Extend SLURM jobs ownership at user level #58
Replies: 3 comments 3 replies
-
Right, the model that we are running on Leonardo and Vega HPCs is with a "service" account.
The service account can be linked to different SLURM accounts, and the plugin/the k8s cluster can authorize users to use one account or the other. So there is the concept of groups more than single users in the most common use cases we have at the moment. Nevertheless more fine grain delegation is possible, simply not coded yet into the current Slurm plugin. We have currently some use cases interested in passing down the interlink chain the sbatch option --uid to indicate the user that own the job. Be aware that this remove the capability of accepting k8s users that are not SLURM users (depending on the case it might be what you want to do though). |
Beta Was this translation helpful? Give feedback.
-
I understand, could you give me some tech details about this? By k8s administrator, I suppose you refer to a human operator, or something automated like an Admission Controller validating submitted tasks? Also, by service account, you mean a proper k8s SA? So it involves the use of RBACs, context, cluster role etc.. I also didn't fully get how this part works in practice: "The service account can be linked to different SLURM accounts, and the plugin/the k8s cluster can authorize users to use one account or the other." I'm just trying to understand how this all fits together :) PS: When you talk about the |
Beta Was this translation helpful? Give feedback.
-
Proposal for UID managementThis solution is to allow use cases where the SLURM plugin is running as root user, so it needs to "impersonate" a real UID to submit jobs. The value should be taken like follows:
Manage all the filesystem operation of the plugin (in preparation of the |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
How can we ensure that SLURM jobs submitted via Interlink through K8s by different users (like Bob) are attributed to the correct user within the SLURM system, rather than always appearing as owned by the Interlink process owner (Alice)?
This is particularly relevant when the Interlink SLURM plugin is active and bound to a specific local user on the edge node.
Beta Was this translation helpful? Give feedback.
All reactions