Ticket 4591 - Slurm reservations to accept unix groups
Summary: Slurm reservations to accept unix groups
Status: RESOLVED WONTFIX
Alias: None
Product: Slurm
Classification: Unclassified
Component: User Commands (show other tickets)
Version: 17.11.0
Hardware: Linux Linux
: 4 - Minor Issue
Assignee: Tim Wickberg
QA Contact:
URL:
Depends on:
Blocks:
 
Reported: 2018-01-08 10:23 MST by NCAR SSG
Modified: 2020-09-21 16:38 MDT (History)
2 users (show)

See Also:
Site: UCAR
Alineos Sites: ---
Atos/Eviden Sites: ---
Confidential Site: ---
Coreweave sites: ---
Cray Sites: ---
DS9 clusters: ---
HPCnow Sites: ---
HPE Sites: ---
IBM Sites: ---
NOAA SIte: ---
OCF Sites: ---
Recursion Pharma Sites: ---
SFW Sites: ---
SNIC sites: ---
Linux Distro: ---
Machine Name:
CLE Version:
Version Fixed:
Target Release: ---
DevPrio: ---
Emory-Cloud Sites: ---


Attachments

Note You need to log in before you can comment on or make changes to this ticket.
Description NCAR SSG 2018-01-08 10:23:30 MST
On https://slurm.schedmd.com/scontrol.html under "SPECIFICATIONS FOR CREATE, UPDATE, AND DELETE COMMANDS, RESERVATIONS" header, there is no option to provide groups only users and/or accounts. Can we get this added since we may need users to change on a reservation during the life of a reservation?
Comment 1 NCAR SSG 2018-01-08 10:36:55 MST
Please make sure groups honor secondary posix groups, not just primary posix group.
Comment 2 Tim Wickberg 2018-01-08 13:00:25 MST
Hey Nate -

Please remember to set the Site to UCAR, or you'll get stuck in Severity 6 for a while.

We generally eschew anything related to the unix groups for performance reasons - constantly polling LDAP / NIS / whatever to verify user permissions is horrendously expensive, whereas slurmctld can always know which accounts correspond to which users.

Is there a reason you cannot use Slurm accounts here, and are thus asking for unix groups?

- Tim
Comment 3 NCAR SSG 2018-01-08 13:07:02 MST
Accounts are based on our funding sources and do not track directly with our unix groups. Accounts also come in and out of existence to what is effectively random timing to a systems perspective. We use local files for groups but wouldn't nscd also act to cache the groups to dull any performance hit. Would it also not be possible to document the perf hit to warn sites that have ldap/nis?
Comment 4 Tim Wickberg 2018-01-08 13:16:43 MST
(In reply to NCAR SSG from comment #3)
> Accounts are based on our funding sources and do not track directly with our
> unix groups. Accounts also come in and out of existence to what is
> effectively random timing to a systems perspective. We use local files for
> groups but wouldn't nscd also act to cache the groups to dull any
> performance hit. Would it also not be possible to document the perf hit to
> warn sites that have ldap/nis?

How do these reservations work then? Why can't whatever's creating them also figure out which account(s) to add in?

And yes, while it's technically feasible to build that, we really don't like giving people easy ways to shoot themselves in the foot. And the performance hit can be quite significant.

If you'd like, I can tag this as an enhancement request. My standard disclaimer does apply here though - we do not promise when/if we'll get to any of them, outside of requests handled under a custom development contract.
Comment 5 Ben Matthews 2018-01-08 13:27:22 MST
> How do these reservations work then? Why can't whatever's creating them also
> figure out which account(s) to add in?


Humans create them, and what might be one or two unix groups can map to a bunch of accounting groups. We don't get to influence the accounting groups (Slurm associations) too much - that's determined by financial allocations.
Comment 6 NCAR SSG 2018-01-10 12:54:37 MST
>
> How do these reservations work then?

With longer reservations, membership in groups can changes as projects
change and as people are hired/depart.


> Why can't whatever's creating them also figure out which account(s) to add
> in?

We could do this, some kind of cron job or maybe even a daemon that watches
for changes to groups and updates the reseveration. I personally rather not
write a scheduler to schedule our scheduler though.

we really don't like giving people easy ways to shoot themselves in the foot

 I like that plan but isn't documenting it sufficient, maybe even with a
warning at reservation creation?

tag this as an enhancement request
>
Please do if that is how this works. I also ask documentation be updated to
make it explicit groups are not support (yet).

Thanks
--Nate

On Mon, Jan 8, 2018 at 1:16 PM, <bugs@schedmd.com> wrote:

> *Comment # 4 <https://bugs.schedmd.com/show_bug.cgi?id=4591#c4> on bug
> 4591 <https://bugs.schedmd.com/show_bug.cgi?id=4591> from Tim Wickberg
> <tim@schedmd.com> *
>
> (In reply to NCAR SSG from comment #3 <https://bugs.schedmd.com/show_bug.cgi?id=4591#c3>)> Accounts are based on our funding sources and do not track directly with our
> > unix groups. Accounts also come in and out of existence to what is
> > effectively random timing to a systems perspective. We use local files for
> > groups but wouldn't nscd also act to cache the groups to dull any
> > performance hit. Would it also not be possible to document the perf hit to
> > warn sites that have ldap/nis?
>
> How do these reservations work then? Why can't whatever's creating them also
> figure out which account(s) to add in?
>
> And yes, while it's technically feasible to build that, we really don't like
> giving people easy ways to shoot themselves in the foot. And the performance
> hit can be quite significant.
>
> If you'd like, I can tag this as an enhancement request. My standard disclaimer
> does apply here though - we do not promise when/if we'll get to any of them,
> outside of requests handled under a custom development contract.
>
> ------------------------------
> You are receiving this mail because:
>
>    - You reported the bug.
>
>
Comment 7 Tim Wickberg 2018-01-18 18:52:23 MST
To jump back a bit, based on what you've described I don't see why the Accounts aren't sufficient.

Is there a disconnect between how your accounts are provisioned, vs. the projects that should have access to these long-lived reservations?

In such a case, would extending the reservations to handle access control based on QOS work instead?

I have no real interest in extending the reservation model to work on *nix groups, for the reasons previously outlined.
Comment 8 Tim Wickberg 2018-02-01 14:13:26 MST
Nate -

I haven't seen a response on comment 7, and am moving ahead to close this out. Please reopen + respond to those questions if you'd like to pursue this further.

- Tim