The Rockfish cluster is used by hundreds of users on a daily basis. The Rockfish cluster has a few login nodes where all users connect to conduct their computing and research. The login nodes are an interface between all compute nodes and the users. We all need to follow good practices to create a friendly environment and ensure that one’s activity does not negatively impact the system and many or all other users.
What is allowed on login nodes:
- Request an interactive session
- Compile your codes, for example run “make”. Be careful if you are running commands with multiple processes, for example while “make -j 4” may be fine, “make -j 20” may impact other users.
- Check your jobs
- Edit files, scripts, manipulate files
- Submit jobs
- sbatch script-name
- Look at output files
- more file-name
What is NOT allowed on the login nodes:
- Run jobs (./a.out or any other executables)
- rsync or copy large number of files
- Run applications like Matlab (use an interactive session)
Any individual with access to the Advanced Research Computing @ Hopkins (ARCH) facility resources.
A username (userid) associated with a user, that allows access to ARCH resources. Read more here: Request an Account.
A set number of service units (SUs) granted to a specific project. A single account (userid) may have access to one or more allocations.
Principal Investigator (PI)
A user that manages one or more allocations, including the ability to grant access to the allocation(s). PIs are usually faculty members.
Accounts and Allocations
PIs can create projects using the Coldfront Portal and request allocations according to the approved proposal (see JHU-Allocations). PIs can also give proxy status to any user if they require help to manage their projects, allocations and users.
All users request an account through the Coldfront Portal. To be added to projects and allocations, a user must notify their PI after requesting the account.
One of ARCH’s goals is to promote collaborations. PIs can sponsor external accounts (ext-userid, this tag is used to identify users and more easily manage accounts).
Acceptance of Terms
Each account is associated with a single user and must not be shared with other individuals, whether or not those individuals are affiliated with the user’s research group.
Users must refrain from sharing passwords and have a responsibility to keep their passwords safe.
The technical support team will never ask a user for their account password. However, there may be some cases when resetting a user’s password is necessary to troubleshoot issues.
Users agree to immediately report the ARCH administration any security flaw found while refraining from exploiting the flaw.
Users may only run computationally intensive applications using the compute nodes and by submitting jobs to the resource manager.
Users must refrain from running resource intensive programs on the login nodes. Any procedure to circumvent the resource manager and directly use a compute node must be reported to the ARCH administration and not be exploited.
Users are responsible for abiding by the U.S. export controls regulation and acquiring licenses when needed.
All publications relying directly on data generated or software developed with ARCH resources shall acknowledge the allocation granted under which resources were used. PI’s should abide with the proposal guidelines and upload publications to the Rockfish portal as soon as these are available.