Re: [slurm-users] configless DNS entries

2020-06-10 Thread gilles
Brian, If you really want to use DNS SRV records to implement configless, then you are looking for bind views https://kb.isc.org/docs/aa-00851 In a nutshell, the DNS server will reply with a SRV record that depends on the IP/subnet of the client. Cheers, Gilles - Original Message - > A

Re: [slurm-users] Change ExcNodeList on a running job

2020-06-10 Thread Ransom, Geoffrey M.
I'm just curious as to what causes a user to decide that a given node has an issue? If a node is healthy in all respects, why would a user decide not to use the node? Not enough free TMPDIR space, a GPU starts having memory errors, or a machine with a temporary issue that slurm hea

Re: [slurm-users] How to view GPU indices of the completed jobs?

2020-06-10 Thread David Braun
Hi Kota, This is from the job template that I give to my users: # Collect some information about the execution environment that may # be useful should we need to do some debugging. echo "CREATING DEBUG DIRECTORY" echo mkdir .debug_info module list > .debug_info/environ_modules 2>&1 ulimit -a >

Re: [slurm-users] [External] Re: ssh-keys on compute nodes?

2020-06-10 Thread Prentice Bisbal
Gladly! User based security means that you need to enter a user password or something similar like kerberos keys or SSH keys to authenticate with a different hosts. In every place I've worked, passwordless ssh keys were forbidden, so even if using SSH keys, that ssh key would need to be unlocke

Re: [slurm-users] How to view GPU indices of the completed jobs?

2020-06-10 Thread Michael Di Domenico
I don't know the answer, but have you checked the SQL tables in the database to see if the data you want is even being kept? its possible slurm is just throwing that value away. (i agree it would be nice if it was retrievable) On Wed, Jun 10, 2020 at 2:59 AM Kota Tsuyuzaki wrote: > > > -j -l`

Re: [slurm-users] ssh-keys on compute nodes?

2020-06-10 Thread Michael Jennings
On Tuesday, 09 June 2020, at 15:26:36 (-0400), Prentice Bisbal wrote: > Host-based security is not considered as safe as user-based security, so > should only be used in special cases. That's a pretty significant claim, and certainly one that would need to be backed up with evidence, references,