These R scripts contain the benchmarking logic for the MSstats-based proteomics data analysis. They execute specific workflows to analyze proteomics datasets, compute metrics (e.g., False Discovery Rate (FDR)), and ensure the validity of the MSstats library's updates. The scripts read input data, process it, and output benchmarking metrics.
This SLURM configuration file automates the execution of the R benchmarking script on an HPC system. It includes directives for resource allocation, job naming, and runtime limits. It ensures efficient utilization of HPC resources for running computationally intensive workflows.
This YAML configuration file is part of a GitHub Actions pipeline. It defines workflows for automating benchmarking tasks. The file contains instructions for setting up the R environment, pulling the required repositories, and executing the benchmarks.
Ensure you have access to the following:
- An HPC account with SLURM job scheduler.
- Required R dependencies installed (check benchmark_{Name_of_Dataset}.R
for library imports).
- A GitHub account with access to the repository containing these files.
config.slurm
files to your HPC environment.config.slurm
file to include your job-specific parameters (e.g., email, account name, partitions).sbatch config.slurm
.benchmark.yml
file in the .github/workflows/
directory of your repository.benchmark.yml
file with appropriate paths and repository settings.benchmark_{Name_of_dataset}.R
script.In this setup, SSH is needed to securely connect to the HPC cluster, submit SLURM jobs, and transfer benchmarking scripts and results. Private keys without passwords are essential for automation, allowing GitHub Actions to authenticate and run benchmarks without manual input. This ensures smooth execution of workflows, enabling continuous integration without interruptions. It also enhances security by eliminating the risks of password-based authentication while maintaining controlled access.
On the new user's local machine, generate an SSH key pair (if not already created):
ssh-keygen -t rsa -b 4096 -C "new_user_email@example.com"
Example : current user email configured is : raina.ans@login-00.discovery.neu.edu
You can check this by navigating to shell through Discovery Cluster Dashboard > Clusters > Discovery Shell Access
Enter
to use the default (~/.ssh/id_rsa
).SSH into the remote server using an existing account with sufficient privileges:
bash
ssh existing_user@remote_server (e.g. raina.ans@login-00.discovery.neu.edu)
Append the public key to the authorized_keys
file:
bash
mkdir -p ~/.ssh
echo "paste_the_public_key_here" >> ~/.ssh/authorized_keys
chmod 600 ~/.ssh/authorized_keys
chmod 700 ~/.ssh
From the new user's local machine, attempt to log in to the remote server:
ssh new_user@remote_server
If successful, the new user should be logged into the remote server.
SSH_PRIVATE_KEY
).To use this secret in a GitHub Actions workflow, see the current configured secret's use case.
.ssh
directory and authorized_keys
file.Add the following code to your website.
For more information on customizing the embed code, read Embedding Snippets.