Welcome to the IBM TechXchange Community, a place to collaborate, share knowledge, & support one another in everyday challenges. Connect with your fellow members through forums, blogs, files, & face-to-face networking.
Join / sign up
In this blog entry I would like to present how to use the IBM Spectrum Scale with CSI Operator on Openshift 4.2 by introducing a sample Tensorflow deployment with assigned GPFS storage. The basic concepts of CSI, storage provisioning, deployment and service routes will be covered in detail. At...
In order to use Nvidia GPUs in an Openshift 4 cluster on worker nodes, you need to deploy the Special Resource Operator. There are some prerequisites that must be met before the operator can be installed correctly. Disable nouveau (RHEL worker node only) If your worker nodes are RHEL76 or...
IBM Spectrum Scale requires SSH configuration across it’s cluster for its management and administration. Each administration node must be able to run administration commands without the use of a password and without producing any extraneous messages. Also, most of the administration commands...
Acknowledgement to co-creators: Sandeep Patil, Prayas Gupta, Chetan Kulkarni, Prashant Sodhiya, Carl Zetie and Wayne Sawdon. IBM Spectrum Scale is a high performance file and object storage with security features covering from authentication of data to authorization of data to secure data at...
As a user of IBM Spectrum Scale, we need to be aware of the security on our Spectrum Scale cluster. That’s where security posture steps in. It gives us a graphical representation of IBM Spectrum Scale cluster's security aspects in Kibana. This enables IBM Spectrum Scale administrators to quickly...
Acknowledgement: Thanks to Asmahan Ali , Kumaran Rajaram, & Carl Zetie for their inputs. In an organization there can be different workloads requiring different security posture. As an example, one of the workloads is a high performance computing workload dealing with non-sensitive data...
Today, Artificial Intelligence (AI) & Analytics are ubiquitous across industry verticals. Healthcare & Life Science is one such industry where AI and analytics are being used for everything from drug discovery and personalized precision medicine, to predicting hospital walk in patients...
Threats from cyber attacks are at an all time high. These threat agents can be external, as well as internal, to an organization. Since 'data' is the new oil, most of these attacks are to directed to the data. It is either to illegitimately gain access to the data or to maliciously corrupt the...
In this blog entry I will present how to set up a sample remote cluster, show common configuration errors and solutions for them. Steps to enable a dedicated high speed network for GPFS daemon communication will be covered as well. This would provide very efficient storage access to locally...