Brian,
If you really want to use DNS SRV records to implement configless,
then you are looking for bind views
https://kb.isc.org/docs/aa-00851
In a nutshell, the DNS server will reply with a SRV record
that depends on the IP/subnet of the client.
Cheers,
Gilles
- Original Message -
> A
I'm just curious as to what causes a user to decide that a given node has
an issue?
If a node is healthy in all respects, why would a user decide not to use
the node?
Not enough free TMPDIR space, a GPU starts having memory errors, or a machine
with a temporary issue that slurm hea
Hi Kota,
This is from the job template that I give to my users:
# Collect some information about the execution environment that may
# be useful should we need to do some debugging.
echo "CREATING DEBUG DIRECTORY"
echo
mkdir .debug_info
module list > .debug_info/environ_modules 2>&1
ulimit -a >
Gladly! User based security means that you need to enter a user password
or something similar like kerberos keys or SSH keys to authenticate with
a different hosts. In every place I've worked, passwordless ssh keys
were forbidden, so even if using SSH keys, that ssh key would need to be
unlocke
I don't know the answer, but have you checked the SQL tables in the
database to see if the data you want is even being kept? its possible
slurm is just throwing that value away. (i agree it would be nice if
it was retrievable)
On Wed, Jun 10, 2020 at 2:59 AM Kota Tsuyuzaki
wrote:
>
> > -j -l`
On Tuesday, 09 June 2020, at 15:26:36 (-0400),
Prentice Bisbal wrote:
> Host-based security is not considered as safe as user-based security, so
> should only be used in special cases.
That's a pretty significant claim, and certainly one that would need
to be backed up with evidence, references,