Ansys HPC Platform Core Services are the core set of services required to run the platform.
| Service | Purpose | Description | Created by |
|---|---|---|---|
| Job Management Service (JMS) | Central hub for storing all information about jobs including their status and associated data | Both users/clients and compute workers contact the Job Management Service to perform various tasks such as creating jobs or collecting work to be done. | Ansys |
| Job Management Web Service | Provides a web interface for interaction with Ansys HPC Platform Services | Delivers the Ansys HPC Manager web app that users run to define, monitor, and manage solve jobs. | Ansys |
| Resource Management Service (RMS) | Central place for registering and configuring compute workers |
Workers register themselves with the Resource Management Service, making them available for work. When workers are registered, this captures basic details about their capabilities (hardware, queues, and so on). This enables the resources to be viewed and potentially selected via the Ansys HPC Manager web app or clients. | Ansys |
| Data Transfer Service (DTS) | File transfer | Handles the efficient transfer of files – uploading input files from users/clients to the compute resources and downloading output files back. | Ansys |
| Monitor Service | Observability |
Provides observability features, collecting system metrics (using InfluxDB) that feed insights into the Ansys HPC Manager web app. This allows users and administrators to monitor the system's health and status and perform actions (such as remediation) when an issue occurs. | Ansys |
| Housekeeper | Job cleanup | A background service responsible for routine cleanup tasks such as removing expired or invalid job records from the JMS database. | Ansys |
| Keycloak | Identity and access management (to ensure that only authorized users get access to your resources) |
Users authenticate with Keycloak rather than the application. Keycloak handles user authentication (signing in) and authorization (determining permissions), ensuring secure access to the platform. A variety of options for authentication and authorization are available, including integration with existing IAM systems if desired. More info: https://www.keycloak.org | Third party (open source) |
| Traefik | Security, networking gateway |
Enables simple and secure communication between services. Acts as a secure network gateway and reverse proxy. It directs incoming user traffic (for example, browser requests) to the appropriate backend service (like the Job Management Web Service or Keycloak) and simplifies secure HTTPS communication. More info: https://github.com/traefik/traefik | Third party (open source) |