Differences between revisions 5 and 6
Revision 5 as of 2012-03-03 22:30:43
Size: 2371
Comment:
Revision 6 as of 2013-10-29 18:18:42
Size: 1073
Comment:
Deletions are marked like this. Additions are marked like this.
Line 22: Line 22:

In many of these cases, you should receive an automatic mail pointing out that you're abusing the systems
and suggesting alternatives.

==== I received an automatic mail asserting that I'm abusing a public login linux system. What now? ====

Do not ignore it.

 * If you ''are'' abusing it, according to the rules stated above, stop it and use the appropriate alternative. Contact uco for help if you think there is no acceptable alternative to doing it on the pubs.
 * If you are not, please contact uco and explain what you did and why you consider it legitimate.

This will allow us to adjust the policies or the abuse detection, or provide an acceptable alternative.

==== What happens if I keep ignoring these automatic notifications? ====

Eventually, your account will be added to a list of accounts with usage restrictions. All your processes will be set to nice level 19, have a hard CPU time limit of a few minutes, and may have a hard memory usage limit and other restrictions like a reduced I/O priority.

These measures do not prevent using these systems the way they're meant to be used. They just help to keep them usable for other users as well. They also make it possible again to monitor the systems properly and detect problems with hardware or configuration.

What is considered acceptable use of the public login linux systems?

Since these are shared between many users, and are low-end compared to the systems in the batch farm, please only use them for their intended purposes:

Acceptable:

  • connecting from outside with ssh and hopping to internal systems

  • desktop work (mail, browser, TeX, ...)

  • software development

    • building, short test runs (< 5 minutes, at nice level 19)

Not acceptable:

  • production runs, test runs longer than 5 minutes or without being nice 19

    • please use the batch farm for those
    • applies to any kind of software (experiment, mathematica, ...)

  • anything with huge memory requirements (significant compared to what the system has)

    • again, run these on the batch farm
  • transferring/processing larger amounts of data, both internally and from/to the outside

    • for internal transfers, again the batch farm can be used
    • for external transfers, see ../RemoteAccess

Frequently_Asked_Questions/PublicLoginSystems (last edited 2013-10-29 18:18:42 by StephanWiesand)