You can turn on system firewalls, and allow all inbound port TCP traffic from 
all cluster nodes, only. And then open ssh ports to on-site, or some other 
restricted set of subnets. Perhaps that will satisfy your InfoSec team.

If you use Univa GridEngine, you can specify the ‘port_range’ option for the 
daemons in the global configuration.

-Hugh

On Oct 26, 2017, at 18:42, Christopher Heiny 
<che...@synaptics.com<mailto:che...@synaptics.com>> wrote:

On Thu, 2017-10-26 at 23:49 +0200, Reuti wrote:
Hi,

Am 26.10.2017 um 23:31 schrieb Christopher Heiny:


Hi folks,

We're using OGS 2011.11p1.  qrsh has been configured to use ssh for
connections.  This worked fine when we were running with no
firewall,
but the InfoSec team recently specified that all unused ports must
be
firewalled (actually, a rather sensible thing to do).

This depends on the cluster setup. The headnode which is connected to
the outside world needs a firewall on this interface for sure. But
inside the cluster, either in this interface of the headnode or the
nodes themselves, there is usually no need for a firewall. MPI would
have a similar problem (while there you can define a range of used
ports for some implementations).

Are you issuing `qrsh` on the headnode of the cluster? As a direct
connection from the node to the machine where the command was issued
is necessary, often it's not a local machine outside of the cluster.

Our setup consists of 10 general-use nodes that users can log into
directly or can access via qsub (and we'd like qrsh), 50 worker nodes
that can only be accessed via qsub (and maybe qrsh), one master node
and one shadow master (which share some cores as worker nodes).  The IT
department didn't want the workers on private network, so all the nodes
are on the same subnet.  According to InfoSec, that means we need
firewalls.


Unfortunately, it looks like qrsh chooses the ssh port at random.

Yes.

Grumble.  I sure was hoping I was wrong.  Perhaps the SSH tunneling
solution some people have mentioned on the intertubes will do the
trick.

                   Thanks,
                       Chris


-- Reuti



 While InfoSec will allow a range of ports to be opened for qrsh,
opening 1024..65535 definitely won't fly.  Is there a way to tell
GridEngine to use a certain range of ports for qrsh connections?  I
suspect not, but perhaps I've missed something.

                   Thanks,
                       Chris
_______________________________________________
users mailing list
users@gridengine.org<mailto:users@gridengine.org>
https://gridengine.org/mailman/listinfo/users



_______________________________________________
users mailing list
users@gridengine.org<mailto:users@gridengine.org>
https://gridengine.org/mailman/listinfo/users
_______________________________________________
users mailing list
users@gridengine.org
https://gridengine.org/mailman/listinfo/users

Reply via email to