Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

If you are familiar with supercomputing on Sol or Agave/Phoenix, Aloe will feel quite similar. However, due to the security requirements and technological differncesdifferences, there are several differences changes between general-use systems like Sol and HIPPA HIPAA complement systems like Aloe.

Table of Contents
minLevel1
maxLevel6
outlinefalse
typelist
separatorpipe
printablefalse

Internet Access is Restricted

...

While Sol and Agave/Phoenix have very large scratch filesystems for high IO computing, Aloe does not. Computing directly from your Home directory or project space is perfectly acceptable as these are designed to be computed on used for computing in this environment. If you have a job that benefits from fast disk access, then you can use the per-job ephemeral storage located at /tmp for faster results.

See ##Ignore for now Using /tmp in Aloe for more information.

Private Slurm Data

Many aspects of the Slurm scheduler have been marked as private and are not viewable to users. For example, you may see the message: slurm_load_partitions: Access/permission denied when viewing slurm information, such as the squeue or myjobs commands. This is not an error; this is expected behavior. This message can be ignored as it does not limit you from viewing information about your jobs and only restricts viewing overall information about partitions, which has been intentionally restricted.

You are not able to see information about other user's jobs.

While these restrictions are in place, it is still important to keep job names free from any PHI, PII, or anything that could be related to private information

No MPI Support

Aloe is not configured with a high-speed fabric for multinode computations. Parallelization can only be achieved with multicore on a single node.

Non-Accessible Compute Nodes

You are not able to SSH directly to a compute node, even if you have a job running on it. You will receive the error: Access denied by pam_slurm_adopt: you have no active jobs on this node. This is expected behavior.

You are not able to see information about other user's jobs.

While these restrictions are in place, it is still important to keep job names free from any PHI, PII, or anything that could be related to private information

Job Notifications

Aloe cannot send email notifications about jobs, such as when they start, end, or fail. Instead, Aloe will send Slack messages directly to you via a bot named “aloe-slurm-bot”. You will need to use the official ASU Slack to receive these notifications. To enable thisnotifications, add the following to your job script:

Code Block
#SBATCH --mail-type=ALL
Info

Note: MailUser will always be set to your ASURITE - you cannot change this value.

For general help with Slack, see the official ET Slack page: https://tech.asu.edu/slack

For help with the aloe-slurm-bot, submit a request at https://links.asu.edu/kesc-support.

Web Portal

The Aloe web portal is more restricted than Sol or Agave/Phoenix. For example:

  • Downloading files is restricted to using Globus

  • Uploading files is discouraged. Use See using Globus

  • The job composer has been disabled

  • The Active Jobs will only display your jobs regardless of the filter

  • A status page is not available at this time

  • There is no way to submit support tickets via the web portal. Instead, email asre-support@asu.edu . A request can be submitted at https://links.asu.edu/kesc-support

Data Ingress and Egress

Sol and Agave/Phoenix have less restricted ways of transferring data, and allow for ease of sharing data between users in the same group.

In a HIPPA HIPAA environment, data movement and sharing are governed by strict policies to ensure no breach of confidential information. Per section 5 6 of the acceptable use policy Acceptable Use Policy:

Sensitive data (e.g., ePHI, PII, HIPAA, other restricted forms of data) must remain inside the KESC environment unless explicit permission to transfer data has been granted by the PI and a member of KESC Management.

If data is being sent to a subcontractor or other agent, additional contractual documents such as
a Data Use Agreement or Business Associate Agreement.

Data may only be transferred into or out of ASRE KE Secure Cloud using approved methods such as Globus, SFTP, and similar authenticated, authorized, and encrypted methods.

Because of this, downloading data from the Web Portal has been restricted.

Please see https://asurc.atlassian.net/wiki/spaces/ASREPUBLICKESC/pages/19090637561913290767/Data+Storage+and+Transfer for acceptable data transfer methods.

Additional information on transferring data can be found in the Data Management and Storage document.

If you have questions about how to move your data in or out of KESC, please contact asre-support@asu.edu submit a request at https://links.asu.edu/kesc-support.

Warning

If you suspect a data leak of PII leak has occurred, report it immediately to KESC staff!

File Permissions

Aloe uses NFS 4 with FACLs (File Access Control Lists) for all networked storage. This includes /home, /globus, /projects, and /rc/packages. These directory permissions may appear with as the owner or group as ke_ldap_app or domain users. The NFS FACL may not appear to translate to POSIX style permissions (ie. drwxrwx--- or mode 770) as one might expect. Regardless of what POSIX permissions say, the enforced permissions are of the NFS FACL. For an accurate view of the FACL permissions, use the command nfs4_getfacl

For example:

Code Block
[jeburks2@ac001 ~]$ nfs4_getfacl ~/testjob.sh 
# file: /home/jeburks2/testjob.sh
A::OWNER@:rwadxtTnNcy

For more information about NFS FACLs, see these recommended readings:

https://www.osc.edu/book/export/html/4523

https://linux.die.net/man/5/nfs4_acl

Warning

This is a secure environment and it should go without saying but do NOT set files or directories to be readable, writeable, executable, traversable, or in any other way accessed by another user. Home directory permissions are inherited by files, there should be no need to use chmod except for enabling a file to be executable or to further restrict permissions.

If you suspect a data leak of PII leak has occurred, report it immediately to KESC staff!

To share files with someone who is authorized to access them, use a shared storage space such as /projects or /globus

Insert excerpt
Additional Help Excerpt
Additional Help Excerpt
nopaneltrue

...