You can turn on system firewalls, and allow all inbound port TCP traffic from all cluster nodes, only. And then open ssh ports to on-site, or some other restricted set of subnets. Perhaps that will satisfy your InfoSec team.
If you use Univa GridEngine, you can specify the ‘port_range’ option for the daemons in the global configuration. -Hugh On Oct 26, 2017, at 18:42, Christopher Heiny <che...@synaptics.com<mailto:che...@synaptics.com>> wrote: On Thu, 2017-10-26 at 23:49 +0200, Reuti wrote: Hi, Am 26.10.2017 um 23:31 schrieb Christopher Heiny: Hi folks, We're using OGS 2011.11p1. qrsh has been configured to use ssh for connections. This worked fine when we were running with no firewall, but the InfoSec team recently specified that all unused ports must be firewalled (actually, a rather sensible thing to do). This depends on the cluster setup. The headnode which is connected to the outside world needs a firewall on this interface for sure. But inside the cluster, either in this interface of the headnode or the nodes themselves, there is usually no need for a firewall. MPI would have a similar problem (while there you can define a range of used ports for some implementations). Are you issuing `qrsh` on the headnode of the cluster? As a direct connection from the node to the machine where the command was issued is necessary, often it's not a local machine outside of the cluster. Our setup consists of 10 general-use nodes that users can log into directly or can access via qsub (and we'd like qrsh), 50 worker nodes that can only be accessed via qsub (and maybe qrsh), one master node and one shadow master (which share some cores as worker nodes). The IT department didn't want the workers on private network, so all the nodes are on the same subnet. According to InfoSec, that means we need firewalls. Unfortunately, it looks like qrsh chooses the ssh port at random. Yes. Grumble. I sure was hoping I was wrong. Perhaps the SSH tunneling solution some people have mentioned on the intertubes will do the trick. Thanks, Chris -- Reuti While InfoSec will allow a range of ports to be opened for qrsh, opening 1024..65535 definitely won't fly. Is there a way to tell GridEngine to use a certain range of ports for qrsh connections? I suspect not, but perhaps I've missed something. Thanks, Chris _______________________________________________ users mailing list users@gridengine.org<mailto:users@gridengine.org> https://gridengine.org/mailman/listinfo/users _______________________________________________ users mailing list users@gridengine.org<mailto:users@gridengine.org> https://gridengine.org/mailman/listinfo/users
_______________________________________________ users mailing list users@gridengine.org https://gridengine.org/mailman/listinfo/users