About Big Red 3 at Indiana University

System overview

Note:
UITS Research Technologies will retire Big Red 3 on August 13, 2023. Big Red 3 users should plan to move to Quartz or Big Red 200 before the retirement date to ensure that their research continues without interruption. If you have questions about the retirement, contact UITS Research Technologies.
Big Red 3 is a Cray XC40 supercomputer dedicated to researchers, scholars, and artists with large-scale, compute-intensive applications that can take advantage of the system's extreme processing capability and high-bandwidth network topology. Big Red 3 supports programs at the highest level of the university, including the Grand Challenges program.

Featuring 930 dual-socket compute nodes equipped with Intel Haswell Xeon processors (22,464 compute cores), Big Red 3 has a theoretical peak performance (Rpeak) of 934 trillion floating-point operations per second (934 teraFLOPS). Big Red 3 runs a proprietary variant of Linux called Cray Linux Environment (CLE). In CLE, compute elements run a lightweight kernel called Compute Node Linux (CNL), and the service nodes run SUSE Enterprise Linux Server (SLES). Big Red 3 uses Slurm to coordinate resource management and job scheduling.

System access

IU students, faculty, staff, and affiliates can create Big Red 3 accounts using the instructions in Get additional IU computing accounts.

Once your account is created, you can use any SSH2 client to access bigred3.uits.iu.edu. Log in with your IU username and passphrase.

Notes:

HPC software

The Research Applications and Deep Learning (RADL) group, within the Research Technologies division of UITS, maintains and supports the high performance computing (HPC) software on IU's research supercomputers. To see which applications are available on a particular system, log into the system, and then, on the command line, enter module avail.

For information on requesting software, see Software requests in Policies regarding UITS research systems.

Set up your user environment

The IU research supercomputers use module-based environment management systems that provide a convenient method for dynamically customizing your software environment. Big Red 3 uses the Modules module management system.

For more, see Use modules to manage your software environment on IU research supercomputers.

Big Red 3 provides programming environments for the Cray, Intel, PGI, and GNU Compiler Collections (GCC) compilers. For information about using these compiler suites, see Compile programs on Big Red 3 at IU.

File storage options

For file storage information, see Available access to allocated and short-term storage capacity on IU's research systems.

To check your quota, use the quota command from the command line of any IU research supercomputer. If the quota command is not already loaded by default, use the module load quota command to add it to your environment. Alternatively, log in to HPC everywhere and, in the "HPC Status" pane, look under "Storage". The quota command and HPC everywhere both display disk (data) quotas and usage for your home directory space on the research supercomputers, your space on Slate, and your space on the Scholarly Data Archive (SDA), as applicable. HPC everywhere additionally displays your inode (file) quotas for these spaces.

Before storing data on this system, make sure you understand the information in the Work with data containing PHI section (below).

Work with data containing PHI

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) established rules protecting the privacy and security of individually identifiable health information. The HIPAA Privacy Rule and Security Rule set national standards requiring organizations and individuals to implement certain administrative, physical, and technical safeguards to maintain the confidentiality, integrity, and availability of protected health information (PHI).

This UITS system or service meets certain requirements established in the HIPAA Security Rule thereby enabling its use for work involving data that contain protected health information (PHI). However, using this system or service does not fulfill your legal responsibilities for protecting the privacy and security of data that contain PHI. You may use this system or service for work involving data that contain PHI only if you institute additional administrative, physical, and technical safeguards that complement those UITS already has in place.

For more, see Your legal responsibilities for protecting data containing protected health information (PHI) when using UITS Research Technologies systems and services.

Note:
Although PHI is classified as Critical data, other types of institutional data classified as Critical are not permitted on Research Technologies systems. For help determining which institutional data elements classified as Critical are considered PHI, see About protected health information (PHI) data elements in the classifications of institutional data.

If you have questions about securing HIPAA-regulated research data at IU, email securemyresearch@iu.edu. SecureMyResearch provides self-service resources and one-on-one consulting to help IU researchers, faculty, and staff meet cybersecurity and compliance requirements for processing, storing, and sharing regulated and unregulated research data; for more, see About SecureMyResearch. To learn more about properly ensuring the safe handling of PHI on UITS systems, see the UITS IT Training video Securing HIPAA Workflows on UITS Systems. To learn about division of responsibilities for securing PHI, see Shared responsibility model for securing PHI on UITS systems.

Run jobs on Big Red 3

Big Red 3 uses the Slurm workload manager for resource management and job scheduling; see Use Slurm to submit and manage jobs on IU's research computing systems.

In Slurm, compute resources are grouped into logical sets called partitions, which are essentially job queues. To view details about available partitions and nodes, use the sinfo command; for more about using sinfo, see the View partition and node information section of Use Slurm to submit and manage jobs on IU's research computing systems.

Notes:
  • Big Red 3 jobs are allocated memory based on task count (--ntasks-per-node). Each task receives 1.2 GB of memory (for example, four tasks will receive 4.8 GB, and so on). If needed, users may request additional memory using the --mem flag. The maximum memory you can request on a node is 58 GB. For example, in a batch script:
        #SBATCH -mem=58G
        

    For an interactive job request:

        srun -p general -N 1 --ntasks-per-node=4 --mem=4G --time=1:00:00 --pty bash
        
  • Each Big Red 3 compute node has 48 hyper-threaded CPU cores and 24 physical CPU cores. Users can share compute nodes among their own jobs when not requesting all the cores on a node. If none of the jobs has unique resource constraints, such as special memory requirements, Slurm automatically stacks up to 24 jobs on one compute node. For example, if you submit four jobs, each requesting 12 cores, Slurm will place them on the same node. To prevent this behavior, you can request all the cores on a node by adding the following directives to your Slurm job script:
        #SBATCH --nodes=1
        #SBATCH --ntasks-per-node=48
        

    If you request all 48 cores on a node but want to use fewer cores for your run, use the -n flag to specify that in your srun command; for example:

        srun -n 24 a.out 
        

    Otherwise, srun will launch the application with 48 cores.

Acknowledge grant support

The Indiana University cyberinfrastructure, managed by the Research Technologies division of UITS, is supported by funding from several grants, each of which requires you to acknowledge its support in all presentations and published works stemming from research it has helped to fund. Conscientious acknowledgment of support from past grants also enhances the chances of IU's research community securing funding from grants in the future. For the acknowledgment statement(s) required for scholarly printed works, web pages, talks, online publications, and other presentations that make use of this and/or other grant-funded systems at IU, see Sources of funding to acknowledge in published work if you use IU's research cyberinfrastructure

Get help

Support for IU research supercomputers, software, and services is provided by various teams within the Research Technologies division of UITS.

For general questions about research computing at IU, contact UITS Research Technologies.

For more options, see Research computing support at IU.

This is document aoku in the Knowledge Base.
Last modified on 2023-03-27 16:12:06.