> Am 22.03.2018 um 16:33 schrieb leconte jérôme 
> <jerome.leco...@i2bc.paris-saclay.fr>:
> 
>> Maybe the correct question is - why do you not want the users to use SSH?
>> If you are trying to restrict users to only being able to access a node
>> that they have a job running on, there is a PAM module for that.
> 
>> Ian
> 
> 
> 
> Thank you Ian
> 
> now  My user  use ssh to execute their own program without using qsub.
> and it's not really fair for other user that use qsub.
> 
> Then the simpliest way  avoiding this is to forbiden the  connection
> 
> I'm not specialist of PAM and authentication have you got a link ?

After setting up the cluster in the way I outlined, this step is optional to 
allow users to peek around on the exechosts while their jobs are running (one 
can even limit the "cpu time" for the SSH login in the limit to prevent abuse 
of this granted option).

But this is optional. GridEngine writes the stderr and stdout files live (other 
queuingsystems copy them only after the job to the working directory [resp. 
specified directory]). Even setting the working directory to be $TMPDIR in the 
job script (as many jobs will put their scratch data just there), still allows 
to write any other file live. Some applications which won't accept any 
specified paths in command line argument can be tricked by a symbolic link. 
Imagine the special output is called "foo" and will go to $TMPDIR without 
option to change it, and you want to see it during execution without logging in 
to the node:

#!/bin/sh
...
OUTPUT_FILE=foo
WORKDIR=$(pwd)
cd $TMPDIR
ln -s "$WORKDIR/$OUTPUT_FILE"
# No typo: missing link name will use the file name of the target file

So it will in reality be written to the directory with the input file of the 
job (and often such "foo" files are small text files and won't create much 
network traffic or load on the file server).

-- Reuti
_______________________________________________
users mailing list
users@gridengine.org
https://gridengine.org/mailman/listinfo/users

Reply via email to