-
Notifications
You must be signed in to change notification settings - Fork 18
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Questions regarding ticket renewal and alternative Slurm AuthType #66
Comments
Hi,
Concerning replacing Munge with a kerberos based approach as the Slurm AuthType, I would say that it is more a Slurm related feature than an auks one. This should be discussed with the Slurm developpers. But for sure, this is something of interest. I worked with a student in internship on a prototype of kerberized RPCs for Slurm about 10 years ago but it was unfortunately not as simple as creating a new AuthType plugin :(. The auth API of Slurm had to be modified and we never went further than a first roughly working proof of concept (using the GSSAPI, not the Auks internals). I am not even sure that I still have the code/patch, but if you are interested on working on that, I could do some digging and try to find that again. Matthieu |
Thank you for the detailled explanation, this is pretty much what I expected. Regarding Munge, I agree this is more of a Slurm issue and it's good to know that you've looked into it before. I might look into it once we've got everything set up. Don't worry too much about digging the code as it may take a while :) |
Reopening since I have an additional question: I've had time to experiment a little and I was wondering if there is any reason why the SPANK logic is done in There are cases where multiple jobstep can be running simultaneously (e.g. So why is AUKS operating at the jobstep level rather than the job level? |
@hautreux if it's not too much to ask, I would very interested if you could find it. |
I am sorry but I am no longer in a position to access that and last time I check I did not find the code. |
Hi,
We're in the process of evaluating AUKS for Kerberized deployments and I had few questions:
From my understanding,
auksdrenewer
is responsible for renewing the tickets inauksd
, while the SPANK plugin process will renew those on each compute nodes (withauks -R loop
). What happens when the ticket expires and is not renewable for long-running jobs? Is there a way to update the ticket ahead of time if the user got a fresh one? If so, does the user have to do this manually with the auks API or can it be automated somehow (something similar to GSS rekeying with PAM maybe?). Does it matter whether the job is running or not and is there any race we need to watch for?Has there been any effort towards replacing Munge with a Kerberos based approach as the Slurm AuthType? It doesn't look like this project is addressing this but I guess most of its infrastructure could be reused for it.
The text was updated successfully, but these errors were encountered: