS Batch Executor

Covalent is a Pythonic workflow tool used to execute tasks on advanced computing hardware.

This executor plugin interfaces Covalent with AWS Batch which allows tasks in a covalent workflow to be executed as AWS batch jobs.

Furthermore, this plugin is well suited for compute/memory intensive tasks such as training machine learning models, hyperparameter optimization, deep learning etc. With this executor, the compute backend is the Amazon EC2 service, with instances optimized for compute and memory intensive operations.

1. Installation

To use this plugin with Covalent, simply install it using pip:

pip install covalent-awsbatch-plugin

The required cloud resources can be created with:

covalent deploy up awsbatch

See Automated Cloud Compute Deployment for more information.

2. Usage Example

This is an example of how a workflow can be adapted to utilize the AWS Batch Executor. Here we train a simple Support Vector Machine (SVM) model and use an existing AWS Batch Compute environment to run the train_svm electron as a batch job. We also note we require DepsPip to install the dependencies when creating the batch job.

from numpy.random import permutation
from sklearn import svm, datasets
import covalent as ct

deps_pip = ct.DepsPip(
packages=["numpy==1.23.2", "scikit-learn==1.1.2"]
)

executor = ct.executor.AWSBatchExecutor(
s3_bucket_name = "covalent-batch-qa-job-resources",
batch_job_definition_name = "covalent-batch-qa-job-definition",
batch_queue = "covalent-batch-qa-queue",
batch_execution_role_name = "ecsTaskExecutionRole",
batch_job_role_name = "covalent-batch-qa-job-role",
batch_job_log_group_name = "covalent-batch-qa-log-group",
vcpu = 2, # Number of vCPUs to allocate
memory = 3.75, # Memory in GB to allocate
time_limit = 300, # Time limit of job in seconds
)

# Use executor plugin to train our SVM model.
@ct.electron(
executor=executor,
deps_pip=deps_pip
)
def train_svm(data, C, gamma):
X, y = data
clf = svm.SVC(C=C, gamma=gamma)
clf.fit(X[90:], y[90:])
return clf

@ct.electron
def load_data():
iris = datasets.load_iris()
perm = permutation(iris.target.size)
iris.data = iris.data[perm]
iris.target = iris.target[perm]
return iris.data, iris.target

@ct.electron
def score_svm(data, clf):
X_test, y_test = data
return clf.score(
X_test[:90],
y_test[:90]
)

@ct.lattice
def run_experiment(C=1.0, gamma=0.7):
data = load_data()
clf = train_svm(
data=data,
C=C,
gamma=gamma
)
score = score_svm(
data=data,
clf=clf
)
return score

# Dispatch the workflow
dispatch_id = ct.dispatch(run_experiment)(
C=1.0,
gamma=0.7
)

# Wait for our result and get result value
result = ct.get_result(dispatch_id=dispatch_id, wait=True).result

print(result)

During the execution of the workflow one can navigate to the UI to see the status of the workflow, Once completed however the above script should also output a value with the score of our model.

0.8666666666666667

3. Overview of Configuration

Config ValueIs RequiredDefaultDescription
profileNodefaultNamed AWS profile used for authentication
regionYesus-east-1AWS Region to use to for client calls
credentialsNo~/.aws/credentialsThe path to the AWS credentials file
batch_queueYescovalent-batch-queueName of the Batch queue used for job management
s3_bucket_nameYescovalent-batch-job-resourcesName of an S3 bucket where covalent artifacts are stored.
batch_job_definition_nameYescovalent-batch-jobsName of the Batch job definition for a user, project, or experiment.
batch_execution_role_nameNoecsTaskExecutionRoleName of the IAM role used by the Batch ECS agent (the above role should already exist in AWS).
batch_job_role_nameYedCovalentBatchJobRoleName of the IAM role used within the container.
batch_job_log_group_nameYescovalent-batch-job-logsName of the CloudWatch log group where container logs are stored.
vcpuNo2The number of vCPUs available to a task
memoryNo3.75Memory (in GB) available to a task
num_gpusNo0Number of GPUs available to a task.
retry_attemptsNo3Number of times a job is retried if it fails.
time_limitNo300Time limit (in seconds) after which jobs are killed.
poll_freqNo10Frequency (in seconds) with which to poll a submitted task.
cache_dirNo/tmp/covalentCache directory used by this executor for temporary files.

This plugin can be configured in one of two ways:

  1. Configuration options can be passed in as constructor keys to the executor class ct.executor.AWSBatchExecutor
  2. By modifying the covalent configuration file under the section [executors.awsbatch]

The following shows an example of how a user might modify their covalent configuration file to support this plugin:

[executors.awsbatch]
s3_bucket_name = "covalent-batch-job-resources"
batch_queue = "covalent-batch-queue"
batch_job_definition_name = "covalent-batch-jobs"
batch_execution_role_name = "ecsTaskExecutionRole"
batch_job_role_name = "CovalentBatchJobRole"
batch_job_log_group_name = "covalent-batch-job-logs"
...

4. Required Cloud Resources

The AWS resources tabulated below must exist to run workflows with the AWS Batch executor plugin. This plugin supports automated resource creation with:

covalent deploy up awsbatch

See Automated Cloud Compute Deployment for more information.

Config ValueIs RequiredDefaultDescription
AWS S3 BucketYescovalent-batch-job-resourcesS3 bucket must be created for covalent to store essential files that are needed during execution.
VPC & SubnetYesN/AA VPC must be associated with the AWS Batch Compute Environment along with a public or private subnet (there needs to be additional resources created for private subnets)
AWS Batch Compute EnvironmentYesN/AAn AWS Batch compute environment (EC2) that will provision EC2 instances as needed when jobs are submitted to the associated job queue.
AWS Batch QueueYesbatch_queueAn AWS Batch Job Queue that will queue tasks for execution in its associated compute environment.
AWS Batch Job DefinitionYesbatch_job_role_nameAn AWS Batch job definition that will be replaced by a new batch job definition when the workflow is executed.
AWS IAM Role (Job Role)Yesbatch_job_definition_nameThe IAM role used within the container.
AWS IAM Role (Execution Role)Nobatch_execution_role_nameThe IAM role used by the Batch ECS agent (default role ecsTaskExecutionRole should already exist).
Log GroupYesbatch_job_log_group_nameAn AWS CloudWatch log group where task logs are stored.

Alternatively, follow the steps below to manually create the required resources.

  1. To create an AWS S3 Bucket refer to the following AWS documentation.
  2. To create a VPC & Subnet refer to the following AWS documentation.
  3. To create an AWS Batch Queue refer to the following AWS documentation it must be a compute environment configured in EC2 mode.
  4. To create an AWS Batch Job Definition refer to the following AWS documentation the configuration for this can be trivial as covalent will update the Job Definition prior to execution.
  5. To create an AWS IAM Role for batch jobs (Job Role) one can provision a policy with the following permissions (below) then create a new role and attach with the created policy. Refer to the following AWS documentation for an example of creating a policy & role in IAM.
AWS Batch IAM Job Policy

{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "BatchJobMgmt",
"Effect": "Allow",
"Action": [
"batch:TerminateJob",
"batch:DescribeJobs",
"batch:SubmitJob",
"batch:RegisterJobDefinition"
],
"Resource": "*"
},
{
"Sid": "ECRAuth",
"Effect": "Allow",
"Action": [
"ecr:GetAuthorizationToken"
],
"Resource": "*"
},
{
"Sid": "ECRUpload",
"Effect": "Allow",
"Action": [
"ecr:GetDownloadUrlForLayer",
"ecr:BatchGetImage",
"ecr:BatchCheckLayerAvailability",
"ecr:InitiateLayerUpload",
"ecr:UploadLayerPart",
"ecr:CompleteLayerUpload",
"ecr:PutImage"
],
"Resource": [
"arn:aws:ecr:<region>:<account>:repository/<ecr_repo_name>"
]
},
{
"Sid": "IAMRoles",
"Effect": "Allow",
"Action": [
"iam:GetRole",
"iam:PassRole"
],
"Resource": [
"arn:aws:iam::<account>:role/CovalentBatchJobRole",
"arn:aws:iam::<account>:role/ecsTaskExecutionRole"
]
},
{
"Sid": "ObjectStore",
"Effect": "Allow",
"Action": [
"s3:ListBucket",
"s3:PutObject",
"s3:GetObject"
],
"Resource": [
"arn:aws:s3:::<s3_resource_bucket>/*",
"arn:aws:s3:::<s3_resource_bucket>"
]
},
{
"Sid": "LogRead",
"Effect": "Allow",
"Action": [
"logs:GetLogEvents"
],
"Resource": [
"arn:aws:logs:<region>:<account>:log-group:<cloudwatch_log_group_name>:log-stream:*"
]
}
]
}